A Study of the Active Access-Point Conﬁguration Algorithm under Channel Bonding to Dual IEEE 802.11n and 11ac Interfaces in an Elastic WLAN System for IoT Applications

: Currently, Internet of Things (IoT) has become common in various applications, including smart factories, smart cities, and smart homes. In them, wireless local-area networks (WLANs) are widely used due to their high-speed data transfer, ﬂexible coverage ranges, and low costs. To enhance the performance, the WLAN conﬁguration should be optimized in dense WLAN environments where multiple access points (APs) and hosts exist. Previously, we have studied the active AP conﬁguration algorithm for dual interfaces using IEEE802.11n and 11ac protocols at each AP under non-channel bonding (non-CB) . In this paper, we study the algorithm considering the channel bonding (CB) to enhance its capacity by bonding two channels together. To improve the throughput estimation accuracy of the algorithm, the reduction factor is introduced at contending hosts for the same AP. For evaluations, we conducted extensive experiments using the WIMENT simulator and the testbed system using Raspberry Pi 4B APs. The results show that the estimated throughput is well matched with the measured one, and the proposal achieves the higher throughput with a smaller number of active APs than the previous conﬁgurations.


Introduction
Nowadays, Internet of Things (IoT) is gaining popularity all over the world with increasing the number of devices connected to the Internet. IoT has been widely deployed in various applications, including smart factories, smart cities, smart homes, smart grid systems, smart farms, smart warehouses, and smart healthcare systems [1][2][3][4][5][6].
Currently, a huge number of IoT devices are connected to the Internet through IEEE 802.11 WLANs, because their popularity has remarkably increased around the world due to high-speed data transfer, flexible coverage ranges, low costs, and easy installation. In WLAN, hosts are connected to the access point (AP) wirelessly, which makes it extensible and flexible compared with wired LAN. As a result, WLAN services are available in offices, schools, and public places, such as hotels, airports, malls, stations, and even trains and airplanes [15][16][17]. In traditional WLANs, hosts communicate with servers over the Internet, while IoT devices communicate with servers. In this paper, a host represents a smartphone, a PC, a tablet, or an IoT device that will be accessed to the Internet through WLAN. In a network field, multiple APs are often deployed to support a large number of users. Such situations are called dense WLAN environments. In dense WLAN environments, network performance can be degraded by radio-signal interference between nearby APs and hosts. To avoid the performance degradation as best as possible, the network configuration of the WLAN, such as activations/deactivations of APs and associations of hosts with active APs, should be properly optimized, according to traffic demands. If redundant APs exist, they should be deactivated to reduce energy consummations [18][19][20][21]. Therefore, we have proposed the active AP configuration algorithm to dynamically optimize the network configuration by activating or deactivating APs according to traffic demands [22].

Internet
The throughput performance in a WLAN is affected by various factors in an indoor environment. Therefore, we have studied the throughput estimation model with the parameter optimization algorithm [23], and the AP setup optimization approach in terms of the orientation and the height of the device [24].
The number of users using WLANs to access the Internet is increasing, resulting in fast growth of traffic. In order to meet the ever-increasing traffic, channel bonding (CB) was introduced in the IEEE 802.11n amendment for improving the network performance of WLANs. In the CB, two adjacent 20 MHz channels are bonded together to form one 40 MHz channel [16,25,26]. The IEEE 802.11ac and the IEEE 802.11ax may further extend the channel-boding feature by allowing 80 MHz or 160 MHz channels with four or eight single channels, respectively, refs. [27][28][29]. However, we did not consider them, since they are still not common in WLAN. In addition, our experiments using IEEE 802.11ax devices [30] show that the throughput performance does not reach the expected level. Therefore, their use will be in future works.
In [31], using orthogonal frequency division multiplexing (OFDM), the CB raises the number of sub-carriers from 52 to 108. To get higher throughput in this wide-band CB, the OFDM can transmit data using a multiple of narrow-band carriers.
However, the CB reduces the number of non-interfered channels and may increase interference between nearby APs and hosts due to wider channel bands in dense WLANs. In [32], Barrachina-Muñoz et al. demonstrated that a CB link can decrease the signal-tointerference-plus-noise ratio (SINR) at a distant host from the AP due to the wider channel bandwidth. A lower SINR may result in a slower modulation and coding scheme (MCS) that will cause lower throughput. The wider bandwidth of the CB link may also cause the hidden terminal problem.
A dual interface at an AP using 11n and 11ac at 2.4 GHz and 5 GHz frequency bands is an efficient approach to enhance the network's performance while avoiding interference. It can reduce the number of active APs, which can further reduce the interference. Therefore, we have studied the active AP configuration algorithm considering the dual interface [33] of a Raspberry Pi [34] AP adopting an external USB interface Archer T4U [35]. In this dual interface, the embedded one is used for 11n, and the external one is for 11ac.
However, the previous algorithm limits the non-channel bonding (non-CB). Thus, it should be extended to consider the CB. In addition, the algorithm selects the active APs and their host associations by estimating the throughput of a host using the throughput estimation model, where the estimation accuracy of the model is critical to determine the network performance. Thus, it should be improved under higher interference by the CB.
In this paper, we study the active AP configuration algorithm for the dual interface with channel bonding (CB) at the same AP. The goal of this algorithm is to find the AP configuration that minimizes the number of active APs in the WLAN under the minimum host throughput constraint for every host. The dual interfaces at the AP will operate at different frequency bands, which allows the AP to communicate with two hosts simultaneously without any interference between them. As a result, the dual interface can reduce interference between neighboring APs in the network and can solve the abovementioned problems in the CB. The main contributions of this paper are summarized as follows:

1.
We investigate the protocol selection at each Wi-Fi interface in a WLAN to make the best use of them in the proposed access point (AP) with the dual interfaces in the testbed system. From experiments, we show that the selection of 11n at 2.4 GHz at the embedded interface of Raspberry Pi and of 11ac at 5 GHz for the external USB interface Archer T4U has better performances.

2.
We present the modification of the active AP configuration algorithm to take into account the use of the dual interfaces and the channel bonding (CB), where the interfaces operate at different frequency bands with IEEE 802.11n and 11ac protocols, and the AP can communicate with two hosts simultaneously without any interference between them. 3.
We incorporate the throughput reduction factor into the throughput estimation model to improve the estimation accuracy when multiple hosts are associated with the same AP.

4.
We evaluated the proposal through both simulations using the WIMENT simulator [36] and experiments using the testbed system in real fields. The testbed system involved a Raspberry Pi with an external Archer T4U for the AP and Linux PCs for the hosts.
The rest of this paper is organized as follows: Section 2 presents related works in the literature. Section 3 reviews our previous works. Section 4 discusses the interface selection through experiments. Section 5 presents modifications of the active AP configuration algorithm. Section 6 evaluates the proposal through simulations and experiments. Finally, Section 7 provides concluding remarks with future works.

Related Works
In this section, we briefly discuss related works in the literature. In [37], Yan et al. presented an algorithm for AP deployment based on physical distance and channel isolation (DPDCI) in urban environments, which can effectively reduce interference and improve the system's overall throughput. The algorithm optimizes the placement of APs and allocates the channel to APs by adopting a genetic algorithm.
In [38], Tang et al. proposed a new optimal AP deployment (OAD) algorithm based on fuzzy C-clustering, which provides good performance in the maximum number of WLAN users and balanced the traffic load among the APs.
In [39], Tian et al. proposed a genetic algorithm Cramer-Rao lower bound (GA-CRLB) method for finding optimal AP positioning that maximizes localization accuracy and coverage simultaneously. This method adopted CRLB as an evaluation methodology for evaluating the localization accuracy of the deployment plan, and then the genetic algorithm was used to rapidly find the optimal AP deployment strategy.
In [40], Wan et al. jointly presented a user association and bandwidth allocation algorithm called the bandwidth-constrained association (BCA) to maximize the total network throughput while satisfying user device bandwidth requirements. They adopted an efficient polynomial time method for producing the best user association.
In [41], Islam et al. presented a joint AP association and bandwidth-allocation scheme in order to optimize network throughput and utilization taking into account access points' (APs) capacity and user demand. They adopted the rounding and bandwidth allocation algorithm (RBAA) for this model.
In [42,43], Zhi et al. and Liu et al. proposed novel AP deployment methods by using a genetic algorithm (GA) and fruit fly optimization algorithm (FOA), respectively. In both proposals, the AP locations and the transmit powers of all the activated APs are optimized while ensuring complete coverage of the desired service area.
In [44], Liu et al. proposed analytical expressions to measure the throughput performance of WLAN while considering the inter-network interference. They adopted the airtime concept to express the simultaneous transmission time and the carrier-sensing duration to understand the carrier-sensing duration for this proposal.
In [45], Kong et al. proposed a method for optimizing AP deployment based on the multi-purpose particle swarm optimisation algorithm (MOPSO). First, the performance of a single AP was evaluated using the random geometry theory to estimate the number of APs that should be deployed in the WLAN, based on the user's service needs. Then, the proposed scheme uses the MOPSO algorithm to obtain the optimal position and optimal transmit power of the APs. Finally, a greedy algorithm is used in order to remove the redundant APs.
In [46], Qiu et al. presented a joint optimization method for the placement of access points, power assignment, channel assignment, and resource unit assignment in dense IEEE 802.11ax WLAN. The objective of the proposal is to reduce the cost regarding the number of access points (APs) while meeting the requirements of specified failure tolerance and a specified two-tier flow. The authors designed a heuristic algorithm based on polynomial time complexity in order to find high-quality solutions and compared the throughput results to the greedy and random solution.
In [47], Abusubaih et al. analyzed the ability of IEEE 802.11n dual-band APs to support heterogeneous client adapters and applications. By testbed experiments, they concluded that dual-band APs can effectively reduce the negative effects of heterogeneity on clients' network adapters.
In [48], Nishat et al. proposed a QoS differentiation scheme called Slickfi for highspeed WLANs. It aims to enhance the real-time application performance while maintaining the high network throughput. It achieves the high performance by isolating real-time traffic and data traffic using two radios in APs managing adjacent-channel interference and allowing the per-frame channel width adaptation to maximize the network throughput. Table 1 overviews the comparison between our proposal and the existing approaches in the literature. Most of them improve the network performance with a single interface at the AP, whereas none of them adopt the IEEE 802.11n and 11ac dual interfaces at the AP to minimize the number of active APs according to the user demand and to improve the network's performance.

Review of Previous Works
In this section, we review our previous works related to this paper.

Throughput Estimation Model
The throughput estimation model is used to estimate the throughput of a wireless communication link between a source node and a destination node in a WLAN. First, it estimates the received signal strength (RSS) using the log-distance path-loss model at the destination node [49]. Then, the sigmoid function is used to convert the RSS into throughput.

Received Signal Strength Estimation
First, the Euclidean distance d (m) is calculated for each link (AP/host pair) by: where AP x and H x represent the x coordinate of the AP and the host; and AP y and H y represent the y coordinate, respectively. After that, the received signal strength (RSS) P d (−dBm) is estimated at the host by: where P 1 represents RSS from the AP to the host at the 1 m distance when there is no obstacle; α represents the path loss exponent; n k is the number of type_k obstacles or walls along the route between the AP and the host; and W k represents the signal attenuation ratio (dBm) for the type_k (k = 1, 2, . . . , 6) obstacle. It is noted that in a building, there are several types of walls that have different thicknesses and materials, which make the different signal attenuation factors.
The value of α depends on the specific environment in which the radio signal is propagating. It represents the amount of loss that the signal will experience as it propagates through the environment. type_k obstacles represent the obstacles or walls that have the k-th signal attenuation factor W k . In this paper, we consider six types of obstacles, namely, the corridor wall for W 1 , the partition wall for W 2 , the intervening wall for W 3 , the glass wall for W 4 , the elevator wall for W 5 , and the door for W 6 [24].

Throughput Estimation from Received Signal Strength
From received signal strength P d , the throughput/link speed is calculated by using the sigmoid function [24]: where tp represents the estimated throughput (Mbps); P d does RSS (−dBm) at the host; and a, b, and c are constant parameters obtained using measurements. These values are optimized by the parameter optimization tool [23] in Table 2.

Throughput Reduction Factor
When multiple hosts are communicating with an AP simultaneously, the throughput reduction factor is introduced in our model to improve the estimation accuracy [50]. It is calculated by: tp × sr f (m) (4) where m is the number of hosts communicating with AP, tp represents the estimated single link throughput between AP i and host j , and sr f (m) is the empirically derived contention factor at AP i among the associated hosts for sending data through the CSMA/CA protocol.

Model Parameter Optimization
The throughput estimation model has multiple parameters whose value determines the accuracy of the estimation. The parameter optimization tool is adopted to optimize these values. It adopts a local search method that adopts the tabu table and the hill-climbing function together in order to avoid a local minimum convergence [23]. Table 2 demonstrates the summary of the parameter optimization results for throughput estimation models that are used for two fields in this paper for 11n and 11ac, Field #1 and Field #2 [24]. Field #1 represents the third floor of Engineering Building #2 in Figure 2.

Elastic WLAN System
The elastic WLAN system has been designed and implemented to dynamically optimize the network topology and the configuration in accordance with the network conditions. Figure 4 depicts an example topology of the system. The elastic WLAN system implementation adopts the management server to manage and control the hosts and the APs by running the active AP configuration algorithm [22]. This server has not only administrative access to all devices in the network but also controls the overall network using the following three procedures:

1.
It explores all network devices and also collects the information that are required for the active AP configuration algorithm.

2.
After that, it executes the active AP configuration algorithm through the derived inputs from the previous step. The output of the algorithm contains the list of the active APs, the host associations, and the assigned channels of each active AP.

3.
Finally, it applies the algorithm output into the network by changing the host associations, activating or deactivating the specified APs, and allocating the channels to the APs.

Active AP Configuration Algorithm for Dual Interfaces
The active AP configuration algorithm selects the active APs and their host associations that can minimize the number of active APs with dual interfaces under the minimum host throughput constraint. Figure 5 shows the flow chart for the active AP configuration algorithm for the dual interface.

Formulation
The problem formulation for this algorithm is formulated as follows:

1.
Inputs: • number of hosts: H, • number of APs: N, • estimated throughput between AP i and host j for i = 1 to N, j = 1 to H at each interface: tp ij , • minimum throughput for the association: S, • number of orthogonal channels (OCs) for each interface: C, • minimum host throughput: G, • available total throughput: B a .

2.
Outputs: • set of active APs with dual interfaces, • set of hosts associated with each interface at every active AP, • channel assigned to each interface at every active AP.

3.
Objectives: • E 1 represents the number of active access points (APs) with the dual interfaces to be minimized under the minimum host throughput constraint: • holding to the first objective, to maximize the minimum average host throughput E 2 : where TH j represents the average host throughput for AP j that is given by: where tp represents the link speed between node j and node k (link jk ).
• holding to the two objectives, to minimize the total interfered communication time E 3 for channel assignments: where T k is the AP i total communication time, I i represents the set of the APs interfered with AP i , and c i indicates the channel assigned to AP i .

Constraints:
• minimum host throughput: the throughput of any host must be larger than or equal to the minimum host throughput G on average when all the hosts are communicating simultaneously. • total throughput: the total throughputs for all the hosts must be smaller than or equal to the available total throughput B a . • channel assignment: each interface of an AP must be assigned a channel.

Algorithm Procedure
The algorithm consists of three phases. The procedure is described as follows: 1.
First Phase: The first phase of the algorithm selects the active APs with the dual interface and their host associations to minimize E 1 and maximize E 2 [33].
(a) Preprocessing: Initially, the APs and the hosts locations are used as inputs of the algorithm. The AP locations are selected manually in the network, taking into account the electrical power supply, the coverage, and user demands. The throughput is estimated using the throughput estimation model in Equation (3) for every possible pair of AP and host. In addition, the 11n interface of an AP is chosen as the initial candidate one for any host. (b) Initial Solution Generation: Greedy algorithm is adopted to calculate the initial solution E 1 [51]. (c) Host Association Improvement: The minimum host throughput and the overall throughput in the network are improved by randomly changing the host association according to the procedure in [22]. (d) AP Selection Optimization: This phase optimizes the selection of number of active dual interfaces APs and the AP-host associations in order to further minimize both E 1 and E 2 using the local search method [52]. (e) Link Speed Normalization: The fairness criterion will be used if the total expected bandwidth is greater than B a . Next, the speed of the link has been normalized. (f) Termination Check: If either of the two interfaces for each current AP is not activated, then activate the interface and apply the host association improvement phase. After that, the algorithm will be terminated and proceed to phase 2 if the minimum throughput constraint of the host is satisfied. If not, proceed to the AP selection optimization phase.

2.
Second Phase: The second phase assigns a channel to each active AP interface to minimize E 3 [22]. Interfered AP Set Generation: The set of interfering AP interfaces is found for each AP interface. (c) Initial Solution Construction: The greedy algorithm is adopted to calculate the the initial solution. (d) Solution Improvement by Simulated Annealing: Simulated annealing (SA) is the probabilistic optimization technique that can be used to improve the solution by gradually adjusting the solution over time. In our proposal, the SA is used to optimize the channel assignment for each interface of every active AP to improve the performance of the network. The SA procedure is used with the constant temperature T SA for the repeating times R SA , where T SA and R SA are given as the algorithm parameters.

3.
Third Phase: The third phase averages the loads among the different channels in order to minimize E 3 [22].
(a) Initialization: The AP flag is initialized with 0(= OFF) in every AP. This flag is used to prevent the re-processing of the same AP again. (b) AP Selection: One OFF flag AP is chosen to move its associated host to a different AP to which a different channel is assigned. (c) Host Selection: One associated host with the selected AP is selected to perform the AP movement. (d) Change Application: Finally, the new associated AP is selected for that host.

Interface Selection
In this section, we examine the two cases of interface selections through experiments. In addition, we introduce the throughput reduction factor to improve the estimation accuracy under higher interference and examine the estimation accuracy in the experimental results.

Experimental Setup for Interface Selection
Raspberry Pi 4B is a small, low-powered, card-sized, and single-board computer. It can be used in a variety of practical systems requiring some computation or networking abilities. It has a built-in wireless network interface (NIC) that supports IEEE 802.11n and 11ac. By using hostapd software, it can be used as a software AP in WLAN [53].
Archer T4U is a wireless adapter and is designed to work with the latest wireless standards, including IEEE 802.11ac, to allow faster data transfers and wider ranges. It has a high-performance antenna that is designed to improve the signal strength and reduce interference. Therefore, we can realize the AP that has two network interfaces with a low cost.
In WLAN, the throughput performance can be different by the protocol selections of the embedded NIC and the external one. We consider the two groups for Raspberry Pi and Archer T4u adapter for measurements as follows: Group A: Raspberry Pi for 11n at 2.4 GHz and external for 11ac at 5 GHz. Group B: Raspberry Pi for 11ac at 5 GHz and external for 11n at 2.4 GHz. Firstly, we conducted experiments by measuring the single link throughput for two network topologies. Figure 6 illustrates the experimental field on the 3rd floor of Engineering Building #2 at Okayama University. The host locations are represented by circles, and the AP locations are represented by triangles. The 40 MHz bonded channel is used for both interfaces. The dual interfaces were configured through the commands in [33].   Figure, 11n Mea. and 11ac Mea. represent the measured throughput for the 11n and 11ac interface; 11n Est. and 11ac Est. represent the estimated throughput for the 11n and 11ac interface. For both interfaces, the throughput is estimated using Equation (3) by the parameter optimization tool in Table 2.

Throughput Results
To obtain more accurate results, we choose 14 different host locations in the experimental field with two different AP positions. Figures 7 and 8 show that Group A is better than Group B for the dual interface, and the measured throughput and the estimated throughput matched well for each host position. In Group A, Raspberry Pi is used for 11n and Archer T4U is 11ac, and in Group B, they are opposites. The performance of Group A is better than that of Group B, because Archer T4U used the more advanced wireless chipset and a higher-quality antenna than Raspberry Pi, which can enhance the throughput performance when Archer T4U is used for the faster communication protocol of 11ac at 5 GHz. Thus, we should use the built-in wireless network interface card (NIC) of the Raspberry Pi device for 11n, and the Archer T4U wireless NIC adapter is for 11ac.

Modification of Active AP Configuration Algorithm
In this section, we modify the active AP configuration algorithm for dual interfaces with the channel bonding (CB).

Modifications of the Problem Formulation
The objectives of the problem formulation for the algorithm is modified to consider CB as follows:

1.
Objectives: The average host throughput calculation of AP j in Equation (8) is modified as follows:

Extension of the Algorithm's Procedure
Host association improvement in the first phase of the algorithm procedure is modified: Change the association of each host to the interface of AP which provides the highest throughput using Equation (4) within the associable AP interfaces. At this stage, compute the cost function E 2 and keep it as the best found cost function, E best 2 .

2.
Find the interface of AP that provides the lowest host throughput using Equation (7). Then, make the modifiable hosts list that are associated with the AP interface, which can be connected with another AP interfaces.

3.
Choose one host at random from the list of modifiable hosts.

Evaluations
In this section, we evaluate the proposal through simulations using the WIMNET simulator and experiments using the testbed system.

Simulation Setup
Originally, the WIMNET simulator [36] was developed to evaluate the performance of a large-scale wireless Internet-access mesh network on a standard PC with a reasonable CPU time. The simulator has been modified to be used in conventional WLAN simulations with multiple access points. It has been used to simulate various WLANs, including different topologies, channel models, and interference conditions. Tables 3 and 4 show the hardware and software specifications in the simulations using the WIMNET simulator.

Experimental Setup
In the experiments, Raspberry Pi 4B is used for each access point (AP) by running hostapd [54]. The embedded wireless NIC is used for the 11n interface, and the Archer T4U wireless NIC adapter is used for the 11ac interface. The Linux laptop PCs are used for the client hosts and server. For both interfaces, the 40 MHz bonded channel is used. The hardware and software presented in Table 5 are taken into account in the measurements.
To set the bonded channel for both interfaces, we can modify the /etc/hostapd/ hostapd.conf file using the following Linux commands: The [HT40+] needs to set the 20 MHz primary channel in the /etc/hostapd/ hostapd.conf file. Then, the primary channel will be bonded with the secondary channel to form the 40 MHz channel. iperf 2.0.5 [55] software is adopted for the throughput measurements as a popular tool for measuring the TCP throughput by sending TCP packets from the server to the host. host. The TCP traffic at a link automatically saturates by this software. The TCP traffic was generated for each measurement point in this paper using a 477 KB TCP window size and an 8 KB buffer size for four minutes at intervals of 30 s, which was conducted twice on different days. Then, the average value is calculated for each point and is shown in this paper. The packet size of the generated TCP traffic is 1500 bytes. For each point, the average of the measured throughput is computed over four minutes at 30 s intervals on two separate days in order to eliminate the fluctuations in measurements.
The elastic WLAN testbed system using Raspberry Pi APs with single interfaces was implemented and used in [13,14,22,[56][57][58]. We extend this testbed by adding Archer T4U at the AP for the dual interface, as shown in Figure 9. The testbed included four Linux laptop PCs for the hosts and one Linux laptop PC for the server that is used to collect the necessary information for the active AP configuration algorithm and controls the APs and the hosts. This server controls the overall system through the following steps: 1.
The server obtains active all the APs in the network.

2.
It collects the information of the connected devices in the network using arp-scan-tool in Linux, which includes the IP and MAC addresses of the APs and the hosts.

3.
It collects the receiving signal strength (RSS) at each host from each AP using nm-tool.

4.
It converts the RSS to the throughput using the sigmoid function in [23].

5.
It executes the active AP configuration algorithm using the inputs derived in the previous steps and obtains the algorithm output that consists of the number of active APs, the host associations, and the channels assigned to the active APs. 6.
It activates or deactivates the APs in the network according to the algorithm output using the following command. $ sudo /etc/init.d/hostapd start $ sudo /etc/init.d/hostapd stop 7.
It changes the associations of the hosts with the APs according to the algorithm output using nmcli-tool.

8.
It assigns the channels to the APs according to the algorithm output using sed-tool. Wi l L Figure 9. Testbed topology for dual interface.

Network Fields
The 3rd floor of Engineering Building #2 and the 2nd floor of Graduate School Building at Okayama University were considered as the network fields for simulations and experiments. Figures 2 and 3 illustrate the network topologies with the AP and host locations in the two fields, respectively. For each topology, we considered five APs with ten hosts. The two different network environments were chosen to show the results in different environments. In both fields, several other WLANs were observed, which may have caused interference in our experiments. In the daytime, a large number of wireless devices, such as smartphones, laptops, and IoT devices, transmit wireless signals. Thus, the daytime situation will make it difficult to measure the performance of the WLAN accurately. The signals from other devices can interfere with the signals being transmitted by the devices under testing, which can result in inaccurate throughput measurements. At night, fewer wireless devices will transmit signals. Thus, the level of interference can be reduced and will make it easier to accurately measure the performance of a WLAN. Table 6 shows the simulation and measurement results for the two fields. The min. host thro. cons. G (Mbps) represents the threshold value for the minimum host throughput constraint. This value is used as the benchmark. All the hosts in the network should achieve it regardless of the relative distances from the associated APs. In our study, the value was selected manually, taking into account the number of hosts, the number of APs, and the overall network capacity of the WLAN. The number of active APs should be increased when this constant is not satisfied. In Table 6, the ave. min. host thro. (Mbps) represents the average minimum host throughput (Mbps), and the ave. overall thro. (Mbps) represents the average overall throughput in the network. The sim. represents the simulation results, and mea. represents the measurement results.

Results and Discussions
Note: field #1 in Table 6 corresponds to Engineering Building #2. The minimum host throughput constraint is applied with G = 10 Mbps and G = 25 Mbps. The throughput results from the simulation are well matched with the measurement results in any topology.
This confirms the accuracy of the proposed algorithm, and the use of the dual interface at the AP can minimize the number of active APs.
In addition, field #2 in Table 6 corresponds to Graduate School Building. The same minimum host throughput constraint is considered in this field. Again, the throughput results by the simulation are well matched with the measurement results in each topology. Thus, the accuracy and effectiveness of the proposed algorithm are confirmed.
Additionally, we evaluated the proposal by comparing the performances between the single 11ac interface case and the dual interface case when the same number of APs are activated. As shown in Table 7, both the minimum host throughput and the average overall throughput results were increased by the proposal. The dual interfaces at the AP operated at different frequency bands. It allows one AP to communicate with two hosts simultaneously without interference. In addition, it can reduce interference between neighboring APs in a dense WLAN, because the number of active APs can be reduced. As a result, the performance of the proposal is greater than that of the single 11ac interface case. The measured throughput results are well-matched with the simulated ones in any case. It is confirmed that the proposal provides higher overall throughput than 11ac only when the same number of APs are activated.

Comparisons with Previous Studies
To clarify the effectiveness of the proposed extended algorithm, we conducted simulations and experiments using the same network configuration as that for our previous algorithm [33]. Table 8 shows the simulation and measurement results for both the single interface and the dual interface under non-CB cases in both experimental fields when the same number of APs was activated as before. The results in Table 8 show that the average minimum host throughput and the average overall throughput results become smaller due to the smaller channel bandwidth, compared with the proposal. Figures 10-13 show the average overall throughput with respect to the number of active APs for each topology for both CB and non-CB cases. It is noted that the simulated results are well-matched with the measured ones for all the cases. This confirms that the proposal with the CB provides higher throughput than the previous one with the non-CB, regardless of the higher interference.         To compare the throughput performance of our approach with that of an existing approach, the band-steering (BSTR) method using the dual interfaces [59] was considered in experiments. In this method, each host is associated with the AP that provides the highest received signal strength indicator (RSSI) among the active APs.
The same number of active APs with dual interfaces and the same number of hosts are used as the ones for the proposal. Figures 14 and 15 show the average minimum host throughput and the average overall throughput results with respect to the number of active APs in Engineering Building #2 at Okayama University as the network field by BSTR and by the proposal. The results suggest that the proposal provides higher throughput than BSTR in any case. Thus, the effectiveness of the proposal has been confirmed.

Conclusions
This paper studied the active access-point (AP) configuration algorithm for the IEEE 802.11n/ac wireless local-area network (WLAN) with dual network interfaces and channel bonding for the APs. The main goal of this algorithm is to optimize the number of active APs where each host satisfies the minimum host throughput constraint in the network. By reducing the number of active APs, it also aims to reduce the amount of energy consumed by the network. The effectiveness of the proposed algorithm was confirmed through extensive simulations using the WIMNET simulator and testbed experiments using Raspberry Pi with the external interface in two different network fields. In future works, we will further improve the AP configuration algorithm by considering partially overlapping channels, transmission power optimizations, and the 11ax protocol. Then, we will evaluate our proposals in various network fields and topologies to confirm their effectiveness.