Skip to main content
Log in

The Claim-based Priority-Discriminated Channel Access (CPDCA) Method using the Registered Backoff Time Mechanism for IEEE 802.11ah

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

IEEE 802.11ah is a protocol that adopts the CSMA/CA-based channel access way for Internet of Thing (IOT). This work proposed a newly devised Restricted Access Window (RAW) called the Claiming RAW to let those spontaneous stations having high priority’s uplinked data frames do claims of intending to uplink high priority’s data to reduce collisions. In addition, instead of generating the random backoff time after the collision happens, which the regular CSMA/CA-based 802.11* protocols adopt, this work adopted the registered backoff time mechanism, for which a station registers its next backoff time to IEEE 802.11ah AP when its current channel access is finished, i.e., a station generates the backoff time before the collision happens. Thus, IEEE 802.11ah AP is able to schedule stations’ channel accesses based on stations’ registered backoff time to avoid collisions more effectively. Through the use of the Claiming RAW and the registered backoff time mechanisms, IEEE 802.11ah AP can know which stations have high priority’s uplinked data frames and then schedule these stations to have the higher privilege to access the channel. The simulation results shown that. Comparing with the traditional IEEE 802.11ah, the simulation results shown that the proposed Claim-based Priority-Discriminated Channel Access (CPDCA)method has a lower collision rate and higher throughput in the network environment having the higher number of stations in each time slot; the transmission time of those stations with high priority’s uplinked data frames using the CPDCA mechanism is much lower than that of using the traditional IEEE 802.11ah.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data Availability

All data supporting the findings of this study are available within the paper.

References

  1. Abbasi M, Yaghmaee MH, Rahnama F (2019) "Internet of Things in Agriculture: A Survey," Proceedings of the 3rd International Conference on Internet of Things and Applications (IoT), pp. 1–12

  2. Habibzadeh H, Dinesh K, RajabiShishvan O, Boggio-Dandry A, Sharma G, Soyata T (2020) A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective. IEEE Internet Things J 7(1):53–71

    Article  Google Scholar 

  3. Dai H, Zheng Z, Zhang Y (2019) Blockchain for Internet of Things: A Survey. IEEE Internet Things J 6(5):8076–8094

    Article  Google Scholar 

  4. Tyagi D, Agrawal R, Singh HM (2018) "A Survey on MAC Layer Protocols for Machine to Machine Communication," Proceedings of the International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 285–288

  5. (2017) "IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation," IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11–2016, as amended by IEEE Std 802.11ai-2016), pp. 1–594

  6. Liu Y, Guo J, Orlik P, Nagai Y, Watanabe K, Sumi T (2018) "Coexistence of 802.11ah and 802.15.4g Networks," Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6

  7. Meera MS, Rao SN (2017) "A Survey of the State of the Art of 802.11ah," Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4

  8. Qiao L, Zheng Z, Cui W, Wang L (2018) "A Survey on Wi-Fi HaLow Technology for Internet of Things," Proceedings of the 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), pp. 1–5

  9. Huang CM, Cheng RS, Li YM (2019) "The Registration-Based Collision Avoidance Mechanism for IEEE 802.11ah," Proceedings of the 16th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN), pp. 240–255

  10. Kim J, Yeom I (2017) "QoS enhanced channel access in IEEE 802.11ah networks," Proceedings of the 17th International Symposium on Communications and Information Technologies (ISCIT), pp. 1–6

  11. Charania NF, Giluka MK, Tamma BR, Franklin A (2017) "Dearf: Delay and Energy Aware Raw Formation Scheme to Support Delay Sensitive M2M Traffic in IEEE 802.11 ah Networks," arXiv preprint arXiv:1709.03723

  12. Ahmed N, De D, Hussain MI (2018) "A QoS-aware MAC Protocol for IEEE 802.11ah-based Internet of Things," Proceedings of the 15th International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1–5

  13. Cheng Y, Zhou H, Yang D (2018) "Performance Evaluation of IEEE 802.11ah Triggered Restricted Access Window Mode in Industrial Real-Time Applications," Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), pp. 325–329

  14. Chang T, Lin C, Lin KC, Chen W (2019) Traffic-Aware Sensor Grouping for IEEE 802.11ah Networks: Regression based Analysis and Design. Proc IEEE Trans Mob Comput 18(3):674–687

    Article  Google Scholar 

  15. Mosavat-Jahromi H, Li Y, Cai L (2019) "A Throughput Fairness-based Grouping Strategy for Dense IEEE 802.11ah Networks," Proceedings of the 30th IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1–6

  16. Zhang X, Yeung KL (2018) "A Novel AID Shuffle Mechanism for RAW Slot Assignment in IEEE 802.11ah Networks," Proceedings of the 43rd IEEE Conference on Local Computer Networks (LCN), pp. 159–166

Download references

Acknowledgements

This work was supported by the Ministry of Science and Technology (MOST), Taiwan (R.O.C.) under the grant number MOST 108-2221-E-006-056-MY3, MOST 109-2221-E-240-002-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rung-Shiang Cheng.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, CM., Cheng, RS. & Pan, YJ. The Claim-based Priority-Discriminated Channel Access (CPDCA) Method using the Registered Backoff Time Mechanism for IEEE 802.11ah. Mobile Netw Appl 28, 1096–1115 (2023). https://doi.org/10.1007/s11036-023-02153-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-023-02153-3

Keywords

Navigation