Abstract
IEEE 802.11ah defines amendments to IEEE 802.11 to support the Internet of Things (IoT). IEEE 802.11ah implements restricted access window (RAW) mechanism to reduce the contention and energy consumption in dense IoT networks. The RAW mechanism is a group-based MAC protocol that partitions the devices into various groups and confines the channel access of a group of devices to the restricted time interval known as the RAW slot. However, the standard does not specify, grouping mechanism, duration of RAW slots, and the number of RAW slots while configuring the RAW mechanism. In an IoT network, each device has distinct transmission requirements. Thus, it is necessary to find the optimal number of RAW slots that can maximize the network performance, to group the devices with similar transmission requirements and to assign a RAW slot that adaptively varies with the traffic requirements of the respective group. In this paper, we exploit fuzzy logic to find the optimal number of RAW slots by considering network size, collision probability, and modulation and coding schemes. Further, we propose a traffic-aware adaptive RAW slot allocation (TARA) scheme that uses fuzzy c-means clustering algorithm to group the devices with similar traffic requirements and to assign each group with a RAW slot whose duration adaptively varies with the transmission requirements of the devices. We have also presented a simple yet accurate analytical model to evaluate the performance of the RAW mechanism. Results show that the optimal number of RAW slots found using fuzzy logic significantly enhances the performance of the RAW mechanism in terms of throughput and energy consumption. Further, it is observed that the TARA scheme can effectively meet the traffic requirements of different group of devices when compared to the uniform grouping scheme. Finally, extensive simulations are conducted using ns-3 to validate the analytical results.
Keywords
Introduction
Internet of Things (IoT) is an emerging trend and a new revolution in technology. It interconnects every living and non-living things together through the Internet to enrich the quality of human life.It seamlessly connects myriads of things and evolves as a vast and powerful heterogeneous network. Things in the IoT network includes not only people but also trees, gadgets, vehicles and everything from large industrial equipment to small household objects. Everyday objects in IoT are equipped with sensors, actuators, processors, and communication interfaces to communicate with each other without human intervention [1]. According to a forecast, 50 billion devices will be interconnected through the Internet by 2020 [2]. This paradigm has numerous applications in environmental and disaster monitoring, vehicular transportation system, smart grids, clinical aids, farming, home automation, and many others [3].
The standardization of IoT is a challenging task. Because, IoT requires a networking technology that can provide large-scale connectivity, broad coverage, and high energy efficiency. Technologies like RFID, Bluetooth, Zigbee etc. are recommended because of their higher data rates, lower energy consumption, but they have limited coverage and scalability. On the other hand, WiMAX and LTE have extensive coverage and high data rates, but consumes more energy. Hence, these technologies are not suitable for IoT [4].
Despite being a popular WLAN standard, IEEE 802.11 suffers from severe contention in the dense networks. To get around the trade-off among the existing wireless networking technologies, IEEE 802.11ah is introduced by the IEEE 802 LAN/MAN standards committee (LMSC) to support IoT applications [5, 6]. IEEE 802.11ah operates at sub 1 GHz ISM frequency bands. The standard provides a broad coverage up to 1 km, a data rate of 78 Mbps and connectivity to 8000 devices [7].
IEEE 802.11ah standard introduces restricted access window (RAW), a group-based MAC protocol, to reduce the channel contention and the energy consumption in dense networks [8]. However, the access point (AP) faces a few challenges while configuring the RAW mechanism. First, the RAW mechanism partitions the network into several groups. Unfortunately, the IEEE 802.11ah draft standard does not specify any grouping schemes. Thus, the design of the grouping schemes is still an open research issue. Most of the existing literature uses the uniform grouping (UG) scheme as the default grouping scheme [9–11], because the UG scheme is simple to implement as it divides the network into an equal number of groups and does not consider any constraints of the devices. Second, the channel time is partitioned into several RAW slots and each RAW slot is assigned to a group of devices. One of the most challenging tasks is to find the optimal number of RAW slots that can maximize the network performance. Because choosing a lesser number of RAW slots increases the number of devices per group and rises the contention in the network. On the other hand, choosing a higher number of RAW slots results in wastage of channel resources. Next is the duration of each RAW slot. Because every device in the network has distinct transmission requirements. For example, a temperature sensor monitoring a hot surface plate or a heartbeat sensor monitoring the patient health has different sampling rates and channel access requirements. So both the nodes cannot be assigned with a RAW slot of equal duration. Thus, it is necessary to adaptively vary the duration of RAW slots according to the transmission requirements of the devices rather than providing them with a RAW slot of equal duration [12].
In this article, we exploit the fuzzy logic system (FLS) to find the optimal number of RAW slots. The FLS considers network size, collision probability, and modulation and coding schemes (MCSs) as inputs to find the optimal number of RAW slots1. Further, we propose a traffic-aware adaptive RAW slot allocation (TARA) scheme that uses fuzzy c-means (FCM) clustering algorithm to group the devices with similar transmission requirements and to allocate each group with a RAW slot whose duration adaptively varies according to the transmission requirements of the devices. The throughput and energy consumption of the RAW mechanism is assessed using the proposed scheme with a simple yet accurate analytical model. The analytical model presented in this paper is based on [13, 14]. The performance of RAW mechanism is evaluated using the TARA scheme and compared with the UG scheme. The results show that the proposed scheme outperforms the UG scheme and significantly enhances the performance of the RAW mechanism.
Rest of the paper is organized as follows: Section 2 presents the related work done. Section 3 discuss the salient features of IEEE 802.11ah protocol. Section 4 presents an analytical model to evaluate the performance of the RAW mechanism. Finding the optimal number of RAW slots using fuzzy logic is proposed in Section 5. TARA scheme is proposed in Section 6. Section 7 discusses the analytical and simulation results. Finally, Section 8 concludes the paper. The major contributions of this paper are summarized as: Motivated by soft computing techniques, a novel method is proposed to find the optimal number of RAW slots using fuzzy logic. This scheme provides the optimal number of RAW slots by considering the network size, collision probability, and MCSs. We exploit fuzzy logic to design TARA scheme that classifies the devices into several groups and adaptively vary the duration of a RAW slot according to the channel requirements of each group of devices. A simple yet accurate analytical model is presented to evaluate the performance of the RAW mechanism in terms of saturation throughput and energy consumption per bit. Using this analytical model the performance of RAW mechanism is evaluated with the optimal number of RAW slots and results are compared with the non-optimal number of RAW slots. Further, this model is used to evaluate the performance of the TARA scheme and compare it with the UG scheme. Results show that the optimal number of RAW slots found using the fuzzy logic approach significantly increases the throughput and decreases energy consumption. It is also observed that the TARA scheme can effectively meet the traffic requirements of different group of devices. The analytical results are corroborated by extensive ns-3 simulations.
Related work
Many works have been proposed to assess the performance of IEEE 802.11ah draft standard. Tian et al. in [8], found throughput, latency, and energy consumption to assess the performance of the RAW mechanism. In [15], authors considered non-cross slot boundary case and proposed various holding schemes to assess the performance of the RAW mechanism. Authors in [16], evaluated the range and bit error rate for the outdoor urban environment under multi-path fading in IEEE 802.11ah network. To reduce RTS collisions in large networks and increase the performance of the system, a sector-based RTS/CTS access scheme is introduced in [17]. Hidden matrix-based regrouping algorithm is proposed in [18] to elevate hidden nodes in the network.
Duration of RAW plays a vital role in network performance. Park et al. in [19] found the optimal RAW parameters by relating the number of devices and the size of the RAW period to maximize the success probability. In [20], authors extended the connectivity using relay nodes and found the duration of the RAW period by using traffic intensity. In [21], the authors provided the guidelines to choose the number of groups based on the traffic arrival rate and duration of the beacon interval. Khorov et al. in [22] discussed the process of estimating the number of devices to select an appropriate RAW slot by finding the distribution of time required by the devices to transmit their frames.
Scalability is the other important feature in IEEE 802.11ah. RAW divides a large network into several groups and allows each group to contend in their respective RAW slot. Unfortunately, IEEE 802.11ah standard does not provide any grouping schemes in the draft. The authors in [23] proposed a simple grouping scheme to mitigate contention by dividing the network into various groups. The scheme divides the network into several groups and selects a group head to minimize the channel contention. Tung et al. in [24], proposed a load-balanced grouping for a saturated network to improve the channel utilization. A simple spatial grouping based on geographic division strategy to decrease the collision probability by reducing hidden node pairs is proposed in [25]. In [26], authors proposed a grouping model based on the measurement of received signal strength.
In [27], authors hasten the association between AP and the network devices by proposing a linear dependence of link set-up time to the number of associating devices. Authors in [28] used probability theory to propose an access window algorithm to optimize the uplink communication energy consumption in 802.11ah networks.
Many works have been published in the literature based on fuzzy logic and its application in wireless networks. Most of the works present clustering algorithms, routing protocols, techniques to improve the energy consumption and lifetime of the network. In [29], authors presented a fuzzy-based clustering architecture to improve the energy consumption and network lifetime. Similarly, authors in [30] proposed a clustering method to extend the network lifetime. Authors in [31] predicted the residual energy of the devices and clusters them using the fuzzy logic. A novel energy efficient routing protocol is presented in [32] based on fuzzy logic. In [33], authors presented power allocation scheme for cooperative and delay constrained energy harvesting nodes.
Many schemes were developed to evaluate the performance of 802.11ah and its RAW mechanism. In this paper, a novel scheme is proposed to find the optimal number of RAW slots using fuzzy logic. Further, TARA scheme is proposed to group the devices and adaptively allocate the RAW slot to each group-based on their transmission requirements. Then, the throughput and energy consumption of the IEEE 802.11ah RAW mechanism is assessed using the optimal number of RAW slots found using the fuzzy approach in a dense IoT network. It is observed that the optimal number of RAW slots can significantly improve the throughput and reduce energy consumption. It is also shown that the proposed TARA scheme can effectively meet the traffic requirements of different group of devices.
IEEE 802.11ah: A wireless LAN standard
IEEE 802.11ah IEEE 802.11ah defines amendments to IEEE 802.11 to support IoT [34, 35]. The emerging wireless standard provides better performance in terms of connectivity, throughput, coverage, and energy consumption in dense networks. This section emphasizes the notable features of the IEEE 802.11ah standard.
Physical layer
The IEEE 802.11ah PHY layer inherits the salient features of IEEE 802.11ac standard [36]. The standard operates in sub 1 GHz (S1G) license-exempt spectrum and supports 1 MHz, 2 MHz, 4 MHz, 8 MHz, and 16 MHz channels. The availability of S1G spectrum differs from country to country. The standard adopts orthogonal frequency division multiplexing (OFDM), multiple-input multiple-output (MIMO) and downlink multi-user MIMO (DL MU-MIMO). IEEE 802.11ah inherits ten different modulation and coding schemes (MCS0-MCS9) with different data rates that are one-tenth of IEEE 802.11ac. Among all the MCSs, MCS0 is the most robust coding scheme that can provide an extended transmission range up to 850 m [37]. Data-rates of various MCSs are shown in Table 1 for 2 MHz channel.
Data rates of various MCSs for 2 MHz Channel
Data rates of various MCSs for 2 MHz Channel
Parameters used to obtain analytical and simulation results
IEEE 802.11ah standard proposes multiple enhancements in MAC layer. This section describes critical improvements relevant to this context. A unique 13-bit association identifier (AID) is assigned by the AP for every device in the network. Thus, it extends the length of the traffic indication map (TIM) up to 8192 bits [38]. The bits in the AID represent the hierarchical organization of the devices into pages, blocks, sub-blocks, and devices.
Every bit in the TIM bitmap corresponds to a device if the AP has a data packet destined to it. The delivery-TIM beacon is the bitmap of the TIM beacons that are broadcasted periodically by the AP as shown in Fig. 1. The duration between two consecutive TIM beacons is divided into multiple RAW periods and contention access period [39]. Further, each RAW period has several RAW slots. The AP broadcasts the beacon with RAW parameters set information element (RPS-IE) that specifies the RAW start time, duration of RAW and AIDs of the devices. Accordingly, a device chooses a RAW slot using,

Beacon interval in IEEE 802.11ah.
Further, IEEE 802.11ah introduces the RAW mechanism to reduce contention among the devices. RAW mechanism divides the devices into several groups, partitions the channel time into several RAW slots and assigns each group with a RAW slot. Then, each group of devices is allowed to contend in their respective RAW slots using enhanced distributed channel access (EDCA) as shown in Fig. 1. The device who wins the channel contention sends a data frame followed by PS_Poll frame. The AP acknowledges each received packet after SIFS duration.
We assume all the devices in the network are completely associated and always have a packet for transmission i.e., saturation condition. We consider an error-free channel and assess the uplink performance of the network. The channel is divided into mini-slots of duration σ. We consider a network of size N which is divided into K groups, each of size g and divides the duration of RAW period T
R
into K RAW slots, each of duration T
slot
such that
Let s (t) and b (t) be the stochastic processes representing the back-off stage and back-off counter in a j th RAW slot. A bi-dimensional discrete time Markov chain (DTMC) model illustrating the back-off mechanism is shown in the Fig. 2.

A bi-dimensional discrete time Markov chain model for back-off mechanism.
Let
The probability that a device transmits a packet in a randomly chosen mini-slot of a j
th
RAW slot is given by,
Then, the conditional collision probability that a transmitted packet encounters collision is given by,
Ps,j is the probability that a device successfully transmits a packet and (g - 1) devices differ the transmission conditioned that there is at least one transmission in the mini-slot of a j th RAW slot,
The saturation throughput S j of a j th RAW slot can be calculated as,
Here δ is the propagation delay, TPS_Poll is the duration of PS_Poll frame, T ACK is the duration of ACK frame, and TE[P] is the duration of the payload.
The time taken to transmit the payload TE[P] is a function of data rate corresponding to the MCSs, that can be calculated using Equation (12). Similarly, the duration of the control frames (PS_Poll, ACK) is calculated by Equation (13). It is noteworthy to point out that, MCS0 (basic _ datarate) is used to transmit the control frames and PHY header.
The energy consumption is defined as the ratio of total energy consumed during a transmission of a device to the successfully transmitted data. In DCF mechanism, a device can be in either a back-off state, freezing state, or a transmission state. Thus, each device consumes energy in four parts: E
b
is the energy consumed during the back-off process. E
f
is the energy consumed when a device freezes its back-off counter. E
s
and E
c
are the energies consumed due to a successful transmission and collision. Therefore, the energy consumption is defined as [41]:
The average energy consumed during the back-off process is given by,
In a RAW slot, among the g devices, a node overhears a transmission when one of g - 1 devices is successfully transmitting conditioned that there is at least one transmission in the j
th
RAW slot. Therefore, the success probability is given by,
The average number of transmissions overheard by a device during the back-off process is given by,
Therefore, the energy consumed by a device due to overhearing the other devices during the back-off process is given by,
Similarly, the average number of transmission attempts before a successful transmission is given by,
Then the average energy consumed due to successful transmission and collision is given by,
Therefore, the average energy consumed to successfully transmit a packet in the j
th
RAW slot is given by,
Finally, the energy consumption per bit η
j
is given by,
In this section, we exploit fuzzy logic to find the optimal number of RAW slots rather than using the conventional analytical approach. Generally, analytical approaches introduce computational overhead that can reduce the performance of the AP. Hence, soft computing techniques would be a feasible solution to reduce computational overhead [33]. Although many soft computational techniques exist, the motivation behind selecting fuzzy logic is its efficiency in decision-making [42]. We briefly introduce the architecture of fuzzy logic system (FLS) before discussing the proposed scheme.
Fuzzy logic is used to model the uncertainties of a system to get desired results [42]. According to boolean logic, an element belongs to a set with a degree of either 0 or 1. In fuzzy logic, every set has a mathematically represented membership function, and every membership function is defined by linguistic terms. Let X be a set with elements denoted by x. Then, the fuzzy set

Proposed scheme to find optimal number of RAW slots.
Figure 3 shows the block diagram of the FLS used to find the optimal number of RAW slots. The FIS takes network size, collision probability, and MCS as inputs and finds the optimal number of RAW slots based on the fuzzy rules.
Fuzzification is defined as the process of mapping the input variable to their respective fuzzy set. As shown in Fig. 3, we have the following three inputs to the FIS to find the optimal number of RAW slots. (i) network size N, (ii) collision probability calculated using Equation (29), (iii) MCSs listed in Table 1. Each input variable has multiple fuzzy sets defined by certain linguistic terms, and each fuzzy set is represented by a membership function. Due to computational efficiency and less complexity, we consider trapezoidal membership function
Figure 4 illustrates the membership functions of both input and output variables. For example, the input variable N is represented by four fuzzy sets {

Membership functions for input and output variables of FLS.
The core of FLS is fuzzy rules. Fuzzy rules are used to evaluate the degree of membership of input and output variables. To find the optimal number of RAW slots, we define hundred and forty four fuzzy rules. For every set of input variables, the AP finds the output based on the fuzzy rules. Some of the fuzzy rules are defined as follows: IF N=LOW, and Pc=LOW, and MCS=MC1 THEN L
opt
= Opt1; IF N=Medium, and Pc=Medium, and MCS=MC2 THEN L
opt
= Opt2; IF N=High, and Pc=High, and MCS=MC4 THEN L
opt
= Opt4; IF N=Dense, and Pc=Dense, and MCS=MC8 THEN L
opt
= Opt8;
Defuzzification
Each fuzzy rule is evaluated for every set of input variables and mapped to the corresponding fuzzy set of output variable. FLS computes the output using the COG method from the output of each rule. For example, if the fuzzy rule is mapped to a fuzzy set given by Equation (24), then the output is calculated using the following equation.
In this section, we propose a traffic-aware adaptive RAW slot allocation scheme using FCM to classify the devices according to their channel access requirements. We systematically formulate the duration of each RAW slot as a function of the channel access requirements of the devices. Initially, every device in the network listens to the periodically broadcasted beacons and undergoes association procedure with the AP. Prior to the association, each device estimates the required channel access time during its full functionality using,
The first term in Equation (28) is the duration of the back-off counter. E [Ts,n] is the duration between transmission of a packet till reception of the acknowledgment frame and is calculated by using Equation (11). Δf,n is the duration in which the back-off counter freezes due to overhearing of other transmission. Therefore,
Here, TACK_timeout is the duration of acknowledgment timeout. Having estimated the transmission times, each device communicates Δ n with the AP using the additional field of short MAC header in the association request frame [43]. The AP finds the optimal number of RAW slots by using the scheme presented in the previous section. The optimal number of RAW slots (L opt ) is equal to the optimal number of groups (K opt ), as each group is assigned with a RAW slot. According to Algorithm 1, the AP sorts all the transmission requirements of the devices into an array A (n). Then, the AP uses FCM to classify the devices into K opt groups according to their channel access requirements. Having grouped the devices into K opt groups, the AP assigns each group with a RAW slot whose duration is a function of the channel requirements of the respective group. Thus, the duration of the k th RAW slot is given by,
TARA scheme
where C i is the average transmission requirements of the i th group. Using Equation (10), the data transferred in each RAW slot is calculated using,
Analytical and simulation results are presented in this section. The analytical model presented in Section 4 is evaluated using MATLAB. The analytical results are validated using the open source network simulator ns-3 [8]. In this paper, we consider a network of size N uniformly deployed around the AP. The AP employs TARA scheme and divides the network into K groups based on their transmission requirements according to Algorithm 1. Let the duration of the RAW period be 500 ms. According to the TARA scheme, the duration of each RAW slot is adaptively varied according to the transmission requirements of the respective group. The AP always runs FIS to find the optimal number of RAW slots (L opt ). As mentioned earlier, the L opt is equal to the optimal number of groups (K opt ) in the network, as each group is assigned with a single RAW slot. Table 2 lists the parameters used to obtain the analytical and simulation results.
Figure 5 illustrates the performance of the RAW mechanism for various groups using different MCSs. We consider a network of size N = 256 devices that is divided into K ∈ {8, 16, 32, 64, 128, 256} groups. It is observed from the figure that the performance of RAW mechanism increases in terms of throughput and energy consumption with an increase in the number of groups. Because an increase in K reduces the number of devices per group and decreases the contention among them. Meanwhile, it is observed for larger values of K, there is a slight increase in energy consumption and a gradual decrease in the throughput. The main reason behind this phenomenon is the wastage of channel resources. Although the contention is minimized for larger values of K, the devices in their respective groups access the channel using the conventional DCF, wasting the channel time in the back-off process. This unwanted phenomenon reduces the saturation throughput. But during the back-off time, the device will be idle and consumes less power. Hence, there is no significant increase in energy consumption. The feasible solution to get the best performance of the RAW mechanism is to divide the RAW period with an optimal number of RAW slots.

Saturation throughput and energy consumption performance for different number of groups using different MCSs.
Figure 6 shows the optimal number of RAW slots found using the fuzzy technique. The L opt obtained using the proposed scheme is used to assess the performance of the RAW mechanism. Figure 7 shows the performance of RAW mechanism using the proposed fuzzy technique. Since the IEEE 802.11ah standard [2] supports up to 8192 devices, the performance of RAW mechanism is evaluated for a network of size N = 8192 devices. The optimal number of RAW slots L opt that can maximize the networkperformance is found using the fuzzy based proposed scheme. In Fig. 7, the performance of RAW mechanism is evaluated using L opt and the results are compared with the non-optimal value Lnon-opt = 32. It is observed that there is a significant increase in throughput and decrease in energy consumption for the L opt found using fuzzy logic. The results justify the optimal number of RAW slots found using fuzzy logic can significantly increase the performance of RAW mechanism in contrast to the conventional analytical technique.

Optimal number of RAW slot found using fuzzy logic.

Saturation throughput and energy consumption performance over different network sizes using MCS1.
Table 3 compares the performance among optimized RAW mechanism, non-optimized RAW mechanism and legacy DCF mechanism in terms of throughput and energy consumption for a dense IoT network. A network of size N up to 8192 devices is considered and the performance of RAW mechanism is evaluated with Lnon-opt = 4 and L opt using MCS0. It is clearly shown from the Table 3 that the performance of the RAW mechanism is significantly improved using fuzzy logic approach. Because in a dense IoT network, numerous devices contend for the channel which increases the contention and collisions among the devices in the network. Because of the increased collisions, the throughput is decreased and the energy consumption is increased. Since the RAW mechanism partitions the network into several groups and allows the channel access in their respective RAW slots, it outperforms the legacy DCF in a dense network, promoting IEEE 802.11ah as a prevalent standard for IoT. Results also show that the throughput is improved and energy consumption is reduced by using the optimal number of RAW slots found by fuzzy based approach.
Performance comparison between optimal RAW mechanism, non-optimal RAW mechanism and legacy DCF in a dense IoT network
Ana.=Analytical, Sim.=Simulation.
Table 4 illustrates the variation of the amount of data transferred according to the transmission requirements of the devices and compares it with the UG scheme. We consider N = 32 devices which are divided into K opt = 4 groups. Here group-1 has highest average transmission requirements and group-4 with the lowest transmission requirements. The duration of each RAW slot is found according to the Algorithm 1 and is listed in Table 4. We use MCS8 with 2 MHz channel at the PHY layer. Unlike the UG scheme, the proposed scheme classifies the devices according to their transmission requirements and assigns each group with a RAW slot whose duration varies adaptively according to Equation (30). Thus, the group-1 devices with longer duration of RAW slot access the channel for a long time and can transfer more amount of data when compared to group-4 devices which has shorter duration of RAW slot. Whereas the UG scheme equally divides the network into several groups and assigns each group with RAW slots of equal duration. Hence, same amount of data is transferred by all the groups in their respective RAW slot. From the results given in Table 4, it is observed that significant amount of data is transferred by group-1 which is having highest transmission requirements compared to the groups with lower transmission requirements. Hence, the TARA scheme can effectively meet the traffic requirements of different group of devices.
Data transferred in a RAW slot
Ana.=Analytical, Sim.=Simulation.
In this paper, a novel scheme is proposed to find the optimal number of RAW slots using fuzzy logic that can significantly improve the throughput and energy consumption. The proposed scheme provides the optimal number of RAW slots (optimal number of groups) by considering network size, collision probability and MCSs. Further, TARA scheme is proposed to classify the devices with similar transmission requirements and allocates each group with a RAW slot whose duration adaptively varies with the traffic requirements of a group of devices. We have presented a simple yet accurate analytical model to evaluate the throughput and energy consumption of IEEE 802.11ah RAW mechanism, by modifying Bianchi’s model for DCF. The RAW mechanism is evaluated using the TARA scheme and compared with the default UG scheme. From the results, it is clear that the TARA scheme significantly enhances the performance of the RAW mechanism and outperforms the UG scheme. Finally, extensive simulation studies have been conducted to validate the analytical findings.
