IEEE802 11ax
IEEE802 11ax
net/publication/299379698
CITATIONS READS
35 10,156
3 authors:
A. Lyakhov
Russian Academy of Sciences
196 PUBLICATIONS 2,081 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Evgeny Khorov on 23 March 2016.
Abstract—Wi-Fi was designed just to replace wired Internet connection, but it has changed the Internet as a whole. Wireless devices
generate the largest percentage of the Internet traffic and the Wi-Fi market is continuously raising, which brings new challenges
connected with more devices, more data, and higher Quality of Experience expectations. Since todays Wi-Fi is inefficient in terms of
these challenges, in 2013, IEEE LAN/MAN Standard Committee launched a new task group, which aims to improve Wi-Fi by 2019. In a
short time, the group has attracted much attention from leading telecommunication manufacturers. In the paper, we observe activities
of the group, paying much attention to the challenges and to those solutions, which have been proposed by November 2015. 1
I. INTRODUCTION
For the last years, the evolution of the telecommunication technologies has been driven by three challenges. The first one is the
exponential growth of traffic. By 2019, Internet traffic will double and exceed the two zettabyte threshold, while the percentage of
traffic generated by wireless devices will 2 times exceed the traffic of the wired ones [1]. The second one is continuously increasing
users’ requirements and expectations. By 2019 80% of traffic will be video (Internet Video, TV and Video on Demand), mainly of
High Definition [1]. Such video shall be shown without annoying pauses, interruptions or video artifacts on the screen. The last but
not the least challenge is the rapid growth of both the number of devices in wireless networks and the number of wireless local area
networks (WLANs) themselves. It inevitably increases the density of stations (STAs) and the density of WLANs within a particular
area. As a result, future wireless networks will experience high intra and inter network interference. Since todays Wi-Fi networks
are not specially developed for such scenarios, they will soon become inefficient in terms of providing required Quality of
Experience (QoE) under aforementioned conditions.
To address these issues, in May 2013 LMSC (LAN/MAN Standards Committee) launched High Efficiency WLAN Study
Group (HEW SG), which was later converted into Task Group AX (TGax) [2]. By 2019 the group aims to develop IEEE 802.11ax,
a new amendment to the Wi-Fi standard, which along with increasing transmission rates improves efficiency of channel usage in
case of dense deployment. Dense deployment aggravates the problem of hidden and exposed terminals, while the state-of-the-art
Wi-Fi mechanisms lead to either a high probability of packet collisions or low channel usage. TGax develops new channel access
methods and modifies the carrier sense, the main Wi-Fi concept.
As for increasing transmission rates, for several epochs (.11n and .11ac), it was done by increasing the channel width and the
order of MIMO. TGax improves the efficiency of channel usage with these techniques. Specifically, while .11ac enables only
Downlink Multi-user Multiple Input Multiple Output (DL MU MIMO), .11ax will use MU MIMO for both downlink and uplink
(UL). Moreover, to better utilize wide bands, coping with frequency selective fading and interference, it brings Orthogonal
Frequency-Division Multiple Access (OFDMA) to Wi-Fi. Thus, TGax aims to increase throughput at least 4 times. Increasing
throughput does not mean any more just the growth of the network cumulative throughput, or its average value. In contrast, TGax
considers a palette of key performance indicators (KPIs), including 5th percentile and area throughput [3]. While increasing
throughput, TGax takes into account that multiple spatial streams, higher order modulation, and wide bands dramatically increase
energy consumption. Since wireless devices – smartphones, tablets, laptops – are battery powered, power efficiency is one more
KPI for TGax.
The rest of the paper is organized as follows. In Section II, we describe .11ax usage models. In Section III, we analyze new
features of the .11ax amendment and provide some technical details. Finally, Section IV concludes the paper.
II. USAGE MODELS: WHAT IS NEW?
IEEE 802.11ax will improve Wi-Fi operation in the vast range of emerging scenarios. While the official document [4] describes
18 usage models, in this paper we only emphasize their main peculiarities. As stated above, the first peculiarity of the usage models
is dense Wi-Fi deployment in both indoor and outdoor scenarios, e.g. mass events, stadiums, airports, railway stations, exhibition
The reported study was partially supported by RFBR, research project No. 15-07-09350 А.
halls, shopping malls with hundreds of APs working at the same area. Dense deployment is also typical for apartment buildings and
offices, since every apartment or office has one or several APs.
The second peculiarity is related to traffic. While in the previous Wi-Fi amendments each usage model usually considers one
type of traffic, e.g. real time streaming, file download, or web browsing, the traffic in .11ax usage models is heterogeneous. Various
clients use different applications that require different throughput, packet loss ratio (PLR) and delay.
The third peculiarity is huge UL upload of numerous photos, videos and documents to social networks and clouds.
Finally, TGax pays more than ever attention to the presence of legacy (not .11ax) STAs. From one hand, .11ax may oppress
legacy STAs. Surely, TGax tries to avoid such an aggressive behavior. From the other hand, the advantages of .11ax can be
diminished by the legacy STAs operation. Thus, coexistence with legacy IEEE 802.11 devices operating in the same band is an
important issue considered by TGax.
Fig. 1. Legacy preamble and HE-SIG-A are duplicated on each 20 MHz channel, [6].
HE- HE-
L- L-
L-STF L-LTF SIG- SIG-
SIG SIG
A1 A2
Two OFDM symbols of HE-SIG-A field are enough to carry control information for the single user (SU) transmission. In case
of MU transmission, the HE-SIG-B field appears, which may contain variable number of OFDM symbols and carry common
information for all STAs followed by specific one for each particular STA [10], [11], see Fig. 4.
Fig. 5. 20 MHz subchannel content for HE-SIG-B for bands ≥ 40 MHz, [12].
Similar to HE-SIG-A, HE-SIG-B is encoded on a per-20 MHz basis. To improve transmission efficiency and robustness, the
following approach is used. For bandwidths ≥ 40 MHz, two neighboring 20 MHz subbands carry different information, while all
other subbands duplicate it [12], see Fig. 5.
Finally, let us consider modulation schemes, introduced in .11ax. The first one is 1024-QAM modulation [13]. Since it needs
rather high signal-to-interference-plus-noise ratio (SINR), it can benefit mostly in indoor scenarios. According to preliminary
investigations, the throughput gain is over 20%. Additionally, .11ax amendment introduces optional Dual sub-carrier modulation
(DCM) [14]. DCM allows the same transmission on a pair of tones, n and m, which are separated far apart in frequency. DCM
improves transmission robustness in the presence of sub-band interference and provides more than 2dB gain in Packet Error Ratio
(PER) performance.
Service frame transmissions consume tremendous amount of airtime. To limit the overhead, .11ax amendment defines 5.5 Mbps
as the minimum rate for beacons and probe (request and response) frames transmission in 2.4 GHz band [15].
C. Channel Access
In addition to the scheduled OFDMA/MU-MIMO channel access in UL described in Section III-B, .11ax provides an Aloha-
like random OFDMA UL MU channel access [26]. It is favorable for the case when the AP is unaware of UL traffic buffered at the
STAs. Although Aloha shows worse performance than CSMA/CA, it makes random UL MU access much simpler. Specifically,
this mechanism works as follows. From time to time, the AP sends a random access Trigger frame which allocates RUs for
random access. To determine whether the STA is allowed to transmit and in which RU, the STA eager to transmit uses the
OFDMA Back-off (OBO) procedure [27]. Initially, the STA chooses a random value from the OFDMA contention window, which
parameters are specified by the AP in Trigger frames [28]. Each Trigger frame the STA decrements the value by the number of
RUs specified in the Trigger frame until it reaches zero. After that, the STA randomly selects a RU and transmits its frame. To
improve power efficiency the AP can define one or more Trigger frames target transmission times, e.g. in its beacons [29]. Apart
from that, the Trigger frame may indicate that the next Trigger frame will be transmitted after the current UL MU transmission and
DL ACKs, if any. This improves power efficiency, since the STAs can sleep almost always and wake up just before the Trigger
frame for random access is transmitted [29].
TGax also tries to decrease the overhead caused by the legacy channel access, e.g. well-known Enhanced Distributed Channel
Access (EDCA). According to [30], backoffs, interframe spacing, RTS/CTS and collisions significantly reduce spectrum
efficiency, especially in case of high data rates. To improve efficiency, [31] proposes a mechanism called roster (list), which
implements the idea of token passing. Specifically, the AP allocates time intervals when only STAs from the roster can transmit.
Moreover, they do it only in a predefined order. If a STA does not transmit, a backoff slot after, the token, i.e. the right to transmit,
is passed to the next STA in the roster. The proposal also describes how to build the roster and maintain it in case of hidden STAs.
Thus, the roster reduces the time of collisions or idle channel. Unlike the legacy deterministic access, e.g. HCCA, MCCA [32], etc.,
which allocates channel time for a particular STA, with the roster the channel is allocated for a group of STAs, which decreases
resource underutilization if the dedicated STA has nothing to transmit. Though the roster initialization induces overhead, the
1
In legacy Wi-Fi, the only reason to fragment frames is exceeding the fragmentation threshold. Moreover, the rules explicitly
forbid joint usage of aggregation and fragmentation.
mechanism is profitable and according to [31] increases the throughput. By November, 2015, the roster is not included in .11ax yet,
however it can be done soon.
To improve power efficiency and to allow STAs to sleep during alien TXOP or UL transmission, .11ax includes in the HE-SIG-
A field of the PHY preamble some MAC layer information: TXOP duration, transmission direction (UL or DL), etc.
Apart from that, TGax adapted the Target Wakeup Time (TWT) mechanism, introduced in .11ah. TWT allows the AP to
schedule a series of times for a STA (called TWT STA) when the TWT STA wakes up for some time interval (called TWT Service
Period or TWT SP) and exchanges frames. Due to this mechanism, the TWT STA can stay in the doze state always except for TWT
SP intervals. TWT STAs are not required to wake up even for beacons, reducing energy consumption [8].
IV. CONCLUSION
In the paper, we provide a deep overview of the key mechanisms which are going to be included in the .11ax amendment, the
first draft of which is going to appear in early 2016. In a year, TGax has sketched out and discussed dozens of mechanisms, which
enrich Wi-Fi with new functionality, improve its efficiency in emerging scenarios. The detail study of these mechanisms will
definitely attract much attention from a large number of researchers all over the world.
REFERENCES
[1] Cisco Visual Networking Index: Forecast and Methodology, 2014-2019 White Paper. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-
ngn-ip-next-generation-network/white_paper_c11-481360.html
[2] Osama Aboul-Magd, et al. EEE 802.11 HEW SG Proposed CSD, 2014. URL: https://mentor.ieee.org/802.11/dcn/14/11-14-0169-01-0hew-ieee-802-11-
hew-sg-proposed-csd.docx
[3] Lei Wang, et al. Proposed 802.11ax Functional Requirements, 2014. URL: https://mentor.ieee.org/802.11/dcn/14/11-14-1009-02-00ax-proposed-802-11ax-
functional-requirements.doc
[4] Laurent Cariou, et al. TGax Usage Models document, 2013. URL: https://mentor.ieee.org/802.11/dcn/13/11-13-0657-06-0hew-hew-sg-usage-models-and-
requirements-liaison-with-wfa.ppt
[5] Sriram Venkateswaran, et al. Payload Symbol Size for 11ax, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0099-03-00ax-payload-symbol-size-
for-11ax.pptx
[6] Jiayin Zhang, et al. Preamble structure for 11ax system, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0101-01-00ax-preamble-structure-for-
11ax-system.pptx
[7] Hongyuan Zhang, et al. 802.11ax Preamble Design and Auto-detection, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0579-04-00ax-preamble-
design-and-autodetection.pptx
[8] Evgeny Khorov, Andrey Lyakhov, Alexander Krotov, Andrey Guschin. A survey on IEEE 802.11ah: an Enabling Networking Technology for Smart Cities.
Computer Communications, Volume 58, March 2015, pp. 53–69, 2015.
[9] Jiayin Zhang, et al. HE-SIGA transmission for range extension, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0826-03-00ax-he-sig-a-
transmission-for-range-extension.pptx
[10] Joonsuk Kim, et al. HE-SIG-B Structure, 2015. URL: https://mentor. ieee.org/802.11/dcn/15/11-15-0821-02-00ax-he-sig-b-structure.pptx
[11] Ron Porat, et al. SIG-B Encoding Structure Part II, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1059-02-00ax-sig-b-encoding-structure-part-
ii.pptx
[12] Ron Porat, et al. SIG-B Encoding Structure, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0873-00-00ax-sig-b-encoding-structure.pptx
[13] Eunsung Park, et al. 1024 QAM Proposal, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1070-03-00ax-1024-qam-proposal.ppt
[14] Jianhan Liu, et al. Reliable Dual Sub-Carrier Modulations (DCM) for HE-SIG-B and Data, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/ 11-15-1068-
01-00ax-reliable-transmission-schemes-for-he-sig-b-and-data.pptx
[15] Guido R. Hiertz, et al. Minimal data rates for management frame transmissions in 2.4 GHz, 2015. URL: https://mentor.ieee.org/802.11/ dcn/15/11-15-0874-
00-00ax-minimal-data-rates-management-frame-transmissions-in-2-4-ghz.pptx
[16] Kome Oteri, et al. Further Analysis of Feedback and Frequency Selective Scheduling (FSS) for TGax OFDMA, 2015. URL:
https://mentor.ieee.org/802.11/dcn/15/11-15-0818-01-00ax-further-analysis-of-feedback-and-frequency-selective-scheduling-fss-for-tgax-ofdma.pptx
[17] Alfred Asterjadhi, et al. Buffer Status Report, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1120-00-00ax-buffer-status-report.pptx
[18] Zhigang Rong, et al. CP Indication for UL MU Transmission, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0813-00-00ax-cp-indication-for-ul-
mu-transmission.pptx
[19] Simone Merlin, et al. Trigger Frame Format, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0877-01-00ax-trigger-frame-format.pptx
[20] Chittabrata Ghosh, et al. Fragmentation with MU Operation, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1102-00-00ax-fragmentation-with-
mu-operation.pptx
[21] Chao-Chun Wang, et al. UL multi-TIDs aggregation, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1065-01-00ax-11ax-uplink-multi-tid-
aggregation.pptx
[22] Po-Kai Huang, et al. MU-RTS/CTS for DL MU, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0867-01-00ax-mu-rts-cts-for-dl-mu.pptx
[23] Simone Merlin, et al. Multi-STA Acknowledgment https://mentor .ieee.org/802.11/dcn/15/11-15-0366-02-00ax-multi-sta-ba.pptx
[24] Jeongki Kim, et al. Further consideration on Multi-STA Block ACK, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0626-01-00ax-further-
consideration-for-multi-sta-block-ack-frame.pptx
[25] Guoqing Li, et al. Multi-User Block ACK Request (MU-BAR) , 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1053-01-00ax-multiuser-block-
ack-request-mu-bar.pptx
[26] Chittabrata Ghosh, et al. Random Access with Trigger Frames using OFDMA, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-0875-01-00ax-
random-access-with-trigger-frames-using-ofdma.pptx
[27] Chittabrata Ghosh, et al. UL OFDMA-based Random Access Procedure, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1105-00-00ax-ul-ofdma-
based-random-access-procedure.pptx
[28] Russell Huang, et al. Triggered OFDMA Random Access Observations, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1137-01-00ax-triggered-
ofdma-random-access-observations.pptx
[29] Chittabrata Ghosh, et al. Power Save with Random Access, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1107-00-00ax-power-save-with-
random-access.pptx
[30] Sean Coffey, et al. Airtime Analysis of EDCA, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1114-01-00ax-airtime-analysis-of-edca.pptx
[31] High Efficiency in Accessing the Medium, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1115-01-00ax-high-efficiency-in-accessing-the-
medium.pptx
[32] Ivanov A.S. Lyakhov A.I. and Khorov E.M. Analytical Model of Batch Flow Multihop Transmission in Wireless Networks with Channel Reservations
//Automation and Remote Control. July 2015, Volume 76, Issue 7, pp 1179-1192.
[33] Reza Hedayat, et al. TXOP Considerations for Spatial Reuse, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1104-04-00ax-txop-considerations-
for-spatial-reuse.pptx
[34] Evgeny Khorov, et al. Multiple NAVs for Spatial Reuse, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1348-00-00ax-multiple-navs-for-spatial-
reuse.pptx
[35] Alfred Asterjadhi, et al. Identifiers in HE PPDUs for power saving, 2015. URL: https://mentor.ieee.org/802.11/dcn/15/11-15-1122-00-00ax-identifiers-in-he-
ppdus-for-power-saving.ppt