Futureinternet 14 00293 v2
Futureinternet 14 00293 v2
Article
A Survey of Wi-Fi 6: Technologies, Advances, and Challenges
Erfan Mozaffariahrar 1, *, Fabrice Theoleyre 2 and Michael Menth 1
Abstract: Wi-Fi is a popular wireless technology and is continuously extended to keep pace with
requirements such as high throughput, real-time communication, dense networks, or resource and
energy efficiency. The IEEE 802.11ax standard, also known as Wi-Fi 6, promises to provide data rates
of up to almost 10 Gb/s, lower energy consumption, and higher reliability. Its capabilities go far
beyond Wi-Fi 5 (802.11ac) and novel technical concepts have been introduced for this purpose. As
such, the Wi-Fi 6 standard includes Multi-User Orthogonal Frequency Division Multiple Access (MU
OFDMA), Multi-User Multiple-Input Multiple-Output (MU MIMO), new mechanisms for Spatial
Reuse (SR), new mechanisms for power saving, higher-order modulation, and additional minor
improvements. In this paper, we provide a survey of Wi-Fi 6. Initially, we provide a compact
technological summary of Wi-Fi 5 and its predecessors. Then, we discuss the potential application
domains of Wi-Fi 6, which are enabled through its novel features. Subsequently, we explain these
features and review the related works in these areas. Finally, performance evaluation tools for Wi-Fi 6
and future roadmaps are discussed.
Keywords: IEEE 802.11ax; Wi-Fi 6; spatial reuse; OFDMA; MU-MIMO; target wake time (TWT);
1024-QAM
The IEEE 802.11ax (Wi-Fi 6) task group started to investigate and design the next
generation of WLAN appropriate for dense networks and real-time communications in
2014. The Wi-Fi 6 standard [4] was officially published in May 2021. The task group
focused on providing a four times higher throughput per station while keeping the same
power consumption as IEEE 802.11ac or improving it. Since this standard focuses on better
spectrum efficiency, it is known as the high-efficiency standard. IEEE 802.11ax modifies
both thePHY and MAC layers and introduces multiple features to enhance Wi-Fi users’
satisfaction. It achieves current expectations thanks to wider channels, MU OFDMA for
channel access, uplink (UL) MU MIMO to improve capacity, SR for spectral efficiency,
Target Wake Time (TWT) to manage power consumption, 1024 Quadrature Amplitude
Modulation (QAM) to increase throughput, and other additional improvements [5]. Wi-Fi 6
operates on the 2.4, 5, and 6 GHz frequency bands. Together, these features lead to high
data rates of up to 9.6 Gb/s.
The successor to the standard of Wi-Fi 6, IEEE 802.11be (Wi-Fi 7), is currently under
study and targets ultra-high-throughput networks. However, it is only in its early stages
and is not expected to be introduced before 2024. This survey serves as a basis for future
improvements to Wi-Fi 7, making it a helpful research tool.
1.1. Contribution
In this paper, we consider publications about Wi-Fi 6 since 2015. To the best of our
knowledge, the current paper is the first comprehensive literature review of IEEE 802.11ax
based on the latest version of the standard.
There are already several tutorials describing novel features of Wi-Fi 6, which are listed in
Table 2. Several papers present Wi-Fi 6 based on the early stages of the standardization [6–8]
and are no longer up to date. Other tutorials focus on specific features such as resource
allocation [9] or the MAC layer [10]. The most complete tutorial on Wi-Fi 6 is the one by
Khorov et al. [11] with a focus on spatial reuse and random Orthogonal Frequency Division
Multiple Access (OFDMA). In Sections 2 and 3, we provide a detailed description of Wi-
Fi 6 for the benefit of non-expert readers, which may be skipped by expert readers familiar
with Wi-Fi 6.
In this article, we present a detailed survey of the studies of Wi-Fi 6. We identified the
following surveys that have been published in this field (Table 3):
• Wilhelmi [12] summarized the related works for spatial reuse in Wi-Fi 6;
• Nurchis [13] focused on energy efficiency for low-power devices;
• Masri [14] focused on scheduling and resource allocation;
• Qu [15] presented a novel simulator for next-generation wireless networks and identi-
fied a few contributions to the field.
According to Tables 2 and 3, each of these tutorials and surveys has only a few
references in common with our paper. Therefore, our paper covers a large number of
references that were not considered by other tutorial and review papers. Moreover, none
of these surveys focus on modulation techniques and MU MIMO. Although OFDMA is
Future Internet 2022, 14, 293 3 of 52
investigated in [14], our survey is more comprehensive with more than 70 references in this
field. In addition, we explore other topics in more detail than the other surveys.
Table 2. Tutorials on Wi-Fi 6. The current paper is based on the official standard (May 2021), whereas
earlier papers rely on, e.g., Draft 3.0 (2018) or Draft 4.0 (2019).
#Common References
Paper Date References Focus
with Current Paper
Bellalta [6] 2016 15 All features 0
Afaqui [7] 2016 12 All features 4
Yang [8] 2017 9 All features 0
Ali [9] 2018 117 Resource allocation 4
All features mainly:
Khorov [11] 2018 79 random OFDMA and 18
spatial reuse
Yang [10] 2020 17 MAC layer 3
#Common References
Paper Date References Focus
with Current Paper
Nurchis [13] 2019 15 TWT 5
Wilhelmi [12] 2020 56 Spatial reuse 18
Scheduling and
Masri [14] 2019 20 15
resource allocation
Qu [15] 2019 18 Simulator 3
Current paper 2022 221 All features –
The ambition of the current paper is a comprehensive survey of all the features of Wi-
Fi 6. Its target and level of explanation focus on the networking aspect of the enhancements
rather than on the signal processing field so it is of most interest to researchers in networking.
In each section, it focuses on a specific feature of Wi-Fi 6 to survey the corresponding related
works. Figure 1 visualizes the categorizations of the related works by feature and facilitates
a fast lookup of the relevant references.
Random Access
[37] ... [50]
Centalized Approach
[51] ... [68]
User Distribution
Real-time/QoS Scheduling [151] ... [155]
[69] ... [73]
TWT Clock Drifts
Optimization OFDMA Section VI [156]
[74] ... [89] Section IV
Traffic Aware Scheduling
Cross-layer Scheduling [157] ... [160]
[90], [91]
Performance Evaluation
[15], [102], [171] ... [173]
Threshold Manipulation
[114] ... [138]
Performance Evaluation
[21], [144] ... [150]
Figure 1. The related works are categorized according to the features of Wi-Fi 6.
Future Internet 2022, 14, 293 4 of 52
Introduction (Sec. I)
2. Wi-Fi Basics
This section provides a brief introduction to Wi-Fi and can be skipped by expert
readers. We provide an overview of thePHY and MAC layers in Wi-Fi up to Wi-Fi 5. It is
the baseline for the improvements to Wi-Fi 6 that are explained in the subsequent sections.
Future Internet 2022, 14, 293 5 of 52
1
------ 3.2 us 0.4/0.8 us
312.5 KHz
Payload GI
(a) Wi-Fi 5
1
------ 12.8 us 0.8/1.6/3.2 us
78.125 KHz
Payload GI
(b) Wi-Fi 6
Figure 3. Wi-Fi 5 and Wi-Fi 6 comparison in terms of subcarrier spacing and OFDM symbol duration.
Payload symbol duration is reciprocal to subcarrier spacing.
With MIMO, the signal is transmitted and received simultaneously through multiple
antennas, increasing the number of data streams that can be transmitted in parallel.
MIMO offers three different methods for data transmission within a channel:
Spatial Multiplexing: Each antenna can transmit independent data signals to the
receiver. These data signals are called spatial streams [16]. MIMO increases the
throughput linearly with the number of antennas. Figure 4a shows this transmis-
sion method.
Spatial Diversity: This method turns the multipath effect into an advantage by trans-
mitting the same data over multiple antennas. Since every antenna on the receiver
side might receive data copies from other streams too, it provides redundancy. A
Digital Signal Processing (DSP) module recombines the received spatial streams to
recover the whole data chunk (see Figure 4a).
Beamforming: This technique modifies dynamically the radiation pattern of the group
of antennas. It is similar to directing the signal in a specific direction to strengthen
the signal rather than spreading the energy in all directions. Narrower beams bring
stronger signals and reduced interference (see Figure 4b).
In 802.11n, an access point with multiple antennas communicates with only a single
station at a time. It may transmit multiple data streams in parallel to the same station
but multiple stations must be served sequentially. This feature is also called Single-User
Multiple-Input Multiple-Output (SU MIMO).
IEEE 802.11ac (Wi-Fi 5) introduces downlink MU MIMO to serve multiple stations
in parallel. Wi-Fi 5 devices support up to eight spatial streams in parallel for downlink
transmission. That is, the access point can transmit data to up to four different stations
(with two spatial streams per station). MU MIMO leverages a transmit beamforming (TxBF)
technique to concentrate the signal in four different directions, i.e., one direction per station.
1 STA 1
1 D
S
2 P
2
STA .
.
.
3
D AP
.
AP S
. STA 2
P
.
2.1.3. Modulation
Modulation techniques maximize the number of bits transmitted per subcarrier. Wi-
Fi 5 supports up to 256 QAM that modulates 8 bits of information per subcarrier. QAM
modulates data in each subcarrier. More bits per OFDM symbol lead to a larger through-
put under the condition that the Signal-to-Noise Ratio (SNR) is sufficient. Higher-order
modulations are expected to be efficient only under favorable conditions, namely clear
environments and short distances.
The coding rate identifies the portion of bits that is used for the transmission of data
and Forward Error Correction (FEC). The supported coding rates are 1/2, 2/3, 3/4, and
5/6. A coding rate of 5/6 means that 83.3% (i.e., 5/6) of the data stream is used to carry
data and 16.7% is used to carry FEC.
The combination of modulations namely, Binary Phase Shift Keying (BPSK), Quadra-
ture Phase Shift Keying (QPSK), 16-QAM, 64-QAM, and 256-QAM with coding rates, allow
the standard to choose the data rate dynamically according to the radio environment [5].
The Modulation and Coding Scheme (MCS) [17] index comprises a given set of parame-
ters to provide a wide variety of data rates for wireless connections. It is part of the rate
Future Internet 2022, 14, 293 7 of 52
adaptation feature in wireless technology and includes the guard interval, coding rate,
modulation, channel width, and the number of spatial streams. A discrete list of MCS
means that some combinations are impossible (cf. Table 4). For instance, BPSK with a
coding rate of 3/4 is not possible.
Table 4. MCS maximum data rates in a 160 MHz channel for one spatial stream. Payload symbol
duration and guard interval are 12.8 µs and 0.8 µs, respectively.
A B C
D S
I I
Busy F F
AP ... RTS DATA
S S
Random S S
backoff I I
F F
CTS ACK
STA S S
D
I
F
Other NAV (RTS)
S
Figure 6. Channel access using the Distributed Coordination Function (DCF) in Wi-Fi.
The access point piggybacks the list of pending destinations (Traffic Indication Map (TIM))
in its beacons. Thus, stations wake up regularly to receive beacons to check whether the
access point has buffered packets for them. Since the beacon interval is indicated in the
beacons, a station knows when the next beacons will be transmitted and wakes up slightly
before their transmission to cope with clock drifts. More precisely, a station must wake up
to receive at least one beacon at every Delivery Traffic Indication Map (DTIM) interval.
When a station decodes the beacon, the station knows if some packets are pending. In
the absence of pending packets, the station may switch immediately to doze mode again.
Otherwise, it stays active and notifies the access point that it is ready to receive packets. If
the station has packets to send, it stays active and uses DCF for transmission.
3. Wi-Fi 6 Overview
The Wi-Fi 6 standard [5] proposes modifications to IEEE 802.11. Its prime goals
are improving throughput by at least four times per station compared to IEEE 802.11ac
while improving power efficiency and supporting dense networks. Wi-Fi 6 adds new
features to thePHY and MAC layers. It also includes some modifications for backward
compatibility with legacy devices operating based on IEEE 802.11n in the 2.4 GHz band
and IEEE 802.11n/ac in the 5 GHz band [19].
In this section, we elaborate on the latest standard by outlining each feature individu-
ally. Next, we introduce Wi-Fi 6E in detail in Section 3.2. Finally, we explain some use cases
for Wi-Fi 6.
Features Benefits
Higher throughput
MU OFDMA
Overhead reduction
High spectral efficiency
Longer OFDM symbol Higher efficiency for indoors
Robustness for outdoors
Spectral efficiency
Spatial reuse
Increased capacity
Higher throughput
Reliability
TWT Lower latency
Power saving
Reduced jitter
MU MIMO Up to 8× capacity increase in uplink
Up to 2× capacity increase in downlink
1024-QAM 25% higher data rate
Access Points (APs) and Stations (STAs) operating based on the IEEE 802.11ax standard
have ““High Efficiency (HE)” as a prefix. To avoid repetition and for simplicity, we use the
station and access point as substitutes for the HE station and HE access point. Moreover,
we use Wi-Fi 6 as the representative of HE IEEE 802.11ax in the remainder of this paper,
and legacy Wi-Fi is considered IEEE 802.11ac.
multiple transmissions can happen in parallel. This considerably reduces contention and
overheads on the MAC layer. Thereby, it reduces latency and improves throughput in
dense networks.
Although OFDMA has already been used by Long Term Evolution (LTE) networks for
downlink multi-user transmission, Wi-Fi 6 supports uplink and downlink transmissions in
multi-user mode. However, Wi-Fi 6 hardware also supports OFDM to maintain backward
compatibility with the 802.11a/g/n/ac standards. Details of OFDMA in Wi-Fi 6 are
explained in Section 4.
3.1.3. TWT
To maximize the battery lifespan of Wi-Fi stations, the IEEE 802.11 standard defines
a PSM [17] (Section 2.2.3). However, stations with traffic to send/receive will compete
just after the reception of a beacon, resulting in traffic peaks and collisions. In addition, a
station stays awake until all its packets are received and/or transmitted, causing relatively
long active times for PSM devices even if they have only a little data to send or receive [22].
To mitigate these problems, Wi-Fi 6 leverages and extends TWT, which was intro-
duced originally in IEEE 802.11ah [23]. The wake times of stations under TWT control are
scheduled in advance without overlap. As a result, the standard maximizes the sleep times
of the stations and reduces their power consumption noticeably. We discuss TWT in detail
in Section 6.
3.1.4. MU MIMO
Wi-Fi 6 proposes both downlink and uplink MU MIMO. Moreover, eight parallel
streams are supported. In contrast to Wi-Fi 5, MU MIMO can be applied to only parts of
the spectrum in Wi-Fi 6 so that it can be combined with OFDMA. The details are discussed
in Section 7.
other bands. As this band is less occupied by other standards, there is mostly less noise than
in other bands, which leads to better performance. There are no backward compatibility
issues of Wi-Fi 6E with previous Wi-Fi standards as they do not use this frequency band.
3.3.3. Multimedia
In the last decade, multimedia applications with high-throughput and low-latency
requirements have become common in mobile devices. Examples are 4K/8K video and
audio streaming, online gaming, virtual reality, augmented reality, etc. This traffic surge
goes beyond the capacity of legacy Wi-Fi access points [27]. Wi-Fi 6 increases the capacity
of access points by higher-order modulation, OFDMA, and MU MIMO, which leads to a
better user experience [28].
4. OFDMA in Wi-Fi 6
In this section, we present the advances of Wi-Fi 6 concerning OFDMA and its impli-
cations for the MAC layer. Finally, we discuss the research works in this field.
The assignment of RUs and TXOPs leads to a time-frequency matrix that enables
transmissions between multiple stations and their access point. RUs and TXOPs make
bandwidth usage more flexible: a station may use wider (resp. narrower) RUs and shorter
(resp. longer) TXOPs. Moreover, multiple parallel transmissions within a single channel
are possible.
Table 6. RU sizes and their maximum numbers supported by the different channel widths.
9 * 26-tone RUs 6 26 26 26 26 13 7 13 26 26 26 26 5
4 * 52-tone RUs 6 52 52 13 7 13 52 52 5
20 MHz channel
compared to Wi-Fi 5. Thus, the bandwidth wasted by the GI is reduced. The larger GI
values are applied to combat the signal delay spread in outdoor environments [29].
L-STF L-LTF L-SIG R-SIG HE-SIG-A HE ... -SIG-B HE-STF HE-LTF ... HE-LTF HE DATA
8 μs 8 μs 4 μs 4 μs
8 μs Only available for HE MU 4 μs Up to 8 fields 13.8/14.4/16 μs
Doubles for ER SU 4 μs per symbol Doubles 4.8/7.2/8/16 μs per symbol
up to 16 symbols for HE TB per symbol
The four different types of HE Physical Layer Protocol Data Units ( PPDU) are distin-
guished by the preamble fields [5]:
HE Single-user (SU) PPDU: this frame is used for single-user transmissions.
HE ER SU PPDU: this frame is the same as the single-user transmission but designed
for outdoor environments with an Extended transmission Range.
HE MU PPDU: this frame is considered for one or multiple downlink transmission(s)
by adding the HE-SIG-B field to the single-user transmission frame.
HE Trigger-Based (TB) PPDU: this frame is used for multi-user uplink transmissions
in response to the Trigger Frame (TF) issued by the access point.
The new HE preamble fields that differentiate the frame formats are the following:
Repeated Legacy (non-HT) SIGNAL (RL-SIG): This field detects the beginning of
the HE frame.
HE-SIG-A: This field is a common field in all four Wi-Fi 6 frame formats. It carries
all the needed information for the types of transmissions and is two OFDM symbols
long. The information in this field differs depending on the frame type and whether
the transmission is single-user, multi-user, or TB. It contains information about the
packet to determine the link type (uplink or downlink), BSS color, TXOP duration,
bandwidth, number of spatial streams, and coding [30]. For an extended-range single-
user transmission, this is repeated one more time to improve the robustness against
interference and signal fading in outdoor scenarios [31].
HE-SIG-B: This field is specific to downlink multi-user transmissions. It is divided
into two parts. In the common part, it carries RU allocation information and it is
decodable by all the stations in the same sub-channel. The user-specific part has a
variable length and contains specific information for each user such as MCS, number
of spatial streams, coding, and station ID [32].
HE-STF and HE-LTF: The HE short training field (STF) and HE long training field
(LTF) are specific to MIMO operations. The former synchronizes a receiver with the
incoming frame in time and frequency. The latter is responsible for beamforming and
spatial diversity. For a TB frame, the duration of the HE-STF is twice as long.
we first introduce the extensions of the RTS/CTS mechanism, detail downlink and uplink
transmissions, and then elaborate on the integration of the new mechanisms with EDCA.
AP STAs AP STAs
40
CTS RU 1 (106-tone) BA
30
CTS RU 2 (26-tone) BA
Frequency (MHz)
CTS RU 3 (52-tone) BA
MU CTS RU 4 (26-tone) BA
20 RTS
Time
VoIP IoT Gaming Media
Figure 9. DL MU OFDMA transmission over different RUs and traffic demands within a 40 MHz channel.
Scheduled Access
With scheduled access, the access point schedules all the RUs for the next TXOP to
the stations, which prevents contention among the stations. The access point learns about
Future Internet 2022, 14, 293 15 of 52
the stations’ demands either from Buffer Status Reports (BSRs) that piggybacked on earlier
data transmissions or explicitly asking the stations with a Buffer Status Report Poll (BSRP).
Figure 10a illustrates scheduled access with polling. The access point sends a BSRP
including the list of RUs for BSR transmissions. The stations randomly choose one of
these RUs to send their BSR to the access point. Based on this knowledge, the access point
schedules disjoint RUs to the stations for the next TXOP and notifies them with a multi-user
RTS/CTS handshake. The transmissions are protected from hidden terminals after the
reception of all CTSs.
TXOP TXOP
AP
AP STAs AP STAs AP STAs (1-5) AP STAs (1-4) AP
TF-R
40 40
BSR
STA 5
CTS RU 1 (106-tone) AID 0 RU 1 (106-tone)
BSR RU 1 STA 1
STA 2
30 30
CTS RU 2 (26-tone)
Frequency (MHz)
Coll
Frequency (MHz)
Time
VoIP IoT Gaming Media Time
(a) (b)
Figure 10. UL MU OFDMA scheduled and random access within a 40 MHz channel. (a) UL MU
OFDMA scheduled access transmission over different RUs and traffic demands. (b) UL OFDMA
random access (UORA) transmission over different RUs (stations 1, 2, and 3 have the Association
Identifiers (AIDs) 1, 2, and 3, respectively. Station 4 is unassociated).
The access point then broadcasts a Trigger Frame (TF) to distribute the parameters for
the uplink transmissions. It contains a list of available RUs and AID values, which maps
resources to stations, as well as optimized transmission parameters (MCS, target Received
Signal Strength Indication (RSSI), FEC coding type, and more).
When the schedule is announced, all other transmissions are interspaced by the SIFS.
Thus, no collisions can occur after the reservation is made by the access point. Afterward,
the stations start their transmissions on the assigned RUs for the proposed TXOP. At the
end of the TXOP, the access point broadcasts a single Multi-Station Block Acknowledgment
(MSBA) via OFDM using the entire channel. It is sent with the lowest modulation to
be decodable by all stations. The message lists all correctly received frames during the
last TXOP.
Random Access
Although scheduled access assigns all RUs to specific stations, random access leaves
at least some RUs for the stations to be used in contention mode. Moreover, there is no
multi-user RTS/CTS handshake to limit the overhead.
The access point triggers UORA mode. The access point first broadcasts a list of
available RUs for random access in a Trigger Frame Random (TF-R) [34]. This is a Trigger
Frame (TF) with at least one RU for random access instead of scheduled access. The
TF-R sets the Network Allocation Vector (NAV) for legacy stations instead of an RTS/CTS
handshake. The TF-R also contains a list of available RUs and AID values. Here, an AID
of 0 stands for the associated stations and an AID of 2045 stands for the unassociated
stations. Any other AID value corresponds to scheduled access. Thus, an associated (resp.
unassociated) station can contend for any RU with an AID equal to 0 (resp. 2045). In
particular, a station does not create collisions with scheduled frames when it engages
an association.
Upon the reception of the TF-R, all associated/unassociated non-scheduled stations
that have data to send try to access one of the available random-access RUs. Each station
Future Internet 2022, 14, 293 16 of 52
adapts CSMA/CA by decrementing its backoff counter independently for each of the RUs
assigned for the random access in the TF-R [35]. The winning stations transmit their data
in the accessed RUs. Finally, the access point acknowledges the received packets by a
Multi-Station Block Acknowledgment (MSBA).
Figure 10b illustrates the mechanism with four contending stations. Stations 1–3
are already associated with a member of the BSS, having AIDs 1, 2, and 3, respectively,
whereas station 4 is unassociated. As RU 3 is assigned to AID 2 (station 2), there will be no
contention for its resources. Conversely, RUs 1 and 2 are for any associated station (AID 0).
We assume that the backoff of station 1 is equal to zero and it competes in RU 1 (it would
have selected RU 2 if its backoff was equal to 1). Station 3 has either no frame to send or its
backoff value is strictly larger than 1 (it will be decremented by two after this UORA phase).
Finally, RU 4 is reserved for the unassociated stations (AID 2045). We further assume that
the backoff of station 4 is equal to zero so it tries to compete in RU 4.
Legacy EDCA
MU EDCA timer Legacy EDCA period
period
However, instead of transmitting its frame immediately, the station may engage a secondary
backoff procedure according to a given probability depending on the Markov model. The
secondary backoff counter reduces the number of collisions among the selected stations for
the transmission. The entire procedure takes place within a TXOP. CRUI [38] also relied
on an extra backoff stage during which each station sends a busy signal at a given offset
depending on its priority. Only the station with the largest priority, i.e., with the earliest
busy signal, wins the contention and is allowed to transmit for the corresponding TXOP.
A winner can also grant the rest of the TXOP to a secondary station with a lower priority
when it has finished transmitting its frames.
Some other approaches tried to find the optimal backoff selection parameters or ap-
plied the backoff differently. Kim et al. [39] concluded that the number of stations does not
increase the contention probability if the OFDMA contention window is tuned optimally.
Therefore, they proposed a distributed backoff counter controller. Every station adjusts
its backoff counter regarding the earlier transmission’s success or failure. If the earlier
transmission is successful, a station will decrease its backoff counter to allow other stations
to allocate more RUs and vice versa in case of transmission failure. Wang et al. [40] mini-
mized latency and improved throughput by retransmitting without the backoff procedure.
The station had a second transmission opportunity for unsuccessful transmissions with a
complementary probability. This method is effective when the number of stations is less
than the number of random access RUs.
Xi et al. [41] proposed a multi-dimensional busy-tone approach to solve contention
among stations that use the same RU. More precisely, each station selects a random backoff
value and sends a signal during the arbitration phase’s sub-slots that corresponds to one in
its backoff value. Thus, the station knows that it lost the TXOP if a signal is received during
a sub-slot corresponding to a zero in its backoff value. A turnaround time is required
during each sub-slot so that a station can switch its radio chipset from transmission to
reception. This significantly complicates the implementation and wastes radio bandwidth.
In addition, these approaches break the compatibility with other Wi-Fi 6 devices.
Artificial intelligence techniques have also been applied to optimize performance. The
deep reinforcement learning technique, more specifically a convolutional neural network,
was exploited to propose a distributed RU selection scheme to improve throughput and
delay [42]. The scheme operates with CSMA/CA to enable a station to select the right RU
considering a fixed number of previous channel allocations. Likewise, ref. [43] applied two
other techniques, namely deep Q-network (DQN) and deep deterministic policy gradient
(DDPG). The authors who leveraged those methods predicted the optimal contention
window size regarding past behaviors to achieve high network throughput.
Islam et al. [44] proposed a hybrid MAC to assign RUs to stations in two steps. Firstly,
RUs are fairly distributed among the stations. Then, multiple stations that select the same
RU contend to access the RU using the legacy CSMA/CA method. However, such an
approach is static and assumes that each station generates the same amount of traffic. In
addition, it just reduces the collision probability but may not function efficiently in dense
networks. Lee et al. [45] proposed hybrid channel access to alleviate the collisions in dense
networks. Firstly, they modeled the upper bound efficiency of random access concerning
the number of stations, contention window, and available RUs. Next, they adjusted the
OFDMA contention window for uplink OFDMA to its optimal value to produce results
similar to the developed model.
Bhattarai et al. [46] proposed to fairly allocate the optimal number of random and
scheduled RUs to provide high throughput. The access point assigns scheduled RUs to the
stations from which it received a BSR. Then, it leaves the remaining RUs for other stations
to contend for the channel access. Efficient Resource Allocation (ERA) [47] classified
stations according to their load. Three classes were created with a different RU width to
accommodate the different traffic loads. Stations with more traffic to send are assigned to
an RU with a larger bandwidth.
Future Internet 2022, 14, 293 18 of 52
Baiocchi et al. [48] adapted Wi-Fi 6 to implement random access in the frequency
domain. The stations send tones (i.e., non-modulated signals) to compete for medium
access. An ordered list of subcarriers is used to transmit the tones: only the stations that do
not detect any tones transmitted through a lower subcarrier win the round. After a few
rounds, the collision probability becomes very small.
The authors of [49] offered a better user experience by enabling the access point to
assign the stations to multiple groups. Then, it assigns the resources to each of these groups.
The authors defined a utility function based on the user data rate and minimum bandwidth
requirement. The access point applies K-mean clustering based on the closeness of the
stations’ utility functions to group the stations. Finally, it assigns RUs to these groups to
have a maximum utility value per group.
Conversely, we can adopt a user-centric (selfish) approach: each user can indepen-
dently select its access point while trying to globally balance the load [50]. A station
considers the signal strength of the neighboring access points as well as its relative capacity,
achievable data rate, and the location of other stations. Since this method is user-centric, it
greatly reduces the overhead, but the system may fall in a local optimum, or even worse
may result in oscillations.
Some papers utilized scheduled and random accesses together. The authors of [59]
proposed a hybrid mechanism for channel utilization. They introduced three control
packets to collect and send information with limited flexibility in network size. This
mechanism was an alternative for TF-R and is now deprecated. In the beginning, the access
point acquires the demands and assigns the RUs to the requesting stations. Stations that did
not ask for a dedicated resource and have data to send can contend to access the remaining
non-allocated RUs. Yang et al. [60,61] also leveraged a utility metric to maximize utility and
user satisfaction. They managed the RU transfer between scheduled and random access
users. Moreover, they suggested a scheduling scheme to distribute the RUs by accounting
for the probability distribution of multi-cell interference. The authors of [62] proposed
hybrid channel access in the channel contention phase to assign the RUs efficiently. In the
contention phase, the stations with expired backoff randomly select RUs to send the BSR.
Then, other stations sense the channel to find free RUs. They resume the backoff counter
and try to select one of these resources. The procedure continues until all the stations
successfully allocate resources or there are no more RUs.
The authors of [63] grouped the stations in a BSS to reduce collision and interference.
They clustered the geographically close stations. Each cluster has a leader station that
contends to access the channel for the whole cluster. The access point schedules these
leaders and subsequently, leaders schedule their member stations based on their available
resources. However, it needs to modify the Wi-Fi 6 standard.
Joo et al. [64] improved the throughput by making the network capable of sharing a
single RU among multiple stations. Virtual timeslots within an RU distinguish the timing
for each station’s access to the medium.
The authors of [65] leveraged OFDMA to enable unidirectional full-duplex trans-
missions. The access point has self-interference cancellation antennas so that it can both
transmit and receive different signals. However, the stations do not have this kind of
complex hardware and they are not full duplex. Thus, the access point must identify the
hidden terminals. They use two OFDM symbol times for signaling. In the first OFDM
symbol time, the access point gathers the uplink transmission demands of the stations. In
the second OFDM symbol time, it compares these demands with its downlink traffic and
finds the hidden stations accordingly. Then, transmissions can take place, full-duplex for
the access point and half-duplex for the receiving stations.
Karthik et al. [66] adapted EDCA to OFDMA to enable priority access. The access
point executes a scheduler that assigns different contention window sizes to each station.
More precisely, the EDCA algorithm is executed virtually by the access point to decide the
station that will use each RU within a PPDU. Because of the virtual execution, no collisions
are actually created; the access point selects a single winner. The station receives an RU if
its backoff value is smaller than the available RUs. The RU size that the station allocates is
a factor of 26-tone RU. It defines a limit for the number of 26-tone RUs participating in a
single transmission using the Min–Max and Z-score normalization functions.
Kim et al. [67] proposed a new multi-user OFDMA frame format to maximize trans-
mission efficiency. They proposed to find the optimal length of the multi-user frame,
considering the status of the buffer and the bitrate of the stations. They proved that the
problem is NP-complete, and decomposed it into subproblems that they solved sequentially.
CC-MAC [68] is a centralized contention-based MAC that exploits uplink OFDMA
random access. Firstly, the access point sends a Contention Period Announcement (CPA)
frame. Then, each active station selects a random slot after the CPA to send an association
ID signal. Thus, the access point knows the list of pending frames and announces the
winners in a Contention Resolution (CR) frame. If the number of winners is strictly larger
than the number of RUs, the access point must select a subset to announce in its CR frame.
Finally, the winning stations can start their transmission synchronously. This mechanism is
an alternative to BSR and TF concepts.
Future Internet 2022, 14, 293 20 of 52
4.3.4. Optimization
Interactive flows are sensitive to latency. Bankov et al. [74] proposed, e.g., to minimize
the upload time in uplink OFDMA. They greedily picked different stations according
to their remaining upload time and assign them to different RUs. The authors of [75]
applied a queue-based drift plus a penalty algorithm [76] to select the transmit power
and resource allocation per timeslot to minimize the queue length. It divides the period
between two consecutive TFs to multiple timeslots and allocates the RUs per timeslot,
i.e., it is large enough for transmission. Zheng et al. [77] doubled the OFDMA contention
window in the case of a station’s failure. More precisely, this happens when the number of
the unsuccessful transmissions exceeds the retransmission limit or when the number of
active stations exceeds the number of available random access RUs Kim et al. [78] clustered
stations with similar expected transmission delays to transmit their data simultaneously.
This enhanced the uplink channel usage. The transmission scheduling was based on a
proportional fair-based approach.
Throughput optimization was the main objective of the following works. The authors
in [79] concentrated on optimizing the network’s capacity when mixing scheduled and
random access. Primarily, they defined the capacity entropy to measure the capacity of
the network. Then, they modeled UORA mode with a Markov chain to derive the access
probability and thus the capacity of the random access mode. Finally, they proposed a hy-
brid mode that relied on a greedy algorithm. The formulation relied on a set of constraints,
defining the capacity and the channel quality perceived by each station. Chen et al. [80] de-
termined the contention window size utilizing deep reinforcement learning to optimize the
throughput. It monitored the network under different circumstances and set the window
size accordingly. A Markov decision process solved the optimization problem by taking
into account the current window size, status of the nodes, and network throughput.
The following papers aimed to improve the throughput with a constraint on queue
length. A scheduling mechanism for downlink OFDMA with minimum throughput re-
Future Internet 2022, 14, 293 21 of 52
4.3.6. Synchronization
OFDMA-based multiple access for IEEE 802.11ax (OMAX) [92] resolves the synchro-
nization problem. The stations sense the whole channel rather than RUs to avoid inter-
Future Internet 2022, 14, 293 22 of 52
ference and the backoff decreases by the number of RUs. Upon backoff completion, each
station randomly chooses one of the RUs. Moreover, it enhances the RTS/CTS mechanism
by embedding the scheduling in CTS to reduce overheads in the network. Furthermore, [93]
introduced a symbol-timing synchronization scheme for uplink multi-user scenarios to
enhance the synchronization quality. This symbol timing depends on the legacy and HE
802.11 preambles to provide synchronous frame arrival in uplink multi-user mode.
The authors of [108] investigated the coexistence of Dedicated Short Range Com-
munications (DSRC) as a vehicular communication protocol in IEEE 802.11p and up-
link/downlink transmissions in Wi-Fi 6. The analysis indicated that both types of networks
may cohabit friendly in the same band, fairly sharing the bandwidth. Lee et al. [109]
introduced a similar model for an unsaturated case. They also considered heterogeneous
deployments with non-802.11ax traffic. They modeled the channel access analytically using
Markov chains. They used simulation to evaluate the network regarding the variable num-
ber of stations, different frame arrival rates, the impact of RU contention and non-802.11ax
traffic, and tuning EDCA parameter sets.
5. SR in Wi-Fi 6
We first explain the concept of SR and then its challenges in Wi-Fi. Finally, we present
new mechanisms in Wi-Fi 6 to improve SR.
5.1. Concept
A BSS regroups stations that use the same parameters (e.g., security, radio channel) to
access the medium. Two BSSs are overlapping if their signals can be mutually detected. In
Figure 12, a laptop is in the intra-BSS area of BSS 1 and it is an inter-BSS node for BSS 2.
An access point defines the parameters for its BSS and orchestrates the transmissions. It
regularly broadcasts beacon frames that contain information about the channel used by the
access point, encryption information, or power saving (see Section 2.2.3).
Legacy Wi-Fi has only limited capabilities for SR. Access points that are substantially
apart from each other may use the same channel to communicate with the stations within
their BSSs. When the BSSs are within each other’s transmission ranges and operate on the
same channel, this causes huge interference [110], increases the congestion, and leads to
poor data rates. Interference may become a problem in dense deployments with many
access points within a small area as the number of different channels is insufficient to avoid
overlapping BSSs.
Applying SR among overlapping BSSs increases spectrum reuse that results in a higher
throughput and network capacity. Each station identifies the originating BSS of the ongoing
data packets: if the packets are from different BSSs and the signal strengths are lower than
a predefined threshold, the station can transmit its data concurrently on the same channel.
BSS 1 BSS 2
CH 5 CH 5
AP 1 AP 2
A
a
are
OBS
S SS
_PD a-B
TR Intr
Figure 12. Two overlapping BSSs: the smartphone and the laptop are in the hearing range of both
access points.
OBSS PDlevel
OBSS_PDmin
-82 dBm
(Legacy Wi-Fi)
TX_PWRref TX_PWR
Calculated TX-PWR
based on measured 21 dBm
receiving signal strength
Figure 13. OBSS PD: A station’s inter-BSS NAV is updated only if the RSSI of an inter-BSS packet is
larger than the OBSS_PDlevel . Otherwise, the station can perform a concurrent transmission with a
transmission power that can be derived from this diagram when the OBSS_PDlevel is given.
The NAV is a timer that helps to block stations during an ongoing transmission.
The backoff is paused during the NAV, forbidding the competing stations to start their
transmission. In legacy Wi-Fi, only a single NAV exists and is updated after overhearing any
transmissions. Thus, it may cause collisions if two different BSSs have parallel transmissions
with different durations. A node may be a neighbor of the two transmitters that belong
to two different BSSs. This neighbor will overhear the first RTS/CTS reservation and
update its NAV. Then, the same neighbor will overhear the second RTS/CTS from the
second BSS and will overwrite the existing NAV with those contained in the new RTS. If
the second NAV value is short enough, the neighbor may create a collision since it will
consider erroneously that the medium has been released.
If a station receives an RTS with a weak signal strength, the sender is far away from
the receiver station. Then, the upcoming transmission will not be impaired by a potential
transmission of the receiver. In that case, setting the NAV by the receiver station is not
needed. This unnecessarily prevents the receiver station from sending, which is a waste of
transmission resources.
among stations [114]. The problem is handled by different parameter values (transmission
power, etc.).
The following papers focused on resolving the hidden node problem. Controlling the
threshold or applying RTS/CTS help to reduce the hidden terminal problem [114]. The
impact of hidden nodes on the uplink transmissions in the presence of legacy Wi-Fi and
Wi-Fi 6 stations was investigated in [115,116]. They proposed three possible solutions:
(1) increasing the threshold of all stations in the association phase with an HE access point;
(2) specifying different channels for adjacent BSSs; (3) the NAV of a station could only be
set if an intra-BSS station is transmitting data. Sou et al. [117] proposed a trigger-based
approach for uplink multi-user transmissions. The access point sends a multi-user RTS.
If some stations do not respond because they have a non-zero NAV (i.e., they are hidden
nodes), other stations not in the trigger list can respond with a CTS if they have a zero NAV.
Some other works focused on optimal CCA threshold tuning. Dynamic Sensitivity
Control (DSC) [118,119] tunes the carrier sense threshold of the access point according
to the RSSI of the farest station to transmit more data concurrently. This means that
the access point tunes the value based on the worst case. The performance of DSC was
examined in [120] where DSC with a well-tuned margin for threshold outperformed legacy
mechanisms in throughput. Nonetheless, it also depends on the node density and topology.
The fairness in medium access also depends on the margin. Since DSC causes a hidden node
problem, [121] combined it with RTS/CTS. The authors of [122] leveraged DSC and TDMA
mechanisms jointly to solve the hidden node problem. They proposed to reserve multiple
stations or one BSS within a time interval to have timely orthogonal BSSs. Yan et al. [123]
bound the CCA threshold value in the PSR mechanism, which manages parallel link
interference, to improve QoS. The authors in [124,125] leveraged stochastic geometry
in carrier-sensing threshold manipulation. Every access point tunes the carrier-sensing
threshold and transmission power based on its received power. They concluded that a linear
increase in the carrier-sensing threshold with respect to the received power maximizes the
throughput. Kiryanov et al. [126] extended [127] to reduce memory usage and converge
faster, which applied a branch-and-bound method to optimize the transmission power and
scheduling. The utility function is a function of the thermal noise, transmission power, and
channel gain, i.e., a factor of sent and received signals and noises that includes the effects
of path loss, shadowing, and fading. They tried to find the right value for the carrier-sense
threshold. A dynamic resource scheduling regularly runs the mechanism to consider prior
radio resources per user for optimal resource allocation.
Wilhelmi et al. [128] aimed to reduce interference and improve SR with a dynamic
channel allocation and by controlling the transmission power, respectively. They applied
multi-armed bandits to find the optimal combination of transmission power and channel
to enhance throughput. Bardou et al. [129] also adopted a multi-armed bandit approach
for the same objective. They proposed a Gaussian mixture to sample new network configu-
rations and computed a reward to avoid starvation to select the best configuration. NS-3
simulations validated the model.
Some papers aimed to compute the OBSS PD value efficiently. The authors of [130]
exploited the RSSI of the beacon to directly compute the OBSS PD threshold. The transmis-
sion power is calculated by subtracting a value from a beacon’s RSSI. A station close to the
access point will use a large OBSS PD value. Selinis et al. [131] proposed a Control OBSS PD
Sensitivity Threshold (COST) algorithm. First, the access point collects the moving average
of the stations’ RSSIs and the interference levels from all the stations. Then, it derives the
sensitivity threshold value to respect a minimum margin.
The OBSS PD value may directly affect the network throughput. Interference-Based
Dynamic Channel Access (IB-DCA) [132] maximized the aggregate throughput of the
WLAN. Each station keeps a record of the maximum RSSI level of all the overlapping
BSSs, i.e., BSSs with a different color. More precisely, it measures the maximum RSSI
separately for uplink and downlink transmissions. These values are advertised to other
stations periodically as well as the transmission power of the issuer. Thus, any station
Future Internet 2022, 14, 293 27 of 52
can compute the expected RSSI level at the expected destination based on these values.
The station defines its SR flag accordingly; it knows it will not provoke any collisions
since the expected receiving RSSI will be sufficient to be robust against transmissions in
overlapping BSSs. As an extension, the authors of [133] focused on the performance of
each end-user in dense networks. Lanante et al. [134] proposed an analytical model to find
the suitable OBSS PD threshold and transmission power that optimizes the throughput.
They proved that the throughput depends on the interference range of the BSSs. The model
was based on the received power, transmission power, MCS, distance, and path loss. The
authors of [135] improved the aggregated throughput by tuning the OBSS PD threshold
and transmission power. They utilized the RSSIs of beacons and overlapping BSSs. The
former keeps the connection with the access point and the latter prevents interference in
overlapping BSSs. The threshold is computed based on the recorded RSSIs and uses an
exponentially weighted moving average (EWMA) [136] for updating the threshold during
runtime. Lee et al. [137] proposed a link-aware SR algorithm to select the appropriate
links for simultaneous transmissions and the MCS without interfering with the ongoing
transmission. The mechanism tunes the transmission power for transmission protection
and applies EWMA to select the link and MCS that compute the achievable throughput.
A distributed OBSS PD mechanism was proposed to improve the fairness in the
network [138]. Taking into account the history of transmission opportunities, it tunes the
OBSS PD threshold. It prioritizes stations that did not access the medium in earlier time
slots and downgrades the other stations.
simulator while the network was modeled by the capture effect model. They highlighted
that the throughput improves with larger frame sizes, whereas the high data rate and large
frame size negatively affect the throughput. SR’s throughput was analyzed in [147] in NS-3.
They reached the conclusion that SR performance depends on the CCA threshold, power,
and the distance between the BSSs.
Wilhelmi et al. [148] evaluated the SR mechanisms with the Komondor simulator.
They considered up to 400 scenarios by varying the number of stations, topology, OBSS PD
threshold, and traffic load. Its efficiency is measured by throughput, delay, and channel
occupancy. By alleviating the inter-neighbor WLAN’ contentions successfully, SR reveals
its significance in high-density and high-load networks.
The authors of [21] evaluated the BSS color efficiency also with NS-3. They proved
that BSS coloring increases the throughput per access point up to 47%. Šepić et al. [149]
mainly focused on BSS color. Seven BSSs were simulated with 70 stations and various
threshold values were applied to find the optimal value. They concluded that up to a
certain value, the throughput increases and thereafter the performance degrades because
of the interference from other BSSs.
Rodrigues et al. [150] investigated the impact of the PSR! (PSR!) feature on transmis-
sion latency using a testbed. The evaluations revealed that this feature could reduce the
latency considerably in worst-case scenarios and enhance the throughput.
6. TWT in Wi-Fi 6
We first explain the challenges for power saving with legacy Wi-Fi. Then, we present
the TWT mechanism and other power management improvements in Wi-Fi 6. Finally, we
review the related works in the context of power management.
6.2.1. Overview
The TWT was introduced in 802.11ah [23]. It has been adopted by Wi-Fi 6 to reduce
energy consumption and solve contention issues. TWT aims to introduce a deterministic
and collision-free wireless network. It reduces the latency and queue occupancy by utilizing
multi-user transmissions and packet aggregation. In addition, the idle time of the stations
increases, which considerably reduces energy consumption [13]. TheTWT balances the
load with different TWT sessions for different stations. It also decreases the medium
access contention by frame exchanges in advance. The standard does not specify a default
scheduling for the TWT and is manufacturer-specific.
contention issues within a BSS. Within the SPs, the stations can exchange data and control
packets. If a station has more urgent data to send, it can also transmit data during the wake
intervals using the normal DCF procedure.
The negotiations define the duration of the SPs (TWT duration), which are multiples
of either 256 µs or 1024 µs, and the duration of the wake intervals. A TWT channel is a
temporary channel, e.g., an RU that a station can use as the primary channel. Finally, TWT
protection is defined to protect an SP from external transmissions. An example is the use of
RTS/CTS at the beginning of an SP.
6.2.3. Agreements
Negotiation results are so-called TWT agreements. A station can have up to eight
agreements with its access point [5]. This is useful to cover traffic from different applications
with distinct agreements. Individual agreements assign resources to an individual station,
whereas broadcast agreements assign resources to a group of stations.
Individual Agreements
Individual agreements are negotiated between a single station and its access point.
Both can cancel the agreement. Figure 14a illustrates the use of an individual agreement.
For the negotiation, the station sends a TWT request and the access point replies with a
TWT response. The schedule is defined by the TWT parameters that are provided within
the next beacon frame. The station must be awake to receive this beacon frame but it can
sleep as soon as the TWT schedule is decoded from the beacon. The station is awake within
the SPs to transmit or receive frames to or from its access point. This procedure may repeat
for a longer time than a beacon interval depending on the agreement or terminate within
the same beacon interval.
Negotiation
Beacon Interval Beacon Interval
TWT resp.
Beacon
Beacon
Beacon
Data Data Data Data
AP
TWT req.
Awake Sleep Awake Sleep Awake Sleep Awake Sleep Awake Sleep Awake Sleep
(SP) (Wake interval)
(a)
Negotiation
Listen Interval
Beacon Interval Beacon Interval
TWT resp.
Target Target
Beacon Beacon
Next Target Beacon Beacon Trigger MBA MBA Beacon
AP Trigger
TWT req.
RU 1 Data
RU 2 Data
STA1
TWT req.
RU 1 Data
sleeping
STA2
(b)
Figure 14. Individual and broadcast TWT agreements. (a) Implicit, non-trigger-enabled, and unan-
nounced individual agreement. Three Service Periods (SPs) are scheduled periodically within one
beacon interval. (b) Trigger-enabled, unannounced broadcast agreement. Two SPs are scheduled on
two different listen intervals.
Broadcast Agreements
Wi-Fi 6 has enhanced the original TWT mechanism to also consider broadcast agree-
ments. A broadcast TWT corresponds to an SP for a group of stations. These agreements
avoid duplicating broadcast or multicast packets that have to be delivered to several
stations. Indeed, all the stations have to stay awake to receive broadcast frames.
Future Internet 2022, 14, 293 30 of 52
In contrast to the individual agreements, the parameters for the TWT sessions are not
provided in normal beacon frames but in so-called target beacons. After having transmitted
their request, the corresponding stations can sleep until the next target beacon. Target
beacons are sent periodically every listen interval and contain the schedule for all the TWT
sessions. A listen interval may contain multiple SPs corresponding to different groups of
stations. The stations participating in the TWT agreements must wake up for the target
beacons as there might be updates for the parameters.
Figure 14b illustrates the operation with a broadcast agreement. All the stations can
send their requests to their access point just after the beacon. Thus, the access point collects
the TWT requests and sends a TWT response, announcing when the next target beacon
will be transmitted. All the stations decode it and can sleep until the next target beacon.
The stations decode the different SPs assigned by the access point in the target beacon.
Then, they have to wake up for the service period (SP) they have been assigned to. Here,
both stations 1 and 2 participate in the first SP, whereas only station 1 is involved in the
second one.
the same BSS and if this frame is not relevant to it. This means that the station sets its NAV
timer, turns to sleep mode, and wakes up only at the end of the current PPDU [5,111].
Opportunistic Power Save (OPS) removes the obligation to negotiate the SPs, combin-
ing the classic PSM and the novel TWT broadcast agreements [5]. It divides the beacon
interval into sub-intervals. The access point schedules a broadcast SP in every sub-interval
and tells certain stations to stay awake and transmit or receive data. The system does not
need explicit negotiations; the schedule is propagated by a traffic indication map frame at
the beginning of every broadcast SP. The stations receive this frame and if they have no
activity in the current SP, they turn to sleep mode until the next SP. Thus, OPS reduces the
overheads of the SPs’ negotiations, which may be costly in dense networks. In addition,
the access point assigns different stations to independent sub-intervals, making the system
more efficient through load balancing [5].
compared with a distributed monitoring process. The requests from stations are forwarded
to the controller, which decides how to allocate resources and configure the link parameters
dynamically depending on the load.
Oni et al. [163] formulated a throughput maximization problem in MIMO WLAN.
They mitigated the hidden node problem by optimizing the CCA threshold. Finally, they
maximized the average number of successful transmissions with respect to the density of
nodes, multi-antenna configuration, channel fading, and path loss.
Kim et al. [67] proposed a new MU MIMO frame format in both uplink and downlink
to maximize the transmission efficiency. They formulated the problem as NP-complete and
considered the status of the buffer and the bitrate of the stations. They solved the problem
to find the optimal length of the multi-user frame.
8. Modulation Techniques
This section introduces the new modulation schemes in Wi-Fi 6. Then, we elaborate
on other modulation improvements, namely, DCM and LDPC. Finally, we discuss the
related works.
independently and a transmission failure means that the corresponding frame has to be
retransmitted entirely.
Binary Convolution Codes (BCC) and Low-Density Parity Check (LDPC) are two
FECs used to reduce the probability of data loss in noisy channels. BCCs support up to
a 242-tone RU. Alternatively, LDPC is applicable in Wi-Fi 6 for MCS 10-11 and/or RU
sizes larger than 242-tone [175,176]. In other words, a BCC is mandatory for bandwidths
smaller than or equal to 20 MHz; otherwise, LDPC is used for larger bandwidths. Indeed,
a BCC is inefficient for large bandwidths, requiring more time to process data and more
encoders [177].
The authors of [187] proposed a simulation model to measure the efficiency of all
modulation schemes. Afterward, they assessed different combinations of all GIs and
channel bandwidths to find the best values. They concluded that higher-order modulations
perform better on narrower RUs. Moreover, GIs do not significantly affect performance.
Some papers evaluated the throughput improvement. The authors of [21] compared
the novel MCS-11 with MCS-9 (Wi-Fi 5). The simulation highlighted that MCS-11 outper-
forms MCS-9 by 14-18%. Rochim et al. [188] also compared the same MCS. In particular,
they focused on the impact of the number of associated clients. They concluded that the
response time is similar. However, MCS-11 outperforms MCS-9 in overall throughput as
the network size increases. Weller et al. [106] evaluated 1024-QAM modulation in an ex-
periment using two different vendors. They measured that the new modulation improved
throughput by 25%.
9.1.1. Hardware
The Wi-Fi Alliance is the organization in charge of the certification of Wi-Fi standard
products. It has decided to release the implementations of Wi-Fi 6 features for access points
in two waves as listed in Table 7. However, some vendors include some features from Wave
2 in Wave 1. In addition, Wi-Fi 6 clients, including laptops, smartphones, etc., are gradually
released in the market.
Waves Features
• UL/DL OFDMA
• DL MU-MIMO ( ≥ 4 spatial streams)
• TWT
Wave 1
• 20/40/80 MHz channel width on the 5 GHz band
• 1024-QAM
• WPA 3 Encryption (non-802.11ax feature)
• 160 MHz channel width on 5 GHz band
• UL MU-MIMO
Wave 2
• Combining OFDMA and MU-MIMO
• BSS coloring
Wi-Fi 6 products from different vendors may differ by their supported features and
their type of antenna, port, and radio-frequency connectors. The high-performance wireless
access points are mainly categorized according to their deployment environment, namely
indoor and outdoor.
Future Internet 2022, 14, 293 37 of 52
Many vendors are producing Wi-Fi 6 access points with various capabilities. Among
these vendors, Aruba, Cisco, and Huawei are the leading vendors that support most of
the features. These vendors release the hardware in different series with different levels
of capabilities. Aruba’s (https://www.arubanetworks.com/products/wireless/access-
points/, accessed on 1 September 2022) access point series meets most of the requirements
in Wi-Fi 6 and Wi-Fi 6 E, namely, TWT, OFDMA with 37 RUs, MCS 0–11, and MU MIMO
with up to four antennas. Moreover, Cisco and Huawei products support OFDMA, TWT,
MCS 0–11, BSS coloring, and MU MIMO with up to eight antennas.
9.1.2. Software
Multiple Wi-Fi 6 features require that different access points cooperate. For instance,
sequentially scheduling the service periods with TWT, allocating orthogonal RUs for
different BSSs, or assigning BSS colors would benefit from a global cooperation scheme.
Thus, we are convinced that we need a common Application Programming Interface (API)
so that an external vendor-independent entity can adapt the behaviors of the different
access points. In this way, a controller may be able to control a heterogeneous set of Wi-Fi 6
access points. Researchers may also exploit this API to plug novel algorithms or evaluate
performance in complex deployments.
Wireless access points need a lightweight operating system to be executed on resource-
constrained hardware. OpenWrt (https://openwrt.org/, accessed on 1 September 2022)
is a well-known Linux operating system for managing network devices including access
points. It can be installed on any writable file system and provides more freedom for tuning
the default configurations from vendors. OpenWrt is open source and can be modified to
integrate novel software features.
The operating system is not sufficient since some Wi-Fi features are implemented in
the hardware. The firmware is a specific software installed in a small memory chip on
the hardware and is in charge of the communication between the operating system and
the NIC! (NIC!). It provides the instructions to control specific hardware. Open-source
firmware is beneficial for tuning some parameters. We identified three Linux firmwares:
ath11k (https://wireless.wiki.kernel.org/en/users/drivers/ath11k, accessed on 1
September 2022): This firmware is designed for Qualcomm Technologies’ Wi-Fi 6
chipset. Its source code is freely available (https://github.com/kvalo/ath11k-firmware,
accessed on1 September 2022).
MT7915 (https://github.com/openwrt/mt76/tree/master/mt7915, accessed on 1
September 2022): This firmware is designed for the Mediatek MT7915 chipsets, which
consist of Wi-Fi 6 and Bluetooth 5 combo chipsets. MT7915 supports the Wave 1+
features listed in Table 7 and mostly targets routers, repeaters, and mesh networking
equipment. It also supports EasyMesh features to create a meshed wireless topology
of access points.
MT7921 (https://github.com/openwrt/mt76/tree/master/mt7921, accessed on 1
September 2022): This firmware is designed for the Mediatek MT7921 chipsets and
mostly targets notebooks and routers. MT7921 supports Wi-Fi 6 with a 2 × 2 dual antenna.
However, the firmware provides often very limited access to Wi-Fi 6 features (or even
none for the non-open-source versions). Many features are implemented in the hardware
and can only be executed as a blackbox.
implemented with dedicated hardware. Thus, it is hard to assess the energy efficiency of a
protocol or algorithm with SDR.
Openwifi is an open-source full-stack Wi-Fi based on SDR designed for Linux op-
erating systems [189]. The prototype is based on an FPGA and includes the software
drivers used with Linux. Both the hardware and software implementations are freely
available. It supports multiple different SDR platforms. Currently, Wi-Fi 6 features are
under development but openwifi does not yet support the high bitrate of Wi-Fi 6.
Xia et al. [190] implemented a cross-technology communication scheme between Wi-
Fi 6 and LoRa. They demonstrated the feasibility of their proposition by implementing a
prototype in the USRP N210 hardware. However, the focus was on implementing the LoRa
mechanisms and most Wi-Fi 6 features are not supported.
Features
MU OFDMA MU-MIMO SR Additional Language
Simulators
Features
round-robin scheduler
Official NS-3.35 X OBSS PD C++
for MU OFDMA
Python
MU EDCA
DCF, MCS
Komondor OBSS PD [12] Channel bonding C++
Packet aggregation
RTS/CTS, NAV
10.1. Challenges
We identified several challenges with Wi-Fi 6. These are the control of complex Wi-Fi 6
deployments, QoS support, and interoperability.
points can orchestrate overlapping BSSs [208,209]. Thus, when multiple access points
compete for channel access, the guarantees may not be met. Here, a controller can help
to coordinate all access points. However, in the presence of other non-controlled access
points, granting guarantees remains a challenge.
The synchronization of nodes is crucial in real-time networks such as TSN. The Wi-Fi
standard already supports time synchronization through the IEEE 802.11v/mc amend-
ments [208]. Researchers are designing Wi-Fi 7 to fulfill the resource reservation challenges
mentioned above and to make Wi-Fi compatible with TSN [210].
The “Reliable and Available Wireless” (RAW) working group in the IETF studies
wireless technologies for use in real-time environments such as Industry 4.0. These use
cases typically utilize current wireline technologies such as TSN that support soft and hard
real-time guarantees [211]. For both purposes, the RAW group studies various wireless
technologies and Wi-Fi 6 is among them.
10.1.3. Interoperability
There are many different Wi-Fi access points on the market as well as Wi-Fi NIC!s.
An implementation must conform with interoperability tests to be standard-compliant.
However, each vendor may implement additional proprietary algorithms, e.g., for time
measurement [212,213] or for the contention window distribution [214]. For this reason,
predicting the behavior of a multi-vendor Wi-Fi deployment is challenging.
More importantly, today’s firmwares are not open access; therefore, there is limited
control of the scheduling process, the MCS selection, or MU MIMO. Researchers need to ac-
cess the firmware and low-level features to identify the pathological situations and provide
algorithms or protocols to tackle the identified problems. Moreover, orchestrating a large
deployment from different vendors is difficult and the results would likely be suboptimal.
It is also essential to have a standardized API to control the behavior of the access point.
Ideally, the architecture should be sufficiently flexible to accommodate novel algorithms and
protocols to support novel features. Yap et al. [215] paved the way for network agility with
OpenRoads consisting of three layers (flow, slicing, and controller). Although this solution
focused on the SDN architecture, features to control the specific Wi-Fi 6 mechanisms would
be helpful.
Backward compatibility brings specific challenges. In particular, CSMA/CA is still
used by an access point to compete with other nodes to access the channel. A Wi-Fi 6
access point can receive the same amount of time as legacy Wi-Fi nodes, which significantly
reduces the bitrate and causes unfairness. This situation may be similar to the performance
anomaly problem in [216]. It can also cause collisions and long delays [86].
The main advantages of Wi-Fi networks are the implementation simplicity and lower
deployment costs. However, the implementation complexity increases with the new Wi-Fi
generations Wi-Fi 6 and Wi-Fi 7, which also increases costs. Their level of complexity is
approaching that of LTE networks.
10.2. Wi-Fi 7
Wi-Fi 7 is defined by the IEEE 802.11be Extremely High Throughput (EHT) amendment.
The IEEE 802.11be task group started in May 2019 and is expected to finalize it by 2024.
Since discussions are still in progress, the future feature set of Wi-Fi 7 is not yet definite.
Although Wi-Fi 6 operates on the 2.4 GHz, 5 GHz, and 6 GHz frequency bands but only
on one of them at a time, Wi-Fi 7 can utilize them simultaneously [26,217–221]. The
specifications of Wi-Fi 7 are listed in Table 9. We elaborate on major candidate features in
the following subsections.
Future Internet 2022, 14, 293 41 of 52
10.2.5. MU-MIMO
To double the nominal throughput, Wi-Fi 7 aims to use 16 spatial streams compared to
the 8 spatial streams in Wi-Fi 6. Doubling the spatial streams causes overheads on channel
sounding that may affect the accuracy of the CSI. Therefore, Wi-Fi 7 introduces an implicit
channel-sounding procedure to have the correct CSI.
11. Conclusions
In this paper, we first provided a brief introduction of Wi-Fi features to help non-
experts understand the content. Then, we provided an overview of the features of Wi-
Fi 6, which are OFDMA, Spatial Reuse, Target Wake Time, MU MIMO, more efficient
modulations, and the new 6 GHz band. These features increase transmission capacity,
allow for explicit resource assignment, facilitate resource sharing in dense networks, and
improve power saving, which is of particular interest in the IoT. Then, we explained these
mechanisms in detail and surveyed the related works, classified by their objectives. In
addition, we summarized the simulation tools used for the performance of Wi-Fi 6, which
helps the reader with the potential selection of an evaluation tool. We discussed the open
challenges in Wi-Fi 6, which are partly tackled by the current IEEE project on Wi-Fi 7.
Finally, we summarized the current directions of Wi-Fi 7.
Author Contributions: conceptualization, E.M., F.T. and M.M.; methodology, E.M., F.T. and M.M.;
validation, E.M. and F.T.; resources, M.M.; writing—original draft preparation, E.M.; writing—review
and editing, E.M., F.T. and M.M.; visualization, E.M.; supervision, F.T. and M.M.; All authors have
read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable as the study did not report any data.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Cisco Annual Internet Report (2018–2023) White Paper. Available online: https://www.cisco.com/c/en/us/solutions/collateral/
executive-perspectives/annual-internet-report/white-paper-c11-741490.html (accessed on 1 September 2022).
2. The Road to Wi-Fi 6/6E. 2022. Available online: https://www.cisco.com/c/en/us/products/collateral/wireless/nb-06
-preparing-for-wifi-6-ebook-cte-en.html (accessed on 1 September 2022).
3. Deng, D.J.; Lien, S.Y.; Lee, J.; Chen, K.C. On Quality-of-Service Provisioning in IEEE 802.11 ax WLANs. IEEE Access 2016, 4,
6086–6104. [CrossRef]
4. Official IEEE 802.11 Working Group Project Timelines. Available online: https://www.ieee802.org/11/Reports/802.11_Timelines.
htm (accessed on 1 September 2022).
5. IEEE Approved Draft Standard for Information Technology—Telecommunications and Information Exchange Between Systems
Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications Amendment 1: Enhancements for High Efficiency WLAN. Draft, IEEE: Piscataway, NJ,
USA, 2021.
6. Bellalta, B. IEEE 802.11ax: High-efficiency WLANs. IEEE Wirel. Commun. 2016, 23, 38–46. [CrossRef]
7. Afaqui, M.S.; Garcia-Villegas, E.; Lopez-Aguilera, E. IEEE 802.11 ax: Challenges and Requirements for Future High Efficiency
WiFi. IEEE Wirel. Commun. 2016, 24, 130–137. [CrossRef]
8. Yang, D.X.; Guo, Y.; Aboul-Magd, O. 802.11 ax: The Coming New WLAN System with More Than 4x MAC Throughput
Enhancement. In Proceedings of the IEEE Semiannual Vehicular Technology Conference (VTC), Sydney, Australia, 4–7 June 2017.
9. Ali, R.; Kim, S.W.; Kim, B.S.; Park, Y. Design of MAC Layer Resource Allocation Schemes for IEEE 802.11 ax: Future Directions.
IETE Tech. Rev. 2018, 35, 28–52. [CrossRef]
10. Yang, M.; Li, B.; Yan, Z. MAC Technology of IEEE 802.11 ax: Progress and Tutorial. Mob. Networks Appl. 2021, 26, 1122–1136.
[CrossRef]
11. Khorov, E.; Kiryanov, A.; Lyakhov, A.; Bianchi, G. A Tutorial on IEEE 802.11 ax High Efficiency WLANs. IEEE Commun. Surv.
Tutor. (COMST) 2018, 21, 197–216. [CrossRef]
12. Wilhelmi, F.; Barrachina-Muñoz, S.; Cano, C.; Selinis, I.; Bellalta, B. Spatial Reuse in IEEE 802.11ax WLANs. Comput. Commun.
2021, 170, 65–93. [CrossRef]
13. Nurchis, M.; Bellalta, B. Target Wake Time: Scheduled Access in IEEE 802.11 ax WLANs. IEEE Wirel. Commun. 2019, 26, 142–150.
[CrossRef]
14. Ibrahim Masri, E.E.; Ergüzen, A. Review Paper on 802.11 ax Scheduling and Resource Allocation. Int. J. Trend Sci. Res. Dev.
(IJTSRD) 2020, 5, 1134-1139.
15. Qu, Q.; Li, B.; Yang, M.; Yan, Z.; Yang, A.; Deng, D.J.; Chen, K.C. Survey and Performance Evaluation of the Upcoming Next
Generation WLANs Standard-IEEE 802.11 ax. Mob. Netw. Appl. 2019, 24, 1461–1474. [CrossRef]
16. Tarokh, V.; Jafarkhani, H.; Calderbank, A.R. Space-Time Block Codes from Orthogonal Designs. IEEE Trans. Inf. Theory 1999, 45,
1456–1467. [CrossRef]
17. IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016); IEEE Standard for Information Technology–Telecommunications and
Information Exchange Between Systems—Local and Metropolitan Area Networks–Specific Requirements—Part 11: Wireless
LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; IEEE: Piscataway, NJ, USA, 2021. Available online:
https://cir.nii.ac.jp/crid/1573950400559565312 (accessed on 1 September 2022).
18. Al-Bado, M.; Sengul, C.; Sreenan, C.J.; Brown, K.N. Hidden Terminal Management for Uplink Traffic in Rate-Controlled WiFi
Networks. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Messina, Italy, 27–30 June 2016.
19. 802.11AX Project Authorizations (PARs). Available online: https://www.ieee802.org/11/PARs/P802.11ax.pdf (accessed on 1
September 2022).
20. Wi-Fi 6 Industry White Paper. Available online: https://e.huawei.com/en/products/enterprise-networking/wlan/wifi-6/
industry-white-paper (accessed on 1 September 2022).
21. Šepić, N.; Kočan, E.; Veljović, Z.; Pejanović, M. Assessment of Novel Solutions for Throughput Enhancement in IEEE 802.11 ax
Networks. In Proceedings of the 27th Telecommunications Forum (TELFOR), Belgrade, Serbia, 26–27 November 2019.
22. Anastasi, G.; Conti, M.; Gregori, E.; Passarella, A. 802.11 Power-Saving Mode for Mobile Computing in Wi-Fi Hotspots:
Limitations, Enhancements and Open Issues. Wirel. Netw. 2008, 14, 745–768. [CrossRef]
23. IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11-2016, as amended by IEEE Std 802.11ai-2016); IEEE Standard for Information
Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks–Specific
Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2:
Sub 1 GHz License Exempt Operation. IEEE: Piscataway, NJ, USA, 2017.
24. Liu, J. Reliable Dual Sub-Carrier Modulations (DCM) for HE-SIG-B and Data. Available online: https://mentor.ieee.org/802.11
/dcn/15/11-15-1068-01-00ax-reliable-transmission-schemes-for-he-sig-b-and-data.pptx (accessed on 1 September 2022).
25. Wi-Fi 6E: The Next Great Chapter in Wi-Fi. Available online: https://www.cisco.com/c/en/us/solutions/collateral/enterprise-
networks/802-11ax-solution/nb-06-wi-fi-6e-wp-cte-en.pdf (accessed on 1 September 2022).
26. Garcia-Rodriguez, A.; Lopez-Perez, D.; Galati-Giordano, L.; Geraci, G. IEEE 802.11 be: Wi-Fi 7 Strikes Back. IEEE Commun. Mag.
(COMMAG) 2021, 59, 102–108. [CrossRef]
Future Internet 2022, 14, 293 45 of 52
27. Kosek-Szott, K.; Natkaniec, M.; Szott, S.; Krasilov, A.; Lyakhov, A.; Safonov, A.; Tinnirello, I. What’s New for QoS in IEEE 802.11?
IEEE Netw. Mag. 2013, 27, 95–104. [CrossRef]
28. Bellalta, B.; Bononi, L.; Bruno, R.; Kassler, A. Next Generation IEEE 802.11 Wireless Local Area Networks: Current Status, Future
Directions and Open Challenges. Comput. Commun. 2016, 75, 1–25. [CrossRef]
29. Venkateswaran, S. Payload Symbol Size for 11ax. Submission, IEEE. 2015. Available online: https://mentor.ieee.org/802.11
/dcn/15/11-15-0099-04-00ax-payload-symbol-size-for-11ax.pptx (accessed on 1 September 2022).
30. Zhang, J.; Zhu, J.; Liu, L.; Luo, J.; Luo, Y.; Lin, Y.; Pang, J.; Rong, Z.; Sun, R.; Yang, D.X.; et al. HE-SIGA Content. Available online:
https://mentor.ieee.org/802.11/dcn/15/11-15-1077-00-00ax-he-sig-a-content.pptx (accessed on 1 September 2022).
31. Zhang, J.; Zhu, J.; Liu, L.; Luo, J.; Luo, Y.; Lin, Y.; Pang, J.; Rong, Z.; Sun, R.; Yang, D.X.; et al. HE-SIGA Transmission for Range
Extension. Available online: https://mentor.ieee.org/802.11/dcn/15/11-15-0826-03-00ax-he-sig-a-transmission-for-range-
extension.pptx (accessed on 1 September 2022).
32. Liu, L.; Gan, M.; Lin, M.; Zhang, J.; Luo, J.; Lin, Y.; Pang, J.; Loc, P.; Sun, R.; Suh, J.; Rong, Z.; et al. HE-SIG-B Contents. Available
online: https://mentor.ieee.org/802.11/dcn/15/11-15-1335-02-00ax-he-sig-b-contents.pptx (accessed on 1 September 2022).
33. Kwon, Y.H.; Hedayat, R.; Seok, Y.; Cheong, M. Protection Using MU RTS/CTS. Available online: https://mentor.ieee.org/802.11
/dcn/16/11-16-0048-00-00ax-protection-using-mu-rts-cts.pptx (accessed on 1 September 2022).
34. Khorov, E.; Kiryanov, A.; Schelstraete, S.; Wang, H. Random Access RU Allocation in the Trigger Frame. Submission, IEEE.
2016. Available online: https://mentor.ieee.org/802.11/dcn/16/11-16-0582-03-00ax-random-access-ru-allocation-in-the-trigger-
frame.pptx (accessed on 1 September 2022).
35. Ghosh, C.; Stacry, R.; Perahia, E.; Azizi, S.; Huang, P.-K.; Lin, Q.; Cariou, L.; Chen, X.; Yang, R.; Alpert, Y.; et al. UL OFDMA-based
Random Access Procedure. Available online: https://mentor.ieee.org/802.11/dcn/15/11-15-1105-00-00ax-ul-ofdma-based-
random-access-procedure.pptx (accessed on 1 September 2022).
36. Cariou, L.; Azizi, S.; Huang, P.-K.; Li, Q.; Chen, X.; Ghosh, C.; Stacry, R.; Alpert, Y.; Gurevitz, A.; Sutskover, I.; et al. Rules for 2
EDCA Parameters. Available online: https://mentor.ieee.org/802.11/dcn/16/11-16-0998-03-00ax-rules-for-2-edca-parameters.
pptx (accessed on 1 September 2022).
37. Lanante, L.; Ghosh, C.; Roy, S. Hybrid OFDMA Random Access with Resource unit Sensing for Next-Gen 802.11 ax WLANs.
IEEE Trans. Mob. Comput. 2020, 20, 3338–3350. [CrossRef]
38. Kim, J.; Lee, H.; Bahk, S. CRUI: Collision Reduction and Utilization Improvement in OFDMA-Based 802.11 ax Networks. In
Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019.
39. Kim, Y.; Kwon, L.; Park, E.C. OFDMA Backoff Control Scheme for Improving Channel Efficiency in the Dynamic Network
Environment of IEEE 802.11 ax WLANs. Sensors 2021, 21, 5111. [CrossRef]
40. Wang, J.; Wu, M.; Chen, Q.; Zheng, Y.; Zhu, Y.H. Probability Complementary Transmission Scheme for Uplink OFDMA-based
Random Access in 802.11 ax WLAN. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC),
Marrakesh, Morocco, 15–18 April 2019.
41. Xie, D.; Zhang, J.; Tang, A.; Wang, X. Multi-Dimensional Busy-Tone Arbitration for OFDMA Random Access in IEEE 802.11 ax.
IEEE Trans. Wirel. Commun. 2020, 19, 4080–4094. [CrossRef]
42. Kotagiri, D.; Nihei, K.; Li, T. Multi-User Distributed Spectrum Access Method for 802.11 ax Stations. In Proceedings of the IEEE
International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 3–6 August 2020.
43. Wydmański, W.; Szott, S. Contention Window Optimization in IEEE 802.11 ax Networks with Deep Reinforcement Learning. In
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021.
44. Islam, G.Z.; Kashem, M.A. An OFDMA-based New MAC Mechanism for IEEE 802.11 ax. In Proceedings of the International
Conference on Networking, Systems and Security (NSYSS), Dhaka, Bangladesh, 18–20 December 2018.
45. Lee, J. OFDMA-based Hybrid Channel Access for IEEE 802.11 ax WLAN. In Proceedings of the International wireless communi-
cations and mobile computing conference (IWCMC), Limassol, Cyprus, 25–29 June 2018.
46. Bhattarai, S.; Naik, G.; Park, J.M.J. Uplink Resource Allocation in IEEE 802.11 ax. In Proceedings of the IEEE International
Conference on Communications (ICC), Shanghai, China, 20–24 May 2019.
47. Islam, G.Z.; Kashem, M.A. Efficient Resource Allocation in the IEEE 802.11 ax Network Leveraging OFDMA Technology. J. King
Saud Univ.-Comput. Inf. Sci. 2020, 34, 2488–2496.
48. Baiocchi, A.; Garlisi, D.; Santaromita, G.; Tinnirello, I. Moving RTS/CTS to the Frequency Domain: an Efficient Contention
Scheme for 802.11 ax Networks. In Proceedings of the International Teletraffic Congress (ITC), Budapest, Hungary, 27–29
August 2019.
49. Yang, A.; Li, B.; Yang, M.; Yan, Z.; Xie, Y. Utility Optimization of Grouping-based Uplink OFDMA Random Access for the Next
Generation WLANs. Wirel. Netw. 2021, 27, 809–823. [CrossRef]
50. Cao, F.; Zhong, Z.; Fan, Z.; Sooriyabandara, M.; Armour, S.; Ganesh, A. User Association for Load Balancing with Uneven User
Distribution in IEEE 802.11 ax Networks. In Proceedings of the IEEE Consumer Communications and Networking Conference
(CCNC), Las Vegas, NV, USA, 9–12 January 2016.
51. Karaca, M.; Bastani, S.; Priyanto, B.E.; Safavi, M.; Landfeldt, B. Resource Management for OFDMA based Next Generation 802.11
WLANs. In Proceedings of the IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, France, 11–13 July 2016.
52. Ali, R.; Shahin, N.; Zikria, Y.B.; Kim, B.S.; Kim, S.W. Deep Reinforcement Learning Paradigm for Performance Optimization of
Channel Observation–based MAC Protocols in Dense WLANs. IEEE Access 2018, 7, 3500–3511. [CrossRef]
Future Internet 2022, 14, 293 46 of 52
53. Bankov, D.; Didenko, A.; Khorov, E.; Lyakhov, A. OFDMA Uplink Scheduling in IEEE 802.11 ax Networks. In Proceedings of the
IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018.
54. Bourgeois, F.; Lassalle, J.C. An Extension of the Munkres Algorithm for the Assignment Problem to Rectangular Matrices.
Commun. ACM 1971, 14, 802–804. [CrossRef]
55. Tutelian, S.; Bankov, D.; Shmelkin, D.; Khorov, E. IEEE 802.11 ax OFDMA Resource Allocation with Frequency-Selective Fading.
Sensors 2021, 21, 6099. [CrossRef]
56. Dovelos, K.; Bellalta, B. Optimal Resource Allocation in IEEE 802.11 ax Uplink OFDMA with Scheduled Access. arXiv 2018,
arXiv:1811.00957.
57. Wang, K.; Psounis, K. Scheduling and Resource Allocation in 802.11 ax. In Proceedings of the IEEE International Conference on
Computer Communications (INFOCOM), Honolulu, HI, USA, 16–19 April 2018.
58. Wang, K.; Psounis, K. Efficient Scheduling and Resource Allocation in 802.11 ax Multi-User Transmissions. Comput. Commun.
2020, 152, 171–186. [CrossRef]
59. Lee, J.; Kim, C. An Efficient Multiple Access Coordination Scheme for OFDMA WLAN. IEEE Commun. Lett. 2016, 21, 596–599.
[CrossRef]
60. Yang, A.; Li, B.; Yang, M.; Yan, Z. Utility Maximization of Capacity Entropy for Multi-User Access for the Next Generation
WLANs. Comput. Commun. 2019, 145, 309–318. [CrossRef]
61. Yang, A.; Li, B.; Yang, M.; Yan, Z.; Cai, X. Utility Maximization of Capacity Entropy for Dense IEEE 802.11 ax WLANs based on
Interference Characteristics. Mob. Netw. Appl. 2020, 27, 141–157. [CrossRef]
62. Lei, J.; Samo, M. Grouping-Based Hybrid Channel Access Mechanism for Ultra-Dense IEEE 802.11 ax Networks. In Proceedings
of the Computer Science On-line Conference, Online, Czech Republic, 1 April 2021.
63. Li, Y.; Li, B.; Yang, M.; Yan, Z. A Spatial Clustering Group Division-based OFDMA Access Protocol for the Next Generation
WLAN. Wirel. Netw. 2019, 25, 5083–5097. [CrossRef]
64. Joo, S.; Kim, T.; Song, T.; Pack, S. MU-MIMO enabled Uplink OFDMA MAC Protocol in Dense IEEE 802.11 ax WLANs. ICT
Express 2020, 6, 287–290. [CrossRef]
65. Hocini, K.; Yazid, M. Toward a MAC Protocol Overcoming Hidden Stations Issue in IEEE 802.11 ax Unidirectional Full Duplex
Radio Communications. In Proceedings of the International Conference on Embedded & Distributed Systems (EDiS), Oran,
Algeria, 3 November 2020.
66. Karthik, R.; Palaniswamy, S. Resource Unit (RU) based OFDMA Scheduling in IEEE 802.11 ax System. In Proceedings of the
International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19–22
September 2018.
67. Kim, S.; Yun, J.H. Efficient Frame Construction for Multi-User Transmission in IEEE 802.11 WLANs. IEEE Trans. Veh. Technol.
2019, 68, 5859–5870. [CrossRef]
68. Lee, G.; Kim, C. Centralized Contention based MAC for OFDMA Wlan. IEICE Trans. Inf. Syst. 2017, 100, 2219–2223. [CrossRef]
69. Filoso, D.G.; Hara, K.; Tamaki, S.; Minami, K.; Tsuji, K.; Kubo, R. Deadline-aware Emergency Data Resource Allocation Control
for IEEE 802.11 ax. In Proceedings of the International Conference on Communications and Electronics (ICCE), Taoyuan, Taiwan,
28–30 September 2020.
70. Lopez-Aguilera, E.; Heusse, M.; Grunenberger, Y.; Rousseau, F.; Duda, A.; Casademont, J. An Asymmetric Access Point for
Solving the Unfairness Problem in WLANs. IEEE Trans. Mob. Comput. 2008, 7, 1213–1227. [CrossRef]
71. Khorov, E.; Loginov, V.; Lyakhov, A. Several EDCA Parameter Sets for Improving Channel Access in IEEE 802.11 ax Networks. In
Proceedings of the International Symposium on Wireless Communication Systems (ISWCS), Poznan, Poland, 20–23 September
2016.
72. Avdotin, E.; Bankov, D.; Khorov, E.; Lyakhov, A. OFDMA Resource Allocation for Real-Time Applications in IEEE 802.11 ax
Networks. In Proceedings of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),
Sochi, Russia, 3–6 June 2019.
73. Inamullah, M.; Raman, B.; Akhtar, N. Will My Packet Reach On Time? Deadline-Based Uplink OFDMA Scheduling in 802.11 ax
WLANs. In Proceedings of the ACM International Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile
Systems (MSWiM), Alicante, Spain, 16–20 November 2020.
74. Bankov, D.; Didenko, A.; Khorov, E.; Loginov, V.; Lyakhov, A. IEEE 802.11 ax Uplink Scheduler to Minimize, Delay: A
Classic Problem with new Constraints. In Proceedings of the International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017.
75. Binoy, B.; Vineeth, B. Minimum Delay Scheduling Under Average Power Constraint for 802.11 ax Uplink. In Proceedings
of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Goa, India, 16–19
December 2019.
76. Neely, M.J. Stochastic Network Optimization with Application to Communication and Queueing Systems. Synth. Lect. Commun.
Netw. 2010, 3, 1–211.
77. Zheng, Y.; Wang, J.; Chen, Q.; Zhu, Y. Retransmission Number Aware Channel Access Scheme for IEEE 802.11 ax Based WLAN.
Chin. J. Electron. 2020, 29, 351–360. [CrossRef]
78. Kim, Y.; Kim, G.; Oh, Y.; Choi, W. Transmission Delay-Based Uplink Multi-User Scheduling in IEEE 802.11 ax Networks. Appl.
Sci. 2021, 11, 9196. [CrossRef]
Future Internet 2022, 14, 293 47 of 52
79. Yang, A.; Li, B.; Yang, M.; Yan, Z. Concept and Analysis of Capacity Entropy for Uplink Multi-User Media Access Control for the
Next-Generation WLANs. Mob. Netw. Appl. 2019, 24, 1572–1586. [CrossRef]
80. Chen, C.; Li, J.; Balasubramaniam, V.; Wu, Y.; Zhang, Y.; Wan, S. Contention Resolution in Wi-Fi 6-Enabled Internet of Things
Based on Deep Learning. IEEE Internet Things J. 2020, 8, 5309–5320. [CrossRef]
81. Dovelos, K.; Bellalta, B. A Scheduling Policy for Downlink OFDMA in IEEE 802.11 ax with Throughput Constraints. arXiv 2020,
arXiv:2009.00413.
82. Kuran, M.Ş.; Dilmac, A.; Topal, Ö.; Yamansavascilar, B.; Avallone, S.; Tugcu, T. Throughput-maximizing OFDMA Scheduler for
IEEE 802.11 ax Networks. In Proceedings of the International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC), London, UK, 31 August–3 September 2020.
83. Filoso, D.G.; Kubo, R.; Hara, K.; Tamaki, S.; Minami, K.; Tsuji, K. Proportional-based Resource Allocation Control with QoS
Adaptation for IEEE 802.11 ax. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland,
7–11 June 2020.
84. Han, M.; Chen, Z.; Cai, L.X.; Luan, T.H.; Hou, F. A Deep Reinforcement Learning Based Approach for Channel Aggregation
in IEEE 802.11 ax. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan, 7–11
December 2020.
85. Zhang, M.; Zhu, Y.h.; Liu, Y. Throughput Aware Users Allocation Scheme for Coexistence of the LTE System and 802.11 ax
WLANs. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29
March–1 April 2021.
86. Shahin, N.; Ali, R.; Kim, S.W.; Kim, Y.T. Cognitive backoff mechanism for IEEE802. 11ax high-efficiency WLANs. J. Commun.
Netw. (JCN) 2019, 21, 158–167. [CrossRef]
87. Cheng, J.; Li, B.; Yang, M.; Yan, Z. Traffic Load Perception Based OFDMA MAC Protocol for the Next Generation WLAN. In
Proceedings of the International Wireless Internet Conference, TaiChung, Taiwan, 26–27 November 2019.
88. Lu, C.; Wu, B.; Wang, L.; Wei, Z.; Tang, Y. A Novel QoS-Aware ARQ Scheme for Multi-User Transmissions in IEEE802. 11ax
WLANs. Electronics 2020, 9, 2065. [CrossRef]
89. Qiu, S.; Chu, X.; Leung, Y.W.; Ng, J.K.Y. Joint Access Point Placement and Power-Channel-Resource-Unit Assignment for 802.11
ax-Based Dense WiFi with QoS Requirements. In Proceedings of the IEEE International Conference on Computer Communications
(INFOCOM), Toronto, ON, Canada, 6–9 July 2020.
90. Sharon, O.; Alpert, Y. Optimizing TCP Goodput and Delay in Next Generation IEEE 802.11 (ax) Devices. Trans. Netw. Commun.
2018, 6, 14–39. [CrossRef]
91. Sharon, O.; Alpert, Y. Advanced IEEE 802.11 ax TCP Aware Scheduling under Unreliable Channels. Int. J. Commun. Syst. 2019,
32, e4060. [CrossRef]
92. Qu, Q.; Li, B.; Yang, M.; Yan, Z. An OFDMA based Concurrent Multiuser MAC for Upcoming IEEE 802.11 ax. In Proceedings of
the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015.
93. Son, Y.; Kim, S.; Byeon, S.; Choi, S. Symbol Timing Synchronization for Uplink Multi-User Transmission in IEEE 802.11 ax WLAN.
IEEE Access 2018, 6, 72962–72977. [CrossRef]
94. Sharon, O.; Alpert, Y. Scheduling Strategies and Throughput Optimization for the Downlink for IEEE 802.11 ax and IEEE 802.11
ac based Networks. arXiv 2017, arXiv:1709.04818.
95. Sharon, O.; Alpert, Y. Scheduling Strategies and Throughput Optimization for the Uplink for IEEE 802.11 ax and IEEE 802.11 ac
Based Networks. arXiv 2018, arXiv:1803.10657.
96. Uwai, T.; Miyamoto, T.; Nagao, Y.; Lanante, L.; Kurosaki, M.; Ochi, H. Performance Evaluation of OFDMA Random Access in
IEEE802. 11ax. In Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems
(ISPACS), Phuket, Thailand, 24–27 October 2016.
97. Lanante, L.; Uwai, H.O.T.; Nagao, Y.; Kurosaki, M.; Ghosh, C. Performance Analysis of the 802.11 ax UL OFDMA Random Access
Protocol in Dense Networks. In Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, 21–25
May 2017.
98. Bellalta, B.; Kosek-Szott, K. AP-initiated Multi-User Transmissions in IEEE 802.11 ax WLANs. Ad Hoc Netw. 2019, 85, 145–159.
[CrossRef]
99. Magrin, D.; Avallone, S.; Roy, S.; Zorzi, M. Validation of the ns-3 802.11 ax OFDMA Implementation. In Proceedings of the
Proceedings of the Workshop on ns-3, Virtual Event, USA, 23–24 June 2021.
100. Naik, G.; Bhattarai, S.; Park, J.M. Performance Analysis of Uplink Multi-User OFDMA in IEEE 802.11 ax. In Proceedings of the
IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018.
101. Dolińska, I.; Jakubowski, M.; Masiukiewicz, A. New IEEE 802.11 HEW Standard Throughput Per User Analysis. In Proceedings
of the International Conference on Information and Digital Technologies (IDT), Zilina, Slovakia, 25–27 June 2019.
102. Daldoul, Y.; Meddour, D.E.; Ksentini, A. Performance Evaluation of OFDMA and MU-MIMO in 802.11 ax Networks. Comput.
Netw. 2020, 182, 107477. [CrossRef]
103. Madhavan, N.; Sekiya, M.; Nabetani, T. Development of 802.11 ax-compatible LSI and Performance Evaluation of Uplink
OFDMA. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates,
9–13 December 2018.
Future Internet 2022, 14, 293 48 of 52
104. Yang, H.; Deng, D.J.; Chen, K.C. Performance Analysis of IEEE 802.11 ax UL OFDMA-based Random Access Mechanism. In
Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, 4–8 December 2017.
105. Naribole, S.; Lee, W.B.; Ranganath, A. Impact of MU EDCA Channel Access on IEEE 802.11 ax WLANs. In Proceedings of the
IEEE Semiannual Vehicular Technology Conference (VTC), Honolulu, HI, USA, 22–25 September 2019.
106. Weller, D.; Mensenkamp, R.D.; van der Vegt, A.; van Bloem, J.W.; de Laat, C. Wi-Fi 6 Performance Measurements of 1024-QAM
and DL OFDMA. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020.
107. Avallone, S.; Imputato, P.; Redieteab, G.; Ghosh, C.; Roy, S. Will OFDMA Improve the Performance of 802.11 WiFi Networks?
IEEE Wirel. Commun. 2021, 28, 100–107. [CrossRef]
108. Ajami, A.K.; Artail, H. Analyzing the Impact of the Coexistence with IEEE 802.11 ax Wi-Fi on the Performance of DSRC using
Stochastic Geometry Modeling. IEEE Trans. Commun. 2019, 67, 6343–6359. [CrossRef]
109. Lee, K.h. Performance Analysis of the IEEE 802.11 ax MAC Protocol for Heterogeneous Wi-Fi Networks in Non-saturated
Conditions. Sensors 2019, 19, 1540. [CrossRef] [PubMed]
110. Zhang, D.; Mohanty, B.; Sambhwani, S.D. Scheduling based on Effective Target Load with Interference Cancellation in a Wireless
Communication System. U.S. Patent 8,676,124, 18 March 2014.
111. Asterjadhi, A.; Merlin, S.; Tian, B.; Aldana, C.; Cherian, G.; Barriac, G.; Sampath, H.; Wentink, M.; Van Nee, R.; Van Zelst, A.; et
al. Identifiers in HE PPDUs for Power Saving. Available online: https://mentor.ieee.org/802.11/dcn/15/11-15-1122-00-00ax-
identifiers-in-he-ppdus-for-power-saving.pptx (accessed on 1 September 2022).
112. Iwatani, J.; Iwatani, J.; Shinohara, S.; Takatori, Y.; Asai, Y.; Ishihara, K.; Yamada, A.; Watanabe, F.; Papadopoulos, H.; Porat, R.; et
al. Number of BSS Color Bits. Available online: https://mentor.ieee.org/802.11/dcn/15/11-15-1075-01-00ax-number-of-bss-
color-bits.pptx (accessed on 1 September 2022).
113. Khorov, E.; Kiryanov; Schelstraete, S.; Wang, H. Multiple NAVs for Spatial Reuse. Available online: https://mentor.ieee.org/802.
11/dcn/15/11-15-1348-00-00ax-multiple-navs-for-spatial-reuse.pptx (accessed on 1 September 2022).
114. Mvulla, J.; Park, E.C.; Adnan, M.; Son, J.H. Analysis of Asymmetric Hidden Node Problem in IEEE 802.11 ax Heterogeneous
WLANs. In Proceedings of the Information Communication Technologies Conference (ICTC), Jeju, Korea, 28–30 October 2015.
115. Ali, M.Z.; Mišić, J.; Mišić, V.B. Impact of Hidden Nodes on Uplink Transmission in IEEE 802.11 ax Heterogeneous Network. In
Proceedings of the International wireless communications and mobile computing conference (IWCMC), Limassol, Cyprus, 25–29
June 2018.
116. Ali, M.Z.; Mišić, J.; Mišić, V.B. Performance Analysis of IEEE 802.11 ax Heterogeneous Network in the Presence of Hidden
Terminals. arXiv 2019, arXiv:1908.01834.
117. Sou, S.I.; Lee, Y. Trigger-based Approach with Hidden Node Problem for Uplink Multi-User Transmission in 802.11 ax. In
Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo,
Japan, 3–6 July 2017.
118. Afaqui, M.S.; Garcia-Villegas, E.; Lopez-Aguilera, E.; Smith, G.; Camps, D. Evaluation of Dynamic Sensitivity Control Algorithm
for IEEE 802.11 ax. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans,
LA, USA, 9–12 March 2015.
119. Afaqui, M.S.; Garcia-Villegas, E.; Lopez-Aguilera, E.; Camps-Mur, D. Dynamic Sensitivity Control of Access Points for IEEE
802.11 ax. In Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27
May 2016.
120. Zhong, Z.; Cao, F.; Kulkarni, P.; Fan, Z. Promise and Perils of Dynamic Sensitivity Control in IEEE 802.11 ax WLANs. In Proceed-
ings of the International Symposium on Wireless Communication Systems (ISWCS), Poznan, Poland, 20–23 September 2016.
121. Afaqui, M.S.; Garcia-Villegas, E.; Lopez-Aguilera, E. Dynamic Sensitivity Control Algorithm Leveraging Adaptive RTS/CTS for
IEEE 802.11 ax. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6
April 2016.
122. Khorov, E.; Kiryanov, A.; Krotov, A.; Gallo, P.; Garlisi, D.; Tinnirello, I. Joint Usage of Dynamic Sensitivity Control and Time
Division Multiple Access in Dense 802.11 ax Networks. In Proceedings of the International Workshop on Multiple Access
Communications, Aalborg, Denmark, 21–22 November 2016.
123. Yan, Y.; Li, B.; Yang, M.; Yan, Z. ESR: Enhanced Spatial Reuse Mechanism for the Next Generation WLAN-IEEE 802.11 ax. In
Proceedings of the International Conference on Internet of Things as a Service, Xi’an, China, 17–18 November 2018.
124. Iwata, M.; Yamamoto, K.; Yin, B.; Nishio, T.; Morikura, M.; Abeysekera, H. Analysis of Inversely Proportional Carrier Sense
Threshold and Transmission Power Setting Based on Received Power for IEEE 802.11 ax. In Proceedings of the IEEE Consumer
Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019.
125. Iwata, M.; Yamamoto, K.; Yin, B.; Nishio, T.; Morikura, M.; Abeysekera, H. Stochastic Geometry Analysis of Individual Carrier
Sense Threshold Adaptation in IEEE 802.11 ax WLANs. IEEE Access 2019, 7, 161916–161927. [CrossRef]
126. Kiryanov, A.; Krotov, A.; Lyakhov, A.; Khorov, E. Algorithm for Dynamic Power Control and Scheduling in IEEE 802.11 ax
Infrastructure Networks. J. Commun. Technol. Electron. 2019, 64, 900–909. [CrossRef]
127. Qian, L.P.; Zhang, Y.J.; Huang, J. MAPEL: Achieving Global Optimality for a Non-Convex Wireless Power Control Problem. IEEE
Trans. Wirel. Commun. 2009, 8, 1553–1563. [CrossRef]
128. Wilhelmi, F.; Cano, C.; Neu, G.; Bellalta, B.; Jonsson, A.; Barrachina-Muñoz, S. Collaborative Spatial Reuse in Wireless Networks
via Selfish Multi-Armed Bandits. Ad Hoc Netw. 2019, 88, 129–141. [CrossRef]
Future Internet 2022, 14, 293 49 of 52
129. Bardou, A.; Begin, T.; Busson, A. Improving the Spatial Reuse in IEEE 802.11ax WLANs: A Multi-Armed Bandit Ap-
proach. In Proceedings of the 24th International ACM Conference on Modeling, Analysis and Simulation of Wireless and
Mobile Systems (MSWiM), Association for Computing Machinery, Alicante, Spain, 22–26 November 2021; pp. 135–144. doi:
10.1145/3479239.3485715. [CrossRef]
130. Ropitault, T. Evaluation of RTOT Algorithm: A First Implementation of OBSS_PD-based SR Method for IEEE 802.11 ax. In
Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January
2018.
131. Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. Control OBSS/PD Sensitivity Threshold for IEEE 802.11 ax BSS Color. In
Proceedings of the International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Bologna, Italy,
1–9 September 2018.
132. Valkanis, A.; Iossifides, A.; Chatzimisios, P. An Interference based Dynamic Channel Access Algorithm for Dense WLAN
Deployments. In Proceedings of the Panhellenic Conference on Electronics and Telecommunications (PACET), Xanthi, Greece,
17–19 November 2017.
133. Valkanis, A.; Iossifides, A.; Chatzimisios, P.; Angelopoulos, M.; Katos, V. IEEE 802.11 ax Spatial Reuse Improvement: An
Interference-based Channel-Access Algorithm. IEEE Veh. Technol. Mag.2019, 14, 78–84. [CrossRef]
134. Lanante, L.; Roy, S. Performance Analysis of the IEEE 802.11 ax OBSS_PD-Based Spatial Reuse. IEEE/ACM Trans. Netw. 2021, 30,
616–628. [CrossRef]
135. Karakoç, A.; Kuran, M.Ş.; Yilmaz, H.B. More WiFi for Everyone: Increasing Spectral Efficiency in WiFi6 Networks using OBSS/PD
Mechanism. arXiv 2021, arXiv:2108.13909.
136. Menth, M.; Hauser, F. On Moving Averages, Histograms and Time-Dependent Rates for Online Measurement. In Proceedings of
the ACM/SPEC International Conference on Performance Engineering (ICPE), L’Aquila, Italy, 22–26 April 2017.
137. Lee, H.; Kim, H.S.; Bahk, S. LSR: Link-aware Spatial Reuse in IEEE 802.11 ax WLANs. In Proceedings of the IEEE Wireless
Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021.
138. Kim, Y.; Kim, G.; Kim, T.; Choi, W. Transmission Opportunity-Based Distributed OBSS/PD Determination Method in IEEE
802.11 ax Networks. In Proceedings of the International Conference on Artificial Intelligence in Information and Communication
(ICAIIC), Fukuoka, Japan, 19–21 February 2020.
139. Kwon, D.; Kim, J. Opportunistic Medium Access for Hyper-Dense beamformed IEEE 802.11 ax Wireless Networks. In Proceedings
of the Information Communication Technologies Conference (ICTC), Jeju Island, Korea, 17–19 October 2018.
140. Kwon, D.; Kim, S.W.; Kim, J.; Mohaisen, A. Interference-aware Adaptive Beam Alignment for Hyper-Dense IEEE 802.11 ax
Internet-of-Things Networks. Sensors 2018, 18, 3364. [CrossRef]
141. Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. An IEEE 802.11 ax Interference-Aware MAC Queue. In Proceedings of
the International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), London, UK, 31 August–3
September 2020.
142. Kawamura, K.; Inoki, A.; Nakayama, S.; Wakao, K.; Takatori, Y. Cooperative Control of 802.11 ax Access Parameters in High
Density Wireless LAN Systems. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC),
Marrakesh, Morocco, 15–18 April 2019.
143. Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. Damysus: A Practical IEEE 802.11 ax BSS Color Aware Rate Control Algorithm. Int.
J. Wirel. Inf. Netw. 2019, 26, 285–307. [CrossRef]
144. Shen, Z.; Li, B.; Yang, M.; Yan, Z.; Li, X.; Jin, Y. Research and performance evaluation of spatial reuse technology for next
generation WLAN. In Proceedings of the International Wireless Internet Conference, Taipei, Taiwan, 15–16 October 2018.
145. Selinis, I.; Filo, M.; Vahid, S.; Rodriguez, J.; Tafazolli, R. Evaluation of the DSC Algorithm and the BSS Color Scheme in Dense
Cellular-like IEEE 802.11 ax Deployments. In Proceedings of the International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC), Valencia, Spain, 4–8 September 2016.
146. Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. Exploiting the Capture Effect on DSC and BSS Color in Dense IEEE 802.11 ax
Deployments. In Proceedings of the Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017.
147. Malhotra, A.; Maity, M.; Dutta, A. How Much Can We Reuse? An Empirical Analysis of the Performance Benefits Achieved by
Spatial-Reuse of IEEE 802.11 ax. In Proceedings of the International Conference on COMmunication Systems and NETworks
(COMSNETS), Bangalore, India, 7–11 January 2019.
148. Wilhelmi, F.; Barrachina-Muñoz, S.; Bellalta, B. On the Performance of the Spatial Reuse Operation in IEEE 802.11 ax WLANs.
In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain, 28–30
October 2019.
149. Šepić, N.; Kočan, E.; Pejanović-Djurišić, M. Evaluating Spatial Reuse in 802.11 ax Networks with Interference Threshold
Adjustment. In Proceedings of the International Conference on Information Technology (IT), Zabljak, Montenegro, 18–22
February 2020.
150. Rodrigues, E.d.C.; Garcia-Rodriguez, A.; Giordano, L.G.; Geraci, G. On the Latency of IEEE 802.11 ax WLANs with Parameterized
Spatial Reuse. arXiv 2020, arXiv:2008.07482.
151. Bai, J.; Fang, H.; Suh, J.; Aboul-Magd, O.; Au, E.; Wang, X. Adaptive Uplink OFDMA Random Access Grouping Scheme for
Ultra-Dense Networks in IEEE 802.11 ax. In Proceedings of the IEEE/CIC International Conference on Communications in China
(ICCC), Beijing, China, 16–18 August 2018.
Future Internet 2022, 14, 293 50 of 52
152. Chen, Q.; Liang, G.; Weng, Z. A Target Wake Time based Power Conservation Scheme for Maximizing Throughput in IEEE 802.11
ax WLANs. In Proceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China,
4–6 December 2019.
153. Chen, Q.; Weng, Z.; Chen, G.; et al. A Target Wake Time Scheduling Scheme for Uplink Multiuser Transmission in IEEE 802.11
ax-Based Next Generation WLANs. IEEE Access 2019, 7, 158207–158222. [CrossRef]
154. Chen, Q.; Zhu, Y.H. Scheduling Channel Access Based on Target Wake Time Mechanism in 802.11 ax WLANs. IEEE Trans. Wirel.
Commun. 2020, 201529–1543.
155. Yang, C.; Lee, J.; Bahk, S. Target Wake Time Scheduling Strategies for Uplink Transmission in IEEE 802.11 ax Networks. In
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021.
156. Bankov, D.; Khorov, E.; Lyakhov, A.; Stepanova, E. Clock Drift Impact on Target Wake Time in IEEE 802.11 ax/ah Networks. In
Proceedings of the Engineering and Telecommunication (EnT-MIPT), Moscow, Russia, 15–16 November 2018.
157. Yang, H.; Deng, D.J.; Chen, K.C. On Energy Saving in IEEE 802.11 ax. IEEE Access 2018,6, 47546–47556 . [CrossRef]
158. KARACA, M. Joint optimization of target wake time mechanism and scheduling for IEEE 802.11 ax. Turk. J. Electr. Eng. Comput.
Sci. 2021, 29, 1659–1671. [CrossRef]
159. Karaca, M. Joint Optimization of TWT Mechanism and Scheduling for IEEE 802.11 ax. arXiv 2020, arXiv:2006.02235.
160. Qiu, W.; Chen, G.; Nguyen, K.N.; Sehgal, A.; Nayak, P.; Choi, J. Category-Based 802.11 ax Target Wake Time Solution. IEEE
Access 2021, 9, 100154–100172. [CrossRef]
161. Lee, K.H. Using OFDMA for MU-MIMO User Selection in 802.11 ax-based Wi-Fi Networks. IEEE Access 2019,7, 186041–186055.
[CrossRef]
162. Karmakar, R.; Chattopadhyay, S.; Chakraborty, S. Intelligent MU-MIMO User Selection with Dynamic Link Adaptation in IEEE
802.11 ax. IEEE Trans. Wirel. Commun. 2019, 18, 1155–1165. [CrossRef]
163. Oni, P.B.; Blostein, S.D. PCS Threshold Selection for Spatial Reuse in High Density CSMA/CA MIMO Wireless Networks. IEEE
Access 2019, 7, 112470–112482. [CrossRef]
164. Hoefel, R.P.F. IEEE 802.11 ax: A Study on Techniques to Mitigate the Frequency Offset in the Uplink Multi-User MIMO. In
Proceedings of the IEEE Latin-American Conference on Communications (LATINCOM), Medellin, Colombia, 15–17 November
2016.
165. Hoefel, R.P.F. IEEE 802.11 ax: Joint Effects of Power Control and IQ Imbalance Mitigation Schemes on the Performance of OFDM
Uplink Multi-User MIMO. In Proceedings of the IEEE Semiannual Vehicular Technology Conference (VTC), Sydney, Australia,
4–7 June 2017.
166. Hoefel, R.P.F. IEEE 802.11 ax: On Hardware Impairments and Mitigation Schemes for OFDM Uplink Multi-User MIMO PHY. In
Proceedings of the IEEE Semiannual Vehicular Technology Conference (VTC), Porto, Portugal, 3–6 June 2018.
167. Jeon, E.; Lee, W.B.; Ahn, M.; Kim, S.; Kim, J. Adaptive Feedback of the Channel Information for Beamforming in IEEE 802.11
ax WLANs. In Proceedings of the IEEE Semiannual Vehicular Technology Conference (VTC), Honolulu, HI, USA, 22–25
September 2019.
168. Nabetani, T.; Madhavan, N.; Mori, H.; Aoki, T. A Novel Low-Overhead Channel Sounding Protocol for Downlink Multi-User
MIMO in IEEE 802.11 ax WLAN. IEICE Trans. Commun. 2017, 101, 924–932.
169. Sangdeh, P.K.; Zeng, H. DeepMux: Deep-Learning-Based Channel Sounding and Resource Allocation for IEEE 802.11 ax. IEEE J.
Sel. Areas Commun. 2021, 39, 2333–2346. [CrossRef]
170. Zeng, H.; Li, H.; Yan, Q. Uplink MU-MIMO in Asynchronous Wireless LANs. In Proceedings of the ACM International
Symposium on Mobile Ad Hoc Networking and Computing, Los Angeles, CA, USA, 26–29 June 2018.
171. Machrouh, Z.; Najid, A. High Efficiency IEEE 802.11 ax MU-MIMO and Frame Aggregation Analysis. In Proceedings of the
International Conference on Advanced Communication Technologies and Networking (CommNet), Marrakech, Morocco, 2–4
April 2018.
172. Heo, Y.; Jang, J.; Kim, Y.; Yang, H.J. Performance Comparison of SU-and MU-MIMO in 802.11 ax: Delay and Throughput. In
Proceedings of the Information Communication Technologies Conference (ICTC), Nanjing, China, 29–31 May 2020.
173. Hoefel, R.P.F. IEEE 802.11 ax (Wi-Fi 6): DL and UL MU-MIMO Channel Sounding Compression Schemes Impaired with IQ
Imbalance and CFO. In Proceedings of the IEEE Semiannual Vehicular Technology Conference (VTC), Antwerp, Belgium, 25–28
May 2020.
174. IEEE Std 802.11ad-2012 (Amendment to IEEE Std 802.11-2012, as amended by IEEE Std 802.11ae-2012 and IEEE Std 802.11aa-2012); IEEE
Standard for Information technology–Telecommunications and Information exchange between Systems–Local and Metropolitan
Area Networks–Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band. IEEE: Piscataway, NJ, USA, 2012.
175. Zhang, H.; Wang, L.; Chu, L.; Jiang, J.; Zhang, Y.; Cao, Y.; Srinivasa, S.; Yu, B.; Tamhane, S.; Yu, M.; et al. LDPC for 1024QAM.
Available online: https://mentor.ieee.org/802.11/dcn/16/11-16-0891-00-00ax-ldpc-for-1024qam.pptx (accessed on 1 September
2022).
176. Hoefel, R.P.F. IEEE 802.11 ax: On Performance of Multi-Antenna Technologies with LDPC Codes. In Proceedings of the
International Conference on Communications and Electronics (ICCE), Hue City, Vietnam, 18–20 July 2018.
Future Internet 2022, 14, 293 51 of 52
177. Taniguchi, K.; Adachi, T.; Kajihara, H.; Ban, K.; Horisaki, K.; Madhavan, N.; Nabetani, T.; Aoki, T.; Halls, D.; Tosato, F.; et al.
Allocation sizes for BCC in OFDMA. Available online: https://mentor.ieee.org/802.11/dcn/16/11-16-0079-02-00ax-allocation-
sizes-for-bcc-in-ofdma.pptx (accessed on 1 September 2022).
178. Adame, T.; Carrascosa, M.; Bellalta, B. The TMB Path Loss Model for 5 GHz Indoor WiFi Scenarios: On the Empirical Relationship
Between RSSI, MCS, and Spatial Streams. In Proceedings of the Wireless Days (WD), Manchester, UK, 24–26 April 2019.
179. Krotov, A.; Kiryanov, A.; Khorov, E. Rate Control With Spatial Reuse for Wi-Fi 6 Dense Deployments. IEEE Access 2020, 8,
168898–168909. [CrossRef]
180. Del Moral, P. Nonlinear Filtering: Interacting Particle Resolution. Comptes Rendus l’Académie Sci.-Ser. I-Math. 1997, 325, 653–658.
[CrossRef]
181. Hussien, M.; Ahmed, M.F.; Dahman, G.; Nguyen, K.K.; Cheriet, M.; Poitau, G. Towards More Reliable Deep Learning-based Link
Adaptation for WiFi 6. In Proceedings of the IEEE International Conference on Communications (ICC), Montreal, QC, Canada,
14–23 June 2021.
182. Ha, V.N.; Kaddoum, G.; Poitau, G. Joint Radio Resource Management and Link Adaptation for Multicasting 802.11ax-based
WLAN Systems. IEEE Trans. Wirel. Commun. 2021, 20, 6122–6138. [CrossRef]
183. Anwar, W.; Dev, S.; Kulkarni, K.; Franchi, N.; Fettweis, G. On PHY Abstraction Modeling for IEEE 802.11ax based Multi-
Connectivity Networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh,
Morocco, 15–18 April 2019.
184. Sharon, O.; Alpert, Y. Single User MAC Level Throughput Comparision: IEEE 802.11 ax vs. IEEE 802.11 ac. Wirel. Sens. Netw.
2017, 9,166–177. [CrossRef]
185. Sánchez-Mahecha, J.S.; Céspedes, S.; Bustos-Jiménez, J. QoS Evaluation of the Future High-efficiency IEEE 802.11 ax WLAN
Standard. In Proceedings of the IEEE Colombian Conference on Communications and Computing (COLCOM), Medellin,
Colombia, 16–18 May 2018.
186. Muhammad, S.; Zhao, J.; Refai, H.H. An Empirical Analysis of IEEE 802.11 ax. In Proceedings of the International Conference on
Communications, Signal Processing, and their Applications (ICCSPA), Sharjah, UAE, 16–18 March 2021.
187. Malekzadeh, M. Spectrum Efficiency of Modulation Schemes for Network Optimization in 5GHz Dense Environments. Pertanika
J. Sci. Technol. 2020, 28, 1063–1080.
188. Rochim, A.F.; Harijadi, B.; Purbanugraha, Y.P.; Fuad, S.; Nugroho, K.A. Performance Comparison of Wireless Protocol IEEE
802.11 ax vs 802.11 ac. In Proceedings of the International Conference on Smart Technology and Applications (ICoSTA), Surabaya,
Indonesia, 20 February 2020.
189. Openwifi. Available online: https://github.com/open-sdr/openwifi (accessed on 1 September 2022).
190. Xia, D.; Zheng, X.; Yu, F.; Liu, L.; Ma, H. WiRa: Enabling Cross-Technology Communication from WiFi to LoRa with IEEE
802.11ax. In Proceedings of the IEEE INFOCOM, Online, 2–5 May 2022. doi: 10.1109/INFOCOM48880.2022.9796831. [CrossRef]
191. NS3-802.11ax-Simulator. Available online: https://www.nsnam.org/docs/models/html/wifi-design.html (accessed on 1
September 2022).
192. NS3-802.11ax-Simulator limitations. Available online: https://www.nsnam.org/docs/release/3.35/models/ns-3-model-library.
pdf#chapter.34 (accessed on 1 September 2022).
193. ns-3 11ax Project. Available online: https://depts.washington.edu/funlab/projects/improvements-to-ns-3-simulator/ns-3-11
ax-project/ (accessed on 1 September 2022).
194. Lin, W.; Li, B.; Yang, M.; Qu, Q.; Yan, Z.; Zuo, X.; Yang, B. Integrated Link-system Level Simulation Platform for the Next
Generation WLAN-IEEE 802.11 ax. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington,
DC, USA, 4–8 December 2016.
195. Barrachina-Munoz, S.; Wilhelmi, F.; Selinis, I.; Bellalta, B. Komondor: A Wireless Network Simulator for Next-Generation
High-Density WLANs. In Proceedings of the Wireless Days (WD), Manchester, UK, 24–26 April 2019.
196. Perform Waveform Generation and End-to-End Link Level Simulation for the IEEE 802.11ax Standard. Available online:
https://ch.mathworks.com/products/wlan.html#802-11ax (accessed on 1 September 2022).
197. Milos, J.; Polak, L.; Slanina, M. Performance Analysis of IEEE 802.11 ac/ax WLAN Technologies under the Presence of CFO. In
Proceedings of the International Conference Radioelektronika (RADIOELEKTRONIKA), Brno, Czech Republic, 19 April 2017.
198. Lei, T.; Wen, X.; Lu, Z.; Li, Y. A Semi-Matching based Load Balancing Scheme for Dense IEEE 802.11 WLANs. IEEE Access 2017,
28,15332–15329. [CrossRef]
199. Ertürk, M.A.; Vollero, L.; Aydın, M.A. Development of Software-based Vendor Independent WLAN Controller. Int. J. Mob.
Commun. 2019, 17, 537–559. [CrossRef]
200. Kiryanov, A.G.E.; Krotov, A.V.E.; Khorov, E.M.; Akyildiz, I.F. Enhancing the Energy Efficiency of Dense Wi-Fi Networks Using
Cloud Technologies. Autom. Remote. Control. 2020, 81, 94–106. [CrossRef]
201. Khorov, E.; Kiryanov, A.; Krotov, A. Cloud-based Management of Energy-Efficient Dense IEEE 802.11 ax Networks. In Proceedings
of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, 3–6 June 2019.
202. Khorov, E.; Ivanov, A.; Lyakhov, A.; Akyildiz, I.F. Cloud Control to Optimize Real-Time Video Transmission in Dense IEEE 802.11
aa/ax Networks. In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Chengdu,
China, 9–12 October 2018.
Future Internet 2022, 14, 293 52 of 52
203. Gallo, P.; Kosek-Szott, K.; Szott, S.; Tinnirello, I. CADWAN: A Control Architecture for Dense WiFi Access Networks. IEEE
Commun. Mag. 2018, 56, 194–201. [CrossRef]
204. Calhoun, P.; Montemurro, M.; Stanley, D. Control and Provisioning of Wireless Access Points (CAPWAP) Protocol specification; IETF
RFC 5415; Cisco Systems, Inc.: San Jose, CA, USA , 2009.
205. Robust Rate Adaptation for 802.11 Wireless Networks. In Proceedings of the Annual International Conference on Mobile
Computing and Networking, New York City, NY, USA, 3–7 October 2016.
206. Dürr, F.; Nayak, N.G. No-Wait Packet Scheduling for IEEE Time-Sensitive Networks (TSN). In Proceedings of the International
Conference on Real-Time Networks and Systems, Brest, France, 19–21 October 2016.
207. Barakabitze, A.A.; Ahmad, A.; Mijumbi, R.; Hines, A. 5G Network Slicing Using SDN and NFV: A Survey of Taxonomy,
Architectures and Future Challenges. Comput. Netw. 2020, 167, 106984. [CrossRef]
208. Adame, T.; Carrascosa-Zamacois, M.; Bellalta, B. Time-Sensitive Networking in IEEE 802.11 be: On the Way to Low-Latency WiFi
7. Sensors 2021, 21, 4954. [CrossRef] [PubMed]
209. Kang, Y.; Lee, S.; Gwak, S.; Kim, T.; An, D. Time-Sensitive Networking Technologies for Industrial Automation in Wireless
Communication Systems. Energies 2021, 14, 4497. [CrossRef]
210. Cavalcanti, D.; Venkatesan, G.; Cariou, L.; Cordiro, C. TSN Support in 802.11 and Potential Extensions for TGbe. Available
online: https://mentor.ieee.org/802.11/dcn/19/11-19-1287-01-00be-tsn-support-in-802-11-and-potential-extensions-for-tgbe.
pptx (accessed on 1 September 2022).
211. Cavalcanti, D.; Perez-Ramirez, J.; Rashid, M.M.; Fang, J.; Galeev, M.; Stanton, K.B. Extending Accurate Time Distribution and
Timeliness Capabilities over the Air to Enable Future Wireless Industrial Automation Systems. Proc. IEEE 2019, 107, 1132–1152.
[CrossRef]
212. Ibrahim, M.; Liu, H.; Jawahar, M.; Nguyen, V.; Gruteser, M.; Howard, R.; Yu, B.; Bai, F. Verification: Accuracy Evaluation of WiFi
Fine Time Measurements on an Open Platform. In Proceedings of the MobiCom, New Delhi, India, 29 October–2 November 2018;
pp. 417–427.
213. Grünblatt, R.; Guérin-Lassous, I.; Simonin, O. Simulation and Performance Evaluation of the Intel Rate Adaptation Algorithm. In
Proceedings of the Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM), Barcelona,
Spain, 3–8 November 2013.
214. Sabbatel, G.B.; Grunenberger, Y.; Heusse, M.; Rousseau, F.; Duda, A. Interarrival Histograms : A Method for Measuring Transmission
Delays in 802.11 WLANs; Technical Report; LIG: Grenoble, France, 2007.
215. Yap, K.K.; Kobayashi, M.; Sherwood, R.; Huang, T.Y.; Chan, M.; Handigol, N.; McKeown, N. OpenRoads: Empowering Research
in Mobile Networks. ACM SIGCOMM Comput. Commun. Rev. 2010, 40, 125–126. [CrossRef]
216. Heusse, M.; Rousseau, F.; Berger-Sabbatel, G.; Duda, A. Performance Anomaly of 802.11b. In Proceedings of the IEEE International
Conference on Computer Communications (INFOCOM), San Franciso, CA, USA, 30 March– 3 April 2003.
217. Khorov, E.; Levitsky, I.; Akyildiz, I.F. Current Status and Directions of IEEE 802.11 be, the Future Wi-Fi 7. IEEE Access 2020, 8,
88664–88688. [CrossRef]
218. 802.11BE Project Authorizations (PARs). Available online: https://development.standards.ieee.org/myproject-web/public/
view.html#pardetail/6886 (accessed on 1 September 2022).
219. Thubert, P.; Cavalcanti, D.; Vilajosana, X.; Schmitt, C.; Farkas, J. Reliable and Available Wireless Technologies. In Internet-Draft
Draft-Ietf-Raw-Technologies-04, Internet Engineering Task Force; Work in Progress; IETF: Fremont, CA, USA, 2021.
220. Deng, C.; Fang, X.; Han, X.; Wang, X.; Yan, L.; He, R.; Long, Y.; Guo, Y. IEEE 802.11 be Wi-Fi 7: New Challenges and Opportunities.
IEEE Commun. Surv. Tutor. 2020, 222136–2166. [CrossRef]
221. Specification Framework for TGbe. Available online: https://mentor.ieee.org/802.11/dcn/19/11-19-1262-15-00be-specification-
framework-for-tgbe.docx (accessed on 1 September 2022).