<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">22214</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2022.022214</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN</article-title>
<alt-title alt-title-type="left-running-head">Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN</alt-title>
<alt-title alt-title-type="right-running-head">Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Mamun</surname><given-names>Md. Selim Al</given-names></name><xref ref-type="aff" rid="aff-1">1</xref>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Akhter</surname><given-names>Fatema</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>fatema@s.okayama-u.ac.jp</email>
</contrib>
<aff id="aff-1"><label>1</label><institution>Graduate School of Natural Science and Technology, Okayama University</institution>, <addr-line>Okayama, 700-8530</addr-line>, <country>Japan</country></aff>
<aff id="aff-2"><label>2</label><institution>Computer Science and Engineering, Jatiya Kabi Kazi Nazrul Islam University</institution>, <addr-line>Mymensingh, 2224</addr-line>, <country>Bangladesh</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Fatema Akhter. Email: <email>fatema@s.okayama-u.ac.jp</email></corresp>
</author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2021-11-29"><day>29</day>
<month>11</month>
<year>2021</year></pub-date>
<volume>71</volume>
<issue>2</issue>
<fpage>3161</fpage>
<lpage>3178</lpage>
<history>
<date date-type="received"><day>31</day><month>7</month><year>2021</year></date>
<date date-type="accepted"><day>06</day><month>9</month><year>2021</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Mamun and Akhter</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Mamun and Akhter</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_22214.pdf"></self-uri>
<abstract>
<p>Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to channel collision i.e., interference from surrounding APs that affects the performance of the WLAN system. Therefore, it becomes a challenge to maintain expected performance in a crowded environment. A mathematical model of throughput considering interferences from surrounding APs can play an important role to set up a WLAN system properly. While set up, assignment of channels considering interference can maximize network performance. In this paper, we investigate the signal propagation of APs under interference of partially overlapping channels for both bonded and non-bonded channels. Then, a throughput estimation model is proposed using difference of operating channels and received signal strength indicator (RSSI). Then, a channel assignment algorithm is introduced using proposed throughput estimation model. Finally, the efficiency of the proposal is verified by numerical experiments using simulator. The results show that the proposal selects the best channel combination of bonded and non-bonded channels that maximize the performance.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Wireless local area network</kwd>
<kwd>partially overlapping channel</kwd>
<kwd>throughput estimation model</kwd>
<kwd>channel assignment algorithm</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1"><label>1</label><title>Introduction</title>
<p>Wireless local area network (WLAN) provides ubiquitous and flexible wireless Internet service to users at low cost. In a WLAN framework, users can move freely without losing connections while communicating through Internet. Recent advancements in wireless technology have brought an assortment of inexpensive gadgets for Internet access. Hence, WLAN has become increasingly popular today as low-cost Internet access among versatile users with handy gadgets [<xref ref-type="bibr" rid="ref-1">1</xref>&#x2013;<xref ref-type="bibr" rid="ref-3">3</xref>]. WLANs are commonly deployed in places like homes, schools, offices, hotels, railway stations, airports and shopping malls [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>]. Access points (APs) are often installed in a spontaneous manner which can cause wide spread of APs in a small network field. In such a dense network environment, coverage areas of APs can overlap each other where they may use same channel of frequency signal. This could result in poor network performance due to interference among APs. Therefore, the channels of these APs ought to be set up appropriately to avoid interference so as to enhance network performance.</p>
<p>In IEEE 802.11 standard, WLANs operate in two unlicensed frequency spectrum bands: the 2.4 GHz <italic>Industrial, Scientific, and Medical</italic> band (ISM) and the 5 GHz <italic>Unlicensed National Information Infrastructure</italic> band (U-NII) [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>]. The IEEE 802.11 WLAN standard characterizes a fixed number of channels for use by APs and their users. A channel is specified a bandwidth of 22 MHz width and is separated by 5 MHz from center frequency of its adjacent channel. Such channel is referred to as 20 MHz channel and conventionally knows as <italic>non-bonded channel</italic>. The signal falls within about 11 MHz of each side of the center frequency. Therefore, signal on any channel partially overlaps with several adjacent channels. Conventionally, they are referred to as <italic>partially overlapping channels (POCs)</italic>. Typically, IEEE 802.11n standard supports 13 channels where only 3 channels are free from overlapping one another and referred to as <italic>orthogonal channels (OCs)</italic> [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]. The increasing demand of high performance resulted in channel bonding mechanism, where two adjacent 20 MHz channels are combined together to form one 40 MHz channel [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>] known as <italic>bonded channel</italic>. Bonded channels offer higher data transmission. However, this reduces the number of channels both POCs and OCs. <?A3B2 "fig1",5,"anchor"?><xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrates available channels in 2.4 GHz spectrum for IEEE 802.11n standard.</p>
<fig id="fig-1"><label>Figure 1</label><caption><title>Available channels in IEEE 802.11n for 2.4 GHz band</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-1.png"/></fig>
<p>Several researches are conducted to derive interference models among operating APs and reduce interference by allocating OCs and POCs properly. In [<xref ref-type="bibr" rid="ref-10">10</xref>], authors proposed a network interference model based on signal-to-interference-plus-noise ratio (SINR). A direct relationship between maximizing system throughput and minimizing total interference is derived for POCs. Then, a channel assignment algorithm is proposed to minimize the total interference in network. The algorithm is a simple greedy one that fails often to find optimal solutions. In [<xref ref-type="bibr" rid="ref-11">11</xref>], authors proposed a channel allocation method using an interference model where APs are operating in point coordination function (PCF) mode. Only orthogonal channels are adopted for allocation. An interference probability function is introduced based on interference relationship among hosts. However, the authors avoided degree of interference in the proposed model. In [<xref ref-type="bibr" rid="ref-12">12</xref>], authors proposed an interference model based on two key features of IEEE 802.11n i.e., channel bonding and frame aggregation mechanism. A distributed channel allocation method for multi-rate 802.11n network is proposed considering estimated throughput of each client in network system. In [<xref ref-type="bibr" rid="ref-13">13</xref>&#x2013;<xref ref-type="bibr" rid="ref-15">15</xref>], authors proposed similar distributed channel allocation method based on the interfering relation among clients in the network. The algorithms pay higher cost to exchange information among hosts. In [<xref ref-type="bibr" rid="ref-16">16</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>], authors proposed a joint channel allocation and power control method to reduce interference problem. However, competition among APs and load distributions are not considered to eliminate interference completely.</p>
<p>While conventional channel assignment algorithms are designed to optimize communication performances by reducing interference only for 20 MHz channel [<xref ref-type="bibr" rid="ref-2">2</xref>,<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>], in this work, we propose an interference model for both 20 and 40 MHz channels in IEEE 802.11n WLAN system and a channel assignment algorithm under POCs using proposed interference model. The proposed interference model utilizes overlapping degree of 20 MHz channels studied in [<xref ref-type="bibr" rid="ref-20">20</xref>] and extends it for 40 MHz channels. In addition, a link speed estimation model using received signal strength indicator (RSSI) is developed for both 20 and 40 MHz channels. Then, we formulate a hierarchical optimization problem for channel assignment algorithm that reduces total interference among APs in a network with an aim to maximize network performance. We named the proposed algorithm <italic>POCABnB (partially overlapping channel assignment using bonded and non-bonded channels)</italic>. One bit communication time of APs is considered for the communication performance metric in this work as it is crucial for many applications maintaining fairness criterion to guarantee a minimum throughput to every user in a WLAN system.</p>
<p>The proposed channel assignment algorithm builds a weighted inference graph from network topology where an edge represents existence of interference and weight value represents degree of interference between connected APs. An exhaustive channel assignment can ensure optimal network performance. However, such procedure has exponential time complexity. Therefore, we utilized a greedy method to derive an initial solution for channel assignment. Then, the solution is improved iteratively using simulated annealing algorithm. After assignment of channels, load on different channels may become imbalance that can affect communication performance. Therefore, we average load on channels by changing associations of some users to APs. Finally, the proposal is evaluated by simulations under different network environments. In short, the contributions of this study are listed below:
<list list-type="simple">
<list-item><p>&#x02460; A channel interference model using both 20 and 40 MHz channel width for IEEE 802.11n protocol.</p></list-item>
<list-item><p>&#x02461; A channel assignment algorithm under POCs using proposed channel interference model for WLAN system.</p></list-item>
<list-item><p>&#x02462; Evaluation of proposed channel assignment algorithm using simulation under different network topologies.</p></list-item>
</list></p>
<p>The rest of this paper is organized as follows: the proposed interference model for IEEE 802.11n protocol, link speed estimation model for 20 and 40 MHz channel and optimization problem formulation for proposed channel assignment algorithm are introduced in Section 2. Proposed channel assignment algorithm and channel load balancing methods are described in Section 3. Experimental results to demonstrate the effectiveness of the proposed channel assignment algorithm are presented in Section 4. Finally, Section 5 concludes this paper with some future works.</p>
</sec>
<sec id="s2"><label>2</label><title>System Model</title>
<p>This work considers infrastructure network of IEEE 802.11n which is illustrated in <?A3B2 "fig2",5,"anchor"?><xref ref-type="fig" rid="fig-2">Fig. 2</xref>. In this work, we denote the <italic>node</italic> as a host and an AP, and the link as a connection between two nodes. A host is associated with an AP which provides the largest RSSI and the link can have an optimal physical data rate according to the channel condition. The inputs of channel assignment algorithm are the network infrastructure including the list of nodes along with node type e.g., AP and host, coordinates of nodes, the link speed estimation equation and a threshold for speed of each link. This link speed threshold is utilized to describe coverage and maintain certain performance for each host. In a WLAN system, all hosts have to compete for wireless channel to transmit data. Due to scarcity of channels, it is impossible to assign non-interfered channels to each AP to serve its associated hosts especially in a high density network. Data transmission is frequently affected by interfering hosts from neighboring APs when operating channels overlap which leads to poor performance. An interference model is proposed to adjust link speed due to interference for proper assignment of channel. Proposed interference model will be described later in Section 2.1. Additionally, an empirical model for link speed using RSSI is introduced through practical measurement and based on observations on actual network environments. In Section 2.3, we describe measurement campaign and present an approximate link speed model for 802.11n based on measurement results. Before proceeding, we summarize the notations used in this study in <?A3B2 "tbl1",5,"anchor"?><xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
<fig id="fig-2"><label>Figure 2</label><caption><title>Illustration of a WLAN system deployment</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-2.png"/></fig>
<table-wrap id="table-1"><label>Table 1</label><caption><title>Notations used in this work</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Symbol</th>
<th align="left">Meaning</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">&#x00A0;<inline-formula id="ieqn-146"><mml:math id="mml-ieqn-146"><mml:mrow><mml:mrow><mml:mi mathvariant="script">C</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula></td>
<td align="left">The set of <italic>k</italic> channels.</td>
</tr>
<tr>
<td align="left">&#x00A0;<inline-formula id="ieqn-147"><mml:math id="mml-ieqn-147"><mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="script">A</mml:mi></mml:mrow></mml:mrow></mml:mrow></mml:math></inline-formula></td>
<td align="left">The list of <italic>m</italic> APs.</td>
</tr>
<tr>
<td align="left">&#x00A0;<inline-formula id="ieqn-148"><mml:math id="mml-ieqn-148"><mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="script">H</mml:mi></mml:mrow></mml:mrow></mml:mrow></mml:math></inline-formula></td>
<td align="left">The list of <italic>n</italic> hosts.</td>
</tr>
<tr>
<td align="left">&#x00A0;<inline-formula id="ieqn-149"><mml:math id="mml-ieqn-149"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula></td>
<td align="left">Communication time of <inline-formula id="ieqn-150"><mml:math id="mml-ieqn-150"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> considering interference.</td>
</tr>
<tr>
<td align="left">&#x00A0;<inline-formula id="ieqn-151"><mml:math id="mml-ieqn-151"><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>&#x0394;</mml:mi><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula></td>
<td align="left">The degree of overlapping for channel difference <inline-formula id="ieqn-152"><mml:math id="mml-ieqn-152"><mml:mi>&#x0394;</mml:mi><mml:mi>c</mml:mi></mml:math></inline-formula>.</td>
</tr>
<tr>
<td align="left">&#x00A0;<inline-formula id="ieqn-153"><mml:math id="mml-ieqn-153"><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula></td>
<td align="left">The list of AP that interfered with <inline-formula id="ieqn-154"><mml:math id="mml-ieqn-154"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s2_1"><label>2.1</label><title>Interference Model</title>
<p>Within the scope of this work, we focus on channel assignment algorithm using POCs in the context of both 20 and 40 MHz channels. A 40 MHz channel is a combination of two adjacent 20 MHz channels. The list of bonded channels is demonstrated in <?A3B2 "tbl2",5,"anchor"?><xref ref-type="table" rid="table-2">Tab. 2</xref>. The degree of interference among channels has been widely studied where only few of them reported on bonded channels. This work considers degree of interference among channels for both bonded and non-bonded channels.</p>
<table-wrap id="table-2"><label>Table 2</label><caption><title>Channel bonding in IEEE 802.11n protocol</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Left boundary channel</th>
<th align="left">Right boundary channel</th>
<th align="left">Bonded channel</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left">5</td>
<td align="left">3</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">6</td>
<td align="left">4</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">7</td>
<td align="left">5</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">8</td>
<td align="left">6</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">9</td>
<td align="left">7</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">10</td>
<td align="left">8</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">11</td>
<td align="left">9</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">12</td>
<td align="left">10</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">13</td>
<td align="left">11</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The estimation of the degree of interference between two channels is a difficult task. For 20 MHz channel, there has been a popular study for measurement of overlapping degree in [<xref ref-type="bibr" rid="ref-20">20</xref>] which is summarized in <?A3B2 "tbl3",5,"anchor"?><xref ref-type="table" rid="table-3">Tab. 3</xref>. Where &#x0394;c represents the difference between two channels and <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>&#x0394;</mml:mi><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> does the overlapping degree for the respective &#x0394;c.</p>
<table-wrap id="table-3"><label>Table 3</label><caption><title>Degree of channel overlapping</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">&#x0394;c</th>
<th align="left">0</th>
<th align="left">1</th>
<th align="left">2</th>
<th align="left">3</th>
<th align="left">4</th>
<th align="left">5</th>
<th align="left">6</th>
<th align="left">7&#x2013;12</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left"><inline-formula id="ieqn-155"><mml:math id="mml-ieqn-155"><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>&#x0394;</mml:mi><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula></td>
<td align="left">0.7272</td>
<td align="left">0.7272</td>
<td align="left">0.2714</td>
<td align="left">0.0375</td>
<td align="left">0.0054</td>
<td align="left">0.0008</td>
<td align="left">0.0002</td>
<td align="left">0</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In this work, we utilized this overlapping degree to derive interference model for proposed channel assignment algorithm. If <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> are operating on channels <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> respectively, the channel difference <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mi>&#x0394;</mml:mi><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula> and degree of interference <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> is defined as follows:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mtable columnalign="left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mi>w</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mspace width="thickmathspace" /><mml:mn>20</mml:mn><mml:mspace width="thickmathspace" /><mml:mrow><mml:mtext mathvariant="italic">MHz:</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>w</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mspace width="thickmathspace" /><mml:mn>40</mml:mn><mml:mspace width="thickmathspace" /><mml:mrow><mml:mtext mathvariant="italic">MHz:</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mspace width="thickmathspace" /><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>&#x2264;</mml:mo><mml:mn>4</mml:mn><mml:mrow><mml:mo>:</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mi>e</mml:mi><mml:mi>l</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo>:</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>4</mml:mn></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>w</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mspace width="thickmathspace" /><mml:mn>20</mml:mn><mml:mspace width="thickmathspace" /><mml:mi>M</mml:mi><mml:mi>H</mml:mi><mml:mi>z</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mspace width="thickmathspace" /><mml:mn>40</mml:mn><mml:mspace width="thickmathspace" /><mml:mrow><mml:mtext mathvariant="italic">MHz:</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mn>0</mml:mn><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mi>w</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mspace width="thickmathspace" /><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2264;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:mn>2</mml:mn></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mspace width="1em" /><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mrow><mml:mi>&#x0394;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>When two APs are interfered each other, the communication is delayed due to collision which results in higher communication time. The definition of communication time will be expounded later in Section 2.2. The transmission distance between devices has a direct impact on interference which gets stronger, the closer the interfered sources. To model such phenomenon, in this work, we consider an inverse linear relationship between degree of interference and distance. It has been observed that for the target link, the interference from the interfering link increases communication time as the rate adaptation mechanism lowers transmission rate resulting throughput drop. The degree of throughput drop is proportionate to inverse of the distance between the devices. Suppose, <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is operating on channel, <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and communication time with its associated host is <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. If <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is interfered by its neighboring APs say <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> operating on channel <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and communication time <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> then communication time of <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> due to interference is calculated as follows:
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></disp-formula>where <italic>d</italic> is the distance of interfered AP i.e., <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> to <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> is the maximum distance for consideration of interference.</p>
</sec>
<sec id="s2_2"><label>2.2</label><title>Hierarchical Minimization of Interference</title>
<p>Let, <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mrow><mml:mrow><mml:mi mathvariant="script">C</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula> be the set of all available <italic>k</italic> channels in underlying WLAN physical layer i.e., <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="script">C</mml:mi></mml:mrow></mml:mrow></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mo>&#x22EF;</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>. In this work, we consider <italic>m</italic> APs presented as <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="script">A</mml:mi></mml:mrow></mml:mrow></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mo>&#x22EF;</mml:mo><mml:mspace width="thickmathspace" /><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>m</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> and <italic>n</italic> hosts presented as <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mrow><mml:mrow><mml:mi mathvariant="script">H</mml:mi></mml:mrow></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mo>&#x22EF;</mml:mo><mml:mspace width="thickmathspace" /><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>. A host connects to only one AP during communication using the same channel assigned to that AP. The list of hosts associated to <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is presented as <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mi>H</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. This work focuses on downlink only, i.e., data is transmitted from APs to hosts. Generally, the traffic in downlink is higher than that of uplink in most of the application [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-21">21</xref>].</p>
<p>The channel assignment algorithm minimizes overall interference <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> of a network which can be formulated as an optimization problem.
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:mi mathvariant="normal">M</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">z</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mrow><mml:mo>:</mml:mo></mml:mrow></mml:mrow><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="script">A</mml:mi></mml:mrow></mml:mrow></mml:mrow></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is the <italic>interfered communication time</italic> of <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mrow><mml:mrow><mml:mi mathvariant="script">A</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula> is the set of all APs in the network. If <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /></mml:math></inline-formula> is interfered with its neighboring APs, e.g., <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>, then <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> presents the list of APs interfered with <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> including itself. Therefore, <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>. Then, the interfered communication time, <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is derived as follows:
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mrow><mml:mtable columnalign='left'><mml:mtr columnalign='left'><mml:mtd columnalign='left'><mml:mrow><mml:msub><mml:mover accent='true'><mml:mi>&#x03C4;</mml:mi><mml:mo>&#x005E;</mml:mo></mml:mover><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr><mml:mtr columnalign='left'><mml:mtd columnalign='left'><mml:mrow><mml:mtext>&#x2003;</mml:mtext><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mstyle displaystyle='true'><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mtext>L</mml:mtext><mml:mo stretchy='false'>(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:munder><mml:mtext>&#x2009;</mml:mtext></mml:mstyle><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is the communication time of <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> is the degree of interference on <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> from <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> as defined in <xref ref-type="disp-formula" rid="eqn-1">(1)</xref>. The communication time of <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is defined as the total time when the <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> transmits 1-bit to all its associated hosts, <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:mi>H</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>:
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>H</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:munder><mml:mspace width="thickmathspace" /><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula>where <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> is the link speed from <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> to <inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. Therefore, <inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:math></inline-formula> presents the link delay for sending 1-bit from the <inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> to <inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> with link speed <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula>. Here, <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> in <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref> can also be interpreted as the estimated latency of <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> to send 1-bit to all its associated <inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> in <inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:mi>H</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. Consequently, the inverse of this estimated latency becomes the estimated minimum throughput, <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>s</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> for a host connected to <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>s</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>H</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:mfrac></mml:math></disp-formula>
</p>
<p>To ensure a minimum throughput to every host in the network, we consider a threshold <inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> that estimated minimum throughput of any host must satisfy i.e., <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>s</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula>. Besides, speed of any link must satisfy a threshold <inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> to ensure coverage and a minimum speed in all links. Each AP must be assigned a channel while minimizing overall interference in the network. Finally, the optimization problem of the proposed channel assignment algorithm can be formulated as follows:
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:mtable columnalign="left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">Minimize:</mml:mtext></mml:mrow><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="script">A</mml:mi></mml:mrow></mml:mrow></mml:mrow></mml:munder><mml:mspace width="thickmathspace" /><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">x</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">Subject to{:}</mml:mtext></mml:mrow><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>a</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>g</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>d</mml:mi><mml:mspace width="thickmathspace" /><mml:mrow><mml:mtext mathvariant="italic">channel c:</mml:mtext></mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>c</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mi mathvariant="script">C</mml:mi></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mover><mml:mi>s</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
</p>
</sec>
<sec id="s2_3"><label>2.3</label><title>Link Speed Measurement of IEEE 802.11n</title>
<p>The speed of a link is affected by many factors like transmission power, distance between devices, modulation and coding schemes (MCS) i.e., modulation type and coding rate, channel interference, and even the receiver design [<xref ref-type="bibr" rid="ref-22">22</xref>&#x2013;<xref ref-type="bibr" rid="ref-24">24</xref>]. This makes the theoretical computation of link speed is difficult. Therefore, this work considers an alternative approach that conducts extensive measurements to establish a formula for link speed by applying the regression analysis. The formula takes RSSI as single input based on measurements and provides respective link speed using sigmoid function [<xref ref-type="bibr" rid="ref-25">25</xref>]. The formula is extended to support distance as input which utilizes log-distance path loss model [<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-27">27</xref>] to derive RSSI. This RSSI is then converted to link speed. Theoretical parameters such as transmission power and MCS are fully characterized in commercial devices, thus, the link speed is solely dependent on adopted devices and physical distance between devices under same network environment. This empirical model for link speed estimation greatly simplifies the optimization complexity.</p>
<p>One commercial AP and two personal computers (PCs) are adopted in this measurement experiment. The configuration of devices is listed in <?A3B2 "tbl4",5,"anchor"?><xref ref-type="table" rid="table-4">Tab. 4</xref>. The experiment was conducted under 32&#x00B0;C and the relative humidity was around 82&#x0025;. A Wi-Fi channel-scanner [<xref ref-type="bibr" rid="ref-28">28</xref>] was utilized to inspect frequency band activity in 2.4 GHz and avoid unnecessary interference in experiment. TCP traffics were generated using iperf [<xref ref-type="bibr" rid="ref-29">29</xref>] for 180 s. We set TCP window size 477 Kbytes and buffer size 8 Kbytes. <?A3B2 "fig3",5,"anchor"?><xref ref-type="fig" rid="fig-3">Figs. 3</xref> and <?A3B2 "fig4",5,"anchor"?><xref ref-type="fig" rid="fig-4">4</xref> show link speed and RSSI measurement results for physical distance ranging from 0 to 100 m respectively. We have observed that the RSSI of bonded and non-bonded channels were not synchronized in some cases. This error may be caused by the fluctuation of RSS at measurements.</p>
<table-wrap id="table-4"><label>Table 4</label><caption><title>Devices and software for the measurement of IEEE 802.11n link speed</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td align="left" rowspan="3">PC1</td>
<td align="left">Model</td>
<td align="left">Ultrabook Lesance NB S3441/L</td>
</tr>
<tr>
<td align="left">CPU</td>
<td align="left">Intel (R) Core i5 3317U (2.6 GHz)</td>
</tr>
<tr>
<td align="left">OS</td>
<td align="left">Ubuntu 14.04 LTS</td>
</tr>
<tr>
<td align="left" rowspan="3">PC2</td>
<td align="left">Model</td>
<td align="left">HP Probook 450 G1</td>
</tr>
<tr>
<td align="left">CPU</td>
<td align="left">Intel (R) Core i5 4200 (2.5 GHz)</td>
</tr>
<tr>
<td align="left">OS</td>
<td align="left">Ubuntu 14.04 LTS</td>
</tr>
<tr>
<td align="left" rowspan="3">AP1, AP2</td>
<td align="left">Model</td>
<td align="left">NEC WG2600HP</td>
</tr>
<tr>
<td align="left">Operating mode</td>
<td align="left">IEEE 802.11<italic>n</italic>, 2.4 GHz</td>
</tr>
<tr>
<td align="left">Channel width</td>
<td align="left">20 MHz/40 MHz</td>
</tr>
<tr>
<td align="left">Software</td>
<td align="left">iPerf</td>
<td align="left">3.1.3</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-3"><label>Figure 3</label><caption><title>IEEE 802.11n link speed measurement results for 20 and 40 MHz channels</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-3.png"/></fig>
<p>Both link speed and RSSI drastically drops sharply with the increase of transmission distance. Such stair-like changes in link speed and RSSI are caused by changes of MCS. The relationship between RSSI and link speed in measurement results is analyzed to yield estimated link speed, <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> which is presented as:
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mn>3.5</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mi>c</mml:mi><mml:mi>w</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mspace width="thickmathspace" /><mml:mfrac><mml:mn>5</mml:mn><mml:mrow><mml:mi>c</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:mfrac><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mo>+</mml:mo><mml:mn>70</mml:mn></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula>where <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi></mml:math></inline-formula> is the given RSSI and <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:mi>c</mml:mi><mml:mi>w</mml:mi></mml:math></inline-formula> is the operating channel width; <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mi>c</mml:mi><mml:mi>w</mml:mi><mml:mo>=</mml:mo><mml:mn>20</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:mi>c</mml:mi><mml:mi>w</mml:mi><mml:mo>=</mml:mo><mml:mn>40</mml:mn></mml:math></inline-formula> when operating on 20 and 40 MHz channel respectively. The relationship between estimated link speed and RSSI is shown in <?A3B2 "fig5",5,"anchor"?><xref ref-type="fig" rid="fig-5">Figs. 5</xref> and <?A3B2 "fig6",5,"anchor"?><xref ref-type="fig" rid="fig-6">6</xref> for 20 MHz channel and 40 MHz channel respectively. RSSI of a host from AP can be easily estimated using indoor path loss model [<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-27">27</xref>] from transmission distance. The RSSI of host from AP at distance, <italic>d</italic> (<italic>m</italic>) is <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mrow><mml:msub><mml:mi>I</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> (<italic>dBm</italic>) can be derived as:
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mrow><mml:msub><mml:mi>I</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mrow><mml:msub><mml:mi>I</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>10</mml:mn><mml:mspace width="thickmathspace" /><mml:mo>&#x00D7;</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>&#x03B1;</mml:mi><mml:mspace width="thickmathspace" /><mml:mo>&#x00D7;</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:mrow><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mi>d</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mspace width="thickmathspace" /><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mi>k</mml:mi></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>W</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>R</mml:mi><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mrow><mml:msub><mml:mi>I</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow></mml:math></inline-formula> presents RSSI at <inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:mn>0</mml:mn><mml:mi>m</mml:mi></mml:math></inline-formula> transmission distance between AP and host, <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> presents path loss exponent, <inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> presents the number of <inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:mi>k</mml:mi></mml:math></inline-formula>-type obstacles on the transmission path and <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:mrow><mml:msub><mml:mi>W</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> presents the signal attenuation factor (<inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:mi>d</mml:mi><mml:mi>B</mml:mi></mml:math></inline-formula>) for the <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:mi>k</mml:mi></mml:math></inline-formula>-type obstacle.</p>
<fig id="fig-4"><label>Figure 4</label><caption><title>IEEE 802.11n RSSI measurement results for 20 and 40 MHz channels</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-4.png"/></fig>
<fig id="fig-5"><label>Figure 5</label><caption><title>Link speed estimation from the measured RSSI for 20 MHz channel</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-5.png"/></fig>
<fig id="fig-6"><label>Figure 6</label><caption><title>Link speed estimation from the measured RSSI for 40 MHz channel</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-6.png"/></fig>
</sec>
</sec>
<sec id="s3"><label>3</label><title>Proposed Channel Assignment Algorithm</title>
<p>In this section, we propose channel assignment algorithm to solve hierarchical optimization problem defined in <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> with an aim to minimize total interference in network. As depicted in <?A3B2 "fig7",5,"anchor"?><xref ref-type="fig" rid="fig-7">Fig. 7</xref>, the proposed algorithm comprises four phases namely preprocessing, initial solution generation, iterative improvement and balancing load on channels. The preprocessing phase constructs an interference graph from the set of APs in network. Then, list of interfered APs for each AP is generated and an initial solution is developed using a greedy approach. The solution is iteratively improved using simulated annealing algorithm. Finally, load on each channel is averaged to improve network performance. In the following subsections, we respectively describe each phase of implementation.</p>
<fig id="fig-7"><label>Figure 7</label><caption><title>Flow chart of proposed channel assignment algorithm</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-7.png"/></fig>
<sec id="s3_1"><label>3.1</label><title>Channel Assignment Algorithm Step1: Preprocessing</title>
<p>In this section, we model an interference graph from set of APs and interference among them. Let, <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:mi>G</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>V</mml:mi><mml:mo>,</mml:mo><mml:mi>E</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> be an <italic>interference graph</italic> where <italic>V</italic> represents the set of APs and the edge <italic>E</italic> presents the existence of the interference in any pair of APs in network. An edge, <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:mi>e</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:mi>E</mml:mi></mml:math></inline-formula> if <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is interfered with <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. In this work, we consider minimum RSSI of &#x2212;82 <inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:mi>d</mml:mi><mml:mi>B</mml:mi><mml:mi>m</mml:mi></mml:math></inline-formula> for interference. The weight of an edge presents the degree of inference between two interfered APs e.g., the degree of interference between <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is presented by <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> which can be derived using <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>. After interference graph, necessary information of hierarchical optimization in <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> is derived for further processing as follows:</p>
<p><bold>Step 1: Preprocessing</bold>
<list list-type="simple">
<list-item><p>&#x2460; Calculate link speed of any pair AP and host in network. Link speed, <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> between <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> can be derived from distance or RSSI using <xref ref-type="disp-formula" rid="eqn-8">Eqs. (8)</xref> and <xref ref-type="disp-formula" rid="eqn-9">(9)</xref>.</p></list-item>
<list-item><p>&#x2461; Calculate <italic>communication time</italic> for every AP in network. The communication time <inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> of <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is defined as the required time of an AP to transmit <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:mn>1</mml:mn></mml:math></inline-formula>-<inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:mi>b</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> to all its connected hosts and calculated using <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>.</p></list-item>
<list-item><p>&#x2462; Generate list of interfered APs for each AP. The list of interfered APs, <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> for <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> can be derived as:
<list list-type="simple">
<list-item><p>&#x02005;&#x02005;&#x02005;a) Initialize <inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">&#x2190;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>i</mml:mi><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> for <inline-formula id="ieqn-92"><mml:math id="mml-ieqn-92"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item><p>&#x02005;&#x02005;&#x02005;b) For each <inline-formula id="ieqn-93"><mml:math id="mml-ieqn-93"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="script">A</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula> include <italic>j</italic> in the list if it is interfered with <inline-formula id="ieqn-94"><mml:math id="mml-ieqn-94"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. Therefore, <inline-formula id="ieqn-95"><mml:math id="mml-ieqn-95"><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mspace width="thinmathspace" /><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">&#x2190;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="script">L</mml:mi></mml:mrow></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>&#x222A;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>j</mml:mi><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> if <inline-formula id="ieqn-96"><mml:math id="mml-ieqn-96"><mml:mi>e</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-97"><mml:math id="mml-ieqn-97"><mml:mi>i</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>j</mml:mi></mml:math></inline-formula>.</p></list-item>
</list></p></list-item>
</list></p>
</sec>
<sec id="s3_2"><label>3.2</label><title>Channel Assignment Algorithm Step 2: Initial Solution Generation</title>
<p>In the second step, an initial solution is generated. A straight forward method is to test all possibilities of channel assignment to every AP in the network. For <italic>m</italic> number of APs and <italic>k</italic> number of channels, there will be <inline-formula id="ieqn-98"><mml:math id="mml-ieqn-98"><mml:mrow><mml:msup><mml:mi>m</mml:mi><mml:mi>k</mml:mi></mml:msup></mml:mrow></mml:math></inline-formula> number of possibilities. The complexity becomes exponential for such exhaustive method which is not suitable in practical applications for large network. To avoid such exponential cost, we choose a faster greedy method for generation of initial solution. At every step, select a channel for assigning to an AP that minimizes current communication time considering interference. The detail of the procedure is given below:</p>
<p><bold>Step 2: Initial Solution Generation</bold>
<list list-type="simple">
<list-item><p>&#x2460; Calculate interfered communication time <inline-formula id="ieqn-99"><mml:math id="mml-ieqn-99"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> for each AP using <xref ref-type="disp-formula" rid="eqn-4">(4)</xref> and sort APs in descending order of <inline-formula id="ieqn-100"><mml:math id="mml-ieqn-100"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. In case of equality, resolve using <inline-formula id="ieqn-101"><mml:math id="mml-ieqn-101"><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item><p>&#x2461; Select a channel <inline-formula id="ieqn-102"><mml:math id="mml-ieqn-102"><mml:mi>c</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="script">C</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula> for <inline-formula id="ieqn-103"><mml:math id="mml-ieqn-103"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> such that interfered communication time becomes minimum when assigned. Interfered communication time for <inline-formula id="ieqn-104"><mml:math id="mml-ieqn-104"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> for selected channel is derived by:
<disp-formula id="ueqn-1">
<mml:math id="mml-ueqn-1" display="block"><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">&#x2190;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mi>k</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>L</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mi>c</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
</p></list-item>
</list>
where channel <inline-formula id="ieqn-105"><mml:math id="mml-ieqn-105"><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is allocated to <inline-formula id="ieqn-106"><mml:math id="mml-ieqn-106"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.
<list list-type="simple">
<list-item><p>&#x2462; Repeat this greedy selection for channel until each AP is allocated a channel that minimizes current interfered communication time.</p></list-item>
<list-item><p>&#x2463; Calculate total cost <inline-formula id="ieqn-107"><mml:math id="mml-ieqn-107"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> using <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> which is considered as the initial solution in this work.</p></list-item>
</list></p>
</sec>
<sec id="s3_3"><label>3.3</label><title>Channel Assignment Algorithm Step 3: Iterative Improvement</title>
<p>In this step, initial solution generated in previous step is improved iteratively using simulated annealing (SA) algorithm. Greedy method for channel selection makes a locally optimal choice aiming to minimize overall interference. However, this does not yield an optimal solution. Therefore, herein, we utilize probabilistic technique of SA to approximate minimal interference. SA starts with the initial solution, selects an AP and a channel with random choice, and examines the changes in total interference. We keep the new selection if it reduces the total interference. Otherwise, we generate a random value between <inline-formula id="ieqn-108"><mml:math id="mml-ieqn-108"><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mn>1</mml:mn></mml:mrow><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> and accept or reject the new selection with some probability based on the generated random value, changes in total interference and a given constant namely <italic>temperature</italic> <inline-formula id="ieqn-109"><mml:math id="mml-ieqn-109"><mml:mrow><mml:msup><mml:mi>T</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>A</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:math></inline-formula> for the <italic>iterative repeating time</italic> <inline-formula id="ieqn-110"><mml:math id="mml-ieqn-110"><mml:msup><mml:mrow><mml:msub><mml:mi>R</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mi>S</mml:mi><mml:mi>A</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula>. The detail of the iterative step is given below:</p>
<p><bold>Step 3: Iterative Improvement</bold>
<list list-type="simple">
<list-item><p>&#x2460; Select initial solution in the previous step as the current solution, <inline-formula id="ieqn-111"><mml:math id="mml-ieqn-111"><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>o</mml:mi><mml:mi>l</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>.</p></list-item>
<list-item><p>&#x2461; Select one AP and one new channel as an alternative channel assignment. Calculate cost function with new channel, <inline-formula id="ieqn-112"><mml:math id="mml-ieqn-112"><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> using <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref>.</p></list-item>
<list-item><p>&#x2462; Calculate <inline-formula id="ieqn-113"><mml:math id="mml-ieqn-113"><mml:mi>&#x0394;</mml:mi><mml:mi>F</mml:mi><mml:mo stretchy="false">&#x2190;</mml:mo><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>o</mml:mi><mml:mi>l</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>. If <inline-formula id="ieqn-114"><mml:math id="mml-ieqn-114"><mml:mi>&#x0394;</mml:mi><mml:mi>F</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, accept the new channel assignment of AP and keep this as the best solution.</p></list-item>
<list-item><p>&#x2463; Otherwise, generate a pseudo-random value, <inline-formula id="ieqn-115"><mml:math id="mml-ieqn-115"><mml:mi>r</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>&#x03F5;</mml:mi><mml:mspace width="thickmathspace" /><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mn>1</mml:mn></mml:mrow><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> and a probability value, <inline-formula id="ieqn-116"><mml:math id="mml-ieqn-116"><mml:mi>p</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mrow><mml:mi>&#x0394;</mml:mi><mml:mi>F</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:msup><mml:mi>T</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>A</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:msup></mml:mrow></mml:math></inline-formula>.
<list list-type="simple">
<list-item><label>a)</label><p>IF: <inline-formula id="ieqn-117"><mml:math id="mml-ieqn-117"><mml:mi>r</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi>p</mml:mi></mml:math></inline-formula> , then accept the new channel assignment and <inline-formula id="ieqn-118"><mml:math id="mml-ieqn-118"><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> as the best solution.</p></list-item>
<list-item><label>b)</label><p>ELSE: keep previous channel assignment and <inline-formula id="ieqn-119"><mml:math id="mml-ieqn-119"><mml:msubsup><mml:mi>F</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>o</mml:mi><mml:mi>l</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> as the best solution.</p></list-item>
</list></p></list-item>
</list></p>
</sec>
<sec id="s3_4"><label>3.4</label><title>Channel Assignment Step 4: Balancing Load on Channels</title>
<p>In this step, we aim to balance load on operating channels. After allocation of channels to APs, some APs may become congested and some APs may not. Therefore, balancing of loads on channels is necessary to decrease network traffic and utilize channel capacity more efficiently. For this purpose, it is required to compute network load based on channels. Then, the load of channels can be balanced by changing associations of hosts in intersection of APs to low crowded AP. Thus, network performance achieved in previous step is further improved by applying procedure of averaging load on channels. The detail of the procedure is given below:</p>
<p><bold>Step 4: Balancing Load on Channels</bold>
<list list-type="simple">
<list-item><p>&#x2460; Select an AP say <inline-formula id="ieqn-120"><mml:math id="mml-ieqn-120"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> that has the largest interfered communication time, <inline-formula id="ieqn-121"><mml:math id="mml-ieqn-121"><mml:mrow><mml:msub><mml:mrow><mml:mover><mml:mi>&#x03C4;</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. A host associated to this AP is considered to change its association to another AP operating on different channel.</p></list-item>
<list-item><p>&#x2461; Select a host say <inline-formula id="ieqn-122"><mml:math id="mml-ieqn-122"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> associated to <inline-formula id="ieqn-123"><mml:math id="mml-ieqn-123"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> that satisfies the following conditions:</p></list-item></list>
<list list-type="simple">
<list-item><label>a)</label><p>The host is under coverage of another AP operating on a different channel other than <inline-formula id="ieqn-124"><mml:math id="mml-ieqn-124"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item><label>b)</label><p>Link speed, <inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> from <inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> to <inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is the smallest among all hosts associated to <inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>.</p></list-item></list>
<list list-type="simple">
<list-item><p>&#x2462; Select an AP say <inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> operating different channel than <inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> for the association of newly selected <inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> where link speed <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> is highest among associable APs.</p></list-item>
<list-item><p>&#x2463; Calculate cost function in <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> considering <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula> is associated to <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:mi>A</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>. If this new association improves network performance, then keep this as the new solution. Otherwise, select another host from <inline-formula id="ieqn-135"><mml:math id="mml-ieqn-135"><mml:mi>H</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and repeat from Step &#x2461;.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s4"><label>4</label><title>Evaluation</title>
<p>In this section, the efficiency of the proposal is verified using WIMNET simulator [<xref ref-type="bibr" rid="ref-30">30</xref>]. First, the accuracy of the throughput estimation is evaluated using proposed interference model. Then, the proposed channel assignment algorithm is evaluated under different network environments by using WIMNET simulator. The simulation is conducted on a platform of Intel (R) Core (TM) i5-4200 CPU <inline-formula id="ieqn-136"><mml:math id="mml-ieqn-136"><mml:mrow><mml:mo>@</mml:mo></mml:mrow></mml:math></inline-formula>2.5 GHz, 8 GB memory with Ubuntu 14.04 LTS as virtual operating system in VMware workstation. The parameters used in simulation are summarized in <?A3B2 "tbl5",5,"anchor"?><xref ref-type="table" rid="table-5">Tab. 5</xref>. In this work, we simulate only downlink transmission where <inline-formula id="ieqn-137"><mml:math id="mml-ieqn-137"><mml:mrow><mml:msup><mml:mn>10</mml:mn><mml:mn>4</mml:mn></mml:msup></mml:mrow></mml:math></inline-formula> packets are transmitted from AP to host. We consider two topologies in this work for simulation to represent random and regular network environments respectively. Link speed between any two nodes is calculated using <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>. We assume that the locations of node information are available to derive distance between any pair of nodes in the network. The link speed can also be estimated by using the RSSI as well.</p>
<table-wrap id="table-5"><label>Table 5</label><caption><title>Simulation parameters in WIMNET simulator</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Parameters</th>
<th align="left">Values</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Packet size</td>
<td align="left">2360 bytes</td>
</tr>
<tr>
<td align="left">Propagation model</td>
<td align="left">Path loss model <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref></td>
</tr>
<tr>
<td align="left">Background noise interval</td>
<td align="left">&#x2212;<sans-serif>95&#x2009;dBm</sans-serif></td>
</tr>
<tr>
<td align="left">Transmission power</td>
<td align="left">20&#x2009;dBm</td>
</tr>
<tr>
<td align="left">Collision threshold</td>
<td align="left">10</td>
</tr>
<tr>
<td align="left">RTS/CTS</td>
<td align="left">Yes</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s4_1"><label>4.1</label><title>Evaluation of Proposed Interference Model</title>
<p>The proposed interference model is utilized in channel assignment algorithm where link speed is estimated considering interference of neighbor APs using the proposed interference. Therefore, the accuracy of the interference model is needed to verify before using in channel assignment algorithm. To verify the efficiency, we conduct a measurement campaign to collect actual link speed for different channel differences of an AP and its interfered APs at different physical distances. We considered 1 and 50 m physical distances for this work. Then, we compare the estimated link speed using proposed interference model with the actual link speed. The comparison results are shown in <?A3B2 "fig8",5,"anchor"?><xref ref-type="fig" rid="fig-8">Figs. 8</xref> and <?A3B2 "fig9",5,"anchor"?><xref ref-type="fig" rid="fig-9">9</xref> non-bonded and bonded channels respectively. The estimated link speed using proposed interference model and measured link speed of the same link are shown in <inline-formula id="ieqn-138"><mml:math id="mml-ieqn-138"><mml:mi>y</mml:mi></mml:math></inline-formula>-<inline-formula id="ieqn-139"><mml:math id="mml-ieqn-139"><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi></mml:math></inline-formula> where channel distance ranging from 0 to 8 is shown in <inline-formula id="ieqn-140"><mml:math id="mml-ieqn-140"><mml:mi>x</mml:mi></mml:math></inline-formula>-<inline-formula id="ieqn-141"><mml:math id="mml-ieqn-141"><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi></mml:math></inline-formula>. The results indicate that the estimated results coincide with the measured results. However, the results deviate noticeably at certain places because of signals from unknown APs in of the building. It should be noted that we conducted the measurement experiment at night in weekend when university is closed aiming to minimize the interference from existing Wi-Fi signals.</p>
</sec>
<sec id="s4_2"><label>4.2</label><title>Evaluation of Proposed Interference Model</title>
<p>First, we consider a random topology as depicted in <?A3B2 "fig10",5,"anchor"?><xref ref-type="fig" rid="fig-10">Fig. 10</xref> where 12 APs and 60 hosts are distributed in a 250 m <inline-formula id="ieqn-142"><mml:math id="mml-ieqn-142"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 200 m rectangular area. The APs are distributed equally in the grids of this rectangular network field. We assume that each AP has the same coverage of 100 m. The hosts are generated randomly in the field where a host is associated with an AP that provides maximum RSSI.</p>
<p>Next, we consider a regular network topology, as depicted in <?A3B2 "fig11",5,"anchor"?><xref ref-type="fig" rid="fig-11">Fig. 11</xref>. The regular topology models 3rd floor of engineering building-3 in Okayama University, Japan. There are 6 rooms with 2 different room sizes: 7 m<inline-formula id="ieqn-143"><mml:math id="mml-ieqn-143"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 6 m and 3.5 m <inline-formula id="ieqn-144"><mml:math id="mml-ieqn-144"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 6 m. We allocated 60 hosts and 9 APs in this dense network environment. The APs and hosts in this topology are regularly distributed since students have their own positions in research rooms. RSSI drops when passing through concrete walls. We consider two types of attenuation factor due to obstacles namely concrete wall and door wall in propagation model <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>. We model such phenomenon by reducing the RSSI 15(dBm) and 3(dBm) if a wall exists between two nodes for concrete wall and door wall respectively.</p>
<fig id="fig-8"><label>Figure 8</label><caption><title>Measurement and estimated link speed of 20 MHz channel for different channel difference. (a) AP-AP distance is 1 m (b) AP-AP distance is 50 m</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-8.png"/></fig>
<fig id="fig-9"><label>Figure 9</label><caption><title>Measurement and estimated link speed of 40 MHz channel for different channel difference. (a) AP-AP distance is 1 m (b) AP-AP distance is 50 m</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-9.png"/></fig>
<p>Now, to evaluate proposed channel assignment algorithm, we compare network throughputs obtained by random assignment of channels, greedy channel assignment and proposed algorithm assignment. Here, the random channel assignment experiment is repeated <inline-formula id="ieqn-145"><mml:math id="mml-ieqn-145"><mml:mn>10</mml:mn></mml:math></inline-formula> times and average of the network throughputs is considered for evaluation to avoid any kind of biasness. <?A3B2 "fig12",5,"anchor"?><xref ref-type="fig" rid="fig-12">Fig. 12</xref> shows simulation results of network throughput for random and regular topology respectively.</p>
<fig id="fig-10"><label>Figure 10</label><caption><title>Random topology with 12 APs and 60 hosts</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-10.png"/></fig>
<fig id="fig-11"><label>Figure 11</label><caption><title>Regular topology with 9 APs and 60 hosts</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-11.png"/></fig>
<p>The throughput for combination of bonded and non-bonded channels is expected to be better for flexibility of selection of partial overlapping channels. The numerical results in <xref ref-type="fig" rid="fig-12">Fig. 12</xref> demonstrate that the proposed algorithm can successfully assign channels in both topologies to reduce interference compared to random and greedy assignment. The network throughput is comparatively higher in random topology than that of regular topology. This is because, the regular topology is denser than random topology and all the APs are within the coverage of each other. Nonetheless, even in such extreme dense network environment, proposed algorithm works well in assigning channels to improve network performance by reducing overall network interference.</p>
<fig id="fig-12"><label>Figure 12</label><caption><title>Comparison results of random and regular topologies among random, greedy and proposed channel assignment algorithms</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_22214-fig-12.png"/></fig>
</sec>
</sec>
<sec id="s5"><label>5</label><title>Conclusion</title>
<p>In this work, we study interference of channels to improve network performance by reducing interference. We propose an interference model for IEEE 802.11n protocol under partially overlapping channels. The proposed model addresses interference of both non-bonded channel and bonded channel. We formulate a hierarchical optimization problem of channel assignment for minimization of total interference in the network. It has been found that reducing the network interference is almost proportional to increasing overall performance of the network. Then, a channel assignment algorithm of partially overlapping channels is introduced using proposed channel interference model in WLAN system. The experimental results showed that the proposed channel assignment algorithm successfully selects the best channel combination and optimizes the network performance. We believe that proposed interference model and algorithm open a new door for installation of WLAN system that specially benefits large-scale network where numerous APs are deployed. The proposal is verified by numerical experiments using WIMNET simulator under several network topologies. In future, we will consider other performance metrics e.g., transmission power, jitter for further improvement of proposed algorithm and dynamic channel width selection in order to improve network performance.</p>
</sec>
</body>
<back>
<ack>
<p>Authors would like to thank those who contributed to accomplish this work and provide us with valuable comments.</p>
</ack>
<fn-group>
<fn fn-type="other"><p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p></fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflict of interest to report regarding the present study.</p></fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Manzoor</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Hei</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Cheng</surname></string-name></person-group>, &#x201C;<article-title>Towards QoSaware load balancing for high density software defined Wi-Fi networks</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>117623</fpage>&#x2013;<lpage>117638</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. S.</given-names> <surname>Oh</surname></string-name>, <string-name><given-names>D. G.</given-names> <surname>Jeong</surname></string-name> and <string-name><given-names>W. S.</given-names> <surname>Jeon</surname></string-name></person-group>, &#x201C;<article-title>Joint radio resource management of channel-assignment and user-association for load balancing in dense WLAN environment</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>69615</fpage>&#x2013;<lpage>69628</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Kim</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Kim</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Shin</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Shin</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Dynamic control for on-demand interference-managed WLAN infrastructures</article-title>,&#x201D; <source>IEEE/ACM Transactions on Networking</source>, vol. <volume>28</volume>, no. <issue>1</issue>, pp. <fpage>84</fpage>&#x2013;<lpage>97</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Karmakar</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Chattopadhyay</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Chakraborty</surname></string-name></person-group>, &#x201C;<article-title>Novel AP association and fair channel access in high throughput WLAN for energy efficiency</article-title>,&#x201D; <source>Ad Hoc Networks</source>, vol. <volume>103</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. S. A.</given-names> <surname>Mamun</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Funabiki</surname></string-name>, <string-name><given-names>K. S.</given-names> <surname>Lwin</surname></string-name>, <string-name><given-names>M. E.</given-names> <surname>Islam</surname></string-name> and <string-name><given-names>W. C.</given-names> <surname>Kao</surname></string-name></person-group>, &#x201C;<article-title>A channel assignment extension of active access-point configuration algorithm for elastic WLAN system and its implementation using raspberry Pi</article-title>,&#x201D; <source>International Journal of Networking and Computing</source>, vol. <volume>7</volume>, no. <issue>2</issue>, pp. <fpage>248</fpage>&#x2013;<lpage>270</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. C.</given-names> <surname>G&#x00F3;mez</surname></string-name>, <string-name><given-names>I. M.</given-names> <surname>Maestre</surname></string-name>, <string-name><given-names>J. M. G.</given-names> <surname>Guzman</surname></string-name> and <string-name><given-names>S. S.</given-names> <surname>Sanz</surname></string-name></person-group>, &#x201C;<article-title>A coral reefs optimization algorithm with substrate layer for robust Wi-Fi channel assignment</article-title>,&#x201D; <source>Soft Computing</source>, vol. <volume>23</volume>, pp. <fpage>12621</fpage>&#x2013;<lpage>12640</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Ali</surname></string-name> and <string-name><given-names>F. A.</given-names> <surname>Khan</surname></string-name></person-group>, &#x201C;<article-title>Condition and location-aware channel switching scheme for multi-hop multi-band WLANs</article-title>,&#x201D; <source>Computer Networks</source>, vol. <volume>168</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Deek</surname></string-name>, <string-name><given-names>E. G.</given-names> <surname>Villegas</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Belding</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Lee</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Almeroth</surname></string-name></person-group>, &#x201C;<article-title>Intelligent channel bonding in 802.11n WLANs</article-title>,&#x201D; <source>IEEE Transactions on Mobile Computing</source>, vol. <volume>13</volume>, no. <issue>6</issue>, pp. <fpage>1242</fpage>&#x2013;<lpage>1255</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Faridi</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Bellalta</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Checco</surname></string-name></person-group>, &#x201C;<article-title>Analysis of dynamic channel bonding in dense networks of WLANs</article-title>,&#x201D; <source>IEEE Transactions on Mobile Computing</source>, vol. <volume>16</volume>, no. <issue>8</issue>, pp. <fpage>2118</fpage>&#x2013;<lpage>2131</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Jia</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Chang</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Tang</surname></string-name></person-group>, &#x201C;<article-title>Partially overlapping channel assignment for WLANs using SINR interference model</article-title>,&#x201D; <source>International Journal of Communication Systems</source>, vol. <volume>27</volume>, no. <issue>11</issue>, pp. <fpage>3082</fpage>&#x2013;<lpage>3095</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Lei</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Jiang</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Shang</surname></string-name></person-group>, &#x201C;<article-title>Channel assignment mechanism for multiple APs cochannel deployment in high density WLANs</article-title>,&#x201D; <source>Wireless Communications and Mobile Computing</source>, vol. <volume>2018</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>11</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Gong</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Zhao</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Yang</surname></string-name></person-group>, &#x201C;<article-title>Channel assignment in multi-rate 802.11n WLANs</article-title>,&#x201D; in <source>Wireless Communications and Networking Conference</source>, <conf-loc>Shanghai, China</conf-loc>, pp. <fpage>392</fpage>&#x2013;<lpage>397</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Kaufmann</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Baccelli</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Chaintreau</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Mhatre</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Papagiannaki</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Measurement-based self organization of interfering 802.11 wireless access networks</article-title>,&#x201D; in <conf-name>Int. Conf. on Computer Communications</conf-name>, <conf-loc>Anchorage, AK, USA</conf-loc>, pp. <fpage>1451</fpage>&#x2013;<lpage>1459</lpage>, <year>2007</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. C.</given-names> <surname>Hsu</surname></string-name>, <string-name><given-names>Y. A.</given-names> <surname>Liang</surname></string-name>, <string-name><given-names>J. L. G.</given-names> <surname>Gomez</surname></string-name>, <string-name><given-names>C. F.</given-names> <surname>Chou</surname></string-name> and <string-name><given-names>C. J.</given-names> <surname>Lin</surname></string-name></person-group>, &#x201C;<article-title>Distributed flexible channel assignment in WLANs</article-title>,&#x201D; in <source>Wireless Communications and Networking Conference</source>, <conf-loc>Shanghai, China</conf-loc>, pp. <fpage>493</fpage>&#x2013;<lpage>498</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Ji</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Ge</surname></string-name></person-group>, &#x201C;<article-title>Channel assignment with fairness for multi-AP WLAN based on distributed coordination</article-title>,&#x201D; in <source> Wireless Communications and Networking Conference</source>, <conf-loc>Cancun, Mexico</conf-loc>, pp. <fpage>392</fpage>&#x2013;<lpage>397</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Feng</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Fair channel allocation and power control for uplink and downlink cognitive radio networks</article-title>,&#x201D; in <source>IEEE GLOBECOM Workshops</source>, <conf-loc>Houston, TX, USA</conf-loc>, pp. <fpage>591</fpage>&#x2013;<lpage>596</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Wu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Ji</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Mao</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>A joint channel allocation and power control scheme for interference mitigation in high density WLANs</article-title>,&#x201D; in <conf-name>Int. Conf. on Communication Technology</conf-name>, <conf-loc>Guilin, China</conf-loc>, pp. <fpage>98</fpage>&#x2013;<lpage>103</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Dolinska</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Jakubowski</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Masiukiewicz</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Rzkadkowski</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Pi&#x00F3;rczynski</surname></string-name></person-group>, &#x201C;<article-title>A minimum-spanning-tree-inspired algorithm for channel assignment in 802.11 networks</article-title>,&#x201D; <source>International Journal of Electronics and Telecommunications</source>, vol. <volume>62</volume>, no. <issue>4</issue>, pp. <fpage>379</fpage>&#x2013;<lpage>388</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Farsi</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Achir</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Boussetta</surname></string-name></person-group>, &#x201C;<article-title>WLAN planning: Separate and joint optimization of both access point placement and channel assignment</article-title>,&#x201D; <source>Annals of Telecommunications</source>, vol. <volume>70</volume>, pp. <fpage>263</fpage>&#x2013;<lpage>274</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Burton</surname></string-name></person-group>, <article-title>Channel Overlap Calculations for 80211b Networks</article-title>. <italic>White Paper</italic>, London, UK: Cirond Networks Inc., <year>2002</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Aditya</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Glenn</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Srinivasan</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Peter</surname></string-name></person-group>, &#x201C;<article-title>Self-management in chaotic wireless deployments</article-title>,&#x201D; in <conf-name>Int. Conf. on Mobile Computing and Networking</conf-name>, <conf-loc>New York, USA</conf-loc>, pp. <fpage>185</fpage>&#x2013;<lpage>199</lpage>, <year>2005</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>T. D.</given-names> <surname>Chiueh</surname></string-name>, <string-name><given-names>P. Y.</given-names> <surname>Tsai</surname></string-name> and <string-name><given-names>I. W.</given-names> <surname>Lai</surname></string-name></person-group>, &#x201C;<source>Baseband Receiver Design for Wireless MIMO-OFDM Communications</source>,&#x201D; <edition>2</edition><sup>nd</sup> ed., <publisher-name>Singapore: Wiley-IEEE Press</publisher-name>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. S. A.</given-names> <surname>Mamun</surname></string-name>, <string-name><given-names>M. E.</given-names> <surname>Islam</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Funabiki</surname></string-name></person-group>, &#x201C;<article-title>An active access-point configuration algorithm for elastic wireless local-area network system using heterogeneous devices</article-title>,&#x201D; <source>International Journal of Networking and Computing</source>, vol. <volume>6</volume>, no. <issue>2</issue>, pp. <fpage>395</fpage>&#x2013;<lpage>419</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. S.</given-names> <surname>Lwin</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Funabiki</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Taniguchi</surname></string-name>, <string-name><given-names>K. K.</given-names> <surname>Zaw</surname></string-name>, <string-name><given-names>M. S. A.</given-names> <surname>Mamun</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>A minimax approach for access point setup optimization in IEEE 802.11n wireless networks</article-title>,&#x201D; <source>International Journal of Networking and Computing</source>, vol. <volume>7</volume>, no. <issue>2</issue>, pp. <fpage>187</fpage>&#x2013;<lpage>207</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Humphrys</surname></string-name></person-group>, &#x201C;<article-title>Continuous output-the sigmoid function</article-title>,&#x201D; Accessed: <year>Jul. 20, 2021</year>. [Online]. Available: <uri xlink:href="https://www.computing.dcu.ie,/~humphrys/Notes/Neural/sigmoid.html">https://www.computing.dcu.ie,/~humphrys/Notes/Neural/sigmoid.html</uri>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>T. S.</given-names> <surname>Rappaport</surname></string-name></person-group>, <source>Wireless Communications: Principles and Practice</source>. vol. <volume>2</volume>, <publisher-name>New Jersey: Prentice hall PTR</publisher-name>, <year>1996</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>D. B.</given-names> <surname>Faria</surname></string-name></person-group>, &#x201C;<article-title>Modeling Signal Attenuation in IEEE 802.11 Wireless LANs</article-title>,&#x201D; <source>Technical Report, TR-KP06-0118</source>, <publisher-name>California‎, USA: Stanford University</publisher-name>, <year>2005</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>WiFi Channel Scanner</collab></person-group>, Accessed: <year>Jul. 20, 2021</year>. [Online]. Available: <uri xlink:href="http://www.wifichannelscanner.com/">http://www.wifichannelscanner.com/</uri>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="web">&#x201C;<person-group person-group-type="author"><collab>iPerf-the ultimate speed test tool for TCP, UDP and SCTP</collab></person-group>,&#x201D; Accessed: <year>Jul. 20, 2021</year>. [Online]. Available: <uri xlink:href="https://iperf.fr/">https://iperf.fr/</uri>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Funabiki</surname></string-name></person-group>, &#x201C;<person-group person-group-type="author"><collab>Wireless mesh networks</collab></person-group>,&#x201D; <publisher-name>London, UK: InTechOpen Publisher</publisher-name>, <year>2011</year>. Accessed: Jul. 20, 2021. [Online]. Available: <uri xlink:href="https://www.intechopen.com/books/wireless-mesh-networks">https://www.intechopen.com/books/wireless-mesh-networks</uri>.</mixed-citation></ref>
</ref-list>
</back>
</article>