181 research outputs found
Energy-efficient MAC protocols for wireless sensor networks: a survey
MAC Protocols enables sensor nodes of the same WSN to access a common shared communication channel. Many researchers have proposed different solutions explaining how to design and implement these protocols. The main goal of most MACs protocols is how to prolong lifetime of the WSN as long as possible by reducing energy consumption since it is often impossible to change or to recharge sensors’ batteries. The majority of these protocols designed for WSN are based on “duty-cycle” technique. Every node of the WSN operates on two periods: active period and sleep period to save energy. Until now (to our knowledge) there is no ideal protocol for this purpose. The main reason relies on the lack of standardization at lower layers (physical layer) and (physical) sensor hardware. Therefore, the MAC protocol choice remains application-dependent. A useful MAC protocol should be able to adapt to network changes (topology, nodes density and network size). This paper surveys MAC protocols for WSNs and discusses the main characteristics, advantages and disadvantages of currently popular protocols
A Performance Analysis Framework for WiFi/WiMAX Heterogeneous Metropolitan Networks Based on Cross-Layer Design
The communication between network nodes within different protocol domains is often regarded simply as a black box with unknown configuration conditions in the path. We address network heterogeneity using a white box approach and focus on its interconnection processes. To achieve this purpose, a Performance Analysis Framework (PAF) is proposed which is composed of the formalization of the latter using process algebra (PA) and the corresponding teletraffic performance models. In this contribution, we target the IEEE 802.16 and IEEE 802.11 protocols. For the teletraffic models, we extend previous models for such scenario with the inclusion of the following protocol operational parameters (metrics): bit error rate (BER), packet error ratio (PER), and packet length (pl). From the framework teletraffic models, the optimal packet length (OPL), end to end throughput, delay, and packet loss are obtained. The PAF outperforms previous modeling solutions in terms of delay and throughput relative to NS3 simulation results. </jats:p
The determining of optimum protocol strategies for half-duplex telemetry communication links
Dissertation (PhD)--University of Stellenbosch, 2002.ENGLISH ABSTRACT: Though not so prominent as the wide band, high speed, mainstream development of
data communication networks, cost and particular bandwidth limitations, still ensure
extensive and continuing use of low-speed, half-duplex data link equipment. Most of these
applications are radio based and aimed towards telemetry systems serving a wide range
of utilities. Experience has shown that systems engineering for this type of installation, is
seldom undertaken to a satisfactory analytical level. Investigation of published analyses
of CSMA protocols in general, has indicated scope of extension of theoretical work to
include system parameters for the type of protocol investigated in this dissertation.
This dissertation describes the mathematical modeling of such a strategy by utilising a significantly
modified, finite source, transition state-matrix approach derived from queueing
theory.
The contribution of the dissertation is to include system overhead parameters, such as
backoff strategy, channel noise, equipment rise times, propagation- and retry delays, into
the abovementioned model. The latter provides a relatively straightforward and readily
applicable method for system analysis and performance prediction.
A further contribution is the presentation of a software emulation with which different
strategies could be simulated, allowing for adjustment of all design parameters. The
simulation is intended for parallel and confimatory use with the theoretical model.
A dual set of tools, theoretical and emulation based, is thus contributed to assist with the
system design, performance prediction and protocol selection process.AFRIKAANSE OPSOMMING: Alhoewel nie so prominent soos die wyeband, hoëspoed, hoofstroom ontwikkeling van
datakommunikasie netwerke nie, verseker koste en spesifieke bandwydte beperkings nog
die uitgebreide en voortdurende gebruik van laespoed half-dupleks data verbindingstoerusting.
Meeste van die toepassings is radio gebaseer en gerig op telemetriestelsels wat deur
'n wye verskeidenheid diensverskaffers benut word. Stelselontwerp vir hierdie tipe installasies
word selde op analitiese vlak benader. Ondersoek van gepubliseerde analises
van kontensieprotokolle in die algemeen, het ruimte aangetoon vir die uitbreiding van
bestaande teoretiese werk om stelselveranderlikes soos van toepassing op die tipe protokol
in hierdie proefskrif ondersoek, in te sluit.
Hierdie proefskrif beskryf die wiskundige modelering van sodanige strategie, deur gebruik
te maak van 'n beduidend veranderde eindige bron, oorgangs-toestandmatriks benadering,
afgelei van touteorie.
Die bydrae van hierdie proefskrif is die insluiting van oorhoofse stelselveranderlikes, soos
herhaal strategie, kanaalruis, toerusting stygtye, herhaal- en voortplantingsvertragings, in
bogenoemde model. Laasgenoemde verskaf 'n relatief eenvoudige en maklik toepasbare
metode vir stelselanalise en werkverrigtingvoorspelling.
'n Verder bydrae is die daarstelling van 'n sagteware simulasie waarmee verskillende strategieë
nageboots kan word. Verstelling van alle ontwerpparameters word ondersteun. Die
simulasie is bedoel vir parallelle en bevestigende gebruik tesame met die teoretiese model.
'n Dubbele, teoreties- en simulasie gebaseerde benadering, word dus aangebied vir gebruik
by stelselontwerp, gedragsvoorspelling en optimale protokolseleksie
Design of State-based Schedulers for a Network of Control Loops
For a closed-loop system, which has a contention-based multiple access
network on its sensor link, the Medium Access Controller (MAC) may discard some
packets when the traffic on the link is high. We use a local state-based
scheduler to select a few critical data packets to send to the MAC. In this
paper, we analyze the impact of such a scheduler on the closed-loop system in
the presence of traffic, and show that there is a dual effect with state-based
scheduling. In general, this makes the optimal scheduler and controller hard to
find. However, by removing past controls from the scheduling criterion, we find
that certainty equivalence holds. This condition is related to the classical
result of Bar-Shalom and Tse, and it leads to the design of a scheduler with a
certainty equivalent controller. This design, however, does not result in an
equivalent system to the original problem, in the sense of Witsenhausen.
Computing the estimate is difficult, but can be simplified by introducing a
symmetry constraint on the scheduler. Based on these findings, we propose a
dual predictor architecture for the closed-loop system, which ensures
separation between scheduler, observer and controller. We present an example of
this architecture, which illustrates a network-aware event-triggering
mechanism.Comment: 17 pages, technical repor
Performance analysis of the carrier-sense multiple access protocol for future generation wireless networks
Ankara : The Department of Electrical and Electronics Engineering and the Graduate School of Engineering and Science of Bilkent University, 2013.Thesis (Ph. D.) -- Bilkent University, 2013.Includes bibliographical references leaves 115-127.Variants of the carrier-sense multiple access (CSMA) protocol has been employed
in many communications protocols such as the IEEE 802.11 and Ethernet standards.
CSMA based medium access control (MAC) mechanisms have been recently
proposed for other communications scenarios such as sensor networks and
acoustical underwater networks. Despite its widespread use, the performance
of the CSMA protocol is not well-studied from the perspective of these newly
encountered networking scenarios. We here investigate the performance of the
CSMA protocol from the point of three different aspects: throughput in networks
with large propagation delay, short-term fairness for delay sensitive applications
in large networks and energy efficiency-throughput trade-off in networks with
battery operated devices.
Firstly, we investigate the performance of the CSMA protocol for channels
with large propagation delay. Such channels are recently encountered in underwater
acoustic networks and in terrestrial wireless networks covering larger areas.
However, a mathematical model of CSMA performance in such networks is not
known. We propose a semi-Markov model for a 2-node CSMA channel and then
extend this model for arbitrary number of users. Using this model, we obtain the
optimum symmetric probing rate that achieves the maximum network throughput
as a function of the average propagation delay, ¯d, and the number of nodes
sharing the channel, N. The proposed model predicts that the total capacity
decreases with ¯d
−1 as N goes to infinity when all nodes probe the channel at the
optimum rate. The optimum probing rate for each node decreases with 1/N and
the total optimum probing rate decreases faster than ¯d
−1 as N goes to infinity.
Secondly, we investigate whether the short-term fairness of a large CSMA network degrades with the network size and density. Our results suggest that (a)
the throughput region that can be achieved within the acceptable limits of shortterm
fairness reduces as the number of contending neighboring nodes increases for
random regular conflict graphs, (b) short-term fair capacity weakly depends on
the network size for a random regular conflict graph but a stronger dependence is
observed for a grid topology. We also present related results from the statistical
physics literature on long-range correlations in large systems and point out the
relation between these results and short-term fairness of CSMA systems.
Thirdly, we investigate the energy efficiency of a CSMA network proposing a
model for the energy consumption of a node as a function of its throughput. We
show that operating the CSMA network at a very high or at a very low throughput
is energy inefficient because of increasing carrier-sensing and sleeping costs, respectively.
Achieving a balance between these two opposite operating regimes, we
derive the energy-optimum carrier-sensing rate and the energy-optimum throughput
which maximize the number of transmitted bits for a given energy budget. For
the single-hop case, we show that the energy-optimum total throughput increases
as the number of nodes sharing the channel increases. For the multi-hop case, we
show that the energy-optimum throughput decreases as the degree of the conflict
graph of the network increases. For both cases, the energy-optimum throughput
reduces as the power required for carrier-sensing increases. The energy-optimum
throughput is also shown to be substantially lower than the maximum throughput
and the gap increases as the degree of the conflict graph increases for multi-hop
networks.Köseoğlu, MehmetPh.D
Supporting Real-Time Communication in CSMA-Based Networks : the VTP-CSMA Virtual Token Passing Approach
Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200
Internet of Things and Sensors Networks in 5G Wireless Communications
The Internet of Things (IoT) has attracted much attention from society, industry and academia as a promising technology that can enhance day to day activities, and the creation of new business models, products and services, and serve as a broad source of research topics and ideas. A future digital society is envisioned, composed of numerous wireless connected sensors and devices. Driven by huge demand, the massive IoT (mIoT) or massive machine type communication (mMTC) has been identified as one of the three main communication scenarios for 5G. In addition to connectivity, computing and storage and data management are also long-standing issues for low-cost devices and sensors. The book is a collection of outstanding technical research and industrial papers covering new research results, with a wide range of features within the 5G-and-beyond framework. It provides a range of discussions of the major research challenges and achievements within this topic
- …