181 research outputs found

    Energy-efficient MAC protocols for wireless sensor networks: a survey

    Get PDF
    MAC Protocols enables sensor nodes of the same WSN to access a common shared communication channel. Many researchers have proposed different solutions explaining how to design and implement these protocols. The main goal of most MACs protocols is how to prolong lifetime of the WSN as long as possible by reducing energy consumption since it is often impossible to change or to recharge sensors’ batteries. The majority of these protocols designed for WSN are based on “duty-cycle” technique. Every node of the WSN operates on two periods: active period and sleep period to save energy. Until now (to our knowledge) there is no ideal protocol for this purpose. The main reason relies on the lack of standardization at lower layers (physical layer) and (physical) sensor hardware.  Therefore, the MAC protocol choice remains application-dependent. A useful MAC protocol should be able to adapt to network changes (topology, nodes density and network size). This paper surveys MAC protocols for WSNs and discusses the main characteristics, advantages and disadvantages of currently popular protocols

    A Performance Analysis Framework for WiFi/WiMAX Heterogeneous Metropolitan Networks Based on Cross-Layer Design

    Get PDF
    The communication between network nodes within different protocol domains is often regarded simply as a black box with unknown configuration conditions in the path. We address network heterogeneity using a white box approach and focus on its interconnection processes. To achieve this purpose, a Performance Analysis Framework (PAF) is proposed which is composed of the formalization of the latter using process algebra (PA) and the corresponding teletraffic performance models. In this contribution, we target the IEEE 802.16 and IEEE 802.11 protocols. For the teletraffic models, we extend previous models for such scenario with the inclusion of the following protocol operational parameters (metrics): bit error rate (BER), packet error ratio (PER), and packet length (pl). From the framework teletraffic models, the optimal packet length (OPL), end to end throughput, delay, and packet loss are obtained. The PAF outperforms previous modeling solutions in terms of delay and throughput relative to NS3 simulation results. </jats:p

    The determining of optimum protocol strategies for half-duplex telemetry communication links

    Get PDF
    Dissertation (PhD)--University of Stellenbosch, 2002.ENGLISH ABSTRACT: Though not so prominent as the wide band, high speed, mainstream development of data communication networks, cost and particular bandwidth limitations, still ensure extensive and continuing use of low-speed, half-duplex data link equipment. Most of these applications are radio based and aimed towards telemetry systems serving a wide range of utilities. Experience has shown that systems engineering for this type of installation, is seldom undertaken to a satisfactory analytical level. Investigation of published analyses of CSMA protocols in general, has indicated scope of extension of theoretical work to include system parameters for the type of protocol investigated in this dissertation. This dissertation describes the mathematical modeling of such a strategy by utilising a significantly modified, finite source, transition state-matrix approach derived from queueing theory. The contribution of the dissertation is to include system overhead parameters, such as backoff strategy, channel noise, equipment rise times, propagation- and retry delays, into the abovementioned model. The latter provides a relatively straightforward and readily applicable method for system analysis and performance prediction. A further contribution is the presentation of a software emulation with which different strategies could be simulated, allowing for adjustment of all design parameters. The simulation is intended for parallel and confimatory use with the theoretical model. A dual set of tools, theoretical and emulation based, is thus contributed to assist with the system design, performance prediction and protocol selection process.AFRIKAANSE OPSOMMING: Alhoewel nie so prominent soos die wyeband, hoëspoed, hoofstroom ontwikkeling van datakommunikasie netwerke nie, verseker koste en spesifieke bandwydte beperkings nog die uitgebreide en voortdurende gebruik van laespoed half-dupleks data verbindingstoerusting. Meeste van die toepassings is radio gebaseer en gerig op telemetriestelsels wat deur 'n wye verskeidenheid diensverskaffers benut word. Stelselontwerp vir hierdie tipe installasies word selde op analitiese vlak benader. Ondersoek van gepubliseerde analises van kontensieprotokolle in die algemeen, het ruimte aangetoon vir die uitbreiding van bestaande teoretiese werk om stelselveranderlikes soos van toepassing op die tipe protokol in hierdie proefskrif ondersoek, in te sluit. Hierdie proefskrif beskryf die wiskundige modelering van sodanige strategie, deur gebruik te maak van 'n beduidend veranderde eindige bron, oorgangs-toestandmatriks benadering, afgelei van touteorie. Die bydrae van hierdie proefskrif is die insluiting van oorhoofse stelselveranderlikes, soos herhaal strategie, kanaalruis, toerusting stygtye, herhaal- en voortplantingsvertragings, in bogenoemde model. Laasgenoemde verskaf 'n relatief eenvoudige en maklik toepasbare metode vir stelselanalise en werkverrigtingvoorspelling. 'n Verder bydrae is die daarstelling van 'n sagteware simulasie waarmee verskillende strategieë nageboots kan word. Verstelling van alle ontwerpparameters word ondersteun. Die simulasie is bedoel vir parallelle en bevestigende gebruik tesame met die teoretiese model. 'n Dubbele, teoreties- en simulasie gebaseerde benadering, word dus aangebied vir gebruik by stelselontwerp, gedragsvoorspelling en optimale protokolseleksie

    Design of State-based Schedulers for a Network of Control Loops

    Full text link
    For a closed-loop system, which has a contention-based multiple access network on its sensor link, the Medium Access Controller (MAC) may discard some packets when the traffic on the link is high. We use a local state-based scheduler to select a few critical data packets to send to the MAC. In this paper, we analyze the impact of such a scheduler on the closed-loop system in the presence of traffic, and show that there is a dual effect with state-based scheduling. In general, this makes the optimal scheduler and controller hard to find. However, by removing past controls from the scheduling criterion, we find that certainty equivalence holds. This condition is related to the classical result of Bar-Shalom and Tse, and it leads to the design of a scheduler with a certainty equivalent controller. This design, however, does not result in an equivalent system to the original problem, in the sense of Witsenhausen. Computing the estimate is difficult, but can be simplified by introducing a symmetry constraint on the scheduler. Based on these findings, we propose a dual predictor architecture for the closed-loop system, which ensures separation between scheduler, observer and controller. We present an example of this architecture, which illustrates a network-aware event-triggering mechanism.Comment: 17 pages, technical repor

    Performance analysis of the carrier-sense multiple access protocol for future generation wireless networks

    Get PDF
    Ankara : The Department of Electrical and Electronics Engineering and the Graduate School of Engineering and Science of Bilkent University, 2013.Thesis (Ph. D.) -- Bilkent University, 2013.Includes bibliographical references leaves 115-127.Variants of the carrier-sense multiple access (CSMA) protocol has been employed in many communications protocols such as the IEEE 802.11 and Ethernet standards. CSMA based medium access control (MAC) mechanisms have been recently proposed for other communications scenarios such as sensor networks and acoustical underwater networks. Despite its widespread use, the performance of the CSMA protocol is not well-studied from the perspective of these newly encountered networking scenarios. We here investigate the performance of the CSMA protocol from the point of three different aspects: throughput in networks with large propagation delay, short-term fairness for delay sensitive applications in large networks and energy efficiency-throughput trade-off in networks with battery operated devices. Firstly, we investigate the performance of the CSMA protocol for channels with large propagation delay. Such channels are recently encountered in underwater acoustic networks and in terrestrial wireless networks covering larger areas. However, a mathematical model of CSMA performance in such networks is not known. We propose a semi-Markov model for a 2-node CSMA channel and then extend this model for arbitrary number of users. Using this model, we obtain the optimum symmetric probing rate that achieves the maximum network throughput as a function of the average propagation delay, ¯d, and the number of nodes sharing the channel, N. The proposed model predicts that the total capacity decreases with ¯d −1 as N goes to infinity when all nodes probe the channel at the optimum rate. The optimum probing rate for each node decreases with 1/N and the total optimum probing rate decreases faster than ¯d −1 as N goes to infinity. Secondly, we investigate whether the short-term fairness of a large CSMA network degrades with the network size and density. Our results suggest that (a) the throughput region that can be achieved within the acceptable limits of shortterm fairness reduces as the number of contending neighboring nodes increases for random regular conflict graphs, (b) short-term fair capacity weakly depends on the network size for a random regular conflict graph but a stronger dependence is observed for a grid topology. We also present related results from the statistical physics literature on long-range correlations in large systems and point out the relation between these results and short-term fairness of CSMA systems. Thirdly, we investigate the energy efficiency of a CSMA network proposing a model for the energy consumption of a node as a function of its throughput. We show that operating the CSMA network at a very high or at a very low throughput is energy inefficient because of increasing carrier-sensing and sleeping costs, respectively. Achieving a balance between these two opposite operating regimes, we derive the energy-optimum carrier-sensing rate and the energy-optimum throughput which maximize the number of transmitted bits for a given energy budget. For the single-hop case, we show that the energy-optimum total throughput increases as the number of nodes sharing the channel increases. For the multi-hop case, we show that the energy-optimum throughput decreases as the degree of the conflict graph of the network increases. For both cases, the energy-optimum throughput reduces as the power required for carrier-sensing increases. The energy-optimum throughput is also shown to be substantially lower than the maximum throughput and the gap increases as the degree of the conflict graph increases for multi-hop networks.Köseoğlu, MehmetPh.D

    Supporting Real-Time Communication in CSMA-Based Networks : the VTP-CSMA Virtual Token Passing Approach

    Get PDF
    Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    The Internet of Things (IoT) has attracted much attention from society, industry and academia as a promising technology that can enhance day to day activities, and the creation of new business models, products and services, and serve as a broad source of research topics and ideas. A future digital society is envisioned, composed of numerous wireless connected sensors and devices. Driven by huge demand, the massive IoT (mIoT) or massive machine type communication (mMTC) has been identified as one of the three main communication scenarios for 5G. In addition to connectivity, computing and storage and data management are also long-standing issues for low-cost devices and sensors. The book is a collection of outstanding technical research and industrial papers covering new research results, with a wide range of features within the 5G-and-beyond framework. It provides a range of discussions of the major research challenges and achievements within this topic
    corecore