145 research outputs found

    Adaptive framed pseudo-Bayesian Aloha algorithm with priorities

    Get PDF
    A new wireless framed pseudo-bayesian Aloha algorithm with adaptive priorities, for wireless ATM reservation-based TDMA MAC prolocols, is presented. The throughput in the presence of Rayleigh-fading, shadowing and capture is calculated, and the waiting time of the different priority classes is estimated using simulated models

    Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks

    Get PDF
    Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions have stimulated the emergence of grant-free (GF) transmission. GF access provides a promising mechanism for carrying low and moderate traffic with small data and fits especially well for massive machine type communications (mMTC) applications. Despite a surge of interest in GF access, how to handle heterogeneous mMTC traffic based on GF mechanisms has not been investigated in depth. In this paper, we propose a priority enabled GF access scheme which performs dynamic slot allocation in each 5G new radio subframe to devices with different priority levels on a subframe-by-subframe basis. While high priority traffic has access privilege for slot occupancy, the remaining slots in the same subframe will be allocated to low priority traffic. To evaluate the performance of the proposed scheme, we develop a two-dimensional Markov chain model which integrates these two types of traffic via a pseudo-aggregated process. Furthermore, the model is validated through simulations and the performance of the scheme is evaluated both analytically and by simulations and compared with two other GF access schemes.publishedVersio

    The FPBA algorithm with controlled capture ICC2001

    Get PDF
    Abstract-In this paper, we introduce a new mixed priority scheme that utilizes the LESRTPL model [S] to control the assignment of the transmitter power levels, assigned to each priority class, whose contending over the wireless channel using the FPBA algorithm [l] to capture the channel. The wireless channel capture model includes Rayleigh fading, shadowing, and path loss. The performance of the algorithm is evaluated using simulation models. Results show that the new priority scheme offers significant improvement to the throughput and the waiting time of the different priority classes, especially to high priority class packets

    Dynamic reservation TDMA protocol for wireless ATM networks

    Full text link

    A Survey on Long-Range Wide-Area Network Technology Optimizations

    Get PDF
    Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are widely deployed in urban areas, which leads to interference caused by concurrent transmissions on the same channel. In this context, it is crucial to understand aspects such as the coexistence of IoT devices and applications, resource allocation, Media Access Control (MAC) layer, network planning, and mobility support, that directly affect LoRaWAN’s performance.We present a systematic review of state-of-the-art works for LoRaWAN optimization solutions for IoT networking operations. We focus on five aspects that directly affect the performance of LoRaWAN. These specific aspects are directly associated with the challenges of densification of LoRaWAN. Based on the literature analysis, we present a taxonomy covering five aspects related to LoRaWAN optimizations for efficient IoT networks. Finally, we identify key research challenges and open issues in LoRaWAN optimizations for IoT networking operations that must be further studied in the future

    The Design of Medium Access Control (MAC) Protocols for Energy Efficient and QoS Provision in Wireless Sensor Networks

    Get PDF
    This thesis work focuses on innovative design of media access control (MAC) protocols in wireless sensor networks (WNSs). The characteristics of the WSN inquire that the network service design considers both energy efficiency and the associated application requirement. However, most existing protocols address only the issue of energy efficiency. In this thesis, a MAC protocol has been proposed (referred to as Q-MAC) that not only minimized the energy consumption in multi-hop WSNs, but also provides Quality of Service (QoS) by differentiating network services based on priority levels prescribed by different applications. The priority levels reflect the state of system resources including residual energy and queue occupancies. Q-MAC contains both intra- and inter- node arbitration mechanisms. The intra-node packet scheduling employs a multiple queuing architectures, and applies a scheduling scheme consisting of packet classification and weighted arbitration. We introduce the Power Conservation MACAW (PC-MACAW), a power-aware scheduling mechanism which, together with the Loosely Prioritized Random Access (LPRA) algorithm, govern the inter-node scheduling. Performance evaluation are conducted between Q-MAC and S-MAC with respect to two performance metrics: energy consumption and average latency. Simulation results indicate Q-MAC achieves comparable performance to that of S-MAC in non-prioritized traffic scenarios. When packets with different priorities are introduced, Q-MAC yields noticeable average latency differentiations between the classes of service, while preserving the same degree of energy consumption as that of S-MAC. Since the high density nature of WSN may introduce heavy traffic load and thus consume large amount of energy for communication, another MAC protocol, referred to as the Deployment-oriented MAC (D-MAC)has been further proposed. D-MAC minimalizes both sensing and communication redundancy by putting majority of redundant nodes into the sleep state. The idea is to establish a sensing and communication backbone covering the whole sensing field with the least sensing and communication redundancy. In specific, we use equal-size rectangular cells to partition the sensing field and chose the size of each cell in a way such that regardless of the actual location within the cell, a node can always sense the whole cell and communicate with all the nodes in neighboring cells. Once the sensing field has been partitioned using these cells, a localized Location-aware Selection Algorithm (LSA) is carried out to pick up only one node within each cell to be active for a fixed amount of period. This selection is energy-oriented, only nodes with a maximum energy will be on and the rest of nodes will be put into the sleep state once the selection process is over. To balance the energy consumption, the selection algorithm is periodically conducted until all the nodes are out of power. Simulation results indicated that D-MAC saves around 80% energy compared to that of S-MAC and Q-MAC, while maintaining 99% coverage. D-MAC is also superior to S-MAC and Q-MAC in terms of average latency. However, the use of GPS in D-MAC in identifying the nodes within the same cell, would cause extra cost and complexity for the design of sensor nodes

    Modeling Slotted Aloha as a Stochastic Game with Random Discrete Power Selection Algorithms

    Get PDF
    We consider the uplink case of a cellular system where bufferless mobiles transmit over a common channel to a base station, using the slotted aloha medium access protocol. We study the performance of this system under several power differentiation schemes. Indeed, we consider a random set of selectable transmission powers and further study the impact of priorities given either to new arrival packets or to the backlogged ones. Later, we address a general capture model where a mobile transmits successfully a packet if its instantaneous SINR (signal to interferences plus noise ratio) is lager than some fixed threshold. Under this capture model, we analyze both the cooperative team in which a common goal is jointly optimized as well as the noncooperative game problem where mobiles reach to optimize their own objectives. Furthermore, we derive the throughput and the expected delay and use them as the objectives to optimize and provide a stability analysis as alternative study. Exhaustive performance evaluations were carried out, we show that schemes with power differentiation improve significantly the individual as well as global performances, and could eliminate in some cases the bi-stable nature of slotted aloha

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Game Theory in Communications:a Study of Two Scenarios

    Get PDF
    Multi-user communication theory typically studies the fundamental limits of communication systems, and considers communication schemes that approach or even achieve these limits. The functioning of many such schemes assumes that users always cooperate, even when it is not in their own best interest. In practice, this assumption need not be fulfilled, as rational communication participants are often only interested in maximizing their own communication experience, and may behave in an undesirable manner from the system's point of view. Thus, communication systems may operate differently than intended if the behavior of individual participants is not taken into account. In this thesis, we study how users make decisions in wireless settings, by considering their preferences and how they interact with each other. We investigate whether the outcomes of their decisions are desirable, and, if not, what can be done to improve them. In particular, we focus on two related issues. The first is the decision-making of communication users in the absence of any central authority, which we consider in the context of the Gaussian multiple access channel. The second is the pricing of wireless resources, which we consider in the context of the competition of wireless service providers for users who are not contractually tied to any provider, but free to choose the one offering the best tradeoff of parameters. In the first part of the thesis, we model the interaction of self-interested users in a Gaussian multiple access channel using non-cooperative game theory. We demonstrate that the lack of infrastructure leads to an inefficient outcome for users who interact only once, specifically due to the lack of coordination between users. Using evolutionary game theory, we show that this inefficient outcome would also arise as a result of repeated interaction of many individuals over time. On the other hand, if the users correlate their decoding schedule with the outcome of some publicly observed (pseudo) random variable, the resulting outcome is efficient. This shows that sometimes it takes very little intervention on the part of the system planner to make sure that users choose a desirable operating point. In the second part of the thesis, we consider the competition of wireless service providers for users who are free to choose their service provider based on their channel parameters and the resource price. We model this situation as a two-stage game where the providers announce unit resource prices in the first stage and the users choose how much resource they want to purchase from each provider in the second stage. Under fairly general conditions, we show that the competitive interaction of users and providers results in socially optimal resource allocation. We also provide a decentralized primal-dual algorithm and prove its convergence to the socially optimal outcome
    • …
    corecore