22 research outputs found

    Frame Capture in IEEE 802.11p Vehicular Networks

    Get PDF
    IEEE 802.11p is the new standard proposed by the IEEE for wireless connectivity in a vehicular context. It can be used by Advanced Driver Assistance Systems (ADAS) and Intelligent Transport Systems (ITS) to make vehicles aware of the traffic around them and increase vehicle safety with applications like cooperative cruise control, assisted merging and assisted lane switching. It is an amendment to the 802.11 standards family, with a physical layer based on Orthogonal Frequency Division Multiplexing (OFDM) similar to 802.11a. It is designed operate in a harsh environment. The increased degree of movement in a vehicular network creates Doppler shift, for example when vehicles connect to roadside units. Also, the cars on the road generate a significantcant amount of scattering and fast fading effects. This Doppler shift and other effects are accounted for in the design of the physical layer of 802.11p

    μ\muNap: Practical Micro-Sleeps for 802.11 WLANs

    Get PDF
    In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design μ\muNap, a local standard-compliant energy-saving mechanism that leverages micro-sleep opportunities inherent to the CSMA operation of 802.11 WLANs. This mechanism is backwards compatible and incrementally deployable, and takes into account the timing limitations of existing hardware, as well as practical CSMA-related issues (e.g., capture effect). According to the performance assessment carried out through trace-based simulation, the use of our scheme would result in a 57% reduction in the time spent in overhearing, thus leading to an energy saving of 15.8% of the activity time.Comment: 15 pages, 12 figure

    An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks

    Full text link
    Numerous studies showed that concurrent transmissions can boost wireless network performance despite collisions. While these works provide empirical evidence that concurrent transmissions may be received reliably, existing signal capture models only partially explain the root causes of this phenomenon. We present a comprehensive mathematical model that reveals the reasons and provides insights on the key parameters affecting the performance of MSK-modulated transmissions. A major contribution is a closed-form derivation of the receiver bit decision variable for arbitrary numbers of colliding signals and constellations of power ratios, timing offsets, and carrier phase offsets. We systematically explore the root causes for successful packet delivery under concurrent transmissions across the whole parameter space of the model. We confirm the capture threshold behavior observed in previous studies but also reveal new insights relevant for the design of optimal protocols: We identify capture zones depending not only on the signal power ratio but also on time and phase offsets.Comment: Accepted for publication in the IEEE Transactions on Wireless Communications under the title "On the Reception of Concurrent Transmissions in Wireless Sensor Networks.

    Scaling Capacity by Two Channels in IEEE 802.11 Ad Hoc Networks With an SIR Comparison Algorithm

    Full text link

    Intra-network interference robustness : an empirical evaluation of IEEE 802.15.4-2015 SUN-OFDM

    Get PDF
    While IEEE 802.15.4 and its Time Slotted Channel Hopping (TSCH) medium access mode were developed as a wireless substitute for reliable process monitoring in industrial environments, most deployments use a single/static physical layer (PHY) configuration. Instead of limiting all links to the throughput and reliability of a single Modulation and Coding Scheme (MCS), you can dynamically re-configure the PHY of link endpoints according to the context. However, such modulation diversity causes links to coincide in time/frequency space, resulting in poor reliability if left unchecked. Nonetheless, to some level, intentional spatial overlap improves resource efficiency while partially preserving the benefits of modulation diversity. Hence, we measured the mutual interference robustness of certain Smart Utility Network (SUN) Orthogonal Frequency Division Multiplexing (OFDM) configurations, as a first step towards combining spatial re-use and modulation diversity. This paper discusses the packet reception performance of those PHY configurations in terms of Signal to Interference Ratio (SIR) and time-overlap percentage between interference and targeted parts of useful transmissions. In summary, we found SUN-OFDM O3 MCS1 and O4 MCS2 performed best. Consequently, one should consider them when developing TSCH scheduling mechanisms in the search for resource efficient ubiquitous connectivity through modulation diversity and spatial re-use

    ZigZag Decoding: Combating Hidden Terminals in Wireless Networks

    Get PDF
    This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11 retransmissions which, in the case of hidden terminals, cause successive collisions. Due to asynchrony, these collisions have different interference-free stretches at their start, which ZigZag uses to bootstrap its decoding. ZigZag makes no changes to the 802.11 MAC and introduces no overhead when there are no collisions. But, when senders collide, ZigZag attains the same throughput as if the colliding packets were a priori scheduled in separate time slots. We build a prototype of ZigZag in GNU Radio. In a testbed of 14 USRP nodes, ZigZag reduces the average packet loss rate at hidden terminals from 82.3% to about 0.7%

    An efficient and fair reliable multicast protocol for 802.11-based wireless LANs

    Get PDF
    Many applications are inherently multicast in nature. Such applications can benefit tremendously from reliable multicast support at the MAC layer since addressing reliability at the MAC level is much less expensive than handling errors at the upper layers. However, the IEEE 802.11 MAC layer does not support reliable multicast. This void in the MAC layer is a limiting factor in the efficacy of multicast applications. In this work, we propose a Slot Reservation based Reliable Multicast protocol that adds a novel reliability component to the existing multicast protocol in the 802.11 MAC. Our protocol builds on the existing DCF support in the IEEE 802.11 MAC to seamlessly incorporate an efficient reliable multicast mechanism. Intelligent assignment of transmission slots, minimal control packet overhead and an efficient retransmission strategy form the basis of our protocol. We evaluate the performance of our protocol through extensive simulations. Our simulation results show that our protocol outperforms another reliable multicast protocol, Batch Mode Multicast MAC, in terms of delivered throughput in various scenarios. We enhance our protocol to add a fairness component in the presence of parallel unicast and multicast flows and provide unicast friendly multicast operation. We then evaluate the performance of our Slot Reservation Based Reliable Multicast Protocol with Fairness through extensive simulations and see that the scheme ensures fairness among parallel unicast and multicas

    Scalable Map Information Dissemination for Connected and Automated Vehicle Systems

    Get PDF
    Situational awareness in connected and automated vehicle (CAV) systems becomes particularly challenging in the presence of non-line of sight objects and/or objects beyond the sensing range of local onboard sensors. Despite the fact that fully autonomous driving requires the use of multiple redundant sensor systems, primarily including camera, radar, and LiDAR, the non-line of sight object detection problem still persists due to the inherent limitations of those sensing techniques. To tackle this challenge, the inter-vehicle communication system is envisioned that allows vehicles to exchange self-status updates aiming to extend their effective field of view and thus compensate for the limitations of the vehicle tracking subsystem that relies substantially on onboard sensing devices. Tracking capability in such systems can be further improved through the cooperative sharing of locally created map data instead of transmitting only self-update messages containing core basic safety message (BSM) data. In the cooperative sharing of safety messages, it is imperative to have a scalable communication protocol to ensure optimal use of the communication channel. This dissertation contributes to the analysis of the scalability issue in vehicle-to-everything (V2X) communication and then addresses the range issue of situational awareness in CAV systems by proposing a content-adaptive V2X communication architecture. To that end, we first analyze the BSM scheduling protocol standardized in the SAE J2945/1 and present large-scale scalability results obtained from a high-fidelity simulation platform to demonstrate the protocol\u27s efficacy to address the scalability issues in V2X communication. By employing a distributed opportunistic approach, the SAE J2945/1 congestion control algorithm keeps the overall offered channel load within an optimal operating range, while meeting the minimum tracking requirements set forth by upper-layer applications. This scheduling protocol allows event-triggered and vehicle-dynamics driven message transmits that further the situational awareness in a cooperative V2X context. Presented validation results of the congestion control algorithm include position tracking errors as the performance measure, with the age of communicated information as the evaluation measure. In addition, we examine the optimality of the default settings of the congestion control parameters. Comprehensive analysis and trade-off study of the control parameters reveal some areas of improvement to further the algorithm\u27s efficacy. Motivated by the effectiveness of channel congestion control mechanism, we further investigate message content and length adaptations, together with transmit rate control. Reasonably, the content of the exchanged information has a significant impact on the map accuracy in cooperative driving systems. We investigate different content control schemes for a communication architecture aimed at map sharing and evaluate their performance in terms of position tracking error. This dissertation determines that message content should be concentrated to mapped objects that are located farther away from the sender to the edge of the local sensor range. This dissertation also finds that optimized combination of message length and transmit rate ensures the optimal channel utilization for cooperative vehicular communication, which in turn improves the situational awareness of the whole system

    Zig Zag decoding : combating hidden terminals in wireless networks

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.Includes bibliographical references (leaves 59-62).This thesis presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11 retransmissions which, in the case of hidden terminals, cause successive collisions. Due to asynchrony, these collisions have different interference-free stretches at their start, which ZigZag uses to bootstrap its decoding. ZigZag makes no changes to the 802.11 MAC and introduces no overhead when there are no collisions. But, when senders collide, ZigZag attains the same throughput as if the colliding packets were a priori scheduled in separate time slots. We build a prototype of ZigZag in GNU Radio. In a testbed of 14 USRP nodes, ZigZag reduces the average packet loss rate at hidden terminals from 82.3% to about 0.7%.by Shyamnath GollakotaS.M
    corecore