882 research outputs found

    Regulatory and Policy Implications of Emerging Technologies to Spectrum Management

    Get PDF
    This paper provides an overview of the policy implications of technological developments, and how these technologies can accommodate an increased level of market competition. It is based on the work carried out in the SPORT VIEWS (Spectrum Policies and Radio Technologies Viable In Emerging Wireless Societies) research project for the European Commission (FP6)spectrum, new radio technologies, UWB, SDR, cognitive radio, Telecommunications, regulation, Networks, Interconnection

    Wireless Sensor Technology Selection for I4.0 Manufacturing Systems

    Get PDF
    The term smart manufacturing has surfaced as an industrial revolution in Germany known as Industry 4.0 (I4.0); this revolution aims to help the manufacturers adapt to turbulent market trends. Its main scope is implementing machine communication, both vertically and horizontally across the manufacturing hierarchy through Internet of things (IoT), technologies and servitization concepts. The main objective of this research is to help manufacturers manage the high levels of variety and the extreme turbulence of market trends through developing a selection tool that utilizes Analytic Hierarchy Process (AHP) techniques to recommend a suitable industrial wireless sensor network (IWSN) technology that fits their manufacturing requirements.In this thesis, IWSN technologies and their properties were identified, analyzed and compared to identify their potential suitability for different industrial manufacturing system application areas. The study included the identification and analysis of different industrial system types, their application areas, scenarios and respective communication requirements. The developed tool’s sensitivity is also tested to recommend different IWSN technology options with changing influential factors. Also, a prioritizing protocol is introduced in the case where more than one IWSN technology options are recommended by the AHP tool.A real industrial case study with the collaboration of SPM Automation Inc. is presented, where the industrial systems’ class, communication traffic types, and communication requirements were analyzed to recommend a suitable IWSN technology that fits their requirements and assists their shift towards I4.0 through utilizing AHP techniques. The results of this research will serve as a step forward, in the transformation process of manufacturing towards a more digitalized and better connected cyber-physical systems; thus, enhancing manufacturing attributes such as flexibility, reconfigurability, scalability and easing the shift towards implementing I4.0

    Ultra wideband: applications, technology and future perspectives

    Get PDF
    Ultra Wide Band (UWB) wireless communications offers a radically different approach to wireless communication compared to conventional narrow band systems. Global interest in the technology is huge. This paper reports on the state of the art of UWB wireless technology and highlights key application areas, technological challenges, higher layer protocol issues, spectrum operating zones and future drivers. The majority of the discussion focuses on the state of the art of UWB technology as it is today and in the near future

    Wireless Technologies for Industry 4.0 Applications

    Get PDF
    Wireless technologies are increasingly used in industrial applications. These technologies reduce cabling, which is costly and troublesome, and introduce several benefits for their application in terms of flexibility to modify the layout of the nodes and scaling of the number of connected devices. They may also introduce new functionalities since they ease the connections to mobile devices or parts. Although they have some drawbacks, they are increasingly accepted in industrial applications, especially for monitoring and supervision tasks. Recently, they are starting to be accepted even for time-critical tasks, for example, in closed-loop control systems involving slow dynamic processes. However, wireless technologies have been evolving very quickly during the last few years, since several relevant technologies are available in the market. For this reason, it may become difficult to select the best alternative. This perspective article intends to guide application designers to choose the most appropriate technology in each case. For this purpose, this article discusses the most relevant wireless technologies in the industry and shows different examples of applications

    Wireless body sensor networks for health-monitoring applications

    Get PDF
    This is an author-created, un-copyedited version of an article accepted for publication in Physiological Measurement. The publisher is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The Version of Record is available online at http://dx.doi.org/10.1088/0967-3334/29/11/R01

    A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes

    Full text link
    [EN] The IEEE 802.15.4 standard is one of the widely adopted networking specification for Internet of Things (IoT). It defines several physical layer (PHY) options and medium access control (MAC) sub-layer protocols for interconnection of constrained wireless devices. These devices are usually battery-powered and need to support requirements like low-power consumption and low-data rates. The standard has been revised twice to incorporate new PHY layers and improvements learned from implementations. Research in this direction has been primarily centered around improving the energy consumption of devices. Recently, to meet specific Quality-of-Service (QoS) requirements of different industrial applications, the IEEE 802.15.4e amendment was released that focuses on improving reliability, robustness and latency. In this paper, we carry out a performance-to-cost analysis of Deterministic and Synchronous Multi-channel Extension (DSME) and Time-slotted Channel Hopping (TSCH) MAC modes of IEEE 802.15.4e with 802.15.4 MAC protocol to analyze the trade-off of choosing a particular MAC mode over others. The parameters considered for performance are throughput and latency, and the cost is quantified in terms of energy. A Markov model has been developed for TSCH MAC mode to compare its energy costs with 802.15.4 MAC. Finally, we present the applicability of different MAC modes to different application scenarios.This work was supported in part by the SERB, DST, Government of India under Grant ECRA/2016/001651.Choudhury, N.; Matam, R.; Mukherjee, M.; Lloret, J. (2020). A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes. IEEE Access. 8:41936-41950. https://doi.org/10.1109/ACCESS.2020.2976654S4193641950

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Delay Analysis of Network Architectures for Machine-to-Machine Communications in LTE System

    Get PDF
    Machine-to-machine communications has emerged to provide autonomic communications for a wide variety of intelligentservices and applications. Among different communication technologies available for connecting machines, cellular-basedsystems have gained more attention as backhaul networks due to ubiquitous coverage and mobility support. The diverse ranges of service requirements as well as machine constraints require adopting different network architectures. This paper reviews three M2M network architectures to integrate machines into the LTE system and analyzes their associated communication delays. It also presents how the appropriate networks can be selected for some machine-to-machine applications, fulfilling their latency constraints.Peer reviewe
    • 

    corecore