5,458 research outputs found

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions

    Get PDF
    Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted

    Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services

    Full text link
    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, developer, research, network operator, and regulatory communities have taken an increased interest in measuring end-to-end mobile network performance to, among other goals, minimize negative impact on application responsiveness. In this survey we examine current approaches to end-to-end mobile network performance measurement, diagnosis, and application prototyping. We compare available tools and their shortcomings with respect to the needs of researchers, developers, regulators, and the public. We intend for this survey to provide a comprehensive view of currently active efforts and some auspicious directions for future work in mobile network measurement and mobile application performance evaluation.Comment: Submitted to IEEE Communications Surveys and Tutorials. arXiv does not format the URL references correctly. For a correctly formatted version of this paper go to http://www.cs.montana.edu/mwittie/publications/Goel14Survey.pd

    Interference mitigation strategy design and applications for wireless sensor networks

    Get PDF
    The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard presents a very useful technology for implementing low-cost, low-power, wireless sensor networks. Its main focus, which is to applications requiring simple wireless connectivity with relaxed throughout and latency requirements, makes it suitable for connecting devices that have not been networked, such as industrial and control instrumentation equipments, agricultural equipments, vehicular equipments, and home appliances. Its usage of the license-free 2.4 GHz frequency band makes the technique successful for fast and worldwide market deployments. However, concerns about interference have arisen due to the presence of other wireless technologies using the same spectrum. Although the IEEE 802.15.4 standard has provided some mechanisms, to enhance capability to coexist with other wireless devices operating on the same frequency band, including Carrier Sensor Multiple Access (CSMA), Clear Channel Assessment (CCA), channel alignment, and low duty cycle, it is essential to design and implement adjustable mechanisms for an IEEE 802.15.4 based system integrated into a practical application to deal with interference which changes randomly over time. Among the potential interfering systems (Wi-Fi, Bluetooth, cordless phones, microwave ovens, wireless headsets, etc) which work on the same Industrial, Scientific, and Medical (ISM) frequency band, Wi-Fi systems (IEEE 802.11 technique) have attracted most concerns because of their high transmission power and large deployment in both residential and office environments. This thesis aims to propose a methodology for IEEE 802.15.4 wireless systems to adopt proper adjustment in order to mitigate the effect of interference caused by IEEE 802.11 systems through energy detection, channel agility and data recovery. The contribution of this thesis consists of five parts. Firstly, a strategy is proposed to enable IEEE 802.15.4 systems to maintain normal communications using the means of consecutive transmissions, when the system s default mechanism of retransmission is insufficient to ensure successful rate due to the occurrence of Wi-Fi interference. Secondly, a novel strategy is proposed to use a feasible way for IEEE 802.15.4 systems to estimate the interference pattern, and accordingly adjust system parameters for the purpose of achieving optimized communication effectiveness during time of interference without relying on hardware changes and IEEE 802.15.4 protocol modifications. Thirdly, a data recovery mechanism is proposed for transport control to be applied for recovering lost data by associating with the proposed strategies to ensure the data integrity when IEEE 802.15.4 systems are suffering from interference. Fourthly, a practical case is studied to discuss how to design a sustainable system for home automation application constructed on the basis of IEEE 802.15.4 technique. Finally, a comprehensive design is proposed to enable the implementation of an interference mitigation strategy for IEEE 802.15.4 based ad hoc WSNs within a structure of building fire safety monitoring system. The proposed strategies and system designs are demonstrated mainly through theoretical analysis and experimental tests. The results obtained from the experimental tests have verified that the interference caused by an IEEE 802.11 system on an IEEE 802.15.4 system can be effectively mitigated through adjusting IEEE 802.15.4 system s parameters cooperating with interference pattern estimation. The proposed methods are suitable to be integrated into a system-level solution for an IEEE 802.15.4 system to deal with interference, which is also applicable to those wireless systems facing similar interference issues to enable the development of efficient mitigation strategies

    FCC Docket Summaries

    Get PDF

    Modularity, Vertical Integration, and Open Access Policies: Towards A Convergence of Antitrust and Regulation In The Internet Age

    Get PDF
    This article aims to help regulators and commentators incorporate both Chicago School and post-Chicago School arguments in assessing whether regulation should mandate open access to information platforms. The authors outline three alternative models that the FCC could adopt to guide its regulation of information platforms in the future and facilitate a true convergence between antitrust and regulatory policy.

    A wireless method for monitoring medication compliance

    Get PDF
    There are many devices on the market to help remind patients to take their pills, but most require observation by a caregiver to assure medication compliance. This project demonstrates three modes to detect pill removal from a pillbox: a switch under the pills, a reflective type photointerrupter and a transmissive electric eye photosensor. Each mode exhibited blind spots or other failures to detect pill presence, but by combining modes with complementary characteristics, the accuracy of pill detection is greatly increased. Two methods of caregiver notification are demonstrated: text messages transmitted via an attached cellular phone, or the status is collected by a PC which provides an audit trail and daily notification if no pills were taken
    • …
    corecore