93 research outputs found

    Energy Harvesting Wireless Communications: A Review of Recent Advances

    Get PDF
    This article summarizes recent contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from the information-theoretic performance limits to transmission scheduling policies and resource allocation, medium access and networking issues. The emerging related area of energy transfer for self-sustaining energy harvesting wireless networks is considered in detail covering both energy cooperation aspects and simultaneous energy and information transfer. Various potential models with energy harvesting nodes at different network scales are reviewed as well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications (Special Issue: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer

    Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation

    Get PDF
    The journey of underwater communication which began from Leonardo’s era took four and a half centuries to ïŹnd practical applications for military purposes during World War II. However, over the last three decades, underwater acoustic communications witnessed a massive development due to the advancements in the design of underwater communicating peripherals and their supporting protocols. Successively, doors are opened for a wide range of applications to employ in the underwater environment, such as oceanography, pollution monitoring, offshore exploration, disaster prevention, navigation assistance, monitoring, coastal patrol and surveillance. Different applications may have different characteristics and hence, may require different network architectures. For instance, routing protocols designed for unpartitioned multi-hop networks are not suitable for Delay-Tolerant Networks. Furthermore, single-hop networks do not need routing protocols at all. Therefore, before developing a protocol one must study the network architecture properly and design it accordingly. There are several other factors which should also be considered with the network architecture while designing an efïŹcient protocol for underwater networks, such as long propagation delay, limited bandwidth, limited battery power, high bit error rate of the channel and several other adverse properties of the channel, such as, multi-path, fading and refractive behaviors. Moreover, the environment also has an impact on the performance of the protocols designed for underwater networks. Even temperature changes in a single day have an impact on the performance of the protocols. A good protocol designed for any network should consider some or all of these characteristics to achieve better performance. In this thesis, we ïŹrst discuss the impact of the environment on the performance of MAC and routing protocols. From our investigation, we discover that even temperature changes within a day may affect the sound speed proïŹle and hence, the channel changes and the protocol performance vary. After that we discuss several protocols which are speciïŹcally designed for underwater acoustic networks to serve different purposes and for different network architectures. Underwater Selective Repeat (USR) is an error control protocol designed to assure reliable data transmission in the MAC layer. One may suspect that employing an error control technique over a channel which already suffers from long propagation delays is a burden. However, USR utilizes long propagation by transmitting multiple packets in a single RTT using an interlacing technique. After USR, a routing protocol for surveillance networks is discussed where some sensors are laid down at the bottom of the sea and some sinks are placed outside the area. If a sensor detects an asset within its detection range, it announces the presence of intruders by transmitting packets to the sinks. It may happen that the discovered asset is an enemy ship or an enemy submarine which creates noise to jam the network. Therefore, in surveillance networks, it is necessary that the protocols have jamming resistance capabilities. Moreover, since the network supports multiple sinks with similar anycast address, we propose a Jamming Resistance multi-path Multi-Sink Routing Protocol (MSRP) using a source routing technique. However, the problem of source routing is that it suffers from large overhead (every packet includes the whole path information) with respect to other routing techniques, and also suffers from the unidirectional link problem. Therefore, another routing protocol based on a distance vector technique, called Multi-path Routing with Limited Cross-Path Interference (L-CROP) protocol is proposed, which employs a neighbor-aware multi-path discovery algorithm to support low interference multiple paths between each source-destination pair. Following that, another routing protocol is discussed for next generation coastal patrol and surveillance network, called Underwater Delay-Tolerant Network (UDTN) routing where some AUVs carry out the patrolling work of a given area and report to a shore based control-center. Since the area to be patrolled is large, AUVs experience intermittent connectivity. In our proposed protocol, two nodes that understand to be in contact with each other calculate and divide their contact duration equally so that every node gets a fair share of the contact duration to exchange data. Moreover, a probabilistic spray technique is employed to restrict the number of packet transmissions and for error correction a modiïŹed version of USR is employed. In the appendix, we discuss a framework which was designed by our research group to realize underwater communication through simulation which is used in most of the simulations in this thesis, called DESERT Underwater (short for DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols). It is an underwater extension of the NS-Miracle simulator to support the design and implementation of underwater network protocols. Its creation assists the researchers in to utilizing the same codes designed for the simulator to employ in actual hardware devices and test in the real underwater scenario

    Real-Time Sensor Networks and Systems for the Industrial IoT

    Get PDF
    The Industrial Internet of Things (Industrial IoT—IIoT) has emerged as the core construct behind the various cyber-physical systems constituting a principal dimension of the fourth Industrial Revolution. While initially born as the concept behind specific industrial applications of generic IoT technologies, for the optimization of operational efficiency in automation and control, it quickly enabled the achievement of the total convergence of Operational (OT) and Information Technologies (IT). The IIoT has now surpassed the traditional borders of automation and control functions in the process and manufacturing industry, shifting towards a wider domain of functions and industries, embraced under the dominant global initiatives and architectural frameworks of Industry 4.0 (or Industrie 4.0) in Germany, Industrial Internet in the US, Society 5.0 in Japan, and Made-in-China 2025 in China. As real-time embedded systems are quickly achieving ubiquity in everyday life and in industrial environments, and many processes already depend on real-time cyber-physical systems and embedded sensors, the integration of IoT with cognitive computing and real-time data exchange is essential for real-time analytics and realization of digital twins in smart environments and services under the various frameworks’ provisions. In this context, real-time sensor networks and systems for the Industrial IoT encompass multiple technologies and raise significant design, optimization, integration and exploitation challenges. The ten articles in this Special Issue describe advances in real-time sensor networks and systems that are significant enablers of the Industrial IoT paradigm. In the relevant landscape, the domain of wireless networking technologies is centrally positioned, as expected

    Advanced random access techniques for satellite communications

    Get PDF
    In this thesis, Advanced Random Access techniques for Satellite Communications are studied. In the last years, new advances in multi-access communication protocols together with the increasing need for bidirectional communications in consumer type of interactive satellite terminals have revived the interest for a set of schemes able to guarantee high-speed and low latency communications in bursty traffic conditions. In this work, starting from the latest findings on Aloha-based Random Access schemes, the optimization of such techniques and their use in closed-loop scenarios is investigated with particular regard to the Return Channel over Satellite of Digital Video Broadcasting. The thesis starts with a summary on the state of the art of Demand Assigned and Random Access techniques as well as on the recent evolution from the first to the second version of the Return Channel over Satellite of the Digital Video Broadcasting specification. In chapter 2 a stability and packet delay model for channel analysis and design are presented, showing that proper design through this tools can ensure high performance of the new access scheme. The use of control limit policies is also introduced and its use is thoroughly discussed both for finite and infinite users population showing that, differently from Slotted Aloha, in some cases static design over dynamic policies might be preferable if long propagation delay is present. In chapter 3 the same models and tools introduced for CRDSA are extended to the case of asynchronous Random Access schemes and a comparison of the two families of schemes is put in place demonstrating that asynchronous techniques are convenient only when the signal-to-noise ratio is high enough to ensure decodability of partially colliding packets. In chapter 4 a new access scheme currently patent pending is presented. In this scheme terminals access the channel in an unframed manner. It is shown that such a change brings improvements that further diminish latency due to immediate transmission of the first replica and further boost throughput because the number of loops on the corresponding bipartite graph representation is mitigated. The thesis concludes with a call for a new discussion of resource allocation in multi-access satellite communication scenarios such as DVB-RCS2 in light of the obtained results and of the new requirements in interactive satellite networks

    Methods for Massive, Reliable, and Timely Access for Wireless Internet of Things (IoT)

    Get PDF
    • 

    corecore