1,443 research outputs found
Spectrum Sharing between Cooperative Relay and Ad-hoc Networks: Dynamic Transmissions under Computation and Signaling Limitations
This paper studies a spectrum sharing scenario between a cooperative relay
network (CRN) and a nearby ad-hoc network. In particular, we consider a dynamic
spectrum access and resource allocation problem of the CRN. Based on sensing
and predicting the ad-hoc transmission behaviors, the ergodic traffic collision
time between the CRN and ad-hoc network is minimized subject to an ergodic
uplink throughput requirement for the CRN. We focus on real-time implementation
of spectrum sharing policy under practical computation and signaling
limitations. In our spectrum sharing policy, most computation tasks are
accomplished off-line. Hence, little real-time calculation is required which
fits the requirement of practical applications. Moreover, the signaling
procedure and computation process are designed carefully to reduce the time
delay between spectrum sensing and data transmission, which is crucial for
enhancing the accuracy of traffic prediction and improving the performance of
interference mitigation. The benefits of spectrum sensing and cooperative relay
techniques are demonstrated by our numerical experiments.Comment: 5 pages, 3 figures, to appear in IEEE International Conference on
Communications (ICC 2011
Wellness Protocol: An Integrated Framework for Ambient Assisted Living : A thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy In Electronics, Information and Communication Systems At School of Engineering and Advanced Technology, Massey University, Manawatu Campus, New Zealand
Listed in 2016 Dean's List of Exceptional ThesesSmart and intelligent homes of today and tomorrow are committed to enhancing the security, safety and comfort of the occupants. In the present scenario, most of the smart homes Protocols are limited to controlled activities environments for Ambient Assisted Living (AAL) of the elderly and the convalescents. The aim of this research is to develop a Wellness Protocol that forecasts the wellness of any individual living in the AAL environment. This is based on wireless sensors and networks that are applied to data mining and machine learning to monitor the activities of daily living. The heterogeneous sensor and actuator nodes, based on WSNs are deployed into the home environment. These nodes generate the real-time data related to the object usage and other movements inside the home, to forecast the wellness of an individual. The new Protocol has been designed and developed to be suitable especially for the smart home system. The Protocol is reliable, efficient, flexible, and economical for wireless sensor networks based AAL.
According to consumer demand, the Wellness Protocol based smart home systems can be easily installed with existing households without any significant changes and with a user-friendly interface. Additionally, the Wellness Protocol has extended to designing a smart building environment for an apartment. In the endeavour of smart home design and implementation, the Wellness Protocol deals with large data handling and interference mitigation. A Wellness based smart home monitoring system is the application of automation with integral systems of accommodation facilities to boost and progress the everyday life of an occupant
Survey of Spectrum Sharing for Inter-Technology Coexistence
Increasing capacity demands in emerging wireless technologies are expected to
be met by network densification and spectrum bands open to multiple
technologies. These will, in turn, increase the level of interference and also
result in more complex inter-technology interactions, which will need to be
managed through spectrum sharing mechanisms. Consequently, novel spectrum
sharing mechanisms should be designed to allow spectrum access for multiple
technologies, while efficiently utilizing the spectrum resources overall.
Importantly, it is not trivial to design such efficient mechanisms, not only
due to technical aspects, but also due to regulatory and business model
constraints. In this survey we address spectrum sharing mechanisms for wireless
inter-technology coexistence by means of a technology circle that incorporates
in a unified, system-level view the technical and non-technical aspects. We
thus systematically explore the spectrum sharing design space consisting of
parameters at different layers. Using this framework, we present a literature
review on inter-technology coexistence with a focus on wireless technologies
with equal spectrum access rights, i.e. (i) primary/primary, (ii)
secondary/secondary, and (iii) technologies operating in a spectrum commons.
Moreover, we reflect on our literature review to identify possible spectrum
sharing design solutions and performance evaluation approaches useful for
future coexistence cases. Finally, we discuss spectrum sharing design
challenges and suggest future research directions
Can Unlicensed Bands Be Used by Unlicensed Usage?
Since their introduction, unlicensed ISM bands have resulted in a wide range of new wireless devices and services. It is fair to say that the success of ISM was an important factor in the opening of the TV white space for unlicensed access. Further bands (e.g., 3550-3650 MHz) are being studied to support unlicensed access. Expansion of the unlicensed bands may well address one of the principle disadvantages of unlicensed (variable quality of service) which could result in a vibrant new group companies providing innovative services and better prices. However, given that many commercial mobile telephone operators are relying heavily on the unlicensed bands to manage growth in data traffic through the “offloading” strategy, the promise of these bands may be more limited than might otherwise be expected (Musey, 2013).\ud
\ud
Wireless data traffic has exploded in the past several years due to more capable devices and faster network technologies. While there is some debate on the trajectory of data growth, some notable reports include AT&T, which reported data growth of over 5000% from 2008 to 2010 and Cisco, who predicted that mobile data traffic will grow to 6.3 exabytes per month in average by 2015 (Hu, 2012). Although the data traffic increased dramatically, relatively little new spectrum for mobile operators has come online in the last several years; further, the “flat-rate” pricing strategy has led to declining Average Revenue Per User (ARPU) for the mobile operators. Their challenge, then, is how to satisfy the service demand with acceptable additional expenditures on infrastructure and spectrum utilization.\ud
\ud
A common response to this challenge has been to offload data traffic onto unlicensed (usually WiFi) networks. This can be accomplished either by establishing infrastructure (WiFi hotspots) or to use existing private networks. This phenomenon leads to two potential risks for spectrum entrants: (1) the use of offloading may overwhelm unlicensed spectrum and leave little access opportunities for newcomers; (2) the intensity of the traffic may increase interference and degrade innovative services.\ud
\ud
Consequently, opening more unlicensed frequency bands alone may not necessarily lead to more unlicensed usage. In this paper, we will estimate spectrum that left for unlicensed usage and analyze risks for unlicensed users in unlicensed bands in terms of access opportunities and monetary gain. We will further provide recommendations that help foster unlicensed usage in unlicensed bands
Opportunistic Access in Frequency Hopping Cognitive Radio Networks
Researchers in the area of cognitive radio often investigate the utility of dynamic spectrum access as a means to make more efficient use of the radio frequency spectrum. Many studies have been conducted to find ways in which a secondary user can occupy spectrum licensed to a primary user in a manner which does not disrupt the primary user\u27s performance. This research investigates the use of opportunistic access in a frequency hopping radio to mitigate the interference caused by other transmitters in a contentious environment such as the unlicensed 2.4 GHz region. Additionally, this work demonstrates how dynamic spectrum access techniques can be used not only to prevent interfering with other users but also improve the robustness of a communication system
Sub-GHz LPWAN network coexistence, management and virtualization : an overview and open research challenges
The IoT domain is characterized by many applications that require low-bandwidth communications over a long range, at a low cost and at low power. Low power wide area networks (LPWANs) fulfill these requirements by using sub-GHz radio frequencies (typically 433 or 868 MHz) with typical transmission ranges in the order of 1 up to 50 km. As a result, a single base station can cover large areas and can support high numbers of connected devices (> 1000 per base station). Notorious initiatives in this domain are LoRa, Sigfox and the upcoming IEEE 802.11ah (or "HaLow") standard. Although these new technologies have the potential to significantly impact many IoT deployments, the current market is very fragmented and many challenges exists related to deployment, scalability, management and coexistence aspects, making adoption of these technologies difficult for many companies. To remedy this, this paper proposes a conceptual framework to improve the performance of LPWAN networks through in-network optimization, cross-technology coexistence and cooperation and virtualization of management functions. In addition, the paper gives an overview of state of the art solutions and identifies open challenges for each of these aspects
Dynamic Channel Access Scheme for Interference Mitigation in Relay-assisted Intra-WBANs
This work addresses problems related to interference mitigation in a single
wireless body area network (WBAN). In this paper, We propose a distributed
\textit{C}ombined carrier sense multiple access with collision avoidance
(CSMA/CA) with \textit{F}lexible time division multiple access (\textit{T}DMA)
scheme for \textit{I}nterference \textit{M}itigation in relay-assisted
intra-WBAN, namely, CFTIM. In CFTIM scheme, non interfering sources
(transmitters) use CSMA/CA to communicate with relays. Whilst, high interfering
sources and best relays use flexible TDMA to communicate with coordinator (C)
through using stable channels. Simulation results of the proposed scheme are
compared to other schemes and consequently CFTIM scheme outperforms in all
cases. These results prove that the proposed scheme mitigates interference,
extends WBAN energy lifetime and improves the throughput. To further reduce the
interference level, we analytically show that the outage probability can be
effectively reduced to the minimal.Comment: 2015 IEEE International Conference on Protocol Engineering (ICPE) and
International Conference on New Technologies of Distributed Systems (NTDS),
Paris, France. arXiv admin note: text overlap with arXiv:1602.0865
Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate
- …