1,949 research outputs found
Upper-Confidence Bound for Channel Selection in LPWA Networks with Retransmissions
In this paper, we propose and evaluate different learning strategies based on
Multi-Arm Bandit (MAB) algorithms. They allow Internet of Things (IoT) devices
to improve their access to the network and their autonomy, while taking into
account the impact of encountered radio collisions. For that end, several
heuristics employing Upper-Confident Bound (UCB) algorithms are examined, to
explore the contextual information provided by the number of retransmissions.
Our results show that approaches based on UCB obtain a significant improvement
in terms of successful transmission probabilities. Furthermore, it also reveals
that a pure UCB channel access is as efficient as more sophisticated learning
strategies.Comment: The source code (MATLAB or Octave) used for the simula-tions and the
figures is open-sourced under the MIT License,
atBitbucket.org/scee\_ietr/ucb\_smart\_retran
2D Time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area Networks
In wireless networks, interferences between trans- missions are modelled
either in time or frequency domain. In this article, we jointly analyze
interferences in the time- frequency domain using a stochastic geometry model
assuming the total time-frequency resources to be a two-dimensional plane and
transmissions from Internet of Things (IoT) devices time- frequency patterns on
this plane. To evaluate the interference, we quantify the overlap between the
information packets: provided that the overlap is not too strong, the packets
are not necessarily lost due to capture effect. This flexible model can be used
for multiple medium access scenarios and is especially adapted to the random
time-frequency access schemes used in Low-Power Wide-Area Networks (LPWANs). By
characterizing the outage probability and throughput, our approach permits to
evaluate the performance of two representative LPWA technologies
Sigfox{\textsuperscript \textregistered} and LoRaWA{\textsuperscript
\textregistered}
Uncoordinated access schemes for the IoT: approaches, regulations, and performance
Internet of Things (IoT) devices communicate using a variety of protocols,
differing in many aspects, with the channel access method being one of the most
important. Most of the transmission technologies explicitly designed for IoT
and Machine-to-Machine (M2M) communication use either an ALOHA-based channel
access or some type of Listen Before Talk (LBT) strategy, based on carrier
sensing. In this paper, we provide a comparative overview of the uncoordinated
channel access methods for IoT technologies, namely ALOHA-based and LBT
schemes, in relation with the ETSI and FCC regulatory frameworks. Furthermore,
we provide a performance comparison of these access schemes, both in terms of
successful transmissions and energy efficiency, in a typical IoT deployment.
Results show that LBT is effective in reducing inter-node interference even for
long-range transmissions, though the energy efficiency can be lower than that
provided by ALOHA methods. The adoption of rate-adaptation schemes,
furthermore, lowers the energy consumption while improving the fairness among
nodes at different distances from the receiver. Coexistence issues are also
investigated, showing that in massive deployments LBT is severely affected by
the presence of ALOHA devices in the same area
- …
