904 research outputs found
LTE and Wi-Fi Coexistence in Unlicensed Spectrum with Application to Smart Grid: A Review
Long Term Evolution (LTE) is expanding its utilization in unlicensed band by
deploying LTE Unlicensed (LTEU) and Licensed Assisted Access LTE (LTE-LAA)
technology. Smart Grid can take the advantages of unlicensed bands for
achieving two-way communication between smart meters and utility data centers
by using LTE-U/LTE-LAA. However, both schemes must co-exist with the incumbent
Wi-Fi system. In this paper, several co-existence schemes of Wi-Fi and LTE
technology is comprehensively reviewed. The challenges of deploying LTE and
Wi-Fi in the same band are clearly addressed based on the papers reviewed.
Solution procedures and techniques to resolve the challenging issues are
discussed in a short manner. The performance of various network architectures
such as listenbefore- talk (LBT) based LTE, carrier sense multiple access with
collision avoidance (CSMA/CA) based Wi-Fi is briefly compared. Finally, an
attempt is made to implement these proposed LTEWi- Fi models in smart grid
technology.Comment: submitted in 2018 IEEE PES T&
An Adaptive Algorithm to Optimize the Dynamics of IEEE 802.15.4 Networks
Presentado en ICST 2013IEEE 802.15.4 standard is becoming one of the most popular technologies for the deployment of low rate Wireless Personal Area Networks with strong power constraints. In order to reduce the energy consumption, beacon-enabled networks with long network inactive periods can be employed. However, the duration of these inactivity periods, as some other configuration parameters, are conventionally set to default values and remain fixed during the whole network operation. This implies that if they are misconfigured the network will not adapt to changes in the conditions of the environment, particularly to the most determining one, i.e. the traffic load. This paper proposes a simple procedure for the dynamic adaptation of several key parameters of IEEE 802.15.4 networks. Under this procedure, the 802.15.4 parameters are modified as a function of the existing traffic conditions.Spanish National Project No.TEC2009-13763-C02-01
CSMA/RN: A universal protocol for gigabit networks
Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined
On the Impact of Wireless Jamming on the Distributed Secondary Microgrid Control
The secondary control in direct current microgrids (MGs) is used to restore
the voltage deviations caused by the primary droop control, where the latter is
implemented locally in each distributed generator and reacts to load
variations. Numerous recent works propose to implement the secondary control in
a distributed fashion, relying on a communication system to achieve consensus
among MG units. This paper shows that, if the system is not designed to cope
with adversary communication impairments, then a malicious attacker can apply a
simple jamming of a few units of the MG and thus compromise the secondary MG
control. Compared to other denial-of-service attacks that are oriented against
the tertiary control, such as economic dispatch, the attack on the secondary
control presented here can be more severe, as it disrupts the basic
functionality of the MG
Extremely high data-rate, reliable network systems research
Significant progress was made over the year in the four focus areas of this research group: gigabit protocols, extensions of metropolitan protocols, parallel protocols, and distributed simulations. Two activities, a network management tool and the Carrier Sensed Multiple Access Collision Detection (CSMA/CD) protocol, have developed to the point that a patent is being applied for in the next year; a tool set for distributed simulation using the language SIMSCRIPT also has commercial potential and is to be further refined. The year's results for each of these areas are summarized and next year's activities are described
- …