1,377 research outputs found

    Survey of Spectrum Sharing for Inter-Technology Coexistence

    Full text link
    Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and non-technical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e. (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    Development of a Random Time-Frequency Access Protocol for M2M Communication

    Get PDF
    This thesis focuses on the design and development of the random time-frequency access protocol in Machine-to-Machine (M2M) communication systems and covers different aspects of the data collision problem in these systems. The randomisation algorithm, used to access channels in the frequency domain, represents the key factor that affects data collisions. This thesis presents a new randomisation algorithm for the channel selection process for M2M technologies. The new algorithm is based on a uniform randomisation distribution and is called the Uniform Randomisation Channel Selection Technique (URCST). This new channel selection algorithm improves system performance and provides a low probability of collision with minimum complexity, power consumption, and hardware resources. Also, URCST is a general randomisation technique which can be utilised by different M2M technologies. The analysis presented in this research confirms that using URCST improves system performance for different M2M technologies, such as Weightless-N and Sigfox, with a massive number of devices. The thesis also provides a rigorous and flexible mathematical model for the random time-frequency access protocol which can precisely describe the performance of different M2M technologies. This model covers various scenarios with multiple groups of devices that employ different transmission characteristics like the number of connected devices, the number of message copies, the number of channels, the payload size, and transmission time. In addition, new and robust simulation testbeds have been built and developed in this research to evaluate the performance of different M2M technologies that utilise the random time-frequency access protocol. These testbeds cover the channel histogram, the probability of collisions, and the mathematical model. The testbeds were designed to support the multiple message copies approach with various groups of devices that are connected to the same base station and employ different transmission characteristics. Utilising the newly developed channel selection algorithm, mathematical model, and testbeds, the research offers a detailed and thorough analysis of the performance of Weightless-N and Sigfox in terms of the message lost ratio (MLR) and power consumption. The analysis shows some useful insights into the performance of M2M systems. For instance, while using multiple message copies improves the system performance, it might degrade the reliability of the system as the number of devices increases beyond a specific limit. Therefore, increasing the number of message copies can be disadvantageous to M2M communication performance

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol

    Get PDF
    The ongoing advances in wireless networks have further expanded the boundaries to the new and challenging area of Wireless Sensor Networks (WSN). Unique properties of sensor nodes such as limited energy storage, constrained processing capabilities and the especially different environments they are usually deployed in have prompted the need of novel protocols in all the layers of the communication stack. A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. Therefore effective techniques in order to reduce the probability of collisions while contending for the medium can be established in a MAC protocol for it organizes the specific time slot a node can have access to the channel. The need for further improving the current applied MAC protocols for WSN in order to reduce the probability of collisions while being energy aware has motivated this research. Sensor MAC as the very first MAC protocol for WSN has been designed on top of the IEEE 802.11 MAC protocol along with some added features to meet the special requirements of a WSN. However the Back-Off scheme of Sensor MAC (S-MAC) is based on a fixed Contention Window (CW) size. This is known as a significant trouble spot in S-MAC in the sense that the delay produced during collisions and idle listening can be so critical to the limited battery lifetime of a sensor node. IEEE 802.11 MAC protocol follows a static approach for obtaining the back-off time and resets the CW to its default minimum upon just one successful transmission and doubles it each time it faces a collision. While the back-off algorithm of IEEE 802.11 suffers from unfairness for its faulty behaviour in both high and low traffic loads the back-off mechanism in S-MAC suffers from a fixed CW size. Reducing the undesired idle listening time caused by unnecessary long back-off times when traffic is low and also decreasing the probability of collisions in situations with high traffic load due to the fixed CW size in S-MAC have motivated our research. We have tried to come up with a dynamic back-off algorithm for SMAC that can extract the current traffic information of the network and engage them in estimating the contention window from which the back-off time is chosen. Our approach is a proactive algorithm to get the CW of the neighbouring nodes ready before contending for the medium. The performance of our algorithm has been measured in terms of average delay, average throughput, delivery ratio, and average energy efficiency. It is shown that our back-off scheme has reduced the delay by 47% and has decreased the energy consumption up to above 15% over the current SMAC implementation. The delivery ratio and throughput have been improved up to 44% and 28% respectively

    A Comprehensive Analysis of Literature Reported Mac and Phy Enhancements of Zigbee and its Alliances

    Get PDF
    Wireless communication is one of the most required technologies by the common man. The strength of this technology is rigorously progressing towards several novel directions in establishing personal wireless networks mounted over on low power consuming systems. The cutting-edge communication technologies like bluetooth, WIFI and ZigBee significantly play a prime role to cater the basic needs of any individual. ZigBee is one such evolutionary technology steadily getting its popularity in establishing personal wireless networks which is built on small and low-power digital radios. Zigbee defines the physical and MAC layers built on IEEE standard. This paper presents a comprehensive survey of literature reported MAC and PHY enhancements of ZigBee and its contemporary technologies with respect to performance, power consumption, scheduling, resource management and timing and address binding. The work also discusses on the areas of ZigBee MAC and PHY towards their design for specific applications

    Survey on wireless technology trade-offs for the industrial internet of things

    Get PDF
    Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity. Wireless connection of sensors and actuators in industrial environments not only enables wireless monitoring and actuation, it also enables coordination of production stages, connecting mobile robots and autonomous transport vehicles, as well as localization and tracking of assets. All these opportunities already inspired the development of many wireless technologies in an effort to fully enable Industry 4.0. However, different technologies significantly differ in performance and capabilities, none being capable of supporting all industrial use cases. When designing a network solution, one must be aware of the capabilities and the trade-offs that prospective technologies have. This paper evaluates the technologies potentially suitable for IWSAN solutions covering an entire industrial site with limited infrastructure cost and discusses their trade-offs in an effort to provide information for choosing the most suitable technology for the use case of interest. The comparative discussion presented in this paper aims to enable engineers to choose the most suitable wireless technology for their specific IWSAN deployment

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future
    corecore