331 research outputs found

    The Design of Medium Access Control (MAC) Protocols for Energy Efficient and QoS Provision in Wireless Sensor Networks

    Get PDF
    This thesis work focuses on innovative design of media access control (MAC) protocols in wireless sensor networks (WNSs). The characteristics of the WSN inquire that the network service design considers both energy efficiency and the associated application requirement. However, most existing protocols address only the issue of energy efficiency. In this thesis, a MAC protocol has been proposed (referred to as Q-MAC) that not only minimized the energy consumption in multi-hop WSNs, but also provides Quality of Service (QoS) by differentiating network services based on priority levels prescribed by different applications. The priority levels reflect the state of system resources including residual energy and queue occupancies. Q-MAC contains both intra- and inter- node arbitration mechanisms. The intra-node packet scheduling employs a multiple queuing architectures, and applies a scheduling scheme consisting of packet classification and weighted arbitration. We introduce the Power Conservation MACAW (PC-MACAW), a power-aware scheduling mechanism which, together with the Loosely Prioritized Random Access (LPRA) algorithm, govern the inter-node scheduling. Performance evaluation are conducted between Q-MAC and S-MAC with respect to two performance metrics: energy consumption and average latency. Simulation results indicate Q-MAC achieves comparable performance to that of S-MAC in non-prioritized traffic scenarios. When packets with different priorities are introduced, Q-MAC yields noticeable average latency differentiations between the classes of service, while preserving the same degree of energy consumption as that of S-MAC. Since the high density nature of WSN may introduce heavy traffic load and thus consume large amount of energy for communication, another MAC protocol, referred to as the Deployment-oriented MAC (D-MAC)has been further proposed. D-MAC minimalizes both sensing and communication redundancy by putting majority of redundant nodes into the sleep state. The idea is to establish a sensing and communication backbone covering the whole sensing field with the least sensing and communication redundancy. In specific, we use equal-size rectangular cells to partition the sensing field and chose the size of each cell in a way such that regardless of the actual location within the cell, a node can always sense the whole cell and communicate with all the nodes in neighboring cells. Once the sensing field has been partitioned using these cells, a localized Location-aware Selection Algorithm (LSA) is carried out to pick up only one node within each cell to be active for a fixed amount of period. This selection is energy-oriented, only nodes with a maximum energy will be on and the rest of nodes will be put into the sleep state once the selection process is over. To balance the energy consumption, the selection algorithm is periodically conducted until all the nodes are out of power. Simulation results indicated that D-MAC saves around 80% energy compared to that of S-MAC and Q-MAC, while maintaining 99% coverage. D-MAC is also superior to S-MAC and Q-MAC in terms of average latency. However, the use of GPS in D-MAC in identifying the nodes within the same cell, would cause extra cost and complexity for the design of sensor nodes

    Hybrid token-CDMA MAC protocol for wireless networks.

    Get PDF
    Thesis (Ph.D.)-University of KwaZulu-Natal, Durban, 2009.Ad hoc networks are commonly known to implement IEEE 802.11 standard as their medium access control (MAC) protocol. It is well known that token passing MAC schemes outperform carrier-sense-multiple-access (CSMA) schemes, therefore, token passing MAC protocols have gained popularity in recent years. In recent years, the research extends the concept of token passing ' scheme to wireless settings since they have the potential of achieving higher channel utilization than CSMA type schemes. In this thesis, a hybrid Token-CDMA MAC protocol that is based on a token passing scheme with the incorporation of code division multiple access (CDMA) is introduced. Using a dynamic code distribution algorithm and a modified leaky-bucket policing system, the hybrid protocol is able to provide both Quality of Service (QoS) and high network resource utilization, while ensuring the stability of a network. This thesis begins with the introduction of a new MAC protocol based on a token-passing strategy. The input traffic model used in the simulation is a two-state Markov Modulated Poisson Process (MMPP). The data rate QoS is enforced by implementing a modified leaky bucket mechanism in the proposed MAC scheme. The simulation also takes into account channel link errors caused by the wireless link by implementing a multi-layered Gilbert-Elliot model. The performance of the proposed MAC scheme is examined by simulation, and compared to the performance of other MAC protocols published in the literature. Simulation results demonstrate that the proposed hybrid MAC scheme is effective in decreasing packet delay and significantly shortens the length of the queue. The thesis continues with the discussion of the analytical model for the hybrid Token CDMA protocol. The proposed MAC scheme is analytically modelled as a multiserver multiqueue (MSMQ) system with a gated service discipline. The analytical model is categorized into three sections viz. the vacation model, the input model and the buffer model. The throughput and delay performance are then computed and shown to closely match the simulation results. Lastly, cross-layer optimization between the physical (PHY) and MAC layers for the hybrid token-CDMA scheme is discussed. The proposed joint PHY -MAC approach is based on the interaction between the two layers in order to enable the stations to dynamically adjust the transmission parameters resulting in reduced mutual interference and optimum system performance

    Final report on the evaluation of RRM/CRRM algorithms

    Get PDF
    Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin

    A Token Based Code Division Multiple Access Mac Protocol For Wireless Ad Hoc Networks

    Get PDF
    Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2009Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2009Ad Hoc ağlarında en mühim konulardan biri MAC protokol tasarımıdır. Bilindiği gibi, MAC protokollerin başlıca fonksiyonu, olabilecek çarpışmaları mümkün olduğunca azaltmak ve uygun kanal kullanımını sağlamaktır. Ayrıca MAC protokoller adil olmalı ve düğümlerin önceliklerine göre kanal erişim sırasını ayarlamalıdır. Gerçek zaman iletişimlerini sağlamak için en uygun olan protokoller jeton yöntemine dayanmaktadır. Bu tip protokollerde paket gecikmeleri deterministiktir ve olabilecek en büyük paket gecikmeleri tahmin edilebilmektedir. Bu çalışmada ileri sürülen MAC protokol de bir çok MAC protokol gibi jeton yöntemine dayanmaktadır, fakat bu çalışmada jeton CDMA kodlarını ağda paylaştırmak için kullanılmaktadır. CDMA özelliği protokole, ağda aynı anda birden çok yayın yapabilmesini sağlamaktadır. Önerilen protokol literatürde adı geçen protokolle karşılaştırılmıştır ve simulasyon sonuçları, önerilen protokolün paket gecikmelerini azaltmakta ve kanal kullanımını artırmakta olduğunu göstermiştir.MAC protocols are very important issues in wireless ad hoc networks. As known, its primary function is to minimize the collisions and achieve reasonable channel utilization. Also MAC protocols must support fairness and prioritized access to the medium. Token based MAC schemes are more suitable for real time communications due to the fact that the packet delay is highly deterministic and upper bound of latency is predictable. The proposed work in this thesis is based on a token passing scheme as many studies have proposed till now, but the difference is that this MAC scheme is based on a token passing scheme with the incorporation of a Code Division Multiple Access (CDMA) unlike others. The protocol is able to support multiple, simultaneous transmissions with it is unique CDMA feature. Nodes are equipped with only one transceiver. The performance of proposed MAC protocol is compared with MAC protocols that have appeared in the literature by simulations. Simulation results show that proposed MAC scheme is effective in decreasing the packet delay and increasing the channel utilization.Yüksek LisansM.Sc

    Energy-efficient diversity combining for different access schemes in a multi-path dispersive channel

    Get PDF
    Dissertação para obtenção do Grau de Doutor em Engenharia Electrotécnica e ComputadoresThe forthcoming generation of mobile communications, 5G, will settle a new standard for a larger bandwidth and better Quality of Service (QoS). With the exploding growth rate of user generated data, wireless standards must cope with this growth and at the same time be energy efficient to avoid depleting the batteries of wireless devices. Besides these issues, in a broadband wireless setting QoS can be severely affected from a multipath dispersive channel and therefore be energy demanding. Cross-layered architectures are a good choice to enhance the overall performance of a wireless system. Examples of cross-layered Physical (PHY) - Medium Access Control (MAC) architectures are type-II Diversity Combining (DC) Hybrid-ARQ (H-ARQ) and Multi-user Detection (MUD) schemes. Cross-layered type-II DC H-ARQ schemes reuse failed packet transmissions to enhance data reception on posterior retransmissions; MUD schemes reuse data information from previously collided packets on posterior retransmissions to enhance data reception. For a multipath dispersive channel, a PHY layer analytical model is proposed for Single-Carrier with Frequency Domain Equalization (SC-FDE) that supports DC H-ARQ and MUD. Based on this analytical model, three PHY-MAC protocols are proposed. A crosslayered Time Division Multiple Access (TDMA) scheme that uses DC H-ARQ is modeled and its performance is studied in this document; the performance analysis shows that the scheme performs better with DC and achieves a better energy efficiency at the cost of a higher delay. A novel cross-layered prefix-assisted Direct-Sequence Code Division Multiple Access (DS-CDMA) scheme is proposed and modeled in this document, it uses principles of DC and MUD. This protocol performs better by means of additional retransmissions, achieving better energy efficiency, at the cost of higher redundancy from a code spreading gain. Finally, a novel cross-layered protocol H-ARQ Network Division Multiple Access (H-NDMA) is proposed and modeled, where the combination of DC H-ARQ and MUD is used with the intent of maximizing the system capacity with a lower delay; system results show that the proposed scheme achieves better energy efficiency and a better performance at the cost of a higher number of retransmissions. A comparison of the three cross-layered protocols is made, using the PHY analytical model, under normalized conditions using the same amount of maximum redundancy. Results show that the H-NDMA protocol, in general, obtains the best results, achieving a good performance and a good energy efficiency for a high channel load and low Signal-to-Noise Ratio (SNR). TDMA with DC H-ARQ achieves the best energy efficiency, although presenting the worst delay. Prefix-assisted DS-CDMA in the other hand shows good delay results but presents the worst throughput and energy efficiency

    Architecting a One-to-many Traffic-Aware and Secure Millimeter-Wave Wireless Network-in-Package Interconnect for Multichip Systems

    Get PDF
    With the aggressive scaling of device geometries, the yield of complex Multi Core Single Chip(MCSC) systems with many cores will decrease due to the higher probability of manufacturing defects especially, in dies with a large area. Disintegration of large System-on-Chips(SoCs) into smaller chips called chiplets has shown to improve the yield and cost of complex systems. Therefore, platform-based computing modules such as embedded systems and micro-servers have already adopted Multi Core Multi Chip (MCMC) architectures overMCSC architectures. Due to the scaling of memory intensive parallel applications in such systems, data is more likely to be shared among various cores residing in different chips resulting in a significant increase in chip-to-chip traffic, especially one-to-many traffic. This one-to-many traffic is originated mainly to maintain cache-coherence between many cores residing in multiple chips. Besides, one-to-many traffics are also exploited by many parallel programming models, system-level synchronization mechanisms, and control signals. How-ever, state-of-the-art Network-on-Chip (NoC)-based wired interconnection architectures do not provide enough support as they handle such one-to-many traffic as multiple unicast trafficusing a multi-hop MCMC communication fabric. As a result, even a small portion of such one-to-many traffic can significantly reduce system performance as traditional NoC-basedinterconnect cannot mask the high latency and energy consumption caused by chip-to-chipwired I/Os. Moreover, with the increase in memory intensive applications and scaling of MCMC systems, traditional NoC-based wired interconnects fail to provide a scalable inter-connection solution required to support the increased cache-coherence and synchronization generated one-to-many traffic in future MCMC-based High-Performance Computing (HPC) nodes. Therefore, these computation and memory intensive MCMC systems need an energy-efficient, low latency, and scalable one-to-many (broadcast/multicast) traffic-aware interconnection infrastructure to ensure high-performance. Research in recent years has shown that Wireless Network-in-Package (WiNiP) architectures with CMOS compatible Millimeter-Wave (mm-wave) transceivers can provide a scalable, low latency, and energy-efficient interconnect solution for on and off-chip communication. In this dissertation, a one-to-many traffic-aware WiNiP interconnection architecture with a starvation-free hybrid Medium Access Control (MAC), an asymmetric topology, and a novel flow control has been proposed. The different components of the proposed architecture are individually one-to-many traffic-aware and as a system, they collaborate with each other to provide required support for one-to-many traffic communication in a MCMC environment. It has been shown that such interconnection architecture can reduce energy consumption and average packet latency by 46.96% and 47.08% respectively for MCMC systems. Despite providing performance enhancements, wireless channel, being an unguided medium, is vulnerable to various security attacks such as jamming induced Denial-of-Service (DoS), eavesdropping, and spoofing. Further, to minimize the time-to-market and design costs, modern SoCs often use Third Party IPs (3PIPs) from untrusted organizations. An adversary either at the foundry or at the 3PIP design house can introduce a malicious circuitry, to jeopardize an SoC. Such malicious circuitry is known as a Hardware Trojan (HT). An HTplanted in the WiNiP from a vulnerable design or manufacturing process can compromise a Wireless Interface (WI) to enable illegitimate transmission through the infected WI resulting in a potential DoS attack for other WIs in the MCMC system. Moreover, HTs can be used for various other malicious purposes, including battery exhaustion, functionality subversion, and information leakage. This information when leaked to a malicious external attackercan reveals important information regarding the application suites running on the system, thereby compromising the user profile. To address persistent jamming-based DoS attack in WiNiP, in this dissertation, a secure WiNiP interconnection architecture for MCMC systems has been proposed that re-uses the one-to-many traffic-aware MAC and existing Design for Testability (DFT) hardware along with Machine Learning (ML) approach. Furthermore, a novel Simulated Annealing (SA)-based routing obfuscation mechanism was also proposed toprotect against an HT-assisted novel traffic analysis attack. Simulation results show that,the ML classifiers can achieve an accuracy of 99.87% for DoS attack detection while SA-basedrouting obfuscation could reduce application detection accuracy to only 15% for HT-assistedtraffic analysis attack and hence, secure the WiNiP fabric from age-old and emerging attacks

    Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey

    Full text link
    [EN] Vehicular ad hoc network (VANET) is an emerging and promising technology, which allows vehicles while moving on the road to communicate and share resources. These resources are aimed at improving traffic safety and providing comfort to drivers and passengers. The resources use applications that have to meet high reliability and delay constraints. However, to implement these applications, VANET relies on medium access control (MAC) protocol. Many approaches have been proposed in the literature using time division multiple access (TDMA) scheme to enhance the efficiency of MAC protocol. Nevertheless, this technique has encountered some challenges including access and merging collisions due to inefficient time slot allocation strategy and hidden terminal problem. Despite several attempts to study this class of protocol, issues such as channel access and time slot scheduling strategy have not been given much attention. In this paper, we have relatively examined the most prominent TDMA MAC protocols which were proposed in the literature from 2010 to 2018. These protocols were classified based on scheduling strategy and the technique adopted. Also, we have comparatively analyzed them based on different parameters and performance metrics used. Finally, some open issues are presented for future deployment.Tambawal, AB.; Noor, RM.; Salleh, R.; Chembe, C.; Anisi, MH.; Michael, O.; Lloret, J. (2019). Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey. Telecommunication Systems. 70(4):595-616. https://doi.org/10.1007/s11235-018-00542-8S59561670

    QoS Routing Solutions for Mobile Ad Hoc Network

    Get PDF
    corecore