96 research outputs found

    Framework for Random Power Allocation of Wireless Sensor Networks in Fading Channels

    Get PDF
    In naturally deaf wireless sensor networks or generally when there is no feedback channel, the fixed-level transmit power of all nodes is the conventional and practical power allocation method. Using random power allocation for the broadcasting nodes has been recently proposed to overcome the limitations and problems of the fixed power allocation. However, the previous work discussed only the performance analysis when uniform power allocation is used for quasi-static channels. This paper gives a general framework to evaluate the performance (in terms of outage and average transmit power) of any truncated probability density function of the random allocated power. Furthermore, dynamic Rayleigh fading channel is considered during the performance analysis which gives more realistic results that the AWGN channels assumed in the previous work. The main objective of this paper is to evaluate the communication performance when general random power allocation is used. Furthermore, the truncated inverse exponential probability distribution of the random power allocation is proposed and compared with the fixed and the uniform power allocations. The performance analysis for the proposed schemes are given mathematically and evaluated via intensive simulations.© 2012 by authors and Scientific Research Publishing Inc. This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.fi=vertaisarvioitu|en=peerReviewed

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Distributed convolutional-coded differential space-time block coding for cooperative communications

    No full text
    A low complexity distributed coding scheme is proposed for communications over Rayleigh fading channels. Convolutional Coding (CC) assisted Differential Phase-Shift Keying (DPSK) modulation is employed at the source node for conveying the source signals to two relay nodes as well as to the destination node during the first transmission period. Iterative detection exchanging extrinsic information between the DPSK demapper and CC decoder is carried out at each relay node in order to recover the source signals. Then, the CC-encoded bits are re-encoded by the two relays to generate Differential Space-Time Block Coding (DSTBC) symbols for transmission to the destination node during the second transmission period. At the destination node, iterative decoding exchanging extrinsic information is invoked between the DPSK demapper and the concatenated CC-DSTBC decoder, where the later is viewed as a single amalgamated decoder. The relay and destination nodes do not have to estimate the channel’s fading coefficients due to the employment of DPSK and DSTBC schemes. Our design requires only two decoding iterations between the DPSK and CC decoders at each relay in order to further reduce the complexity of the relay nodes. Our distributed coding scheme assisted by two low-complexity relay nodes outperforms the non-cooperative benchmarker scheme by about 8 dBs, when aiming for a bit error ratio of 10-5

    Analysis of MAC Strategies for Underwater Acoustic Networks

    Get PDF
    En esta tesis presentamos los protocolos MAC diseñados para redes acústicas subacuáticas, clasificándolos en amplias categorías, proporcionando técnicas de medición de rendimiento y análisis comparativo para seleccionar el mejor algoritmo MAC para aplicaciones específicas. Floor Acquisition Multiple Access (FAMA) es un protocolo MAC que se propuso para redes acústicas submarinas como medio para resolver los problemas de terminales ocultos y expuestos. Una versión modificada, Slotted FAMA, tenía como objetivo proporcionar ahorros de energía mediante el uso de ranuras de tiempo, eliminando así la necesidad de paquetes de control excesivamente largos en FAMA. Sin embargo, se ha observado que, debido al alto retraso de propagación en estas redes, el coste de perder un ACK es muy alto y tiene un impacto significativo en el rendimiento. Los mecanismos MultiACK y EarlyACK han sido analizados para el protocolo MACA, para mejorar su eficiencia. El mecanismo MultiACK aumenta la probabilidad de recibir al menos un paquete ACK al responder con un tren de paquetes ACK, mientras que el mecanismo EarlyACK evita la repetición de todo el ciclo de contención y transmisión de datos RTS / CTS enviando un ACK temprano. En esta investigación se presenta un análisis matemático de las dos variantes, los mecanismos MultiACK y EarlyACK, en Slotted FAMA. La investigación incluye las expresiones analíticas modificadas así como los resultados numéricos. Las simulaciones se llevaron a cabo utilizando ns-3. Los resultados han sido probados y validados utilizando Excel y MATLAB. La evaluación del rendimiento de S-FAMA con dos variantes mostró un factor de mejora del 65,05% en la probabilidad de recibir un ACK correctamente utilizando el mecanismo MultiACK y del 60,58% en la prevención de la repetición del ciclo completo, con EarlyACK. El impacto de este factor de mejora en el retardo, el tamaño del paquete de datos y el rendimiento también se analiza. La energía de transmisión desperdiciada y consumida en los mecanismos MultiACK y EarlyACK se analizan y comparan con S-FAMA. El rendimiento se ha evaluado, alcanzando una mejora en ambos casos, en comparación con S-FAMA. Estos mecanismos tendrán una utilidad práctica en caso de pérdida de ACK, al ahorrar energía y tiempo en períodos críticos. Fecha de lectura de Tesis Doctoral: 28 septiembre 2018.Esta tesis presenta una investigación sobre los protocolos MAC utilizados en la comunicación subacuática para explorar el mundo submarino. Los protocolos MAC ayudan en el acceso al medio compartido y la recopilación de datos de los océanos, para monitorizar el clima y la contaminación, la prevención de catástrofes, la navegación asistida, la vigilancia estratégica y la exploración de los recursos minerales. Esta investigación beneficiará a sectores como las industrias militares, de petróleo y gas, pesquerías, compañías de instrumentación subacuática, organismos de investigación, etc. El protocolo MAC afecta la vida útil de las redes inalámbricas de sensores. La eficiencia energética de las redes acústicas submarinas se ve gravemente afectada por las propiedades típicas de la propagación de las ondas acústicas. Los largos retrasos de propagación y las colisiones de paquetes de datos dificultan la transmisión de los paquetes de datos, que contienen información útil para que los usuarios realicen tareas de supervisión colectivas. El objetivo de este estudio es proponer nuevos mecanismos para protocolos MAC diseñados para funcionar en redes acústicas submarinas, con el propósito de mejorar su rendimiento. Para alcanzar ese objetivo es necesario realizar un análisis comparativo de los protocolos existentes. Lo que además sienta un procedimiento metodológicamente correcto para realizar esa comparación. Como la comunicación subacuática depende de ondas acústicas, en el diseño de los protocolos de MAC submarinos surgen varios desafíos como latencia prolongada, ancho de banda limitado, largas demoras en la propagación, grandes tasas de error de bit, pérdidas momentáneas en las conexiones, severo efecto multicamino y desvanecimientos. Los protocolos MAC terrestres, si se implementan directamente, funcionarán de manera ineficiente

    Performance of a Busy-Tone Approach on 802.11 Wireless Network

    Get PDF
    The big evolution of modem applications in the wireless networks domain as the wireless videos remote access, big files transfer, streaming and downloading high definition videos etc, has led to using the mmWave technology (60 GHz for example) that represents an important solution for the se applications because of the advantages presented by this frequency band such as the high data rate transmission up to multi gigabits, also the large bandwidth that goes up to 7 GHz. The use of the mm Wave technology requires a MAC protocol which ensures the channel sharing between users in a multi-node network, with directional antennas that increase spatial reuse and cover a wider area compared to the omnidirecti on al antennas. Many access method approaches were used in order to resolve these problems, for instance, the methods that use a signaling channel, then methods that exploit directional antennas with directional frames, and those using beacons and many others .... In our project, we worked on the adaptation of the 'Busy - Tone' method using the 802.11 ad protocol with directional antennas in addition to a coordination between 2.4 GHz and 60 GHz. This method offers a big solution to resolve the collisions of data and control packets that affect and reduce the network capacity and lead to data loss. Simulation results showed the efficiency of this model by reducing collisions caused by hidden terminais, therefore, enhancing the performance of the network in terms oftransmission delay, retransmission attempts and throughput. L'évolution des applications modernes dans le domaine des réseaux sans fils tel que 1 'accès à distance des vidéos sans fils, le transfert des gros fichiers, flux des vidéos à haute définition etc .... nécessite l'utilisation de la bande 60 GHz qui présente une solution très importante pour ces applications grâce aux avantages que présente cette bande tel que le taux de transmission des données qui atteint quelques Gigabits, et aussi grâce à la bande passante du canal qui est environ 7 GHz. L'utilisation de cette bande de fréquence nécessite un protocole MAC qui assure le partage de canal entre les utilisateurs dans un réseau multi-noeuds. Ce protocole doit tenir compte les problèmes et les défis qui se produisent grâce à l'utilisation de la bande 60 GHz, tel que les problèmes des terminales cachées et exposées Dans ce projet on a proposé une méthode qui se base sur l'adaptation de protocole 802.llad avec la méthode 'Busy-Tone 'parce qu'elle représente la solution la plus efficace pour résoudre les problèmes des collisions des paquets de donnés et les paquets de contrôle qui sont causés normalement par la présence des terminales cachées et exposées. L'approche proposée consiste aussi à utiliser les antennes directives qm augmentent la réutilisation spatiale et couvre une portée plus grande par rapport à l'antenne omnidirectionnelle. Ces antennes ont été utilisées à côté des antennes omnidirectionnelles avec une coordination entre les deux, alors les antennes omnidirectionnelles sont utilisées pour envoyer les signaux 'Busy-Tone ' tandis que les antennes directives sont utilisées pour envoyer les paquets de données. Les résultats de la simulation ont montré une amélioration au niveau de la performance du réseau en terme du débit, du délai et les essaies de retransmission en comparant avec le standard 801.11ad. La mise en oeuvre est effectuée dans le logiciel Matlab/Simulink. Les paramètres utilisés dans les simulations sont des valeurs typiques des centrales existantes ou prises dans la littérature. La conformité avec la littérature est réalisée grâce à une validation croisée progressive de chaque sous-ensemble et du système globa

    Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey

    Get PDF
    Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work

    Layer 2 Path Selection Protocol for Wireless Mesh Networks with Smart Antennas

    Get PDF
    In this thesis the possibilities of smart antenna systems in wireless mesh networks are examined. With respect to the individual smart antenna tradeoffs, a routing protocol (Modified HWMP, MHWMP) for IEEE 802.11s mesh networks is presented, that exploits the full range of benefits provided by smart antennas: MHWMP actively switches between the PHY-layer transmission/reception modes (multiplexing, beamforming and diversity) according to the wireless channel conditions. Spatial multiplexing and beamforming are used for unicast data transmissions, while antenna diversity is employed for efficient broadcasts. To adapt to the directional channel environment and to take full benefit of the PHY capabilities, a respective MAC scheme is employed. The presented protocol is tested in extensive simulation and the results are examined.:1 Introduction 2 Wireless Mesh Networks 3 IEEE 802.11s 4 Smart Antenna Concepts 5 State of the Art: Wireless Mesh Networks with Smart Antennas 6 New Concepts 7 System Model 8 Results and Discussion 9 Conclusion and Future Wor

    Dish networks: Protocols, strategies, analysis, and implementation

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Journal of Telecommunications and Information Technology, 2006, nr 2

    Get PDF
    kwartalni
    corecore