391 research outputs found

    A control theoretic approach to achieve proportional fairness in 802.11e EDCA WLANs

    Get PDF
    This paper considers proportional fairness amongst ACs in an EDCA WLAN for provision of distinct QoS requirements and priority parameters. A detailed theoretical analysis is provided to derive the optimal station attempt probability which leads to a proportional fair allocation of station throughputs. The desirable fairness can be achieved using a centralised adaptive control approach. This approach is based on multivariable statespace control theory and uses the Linear Quadratic Integral (LQI) controller to periodically update CWmin till the optimal fair point of operation. Performance evaluation demonstrates that the control approach has high accuracy performance and fast convergence speed for general network scenarios. To our knowledge this might be the first time that a closed-loop control system is designed for EDCA WLANs to achieve proportional fairness

    Survey of Spectrum Sharing for Inter-Technology Coexistence

    Full text link
    Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and non-technical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e. (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions

    A Remote Capacity Utilization Estimator for WLANs

    Get PDF
    In WLANs, the capacity of a node is not fixed and can vary dramatically due to the shared nature of the medium under the IEEE 802.11 MAC mechanism. There are two main methods of capacity estimation in WLANs: Active methods based upon probing packets that consume the bandwidth of the channel and do not scale well. Passive methods based upon analyzing the transmitted packets that avoid the overhead of transmitting probe packets and perform with greater accuracy. Furthermore, passive methods can be implemented locally or remotely. Local passive methods require an additional dissemination mechanism in order to communicate the capacity information to other network nodes which adds complexity and can be unreliable under adverse network conditions. On the other hand, remote passive methods do not require a dissemination mechanism and so can be simpler to implement and also do not suffer from communication reliability issues. Many applications (e.g. ANDSF etc) can benefit from utilizing this capacity information. Therefore, in this thesis we propose a new remote passive Capacity Utilization estimator performed by neighbour nodes. However, there will be an error associated with the measurements owing to the differences in the wireless medium as observed by the different nodes’ location. The main undertaking of this thesis is to address this issue. An error model is developed to analyse the main sources of error and to determine their impact on the accuracy of the estimator. Arising from this model, a number of modifications are implemented to improve the accuracy of the estimator. The network simulator ns2 is used to investigate the performance of the estimator and the results from a range of different test scenarios indicate its feasibility and accuracy as a passive remote method. Finally, the estimator is deployed in a node saturation detection scheme where it is shown to outperform two other similar schemes based upon queue observation and probing with ping packets

    Weighted proportional fairness and pricing based resource allocation for uplink offloading using IP flow mobility

    Get PDF
    Mobile data offloading has been proposed as a solution for the network congestion problem that is continuously aggravating due to the increase in mobile data demand. However, the majority of the state-of-the-art is focused on the downlink offloading, while the change of mobile user habits, like mobile content creation and uploading, makes uplink offloading a rising issue. In this work we focus on the uplink offloading using IP Flow Mobility (IFOM). IFOM allows a LTE mobile User Equipment (UE) to maintain two concurrent data streams, one through LTE and the other through WiFi access technology, that presents uplink limitations due to the inherent fairness design of IEEE 802.11 DCF by employing the CSMA/CA scheme with a binary exponential backoff algorithm. In this paper, we propose a weighted proportionally fair bandwidth allocation algorithm for the data volume that is being offloaded through WiFi, in conjunction with a pricing-based rate allocation for the rest of the data volume needs of the UEs that are transmitted through the LTE uplink. We aim to improve the energy efficiency of the UEs and to increase the offloaded data volume under the concurrent use of access technologies that IFOM allows. In the weighted proportionally fair WiFi bandwidth allocation, we consider both the different upload data needs of the UEs, along with their LTE spectrum efficiency and propose an access mechanism that improves the use of WiFi access in uplink offloading. In the LTE part, we propose a two-stage pricing-based rate allocation under both linear and exponential pricing approaches, aiming to satisfy all offloading UEs regarding their LTE uplink access. We theoretically analyse the proposed algorithms and evaluate their performance through simulations. We compare their performance with the 802.11 DCF access scheme and with a state-of-the-art access algorithm under different number of offloading UEs and for both linear and exponential pricing-based rate allocation for the LTE uplink. Through the evaluation of energy efficiency, offloading capabilities and throughput performance, we provide an improved uplink access scheme for UEs that operate with IFOM for uplink offloading.Peer ReviewedPreprin

    MAC-layer approaches for security and performance enhancement in IEEE 802.11

    Get PDF
    Over the past few years, wireless networks are becoming increasingly popular. The dominant question facing the wireless network today is: how can the network meet the needs of various users and applications? Two basic and primary needs for users are efficiency and security. To deal with these two concerns, this dissertation investigates the two areas and proposes four MAC-level approaches for security and performance enhancement in IEEE 802.11.;In the first part, we propose three MAC-level approaches to improve the throughput performance in wireless LANs, i.e., the Freeze Counter scheme (FC), the Dynamically Adaptive Retransmission (DAR), and the Quick Acknowledgement (QA) scheme. The Freeze Counter scheme is an adaptive error recovery mechanism in 802.11, which can perform different actions according to the reasons for frame losses. Dynamically Adaptive Retransmission scheme is an enhanced feedback scheme in 802.11. We propose a Quick Acknowledgement (QA) scheme as a replacement for positive acknowledgement in IEEE 802.11. By using similar concepts as selective ACK and negative ACK, the proposed protocol solves the inefficiency problem of positive ACK in 802.11.;In the second part, we propose a lightweight statistical authentication protocol for wireless networks. With more and more applications on wireless networks, new concerns are raised when it comes to security issues. Authentication service particularly becomes one of the basic but necessary security measures for wireless applications. However, traditional authentication protocols for wired networks do not work well in a wireless environment due to unique characteristics. To meet this target, we propose a lightweight statistical authentication protocol for wireless networks, namely Shepherd. To solve the inherent out-of-sync problem with Shepherd protocol, we develop three synchronization schemes with their statistical methods. In Shepherd, the legitimacy of a mobile node is determined by continuously checking a series of random authentication bits where each bit in this stream is piggybacked by a packet. Such an authentication bit stream is generated by both mobile node and access point using the same random number generator under the same shared seed as a key. The complete evaluation and analysis of all proposed approaches have been discussed

    Medium access control protocol design for wireless communications and networks review

    Get PDF
    Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive number of antenna elements to improve both spectral efficiency and energy efficiency. On the other hand, the second research method (PD-NOMA) allows multiple non-orthogonal signals to share the same orthogonal resources by allocating different power level for each station. PD-NOMA has a better spectral efficiency over the orthogonal multiple access methods. A review of previous works regarding the MAC design for different wireless networks is classified based on different categories. The main contribution of this research work is to show the importance of the MAC design with added optimal functionalities to improve the spectral and energy efficiencies of the wireless networks
    • …
    corecore