584 research outputs found

    An efficient scalable scheduling mac protocol for underwater sensor networks

    Get PDF
    Underwater Sensor Networks (UWSNs) utilise acoustic waves with comparatively lower loss and longer range than those of electromagnetic waves. However, energy remains a challenging issue in addition to long latency, high bit error rate, and limited bandwidth. Thus, collision and retransmission should be efficiently handled at Medium Access Control (MAC) layer in order to reduce the energy cost and also to improve the throughput and fairness across the network. In this paper, we propose a new reservation-based distributed MAC protocol called ED-MAC, which employs a duty cycle mechanism to address the spatial-temporal uncertainty and the hidden node problem to effectively avoid collisions and retransmissions. ED-MAC is a conflict-free protocol, where each sensor schedules itself independently using local information. Hence, ED-MAC can guarantee conflict-free transmissions and receptions of data packets. Compared with other conflict-free MAC protocols, ED-MAC is distributed and more reliable, i.e., it schedules according to the priority of sensor nodes which based on their depth in the network. We then evaluate design choices and protocol performance through extensive simulation to study the load effects and network scalability in each protocol. The results show that ED-MAC outperforms the contention-based MAC protocols and achieves a significant improvement in terms of successful delivery ratio, throughput, energy consumption, and fairness under varying offered traffic and number of nodes

    Resource Allocation in Ad Hoc Networks

    No full text
    Unlike the centralized network, the ad hoc network does not have any central administrations and energy is constrained, e.g. battery, so the resource allocation plays a very important role in efficiently managing the limited energy in ad hoc networks. This thesis focuses on the resource allocation in ad hoc networks and aims to develop novel techniques that will improve the network performance from different network layers, such as the physical layer, Medium Access Control (MAC) layer and network layer. This thesis examines the energy utilization in High Speed Downlink Packet Access (HSDPA) systems at the physical layer. Two resource allocation techniques, known as channel adaptive HSDPA and two-group HSDPA, are developed to improve the performance of an ad hoc radio system through reducing the residual energy, which in turn, should improve the data rate in HSDPA systems. The channel adaptive HSDPA removes the constraint on the number of channels used for transmissions. The two-group allocation minimizes the residual energy in HSDPA systems and therefore enhances the physical data rates in transmissions due to adaptive modulations. These proposed approaches provide better data rate than rates achieved with the current HSDPA type of algorithm. By considering both physical transmission power and data rates for defining the cost function of the routing scheme, an energy-aware routing scheme is proposed in order to find the routing path with the least energy consumption. By focusing on the routing paths with low energy consumption, computational complexity is significantly reduced. The data rate enhancement achieved by two-group resource allocation further reduces the required amount of energy per bit for each path. With a novel load balancing technique, the information bits can be allocated to each path in such that a way the overall amount of energy consumed is minimized. After loading bits to multiple routing paths, an end-to-end delay minimization solution along a routing path is developed through studying MAC distributed coordination function (DCF) service time. Furthermore, the overhead effect and the related throughput reduction are studied. In order to enhance the network throughput at the MAC layer, two MAC DCF-based adaptive payload allocation approaches are developed through introducing Lagrange optimization and studying equal data transmission period

    TDMA Slot Reservation in Cluster-Based VANETs

    Get PDF
    Vehicular Ad Hoc Networks (VANETs) are a form of Mobile Ad Hoc Networks (MANETs) in which vehicles on the road form the nodes of the network. VANETs provide several services to enhance the safety and comfort of drivers and passengers. These services can be obtained by the wireless exchange of information among the vehicles driving on the road. In particular, the transmission of two different types of messages, safety/update and non-safety messages. The transmission of safety/update message aims to inform the nearby vehicles about the sender\u27s current status and/or a detected dangerous situation. This type of transmission is designed to help in accident and danger avoidance. Moreover, it requires high message generated rate and high reliability. On the other hand, the transmission of non-safety message aims to increase the comfort on vehicles by supporting several non-safety services, from notifications of traffic conditions to file sharing. Unfortunately, the transmission of non-safety message has less priority than safety messages, which may cause shutting down the comfort services. The goal of this dissertation is to design a MAC protocol in order to provide the ability of the transmission of non-safety message with little impact on the reliability of transmitting safety message even if the traffic and communication densities are high. VANET is a highly dynamic network. With lack of specialized hardware for infrastructure and the mobility to support network stability and channel utilization, acluster-based MAC protocol is needed to solve these overcomes. This dissertation makes the following contributions: 1. A multi-channel cluster-based TDMA MAC protocol to coordinate intracluster communications (TC-MAC) 2. A CH election and cluster formation algorithm based on the traffic flow and a cluster maintenance algorithm that benefits from our cluster formation algorithm 3. A multi-channel cluster-based CDNIA/TDMA hybrid MAC protocol to coordinate inter-cluster communications I will show that TC-MAC provides better performance than the current WAVE standard in terms of safety/update message reliability and non-safety message delivery. Additionally, I will show that my clustering and cluster maintenance protocol provides more stable clusters, which will reduce the overhead of clusterhead election and re-clustering and leads to an efficient hierarchical network topology

    Analysis of MAC Strategies for Underwater Acoustic Networks

    Get PDF
    En esta tesis presentamos los protocolos MAC diseñados para redes acústicas subacuáticas, clasificándolos en amplias categorías, proporcionando técnicas de medición de rendimiento y análisis comparativo para seleccionar el mejor algoritmo MAC para aplicaciones específicas. Floor Acquisition Multiple Access (FAMA) es un protocolo MAC que se propuso para redes acústicas submarinas como medio para resolver los problemas de terminales ocultos y expuestos. Una versión modificada, Slotted FAMA, tenía como objetivo proporcionar ahorros de energía mediante el uso de ranuras de tiempo, eliminando así la necesidad de paquetes de control excesivamente largos en FAMA. Sin embargo, se ha observado que, debido al alto retraso de propagación en estas redes, el coste de perder un ACK es muy alto y tiene un impacto significativo en el rendimiento. Los mecanismos MultiACK y EarlyACK han sido analizados para el protocolo MACA, para mejorar su eficiencia. El mecanismo MultiACK aumenta la probabilidad de recibir al menos un paquete ACK al responder con un tren de paquetes ACK, mientras que el mecanismo EarlyACK evita la repetición de todo el ciclo de contención y transmisión de datos RTS / CTS enviando un ACK temprano. En esta investigación se presenta un análisis matemático de las dos variantes, los mecanismos MultiACK y EarlyACK, en Slotted FAMA. La investigación incluye las expresiones analíticas modificadas así como los resultados numéricos. Las simulaciones se llevaron a cabo utilizando ns-3. Los resultados han sido probados y validados utilizando Excel y MATLAB. La evaluación del rendimiento de S-FAMA con dos variantes mostró un factor de mejora del 65,05% en la probabilidad de recibir un ACK correctamente utilizando el mecanismo MultiACK y del 60,58% en la prevención de la repetición del ciclo completo, con EarlyACK. El impacto de este factor de mejora en el retardo, el tamaño del paquete de datos y el rendimiento también se analiza. La energía de transmisión desperdiciada y consumida en los mecanismos MultiACK y EarlyACK se analizan y comparan con S-FAMA. El rendimiento se ha evaluado, alcanzando una mejora en ambos casos, en comparación con S-FAMA. Estos mecanismos tendrán una utilidad práctica en caso de pérdida de ACK, al ahorrar energía y tiempo en períodos críticos. Fecha de lectura de Tesis Doctoral: 28 septiembre 2018.Esta tesis presenta una investigación sobre los protocolos MAC utilizados en la comunicación subacuática para explorar el mundo submarino. Los protocolos MAC ayudan en el acceso al medio compartido y la recopilación de datos de los océanos, para monitorizar el clima y la contaminación, la prevención de catástrofes, la navegación asistida, la vigilancia estratégica y la exploración de los recursos minerales. Esta investigación beneficiará a sectores como las industrias militares, de petróleo y gas, pesquerías, compañías de instrumentación subacuática, organismos de investigación, etc. El protocolo MAC afecta la vida útil de las redes inalámbricas de sensores. La eficiencia energética de las redes acústicas submarinas se ve gravemente afectada por las propiedades típicas de la propagación de las ondas acústicas. Los largos retrasos de propagación y las colisiones de paquetes de datos dificultan la transmisión de los paquetes de datos, que contienen información útil para que los usuarios realicen tareas de supervisión colectivas. El objetivo de este estudio es proponer nuevos mecanismos para protocolos MAC diseñados para funcionar en redes acústicas submarinas, con el propósito de mejorar su rendimiento. Para alcanzar ese objetivo es necesario realizar un análisis comparativo de los protocolos existentes. Lo que además sienta un procedimiento metodológicamente correcto para realizar esa comparación. Como la comunicación subacuática depende de ondas acústicas, en el diseño de los protocolos de MAC submarinos surgen varios desafíos como latencia prolongada, ancho de banda limitado, largas demoras en la propagación, grandes tasas de error de bit, pérdidas momentáneas en las conexiones, severo efecto multicamino y desvanecimientos. Los protocolos MAC terrestres, si se implementan directamente, funcionarán de manera ineficiente

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research

    RLT Code Based Handshake-Free Reliable MAC Protocol for Underwater Sensor Networks

    Get PDF
    The characteristics of underwater acoustic channels such as long propagation delay and low bit rate cause the medium access control (MAC) protocols designed for radio channels to either be inapplicable or have low efficiency for underwater sensor networks (UWSNs). Meanwhile, due to high bit error, conventional end-to-end reliable transfer solutions bring about too many retransmissions and are inefficient in UWSN. In this paper, we present a recursive LT (RLT) code. With small degree distribution and recursive encoding, RLT achieves reliable transmission hop-by-hop while reducing the complexity of encoding and decoding in UWSN. We further propose an RLT code based handshake-free (RCHF) reliable MAC protocol. In RCHF protocol, each node maintains a neighbor table including the field of state, and packages are forwarded according to the state of a receiver, which can avoid collisions of sending-receiving and overhearing. The transmission-avoidance time in RCHF decreases data-ACK collision dramatically. Without RTS/CTS handshaking, the RCHF protocol improves channel utilization while achieving reliable transmission. Simulation results show that, compared with the existing reliable data transport approaches for underwater networks, RCHF can improve network throughput while decreasing end-to-end overhead

    Analysis and evaluation of decentralized multiaccess Mac for ad-hoc networks

    Get PDF
    In mobile ad-hoc radio networks, terminals are mobile and heterogeneous, the architecture of the network is continuously changing, communication links are packet oriented and radio resources are scarce. Therefore, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency and, when needed, to guarantee QoS. However, due to these network harsh conditions, decentralized Medium Access Control (MAC) protocols designed specifically for ad hoc networks are scarce. In this paper we present a novel decentralized multiaccess MAC protocol for Ad Hoc networks. This MAC protocol is an hybrid CDMATDMA in which a cross layer approach has been followed in order to maximize network throughput. A theoretical analysis of the system is presented ending up with closed expressions for the throughput and delay of the network and some simulations are presented to evaluate the performance of the system.Postprint (published version
    corecore