438 research outputs found

    Capacity Analysis of IEEE 802.11ah WLANs for M2M Communications

    Full text link
    Focusing on the increasing market of the sensors and actuators networks, the IEEE 802.11ah Task Group is currently working on the standardization of a new amendment. This new amendment will operate at the sub-1GHz band, ensure transmission ranges up to 1 Km, data rates above 100 kbps and very low power operation. With IEEE 802.11ah, the WLANs will offer a solution for applications such as smart metering, plan automation, eHealth or surveillance. Moreover, thanks to a hierarchical signalling, the IEEE 802.11ah will be able to manage a higher number of stations (STAs) and improve the 802.11 Power Saving Mechanisms. In order to support a high number of STAs, two different signalling modes are proposed, TIM and Non-TIM Offset. In this paper we present a theoretical model to predict the maximum number of STAs supported by both modes depending on the traffic load and the data rate used. Moreover, the IEEE 802.11ah performance and energy consumption for both signalling modes and for different traffic patterns and data rates is evaluated. Results show that both modes achieve similar Packet Delivery Ratio values but the energy consumed with the TIM Offset is, in average, a 11.7% lower.Comment: Multiple Access Communications 201

    Energy-delay aware Restricted Access Window with novel retransmission for IEEE 802.11ah networks

    Get PDF
    Restricted Access Window (RAW) has been introduced to IEEE 802.11ah MAC layer to decrease collision probability. However, the inappropriate application of RAW duration for diverse groups of devices would increase uplink energy consumption, delay and lower down the data rate. In this paper, we study a RAW optimization problem with a novel retransmission scheme that utilizes the next empty slot for retransmission in the uplink. The problem is formulated based on overall energy efficiency and delay of each RAW by applying probability theory and Markov Chain. To jointly optimize energy efficiency and delay, an energy-delay aware window control algorithm is proposed to adapt RAW size by estimating the number of time slots and internal slot duration in one RAW for different groups. The optimal solution is derived by applying Gradient Descent approach. Simulation results show that our proposed algorithm improves up to 113.3% energy efficiency and reduces 53.4% delay compared to the existing RAW

    2nd Joint ERCIM eMobility and MobiSense Workshop

    Get PDF

    Modeling CCH Switch to SCH in IEEE 802.11p/WAVE Vehicular Networks

    Full text link
    © 2017 IEEE. Packet collision and packet delay are considered to be critical for safety applications in vehicular networks. This paper designs a new analytical model to evaluate the performance of channel switching for IEEE 802.11p/WAVE in vehicular networks. Under this model, it explicitly expresses the WAVE channel switching, and constructs contention window size and number of vehicles as packet collision probability and packet delay time function of variables. Finally, we evaluate accuracy of the designed model of collision caused by channel switching and transmission delay in vehicular networks. The results show that the model could analyzes perfectly packet collision which is caused by channel switching and packet delay in vehicular networks

    Energy-aware Restricted Access Window control with retransmission scheme for IEEE 802.11ah (Wi-Fi HaLow) based networks

    Get PDF
    Restricted Access Window (RAW) has been introduced to IEEE 802.11ah MAC layer to decrease collision probability. However, the inappropriate application of RAW for different groups of devices would increase uplink energy consumption and decrease data rate. In this paper, we study an energy efficient RAW optimization problem for IEEE 802.11ah based uplink communications. We first present a novel retransmission scheme that utilizes the next empty slot to retransmit for collided devices, and formulate the problem based on overall energy consumption and the data rate of each RAW by applying probability theory and Markov Chain. Then, we derive the energy efficiency of the uplink transmission. Last but not the least, an energy-aware window control algorithm to adapt the RAW size is proposed to optimize the energy efficiency by identifying the number of slots in each RAW for different group scales. Simulation results show that our proposed algorithm outperforms existing RAW on uplink energy efficiency and delivery ratio

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Delay and Reliability of Load-Based Listen-Before-Talk in LAA

    Full text link
    © 2013 IEEE. With the release of the 5 GHz unlicensed spectrum has emerged licensed-Assisted access, in which long-Term evolution (LTE) operators compete with Wi-Fi users for a share of the unlicensed spectrum so as to augment their licensed spectrum. Subsequently, there has been the need to develop a LTE channel access mechanism that enables harmonious coexistence between Wi-Fi and LTE. Load-based listen-before-Talk (LB-LBT) has been adopted as this LTE channel access mechanism by the 3rd Generation Partnership Project (3GPP). Theoretical modelling of LB-LBT schemes has focused on throughput and fair channel-Time sharing between Wi-Fi and LTE technologies. We explore a LB-LBT scheme that belongs to LBT category 4, as recommended by the 3GPP, and develop a model for the distribution of the medium access control (MAC) delays experienced by the Wi-Fi packets and LTE frames. The model, validated by simulations, reveals design insights that can be used to dynamically adjust the LB-LBT parameters not only to achieve channel-Time fairness, but also to guarantee MAC-delay bounds, with specified probability
    corecore