36 research outputs found

    On the Impact of Shadowing on the Performance of Cooperative Medium Access Control Protocols

    No full text
    International audienceAccurate representation of the physical layer is instrumental for a sound design and optimization of Medium Access Control (MAC) protocols for cooperative wireless networks. However, the vast majority of MAC protocols are designed and analyzed by considering simplified physical layer and channel models, which often lead to too optimistic performance predictions. In particular, even though many experimental activities have showcased the important role played by shadow-fading, most protocols are designed and evaluated by taking into account only the transmission distance (circular coverage model) or only the fast-fading. Motivated by the proved unsuitability of these models, the contribution of this paper is threefold: i) we provide important considerations on how to adequately include the effect of shadowing into the design of MAC protocols for cooperative networks; ii) we provide an analytical framework to determine the subset of active relays in order to meet a given Quality-of-Service (QoS) requirement; and iii) we study, through analysis and simulation, the performance of a promising MAC protocol for cooperative networks, which is called Persistent Relay Carrier Sensing Multiple Access (PRCSMA), by explicitly taking into account the effect of shadowing. Our study shows that shadowing can dramatically change system and protocol performance

    Analysis of an Energy-Efficient MAC Protocol Based on Polling for IEEE 802.11 WLAN

    Get PDF
    This paper analyzes the performance of a duty-cycled polling-based access mechanism that exploits the Transmission Opportunity Power Save Mode (TXOP PSM) defined in the IEEE 802.11ac to improve the energy efficiency of Wireless Local Area Networks (WLANs) based on the IEEE 802.11. The basic idea behind the proposed approach, named GreenPoll, is to enable contention free periods, based on polling with beacons, during which wireless stations can save energy by turning off their radio transceivers after exchanging data with the access point. The closed expression of energy efficiency of GreenPoll is formulated in this paper and is used to evaluate the performance of GreenPoll considering important parameters like the traffic load, packet length, data rate, and number of stations in the network. Both analytical and simulation results show the high energy efficiency of GreenPoll with gains of up to 330% and 110% when compared to the legacy Distributed Coordination Function (DCF) and the Point Coordination Function (PCF) defined in the IEEE 802.11, respectively

    Experimental Interference Robustness Evaluation of IEEE 802.15.4-2015 OQPSK-DSSS and SUN-OFDM Physical Layers for Industrial Communications

    Get PDF
    International audienceIn this paper, we experimentally evaluate and compare the robustness against interference of the OQPSK-DSSS (Offset Quadrature Phase Shift Keying-Direct Sequence Spread Spectrum) and the SUN-OFDM (Smart Utility Network-Orthogonal Frequency Division Multiplexing) physical layers, as defined in the IEEE 802.15.4-2015 standard. The objective of this study is to provide a comprehensive analysis of the impact that different levels of interference produce on these modulations, in terms of the resulting PDR (Packet Delivery Ratio) and depending on the length of the packet being transmitted. The results show that the SUN-OFDM physical layer provides significant benefits compared to the ubiquitous OQPSK-DSSS in terms of interference robustness, regardless of the interference type and the packet length. Overall, this demonstrates the suitability of choosing the SUN-OFDM physical layer when deploying low-power wireless networks in industrial scenarios, especially taking into consideration the possibility of trading-off robustness and spectrum efficiency depending on the application requirements

    Enabling SDN in VANETs: What is the Impact on Security?

    Get PDF
    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture

    On the needs and requirements arising from connected and automated driving

    Get PDF
    Future 5G systems have set a goal to support mission-critical Vehicle-to-Everything (V2X) communications and they contribute to an important step towards connected and automated driving. To achieve this goal, the communication technologies should be designed based on a solid understanding of the new V2X applications and the related requirements and challenges. In this regard, we provide a description of the main V2X application categories and their representative use cases selected based on an analysis of the future needs of cooperative and automated driving. We also present a methodology on how to derive the network related requirements from the automotive specific requirements. The methodology can be used to analyze the key requirements of both existing and future V2X use cases

    G95-1248 Healthful Snacks for Children Two to Five Years of Age

    Get PDF
    This guide discusses the benefits of providing snacks to young children and shares ideas for what good snacks are for these children. Why do children two to five years of age need snacks? Snacks are an important part of children\u27s daily food intake. It is difficult for children to get all the nutrients they need to promote growth and development in three meals a day. Also, most children need snacks because they get hungry between meals. Well-chosen snacks can help supply nutrients and energy needs (calories). As a parent you may say, My children do not need any more calories, they are overweight. Even children who are large for their age need snacks between meals. Every child can benefit from low-calorie snacks in terms of nutrients and satisfying their hunger. Children two to five years of age need two planned snacks each day. Try to establish a regular snack time. Schedule snacks two hours before a meal
    corecore