To see the other types of publications on this topic, follow the link: Medium access controls (MAC) protocols.

Dissertations / Theses on the topic 'Medium access controls (MAC) protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 41 dissertations / theses for your research on the topic 'Medium access controls (MAC) protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Guennoun, Mouhcine. "Semi-Persistent Medium Access Control Protocols for Wireless Sensor Networks." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31769.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are dense clusters of sensor nodes, made up of small, intelligent, resource-constrained wireless devices that are deployed to monitor a specific phenomenon in a certain field. The sensor nodes can be constrained by limited power supply, memory capacity and/or processing capabilities, which means that the design of WSNs requires all algorithms and protocols to be lightweight and efficient, and use as little power as possible. The Medium Access Control (MAC) protocol in WSNs, defined by the IEEE 802.15.4 standard, employs the Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) algorithm to control the nodes contending for access to the communication medium. Though the performance of this protocol has been studied extensively, and several improvements to its backoff counter, superframe format and contention-free period (CFP) features have been proposed, very few studies have addressed improving the Clear Channel Assessment (CCA) feature. In this thesis, we study the impact of increasing the value of the contention window beyond the standard value of 2, on the performance of the MAC protocol. We propose a semi-persistent MAC protocol that is a hybrid form of 802.11 and 802.15.4, to achieve a favorable performance that can serve a broad range of applications over the IEEE 802.15.4-based WSNs. We build an analytical model of the proposed protocol based on Markov chain modelling and derive the analytical expressions of the performance metrics, which we then validate against the simulation result sets generated by our in-house built simulation framework. We prove analytically that the probability of collision of the semi-persistent MAC is lower than that of the standard protocol. Based on our theoretical and simulated models, we show that incorporating the semi-persistent feature into existing MAC protocols leads to significant improvement of the performance metrics, including the probability of collision, throughput, energy consumption, transmission delay and reliability, particularly for networks with a large number of sensor nodes.
APA, Harvard, Vancouver, ISO, and other styles
2

Cavallero, Sara. "Medium Access Control Protocols for Terahertz Communication." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
This thesis proposes and studies a Medium Access Control (MAC) protocol for networks of tags deployed over an industrial machine using THz communications. Despite the great advantages of these frequencies, there are drawbacks that cannot be ignored, such as propagation delays that, even at small distances, are of the same order of magnitude as packet transmission times. For this reason, the mathematical models developed for Contention-Free and Contention-Based protocols take into account the propagation delay. The main focus of this thesis is on the CSMA/CA protocol, which introduces channel sensing to reduce collisions and increase performance. The performance of the protocol are compared with two benchmarks, based on Polling and Aloha, considering an industrial machine scenario and accounting for physical and MAC layers features.
APA, Harvard, Vancouver, ISO, and other styles
3

Kalfas, Georgios. "Medium-transparent MAC protocols for converged optical wireless networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/406358.

Full text
Abstract:
In order to address the explosive demand for high-capacity and omnipresent wireless access, modern cell-based wireless networks are slowly adopting two major solution roadmaps. The first is the employment of small-cell formations in order to increase the overall spectral efficiency, whereas the second is the employment of higher frequency bands, such as the mm-wave 60GHz band, that offers vast amounts of bandwidth. Depending on the specific application, the above solutions inevitably require the installation and operational management of large amounts of Base Stations (BSs) or Access Points (APs), which ultimately diminishes the overall cost-effectiveness of the architecture. In order to reduce the system cost, Radio over Fiber (RoF) technology has been put forward as an ideal candidate solution, due to the fact that it provides functionally simple antenna units, often termed as Remote Antenna Units (RAUs) that are interconnected to a central managing entity, termed as the Central Office (CO), via an optical fiber. Although extensive research efforts have been dedicated to the development of the physical layer aspects regarding RoF technologies, such as CO/RAU physical layer design and radio signal transport techniques over fiber, very limited efforts have con-centrated on upper layer and resource management issues. In this dissertation, we are concerned with access control and resource management of RoF-based mm-wave network architectures targeting the exploitation of the dual medium and its centralized control properties in order to perform optimal optical/wireless/time resource allocation. In this dissertation, we propose a Medium-Transparent MAC (MT-MAC) protocol that concurrently administers the optical and wireless resources of a 60GHz RoF based network, seamlessly connecting the CO to the wireless terminals through minimal RAU intervention. In this way, the MT-MAC protocol forms extended reach 60GHz WLAN networks offering connectivity amongst wireless devices that are attached to the same or different RAUs under both Line of Sight (LOS) and non LOS conditions. The notion of medium-transparency relies on two parallel contention periods, the first in the optical domain and the second in the wireless frequency and time domains, with nested dataframe structures. The MT-MAC operation is based on a proposed RAU design that allows for wavelength selectivity functions, thus being compatible with completely passive optical distribution network implementations that are predominately used by telecom operators today. Two variants of the MT-MAC protocol are considered. The first offers dynamic wavelength allocation with fixed time windows, whereas the second targets fairness-sensitive applications by offering dynamic wavelength allocation with dynamic transmission opportunity window sizes, based on the number of active clients connected at each RAU. Both variants of the protocol are evaluated by both simulation and analytical means. For the latter part, this thesis introduces two analytical models for calculating saturation throughput and non-saturation packet delay for the converged MT-MAC protocol. Finally, this thesis presents an extensive study regarding the network planning and formation of 60GHz Gigabit WLAN networks when the latter are deployed over existing Passive Optical Network (PON) infrastructures. Three possible architectures where studied: i) the RoF approach, ii) the Radio & Fiber approach and iii) the hybrid RoF-plus-R&F approach that combines the properties of both the aforementioned architectures. During the elaboration of this thesis, one major key conclusion has been extracted. The work proposed in this thesis considers that there is a fundamental requirement for implementing new converged optical/wireless MAC protocols, that have the complete overview of both available resources in order to effectively administer the hybrid Radio-over-Fiber networks.
A fin de atender la demanda explosiva de alta capacidad y acceso inalámbrico omnipresente, las redes inalámbricas basadas en celdas están poco a poco adoptando dos principales guías de solución. La primera es el empleo de formaciones de celdas pequeñas con el fin de aumentar la eficiencia espectral global, mientras que la segunda es el empleo de bandas de frecuencia superior, como la banda de 60GHz, la cual ofrece una gran cantidad de ancho de banda. Dependiendo de la aplicación en específico, las soluciones anteriores inevitable-mente requieren de una instalación y una gestión operativa de grandes cantidades de Estaciones Base o Puntos de Acceso, que en última instancia disminuye la rentabilidad de la arquitectura. Para reducir el coste, la tecnología radioeléctrica por fibra (RoF) se presenta como una solución ideal debido al hecho de que proporciona unidades de antenas de sim-ple funcionamiento, a menudo denominadas Unidades de Antenas Remotas (RAUs), las cuales están interconectadas a una entidad central de gestión, denominada Oficina Central (CO), a través de la fibra óptica. A pesar de que se han dedicado muchos esfuerzos de investigación al desarrollo de varios aspectos de las capas física con respecto a las tecnologías RoF, muy pocos esfuerzos se han concentrado en la capa superior y cuestiones de gestión de recursos. En esta tesis, nos enfocando en el control de acceso y gestión de recursos de arquitecturas RoF y comunicaciones milimétricas, con el fin de aprovechar y explotar el medio dual y las propiedades para realizar una óptima asignación de los recursos ópticos, inalámbricos y temporales. Nosotros proponemos un protocolo Transparente al Medio MAC (MT-MAC) que simultáneamente administre los recursos ópticos e inalámbricos de una red RoF a 60GHz, conectando a la perfección el CO a los terminales inalámbricos a través de una mínima intervención RAU. El protocolo MT-MAC forma unas redes WLAN 60GHz de alcance extendido, ofreciendo así conectividad entre los dispositivos inalámbricos que están conectados al mismo o diferentes RAUs bajo con o sin Línea de Vista (condiciones LOS o NLOS) respectivamente. La noción de transparencia al medio se basa en dos períodos de contención para-lelos, el primero en el dominio óptico y el segundo en la frecuencia inalámbrica y dominio del tiempo, con estructuras de datos anidados. La operación MT-MAC se basa en proponer un diseño RAU que permita la selectividad de funciones de longitud de onda. Dos variantes del protocolo MT- MAC son considerados; el primer ofrece asignación de longitud de onda dinámica con ventanas de tiempo fijo, mientras que la segunda tiene como objetivo entornos de aplicaciones sensibles ofreciendo asignación de longitud de onda con tamaño de ventana de oportunidad de transmisión dinámico, basado en el número de clientes conectados en cada RAU. Ambas variantes del protocolo están evaluadas tanto por medios analíticos como de simulación. En la segunda parte, esta tesis introduce dos modelos analíticos para calcular el rendimiento de saturación y no saturación del retardo de paquetes para el protocolo MT-MAC convergente. Finalmente, esta tesis presenta un extenso estudio de la planificación de red y la formación de redes 60GHz Gigabit WLAN cuando esta se encuentra desplegada sobre las ya existente infraestructuras de Redes Ópticas Pasivas (PONs). Tres posibles arquitecturas han sido estudiadas: i) el enfoque RoF, ii) el enfoque Radio y Fibra , y iii) el enfoque híbrido, RoF más R&F el cual combina las propiedades de ambas arquitecturas anteriormente mencionadas. Durante la elaboración de esta tesis, se ha extraído una importante conclusión: hay un requerimiento fundamental para implementar nuevos protocolos ópticos/inalámbricos convergentes, que tengan una completa visión de ambos recursos disponibles para poder administrar efectivamente las redes de tecnología RoF.
APA, Harvard, Vancouver, ISO, and other styles
4

Augustin, Angelika. "Effective Power Consumption in MAC Protocols for Wireless Sensor Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-286.

Full text
Abstract:

Wireless sensor networks offer easy implementation, flexibility and mobility of hand held

devices. Sensors consist of an internal power source, which is the great limitation for

the life time and the usage of sensor networks. To increase the life time, sensors should

stay in energy saving sleep mode as long as possible, because in sleep mode the radio is

either shut down or working with less energy. Better energy handling is implemented in

different power saving mechanism of common Medium Access Control protocols, which are

evaluated and analyzed and further extensions and ideas to improve the energy efficiency

are presented. Slotted PSM is simulated with the NS2 and compared to the WLAN 802.11

PSM technology and the results show that energy efficiency and power consumption are

much better implemented and life time increases with the use of Slotted PSM.

APA, Harvard, Vancouver, ISO, and other styles
5

Bag, Anirban. "MEDIUM ACCESS CONTROL PROTOCOLS AND ROUTING ALGORITHMS FOR WIRELESS SENSOR NETWORKS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3418.

Full text
Abstract:
In recent years, the development of a large variety of mobile computing devices has led to wide scale deployment and use of wireless ad hoc and sensor networks. Wireless Sensor Networks consist of battery powered, tiny and cheap "motes", having sensing and wireless communication capabilities. Although wireless motes have limited battery power, communication and computation capabilities, the range of their application is vast. In the first part of the dissertation, we have addressed the specific application of Biomedical Sensor Networks. To solve the problem of data routing in these networks, we have proposed the Adaptive Least Temperature Routing (ALTR) algorithm that reduces the average temperature rise of the nodes in the in-vivo network while routing data efficiently. For delay sensitive biomedical applications, we proposed the Hotspot Preventing Routing (HPR) algorithm which avoids the formation of hotspots (regions having very high temperature) in the network. HPR forwards the packets using the shortest path, bypassing the regions of high temperature and thus significantly reduces the average packet delivery delay, making it suitable for real-time applications of in-vivo networks. We also proposed another routing algorithm suitable for being used in a network of id-less biomedical sensor nodes, namely Routing Algorithm for networks of homogeneous and Id-less biomedical sensor Nodes (RAIN). Finally we developed Biocomm, a cross-layer MAC and Routing protocol co-design for Biomedical Sensor Networks, which optimizes the overall performance of an in-vivo network through cross-layer interactions. We performed extensive simulations to show that the proposed Biocomm protocol performs much better than the other existing MAC and Routing protocols in terms of preventing the formation of hotspots, reducing energy consumption of nodes and preventing network congestion when used in an in-vivo network. In the second part of the dissertation, we have addressed the problems of habitat-monitoring sensor networks, broadcast algorithms for sensor networks and the congestion problem in sensor networks as well as one non-sensor network application, namely, on-chip communication networks. Specifically, we have proposed a variation of HPR algorithm, called Hotspot Preventing Adaptive Routing (HPAR) algorithm, for efficient data routing in Networks On-Chip catering to their specific hotspot prevention issues. A protocol similar to ALTR has been shown to perform well in a sensor network deployed for habitat monitoring. We developed a reliable, low overhead broadcast algorithm for sensor networks namely Topology Adaptive Gossip (TAG) algorithm. To reduce the congestion problem in Wireless Sensor Networks, we proposed a tunable cross-layer Congestion Reducing Medium Access Control (CRMAC) protocol that utilizes buffer status information from the Network layer to give prioritized medium access to congested nodes in the MAC layer and thus preventing congestion and packet drops. CRMAC can also be easily tuned to satisfy different application-specific performance requirements. With the help of extensive simulation results we have shown how CRMAC can be adapted to perform well in different applications of Sensor Network like Emergency Situation that requires a high network throughput and low packet delivery latency or Long-term Monitoring application requiring energy conservation.
Ph.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
APA, Harvard, Vancouver, ISO, and other styles
6

Armstrong, Dean Andrew. "Easing the Transition from Inspiration to Implementation: A Rapid Prototyping Platform for Wireless Medium Access Control Protocols." The University of Waikato, 2007. http://hdl.handle.net/10289/2528.

Full text
Abstract:
Packet broadcast networks are in widespread use in modern wireless communication systems. Medium access control is a key functionality within such technologies. A substantial research effort has been and continues to be invested into the study of existing protocols and the development of new and specialised ones. Academic researchers are restricted in their studies by an absence of suitable wireless MAC protocol development methods. This thesis describes an environment which allows rapid prototyping and evaluation of wireless medium access control protocols. The proposed design flow allows specification of the protocol using the specification and description language (SDL) formal description technique. A tool is presented to convert the SDL protocol description into a C++ model suitable for integration into both simulation and implementation environments. Simulations at various levels of abstraction are shown to be relevant at different stages of protocol design. Environments based on the Cinderella SDL simulator and the ns-2 network simulator have been developed which allow early functional verification, along with detailed and accurate performance analysis of protocols under development. A hardware platform is presented which allows implementation of protocols with flexibility in the hardware/software trade-off. Measurement facilities are integral to the hardware framework, and provide a means for accurate real-world feedback on protocol performance.
APA, Harvard, Vancouver, ISO, and other styles
7

van, Coppenhagen Robert Lindenberg, and robert vancoppenhagen@dsto defence gov au. "On the Coordinated Use of a Sleep Mode in Wireless Sensor Networks: Ripple Rendezvous." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.145741.

Full text
Abstract:
It is widely accepted that low energy consumption is the most important requirement when designing components and systems for a wireless sensor network (WSN). The greatest energy consumer of each node within a WSN is the radio transceiver and as such, it is important that this component be used in an extremely energy e±cient manner. One method of reducing the amount of energy consumed by the radio transceiver is to turn it off and allow nodes to enter a sleep mode. The algorithms that directly control the radio transceiver are traditionally grouped into the Medium Access Control (MAC) layer of a communication protocol stack. This thesis introduces the emerging field of wireless sensor networks and outlines the requirements of a MAC protocol for such a network. Current MAC protocols are reviewed in detail with a focus on how they utilize this energy saving sleep mode as well as performance problems that they suffer from. A proposed new method of coordinating the use of this sleep mode between nodes in the network is specifed and described. The proposed new protocol is analytically compared with existing protocols as well as with some fundamental performance limits. The thesis concludes with an analysis of the results as well as some recommendations for future work.
APA, Harvard, Vancouver, ISO, and other styles
8

JAIN, NITIN. "MULTICHANNEL CSMA PROTOCOLS FOR AD HOC NETWORKS." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin995471534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alonso, Zárate Jesús. "Design and analysis of medium access control protocols for ad hoc and cooperative wireless networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2009. http://hdl.handle.net/10803/30707.

Full text
Abstract:
La presente tesis doctoral contribuye a la incesante evolución de las comunicaciones inalámbricas. Se centra en el diseño de protocolos de acceso al medio (MAC) para redes ad hoc y redes inalámbricas cooperativas. En una primera parte introductoria se presenta un minucioso estado del arte y se establecen las bases teóricas de las contribuciones presentadas en la tesis. En esta primera parte introductoria se definen las principales motivaciones de la tesis y se plantean los objetivos. Después, las contribuciones de la tesis se organizan en dos grandes bloques, o partes. En la primera parte de esta tesis se diseña, analiza y evalúa el rendimiento de un novedoso protocolo MAC de alta eficiencia llamado DQMAN (Protocolo MAC basado en colas distribuidas para redes ad hoc). Este protocolo constituye la extensión y adaptación del protocolo DQCA, diseñado para redes centralizadas, para operar en redes sin infraestructura. En DQMAN se introduce un nuevo paradigma en el campo del acceso al medio para redes distribuidas: la integración de un algoritmo de clusterización espontáneo y dinámico basado en una estructura de master y esclavo junto con un protocolo MAC de alta eficiencia diseñado para redes centralizadas. Tanto el análisis teórico como las simulaciones por ordenador presentadas en esta tesis muestran que DQMAN mejora el rendimiento del actual estándar IEEE 802.11. La principal característica de DQMAN es que se comporta como un protocolo de acceso aleatorio cuando la carga de tráfico es baja y cambia automática y transparentemente a un protocolo de reserva a medida que el tráfico de la red aumenta. Además, su rendimiento es prácticamente independiente del número de usuarios simultáneos de la red, lo cual es algo deseable en redes que nacen para cubrir una necesidad espontánea y no pueden ser planificadas. El hecho de que algoritmo de clusterización se base en un acceso aleatorio permite la coexistencia e intercomunicación de usuarios DQMAN con usuarios basados en el estándar IEEE 802.11. Este estudio se presenta en esta primera parte de la tesis y es fundamental de cara a una posible explotación comercial de DQMAN. La metodología presentada en esta tesis mediante el cual se logra extender la operación de DQCA a entornos ad hoc sin infraestructura puede ser utilizada para adaptar cualquier otro protocolo centralizado. Con el objetivo de poner de manifiesto esta realidad, la primera parte de la tesis concluye con el diseño y evaluación de DPCF como una extensión distribuida del modo de coordinación centralizado (PCF) del estándar IEEE 802.11 para operar en redes distribuidas. La segunda parte de la tesis se centra en el estudio de un tipo específico de técnicas cooperativas: técnicas cooperativas de retransmisión automática (C-ARQ). La idea principal de las técnicas C-ARQ es que cuando un paquete de datos se recibe con bits erróneos, se solicita retransmisión, no a la fuente de datos, si no a cualquiera de los usuarios que escuchó la transmisión original. Estos usuarios se convierten en espontáneos retransmisores que permiten mejorar la eficiencia de la comunicación. A pesar de que este tipo de esquema puede obtener diversidad de cooperación, el hecho de implicar a más de un usuario en una comunicación punto a punto requiere una coordinación que hasta ahora ha sido obviada en la literatura, asumiendo que los retransmisores pueden coordinarse perfectamente para retransmitir uno detrás de otro. En esta tesis se analiza y evalúa el coste de coordinación impuesto por la capa MAC y se identifican los principales retos de diseño que las técnicas C-ARQ imponen al diseño de la capa MAC. Además, se presenta el diseño y análisis de dos novedosos protocolos MAC para C-ARQ: DQCOOP y PRCSMA. El primero se basa en DQMAN y constituye una extensión de este para operar en esquemas C-ARQ, mientras que el segundo constituye la adaptación del estándar IEEE 802.11 para poder ejecutarse en un esquema C-ARQ. El rendimiento de estos esquemas se compara en esta tesis tanto con esquemas no cooperativos como con esquemas ideales cooperativos donde se asume que el MAC es ideal. Los resultados principales muestran que el diseño eficiente de la capa MAC es esencial para obtener todos los beneficios potenciales de los esquemas cooperativos.
This thesis aims at contributing to the incessant evolution of wireless communications. The focus is on the design of medium access control (MAC) protocols for ad hoc and cooperative wireless networks. A comprehensive state of the art and a background on the topic is provided in a first preliminary part of this dissertation. The motivations and key objectives of the thesis are also presented in this part. Then, the contributions of the thesis are divided into two fundamental parts. The first part of the thesis is devoted to the design, analysis, and performance evaluation of a new high-performance MAC protocol. It is the Distributed Queueing MAC Protocol for Ad hoc Networks (DQMAN) and constitutes an extension and adaptation of the near-optimum Distributed Queueing with Collision Avoidance (DQCA) protocol, designed for infrastructure-based networks, to operate over networks without infrastructure. DQMAN introduces a new access paradigm in the context of distributed networks: the integration of a spontaneous, dynamic, and soft-binding masterslave clustering mechanism together with a high-performance infrastructure-based MAC protocol. Theoretical analysis and computer-based simulation show that DQMAN outperforms IEEE 802.11 Standard. The main characteristic of the protocol is that it behaves as a random access control protocol when the traffic load is low and it switches smoothly and automatically to a reservation protocol as the traffic load grows. In addition, its performance is almost independent of the number of users of a network. The random-access based clustering algorithm allows for the coexistence and intercommunication of stations using DQMAN with the ones just based on the legacy IEEE 802.11 Standard. This assessment is also presented in this first part of the dissertation and constitutes a key contribution in the light of the commercial application of DQMAN. Indeed, the rationale presented in this first part of the thesis to extend DQCA and become DQMAN to operate over distributed networks can be used to extend the operation of any other infrastructure-based MAC protocol to ad hoc networks. In order to exemplify this, a case study is presented to conclude the first part of the thesis. The Distributed Point Coordination Function (DPCF) MAC protocol is presented as the extension of the PCF of the IEEE 802.11 Standard to be used in ad hoc networks. The second part of the thesis turns the focus to a specific kind of cooperative communications: Cooperative Automatic Retransmission Request (C-ARQ) schemes. The main idea behind C-ARQ is that when a packet is received with errors at a receiver, a retransmission can be requested not only from the source but also to any of the users which overheard the original transmission. These users can become spontaneous helpers to assist in the failed transmission by forming a temporary ad hoc network. Although such a scheme may provide cooperative diversity gain, involving a number of users in the communication between two users entails a complicated coordination task that has a certain cost. This cost has been typically neglected in the literature, assuming that the relays can attain a perfect scheduling and transmit one after another. In this second part of the thesis, the cost of the MAC layer in C-ARQ schemes is analyzed and two novel MAC protocols for C-ARQ are designed, analyzed, and comprehensively evaluated. They are the DQCOOP and the Persistent Relay Carrier Sensing Multiple Access (PRCSMA) protocols. The former is based on DQMAN and the latter is based on the IEEE 802.11 Standard. A comparison with non-cooperative ARQ schemes (retransmissions performed only from the source) and with ideal CARQ (with perfect scheduling among the relays) is included to have actual reference benchmarks of the novel proposals. The main results show that an efficient design of the MAC protocol is crucial in order to actually obtain the benefits associated to the C-ARQ schemes.
APA, Harvard, Vancouver, ISO, and other styles
10

Kangude, Shantanu. "CSMA with Implicit Scheduling through State-keeping: A Distributed MAC Framework for QoS in Broadcast LANs." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-05132004-132109/unrestricted/kangude%5Fshantanu%5F200407%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2005. Directed by John Copeland.
Copeland, John, Committee Chair ; Owen, Henry, Committee Member ; Sivakumar, Raghupathy, Committee Member ; Lanterman, Aaron, Committee Member ; Dos Santos, Andre, Committee Member. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
11

Ammar, Ibrahim A. M. "Design and analysis of energy-efficient media access control protocols in wireless sensor networks. Design and analysis of MAC layer protocols using low duty cycle technique to improve energy efficient and enhance communication performance in wireless sensor networks." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7268.

Full text
Abstract:
Wireless sensor network (WSN) technology has gained significant importance due to its potential support for a wide range of applications. Most of the WSN applications consist of a large numbers of distributed nodes that work together to achieve common objects. Running a large number of nodes requires an efficient mechanism to bring them all together in order to form a multi-hop wireless network that can accomplish some specific tasks. Even with recent developments made in WSN technology, numbers of important challenges still stand as vulnerabilities for WSNs, including energy waste sources, synchronisation leaks, low network capacity and self-configuration difficulties. However, energy efficiency remains the priority challenging problem due to the scarce energy resources available in sensor nodes. These concerns are managed by medium access control (MAC) layer protocols. MAC protocols designed specifically for WSN have an additional responsibility of managing radio activity to conserve energy in addition to the traditional functions. This thesis presents advanced research work carried out in the context of saving energy whilst achieving the desired network performance. Firstly the thesis contributes by proposing Overlapped Schedules for MAC layer, in which the schedules of the neighbour clusters are overlapped by introducing a small shift time between them, aiming to compensate the synchronisation errors. Secondly, this thesis proposed a modified architecture derived from S-MAC protocol which significantly supports higher traffic levels whilst achieving better energy efficiency. This is achieved by applying a parallel transmission concept on the communicating nodes. As a result, the overall efficiency of the channel contention mechanism increases and leads to higher throughput with lower energy consumption. Finally, this thesis proposed the use of the Adaptive scheme on Border Nodes to increase the power efficiency of the system under light traffic load conditions. The scheme focuses on saving energy by forcing the network border nodes to go off when not needed. These three contributions minimise the contention window period whilst maximising the capacity of the available channel, which as a result increase network performance in terms of energy efficiency, throughput and latency. The proposed system is shown to be backwards compatible and able to satisfy both traditional and advanced applications. The new MAC protocol has been implemented and evaluated using NS-2 simulator, under different traffic loads and varying duty cycle values. Results have shown that the proposed solutions are able to significantly enhance the performance of WSNs by improving the energy efficiency, increasing the system throughput and reducing the communication delay.
APA, Harvard, Vancouver, ISO, and other styles
12

Ammar, Ibrahim Ammer Musbah. "Design and analysis of energy-efficient media access control protocols in wireless sensor networks : design and analysis of MAC layer protocols using low duty cycle technique to improve energy efficient and enhance communication performance in wireless sensor networks." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7268.

Full text
Abstract:
Wireless sensor network (WSN) technology has gained significant importance due to its potential support for a wide range of applications. Most of the WSN applications consist of a large numbers of distributed nodes that work together to achieve common objects. Running a large number of nodes requires an efficient mechanism to bring them all together in order to form a multi-hop wireless network that can accomplish some specific tasks. Even with recent developments made in WSN technology, numbers of important challenges still stand as vulnerabilities for WSNs, including energy waste sources, synchronisation leaks, low network capacity and self-configuration difficulties. However, energy efficiency remains the priority challenging problem due to the scarce energy resources available in sensor nodes. These concerns are managed by medium access control (MAC) layer protocols. MAC protocols designed specifically for WSN have an additional responsibility of managing radio activity to conserve energy in addition to the traditional functions. This thesis presents advanced research work carried out in the context of saving energy whilst achieving the desired network performance. Firstly the thesis contributes by proposing Overlapped Schedules for MAC layer, in which the schedules of the neighbour clusters are overlapped by introducing a small shift time between them, aiming to compensate the synchronisation errors. Secondly, this thesis proposed a modified architecture derived from S-MAC protocol which significantly supports higher traffic levels whilst achieving better energy efficiency. This is achieved by applying a parallel transmission concept on the communicating nodes. As a result, the overall efficiency of the channel contention mechanism increases and leads to higher throughput with lower energy consumption. Finally, this thesis proposed the use of the Adaptive scheme on Border Nodes to increase the power efficiency of the system under light traffic load conditions. The scheme focuses on saving energy by forcing the network border nodes to go off when not needed. These three contributions minimise the contention window period whilst maximising the capacity of the available channel, which as a result increase network performance in terms of energy efficiency, throughput and latency. The proposed system is shown to be backwards compatible and able to satisfy both traditional and advanced applications. The new MAC protocol has been implemented and evaluated using NS-2 simulator, under different traffic loads and varying duty cycle values. Results have shown that the proposed solutions are able to significantly enhance the performance of WSNs by improving the energy efficiency, increasing the system throughput and reducing the communication delay.
APA, Harvard, Vancouver, ISO, and other styles
13

Hu, Jia. "Analysis and improvement of medium access control protocols in wireless networks : performance modelling and Quality-of-Service enhancement of IEEE 802.11e MAC in wireless local area networks under heterogeneous multimedia traffic." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4466.

Full text
Abstract:
In order to efficiently utilize the scarce wireless resource as well as keep up with the ever-increasing demand for Quality-of-Service (QoS) of multimedia applications, wireless networks are undergoing rapid development and dramatic changes in the underlying technologies and protocols. The Medium Access Control (MAC) protocol, which coordinates the channel access and data transmission of wireless stations, plays a pivotal role in wireless networks. Performance modelling and analysis has been and continues to be of great theoretical and practical importance in the design and development of wireless networks. This research is devoted to developing efficient and cost-effective analytical tools for the performance analysis and enhancement of MAC protocols in Wireless Local Area Networks (WLANs) under heterogeneous multimedia traffic. To support the MAC-layer QoS in WLANs, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) protocol has proposed three QoS differentiation schemes in terms of Arbitrary Inter-Frame Space (AIFS), Contention Window (CW), and Transmission Opportunity (TXOP). This research starts with the development of new analytical models for the TXOP scheme specified in the EDCA protocol under Poisson traffic. A dynamic TXOP scheme is then proposed to adjust the TXOP limits according to the status of the transmission queue. Theoretical analysis and simulation experiments show that the proposed dynamic scheme largely improves the performance of TXOP. To evaluate the TXOP scheme in the presence of ii heterogeneous traffic, a versatile analytical model is developed to capture the traffic heterogeneity and model the features of burst transmission. The performance results highlight the importance of taking into account the heterogeneous traffic for the accurate evaluation of the TXOP scheme in wireless multimedia networks. To obtain a thorough and deep understanding of the performance attributes of the EDCA protocol, a comprehensive analytical model is then proposed to accommodate the integration of the three QoS schemes of EDCA in terms of AIFS, CW, and TXOP under Poisson traffic. The performance results show that the TXOP scheme can not only support service differentiation but also improve the network performance, whereas the AIFS and CW schemes provide QoS differentiation only. Moreover, the results demonstrate that the MAC buffer size has considerable impact on the QoS performance of EDCA under Poisson traffic. To investigate the performance of EDCA in wireless multimedia networks, an analytical model is further developed for EDCA under heterogeneous traffic. The performance results demonstrate the significant effects of heterogeneous traffic on the total delay and frame losses of EDCA with different buffer sizes. Finally, an efficient admission control scheme is presented for the IEEE 802.11e WLANs based on analytical modelling and a game-theoretical approach. The admission control scheme can maintain the system operation at an optimal point where the utility of the Access Point (AP) is maximized with the QoS constraints of various users.
APA, Harvard, Vancouver, ISO, and other styles
14

Gautam, S. Vijay. "Performance Analysis Of A Variation Of The Distributed Queueing Access Protocol." Thesis, Indian Institute of Science, 1995. http://hdl.handle.net/2005/149.

Full text
Abstract:
"A distributed queueing Medium Access Control (MAC) protocol is used in Distributed Queue Dual Bus (DQDB) networks. A modified version of the MAC protocol was proposed by R.R. Pillai and U. Mukherji in an attempt to overcome some of the shortcomings of the DQDB MAC protocol. They analyzed the performance of the system for Bernoulli arrivals and for large propagation delays between the nodes. We extend the performance analysis of the modified MAC protocol for a DQDB type of Network. The parameter of interest to us is the bus access delay. This has two components, viz., the request bus access delay and the data bu6 access delay. We use the model at the request point at node and present methods to evaluate the delay experienced in such a model. The model is an n-priority ./D/l queue with D vacations (non-preemptive priority) where n is the number of nodes sending requests on the request bus for transmission on the data bus. The methods presented help to evaluate the request bus access delay when the arrivals at each node are Markovian Arrival Processes (MAPs). The algorithms for evaluating the mean request bus access delay are based on matrix geometric techniques. Thus, one can use the algorithms developed in the literature to solve for the finite buffers case too. This model, for the request bus access delay, holds irrespective of the propagation delay between the nodes. We also evaluate the inter-departure time of class 1 customers and virtual customers in a 2-priority M/G/l system with G vacations (non-preemptive priority). In the case of Poisson arrivals at all the nodes, we would have a 2-priority M/D/l system with D vacations (non-preemptive priority). We thus evaluate the inter-arrival time of the free slots on the data bus as seen by Node 2. Note that this is independent of the number of active nodes in the network We then develop methods to evaluate the mean data bus access delay experienced by the customers at Node 2 in a three-node network with 2 nodes communicating with the third when the propagation delay between the nodes is large. We consider the case of finite Local Queue buffers at the two nodes. Using this assumption we arrive at process of arrivals to the Combined Queue and the process of free slots on the data bus to be Markov Modulated Bernoulli processes. The model at the combined queue at Node 2 then has a Quasi Birth-Death evolution. Thus, this system is solved by using the Ramaswami-Latouche algorithm. The stationary probabilities are then used to evaluate the mean data bus access delay experienced at Node 2. The finite buffer case of this system can be solved by G.Wi Stewart's algorithm. The method in modelling the system and the results are presented in detail for Poisson arrivals. The extension of this to more complex processes is also explained. We encounter in the analysis an explosion of the state-space of the system. We try to counter this by considering approximations to the process of free slots on the data bus. The approximations considered are on the basis of what are known as Idealized Aggregates. The performance of the approximation is also detailed. It works very well under low and moderate load but underestimates the mean delay under heavy load. Thereafter, we discuss the performance of the system with reference to the mean of the access delay and the standard deviation of the access delay under varying traffic at the two nodes. For this part we use simulation results to discuss the performance. The comparison between the performance measures at both the nodes is also done. Then we develop methods/techniques to understand the performance of the system when we have finite propagation delays between the nodes. We concentrate on the 3-node problem and calculate performance bounds based on linear programs. This is illustrated in detail for Bernoulli arrivals for the case of 1 slot propagation delay between the nodes as well as for the case of 2 slots propagation delay. The performance of the bounds obtained is also detailed. The presence of an idling system at the combined queue of Node 2 makes the bounds somewhat loose. Finally, we discuss the performance of the system with reference to the mean access delay and the standard deviation of the access delay under varying load on the system. Again, we rely on simulation studies. Finally, we study the performance of the system as a multiplexer. For this, we re­strict the traffic to Markov Modulated Processes (or those which would satisfy the Gartner-Ellis Theorem requirements). The traffic is characterized by what are known as Envelope Processes - Lower and Upper. The class of processes which satisfy the conditions of the Gartner-Ellis theorem come under the category where both the Envelope Processes exist and the Minimum Envelope Rate and the Maximum Lower Envelope Rate are the same. We use the system evolution equations at the combined queue at any node to develop re­lations between the various input and output processes. First, this is done for a. system of this kind, in isolation. Then, we consider this system as a part of the modified protocol and present relations, among the various input and output processes, which are specific to the modified protocol. The possible use of all of the above to do Admission Control at the entry point to the Asynchronous Transfer Mode (ATM) network is also presented.
APA, Harvard, Vancouver, ISO, and other styles
15

Kunert, Kristina. "Architectures and Protocols for Performance Improvements of Real-Time Networks." Doctoral thesis, Högskolan i Halmstad, Inbyggda system (CERES), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14082.

Full text
Abstract:
When designing architectures and protocols for data traffic requiring real-time services, one of the major design goals is to guarantee that traffic deadlines can be met. However, many real-time applications also have additional requirements such as high throughput, high reliability, or energy efficiency. High-performance embedded systems communicating heterogeneous traffic with high bandwidth and strict timing requirements are in need of more efficient communication solutions, while wireless industrial applications, communicating control data, require support of reliability and guarantees of real-time predictability at the same time. To meet the requirements of high-performance embedded systems, this thesis work proposes two multi-wavelength high-speed passive optical networks. To enable reliable wireless industrial communications, a framework in­corporating carefully scheduled retransmissions is developed. All solutions are based on a single-hop star topology, predictable Medium Access Control algorithms and Earliest Deadline First scheduling, centrally controlled by a master node. Further, real-time schedulability analysis is used as admission control policy to provide delay guarantees for hard real-time traffic. For high-performance embedded systems an optical star network with an Arrayed Waveguide Grating placed in the centre is suggested. The design combines spatial wavelength re­use with fixed-tuned and tuneable transceivers in the end nodes, enabling simultaneous transmis­sion of both control and data traffic. This, in turn, permits efficient support of heterogeneous traf­fic with both hard and soft real-time constraints. By analyzing traffic dependencies in this mul­tichannel network, and adapting the real-time schedulability analysis to incorporate these traffic dependencies, a considerable increase of the possible guaranteed throughput for hard real-time traffic can be obtained. Most industrial applications require using existing standards such as IEEE 802.11 or IEEE 802.15.4 for interoperability and cost efficiency. However, these standards do not provide predict­able channel access, and thus real-time guarantees cannot be given. A framework is therefore de­veloped, combining transport layer retransmissions with real-time analysis admission control, which has been adapted to consider retransmissions. It can be placed on top of many underlying communication technologies, exemplified in our work by the two aforementioned wireless stan­dards. To enable a higher data rate than pure IEEE 802.15.4, but still maintaining its energy saving properties, two multichannel network architectures based on IEEE 802.15.4 and encompassing the framework are designed. The proposed architectures are evaluated in terms of reliability, utiliza­tion, delay, complexity, scalability and energy efficiency and it is concluded that performance is enhanced through redundancy in the time and frequency domains.
APA, Harvard, Vancouver, ISO, and other styles
16

Qayoom, Mohamad. "An Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks "V-MAC"." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/704.

Full text
Abstract:
Wireless sensor networks (WSNs) are composed of hundreds of wireless sensors which collaborate to perform a common task. Because of the small size of wireless sensors, they have some serious limitations including very low computation capability and battery reserve. Such resource limitations require that WSN protocols to be extremely efficient. In this thesis, we focus on the Medium Access Control (MAC) layer in WSNs. We propose a MAC scheme, V-MAC, for WSNs that extends that lifetime of the network. We compare V-MAC with other MAC schemes. V-MAC uses a special mechanism to divide sensors in different groups and then all the members of a group go to sleep at the same time. V-MAC protects WSNs against denial of sleep and broadcast attacks. We present the V-MAC scheme in details and evaluate it with simulations. Our simulations show that V-MAC enjoys significantly higher throughput and network lifetime compared to other schemes.
APA, Harvard, Vancouver, ISO, and other styles
17

Brownfield, Michael I. "Energy-efficient Wireless Sensor Network MAC Protocol." Diss., This resource online, 2006. http://scholar.lib.vt.edu/theses/available/etd-04102006-170423/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Muqattash, Alaa Hilal. "Medium Access Control and Adaptive Transmission Techniques in Wireless Networks." Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1359%5F1%5Fm.pdf&type=application/pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tonsing, Christoph Erik. "Energy-efficient MAC protocol for wireless sensor networks." Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/31247.

Full text
Abstract:
A Wireless Sensor Network (WSN) is a collection of tiny devices called sensor nodes which are deployed in an area to be monitored. Each node has one or more sensors with which they can measure the characteristics of their surroundings. In a typical WSN, the data gathered by each node is sent wirelessly through the network from one node to the next towards a central base station. Each node typically has a very limited energy supply. Therefore, in order for WSNs to have acceptable lifetimes, energy efficiency is a design goal that is of utmost importance and must be kept in mind at all levels of a WSN system. The main consumer of energy on a node is the wireless transceiver and therefore, the communications that occur between nodes should be carefully controlled so as not to waste energy. The Medium Access Control (MAC) protocol is directly in charge of managing the transceiver of a node. It determines when the transceiver is on/off and synchronizes the data exchanges among neighbouring nodes so as to prevent collisions etc., enabling useful communications to occur. The MAC protocol thus has a big impact on the overall energy efficiency of a node. Many WSN MAC protocols have been proposed in the literature but it was found that most were not optimized for the group of WSNs displaying very low volumes of traffic in the network. In low traffic WSNs, a major problem faced in the communications process is clock drift, which causes nodes to become unsynchronized. The MAC protocol must overcome this and other problems while expending as little energy as possible. Many useful WSN applications show low traffic characteristics and thus a new MAC protocol was developed which is aimed at this category of WSNs. The new protocol, Dynamic Preamble Sampling MAC (DPS-MAC) builds on the family of preamble sampling protocols which were found to be most suitable for low traffic WSNs. In contrast to the most energy efficient existing preamble sampling protocols, DPS-MAC does not cater for the worst case clock drift that can occur between two nodes. Rather, it dynamically learns the actual clock drift experienced between any two nodes and then adjusts its operation accordingly. By simulation it was shown that DPS-MAC requires less protocol overhead during the communication process and thus performs more energy efficiently than its predecessors under various network operating conditions. Furthermore, DPS-MAC is less prone to become overloaded or unstable in conditions of high traffic load and high contention levels respectively. These improvements cause the use of DPS-MAC to lead to longer node and network lifetimes, thus making low traffic WSNs more feasible.
Dissertation (MEng)--University of Pretoria, 2008.
Electrical, Electronic and Computer Engineering
MEng
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
20

Mullins, Barry E. "Cater: An Opportunistic Medium Access Control Protocol for Wireless Local Area Networks." Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/30578.

Full text
Abstract:
An adaptive MAC protocol is developed and analyzed that offers a "best case" scenario by allowing the MAC to control medium parameters thereby fully exploiting the channel of an ad hoc wireless LAN. This new, opportunistic medium access control protocol is called CATER (Code Adapts To Enhance Reliability) and is based on the proposed MAC standard for wireless local area networks (WLAN)-IEEE 802.11 [IEE96]. As currently proposed, IEEE 802.11 uses a fixed pseudo-noise (PN) code for spreading the information signal, implying a fixed process gain at the receiver. When the channel degrades, IEEE 802.11 offers only retransmissions at the MAC layer to combat a corrupt medium. However, CATER allows communicating stations to reconfigure their transceivers to use a longer PN code after a prescribed number of failed retransmissions. This longer code increases the process gain of the receiver and reduces the error rate. After the two stations are reconfigured, the source station sends the frame in question. Immediately after that frame is acknowledged, the source station may send additional frames during the reconfigured period. Simulation and emulation are used to demonstrate and validate the adaptive protocol's capabilities. Results show that this new protocol offers substantial improvement in system throughput when the channel degrades to a point that reliable transmission of frames is not feasible in a standard IEEE 802.11 WLAN. Specifically, CATER continues to function, permitting up to 14 percent normalized aggregate throughput at times when IEEE 802.11 permits no frames to pass through the WLAN. In addition, throughput experiences only a small decrease due to protocol overhead during periods when stations experience a good channel with few bit errors. Moreover, CATER does not adversely affect the predominate transport layer protocol (i.e., TCP), and provides equitable service to all stations within the network.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
21

Ben, Khalifa Abderrahman. "Medium access control layer for dedicated IoT networks." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI063.

Full text
Abstract:
Les réseaux dédiés pour l’Internet des Objets sont apparus avec la promesse de connecter des milliers de nœuds, voire plus, à une seule station de base dans une topologie en étoile. Cette nouvelle logique représente un changement fondamental dans la façon de penser les réseaux, après des décennies pendant lesquelles les travaux de recherche se sont focalisés sur les réseaux multi-sauts. Les réseaux pour l’Internet des Objets se caractérisent par la longue portée des transmissions, la vaste couverture géographique, une faible consommation d’énergie et un bas coût de mise en place. Cela a rendu nécessaire des adaptations à tous les niveaux protocolaires afin de satisfaire les besoins de ces réseaux. Plusieurs acteurs sont en concurrence sur le marché de l’Internet des Objets, essayant chacun d’établir la solution la plus efficiente. Ces acteurs se sont concentrés sur la modification de la couche physique, soit au niveau de la partie matérielle, soit par la proposition de nouvelles techniques de modulation. Toutefois, en ce qui concerne la solution de contrôle d’accès au canal (connue sous le nom de couche MAC), toutes les solutions proposées par ces acteurs se fondent sur des approches classiques, tel que Aloha et CSMA. L'objectif de cette thèse est de proposer une solution MAC dynamique pour les réseaux dédiés à l’Internet des Objets. La solution proposée a la capacité de s'adapter aux conditions du réseau. Cette solution est basée sur un algorithme d'apprentissage automatique, qui apprend de l'historique du réseau afin d'établir la relation entre les conditions du réseau, les paramètres de la couche MAC et les performances du réseau en termes de fiabilité et de consommation d'énergie. La solution possède également l'originalité de faire coexister des nœuds utilisant de différentes configurations MAC au sein du même réseau. Les résultats de simulations ont montré qu'une solution MAC basée sur l'apprentissage automatique pourrait tirer profit des avantages des différents protocoles MAC classiques. Les résultats montrent aussi qu'une solution MAC cognitive offre toujours le meilleur compromis entre fiabilité et consommation d'énergie, tout en prenant en compte l'équité entre les nœuds du réseau. La solution MAC cognitive testée pour des réseaux à haute densité a prouvé des bonnes propriétés de passage à l’échelle par rapport aux protocoles MACs classiques, ce qui constitue un autre atout important de notre solution
Dedicated networks for the Internet of Things appeared with the promise of connecting thousands of nodes, or even more, to a single base station in a star topology. This new logic represents a fundamental change in the way of thinking about networks, after decades during which research work mainly focused on multi-hop networks. Internet of Things networks are characterized by long transmission range, wide geographic coverage, low energy consumption and low set-up costs. This made it necessary to adapt the protocols at different architectural layers in order to meet the needs of these networks. Several players compete in the Internet of Things market, each trying to establish the most efficient solution. These players are mostly focused on modifying the physical layer, on the hardware part or through proposing new modulations. However, with regard to the channel access control solution (known as the MAC protocol), all the solutions proposed by these players are based on classic approaches such as Aloha and CSMA. The objective of this thesis is to propose a dynamic MAC solution for networks dedicated to the Internet of Things. The proposed solution has the ability to adapt to network conditions. This solution is based on a machine learning algorithm that learns from network history in order to establish the relationship between network conditions, MAC layer parameters and network performance in terms of reliability and energy consumption. The solution also has the originality of making possible the coexistence of nodes using different MAC configurations within the same network. The results of simulations have shown that a MAC solution based on machine learning could take advantage of the good properties of different conventional MAC protocols. The results also show that a cognitive MAC solution always offers the best compromise between reliability and energy consumption, while taking into account the fairness between the nodes of the network. The cognitive MAC solution tested for high density networks has proven better scalability compared to conventional MAC protocols, which is another important advantage of our solution
APA, Harvard, Vancouver, ISO, and other styles
22

Hyon, Tae-In. "Wireless ATM Networks Medium Access Control with Adaptive Parallel Multiple Substream CDMA Air-inteface." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/28163.

Full text
Abstract:
One of the most important components of any wireless network is the medium access control protocol. This research deals with wireless ATM (WATM) medium access control (MAC) protocol. Conventional studies concerning WATM have focused mainly on variations of the time-division-multiple-access (TDMA) method for the wireless aspect of WATM networks. However, there are many advantages that the direct-sequence code-division-multiple-access (DS-CDMA) air-interface method has, such as inherent robustness against multipath fading, better resilience against security infringement attempts, and greater overall capacity compared to the TDMA method as proven in the cellular telephone industry. The main reason behind the relatively broader support for the TDMA method is that the source bit rate is generally higher compared to the DS-CDMA method since the maximum data rate per mobile unit is limited by the processing gain of a traditional DS-CDMA method. In this research, the problem of limited data rate often associated with a DS-CDMA air-interface is alleviated by employing the recently conceived multi-coded DS-CDMA as the primary air-interface, which is known to achieve maximum data rate per mobile unit comparable to applications employing TDMA. The focus of this research is on overcoming periods of significant deterioration of the wireless channel by adaptively employing bit combining. A MAC protocol called Adaptive Parallel Multiple Sub-stream CDMA (APMS-CDMA) is proposed to alternate between normal and ¡°rake-in¡± mode to deal with the often hostile environment of a WATM network. Although the context in which this research effort was conducted was a wireless ATM network environment, the protocol and techniques developed here can be applied to other infrastructure wireless systems using multi-code CDMA as their air-interface. Further, independent of the air-interface technique employed, other wireless systems can benefit from the channel estimation and the traffic management techniques used in this research effort.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
23

Ahmed, Sabbir. "Performance of Multi-Channel Medium Access Control Protocol incorporating Opportunistic Cooperative Diversity over Rayleigh Fading Channel." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6171.

Full text
Abstract:
This thesis paper proposes a Medium Access Control (MAC) protocol for wireless networks, termed as CD-MMAC that utilizes multiple channels and incorporates opportunistic cooperative diversity dynamically to improve its performance. The IEEE 802.11b standard protocol allows the use of multiple channels available at the physical layer but its MAC protocol is designed only for a single channel. The proposed protocol utilizes multiple channels by using single interface and incorporates opportunistic cooperative diversity by using cross-layer MAC. The new protocol leverages the multi-rate capability of IEEE 802.11b and allows wireless nodes far away from destination node to transmit at a higher rate by using intermediate nodes as a relays. The protocol improves network throughput and packet delivery ratio significantly and reduces packet delay. The performance improvement is further evaluated by simulation and analysis.
sabbir@linuxmail.org
APA, Harvard, Vancouver, ISO, and other styles
24

Amadou, Ibrahim. "Protocoles de routage sans connaissance de voisinage pour réseaux radio multi-sauts." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00763865.

Full text
Abstract:
L'efficacité énergétique constitue l'objectif clef pour la conception des protocoles de communication pour des réseaux de capteurs radio multi-sauts. Beaucoup d'efforts ont été réalisés à différents niveaux de la pile protocolaire à travers des algorithmes d'agrégation spatiale et temporelle des données, des protocoles de routage efficaces en énergie, et des couches d'accès au médium avec des mécanismes d'ordonnancement permettant de mettre la radio en état d'endormissement afin d'économiser l'énergie. Pour autant, ces protocoles utilisent de façon importante des paquets de contrôle et de découverte du voisinage qui sont coûteux en énergie. En outre, cela se fait très souvent sans aucune interaction entre les différentes couches de la pile. Ces travaux de thèse s'intéressent donc particulièrement à la problématique de l'énergie des réseaux de capteurs à travers des protocoles de routage et d'accès au médium. Les contributions de cette thèse se résument de la manière suivante : Nous nous sommes tout d'abord intéressés à la problématique de l'énergie au niveau routage. Dans cette partie, les contributions se subdivisent en deux parties. Dans un premier temps, nous avons proposé une analyse théorique de la consommation d'énergie des protocoles de routage des réseaux radio multi-sauts d'appréhender au mieux les avantages et les inconvénients des uns et des autres en présence des modèles de trafic variables, un diamètre du réseau variable également et un modèle radio qui permet de modéliser les erreurs de réception des paquets. À l'issue de cette première étude, nous sommes parvenus à la conclusion que pour être économe en énergie, un protocole de routage doit avoir des approches similaires à celle des protocoles de routage géographique sans message hello. Puis, dans un second temps, nous introduisons une étude de l'influence des stratégies de relayage dans un voisinage à 1 saut sur les métriques de performance comme le taux de livraison, le nombre de messages dupliqués et la consommation d'énergie. Cette étude est suivie par une première proposition de protocole de routage géographique sans message hello (Pizza-Forwarding (PF)) exploitant des zones de relayage optimisées et sans aucune hypothèse sur les propriétés du canal radio. Dans le but de réduire considérablement la consommation de PF, nous proposons de le combiner avec une adaptation d'un protocole MAC asynchrone efficace en énergie à travers une approche transversale. La combinaison de ces deux approches montre un gain significatif en terme d'économie d'énergie avec des très bon taux de livraison et cela quels que soient les scénarios et la nature de la topologique.
APA, Harvard, Vancouver, ISO, and other styles
25

Karaputugala, Gamacharige Madushan Thilina. "On spectrum sensing, resource allocation, and medium access control in cognitive radio networks." Elsevier, 2012. http://hdl.handle.net/1993/30650.

Full text
Abstract:
The cognitive radio-based wireless networks have been proposed as a promising technology to improve the utilization of the radio spectrum through opportunistic spectrum access. In this context, the cognitive radios opportunistically access the spectrum which is licensed to primary users when the primary user transmission is detected to be absent. For opportunistic spectrum access, the cognitive radios should sense the radio environment and allocate the spectrum and power based on the sensing results. To this end, in this thesis, I develop a novel cooperative spectrum sensing scheme for cognitive radio networks (CRNs) based on machine learning techniques which are used for pattern classification. In this regard, unsupervised and supervised learning-based classification techniques are implemented for cooperative spectrum sensing. Secondly, I propose a novel joint channel and power allocation scheme for downlink transmission in cellular CRNs. I formulate the downlink resource allocation problem as a generalized spectral-footprint minimization problem. The channel assignment problem for secondary users is solved by applying a modified Hungarian algorithm while the power allocation subproblem is solved by using Lagrangian technique. Specifically, I propose a low-complexity modified Hungarian algorithm for subchannel allocation which exploits the local information in the cost matrix. Finally, I propose a novel dynamic common control channel-based medium access control (MAC) protocol for CRNs. Specifically, unlike the traditional dedicated control channel-based MAC protocols, the proposed MAC protocol eliminates the requirement of a dedicated channel for control information exchange.
October 2015
APA, Harvard, Vancouver, ISO, and other styles
26

Chandramohan, Vijay. "Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mouradian, Alexandre. "Proposition et vérification formelle de protocoles de communications temps-réel pour les réseaux de capteurs sans fil." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00910394.

Full text
Abstract:
Les RCsF sont des réseaux ad hoc, sans fil, large échelle déployés pour mesurer des paramètres de l'environnement et remonter les informations à un ou plusieurs emplacements (nommés puits). Les éléments qui composent le réseau sont de petits équipements électroniques qui ont de faibles capacités en termes de mémoire et de calcul ; et fonctionnent sur batterie. Ces caractéristiques font que les protocoles développés, dans la littérature scientifique de ces dernières années, visent principalement à auto-organiser le réseau et à réduire la consommation d'énergie. Avec l'apparition d'applications critiques pour les réseaux de capteurs sans fil, de nouveau besoins émergent, comme le respect de bornes temporelles et de fiabilité. En effet, les applications critiques sont des applications dont dépendent des vies humaines ou l'environnement, un mauvais fonctionnement peut donc avoir des conséquences catastrophiques. Nous nous intéressons spécifiquement aux applications de détection d'événements et à la remontée d'alarmes (détection de feu de forêt, d'intrusion, etc), ces applications ont des contraintes temporelles strictes. D'une part, dans la littérature, on trouve peu de protocoles qui permettent d'assurer des délais de bout en bout bornés. Parmi les propositions, on trouve des protocoles qui permettent effectivement de respecter des contraintes temporelles mais qui ne prennent pas en compte les spécificités des RCsF (énergie, large échelle, etc). D'autres propositions prennent en compte ces aspects, mais ne permettent pas de garantir des bornes temporelles. D'autre part, les applications critiques nécessitent un niveau de confiance très élevé, dans ce contexte les tests et simulations ne suffisent pas, il faut être capable de fournir des preuves formelles du respect des spécifications. A notre connaissance cet aspect est très peu étudié pour les RcsF. Nos contributions sont donc de deux types : * Nous proposons un protocole de remontée d'alarmes, en temps borné, X-layer (MAC/routage, nommé RTXP) basé sur un système de coordonnées virtuelles originales permettant de discriminer le 2-voisinage. L'exploitation de ces coordonnées permet d'introduire du déterminisme et de construire un gradient visant à contraindre le nombre maximum de sauts depuis toute source vers le puits. Nous proposons par ailleurs un mécanisme d'agrégation temps-réel des alarmes remontées pour lutter contre les tempêtes de détection qui entraînent congestion et collision, et donc limitent la fiabilité du système. * Nous proposons une méthodologie de vérification formelle basée sur les techniques de Model Checking. Cette méthodologie se déroule en trois points, qui visent à modéliser de manière efficace la nature diffusante des réseaux sans fil, vérifier les RCsF en prenant en compte la non-fiabilité du lien radio et permettre le passage à l'échelle de la vérification en mixant Network Calculus et Model Checking. Nous appliquons ensuite cette méthodologie pour vérifier RTXP.
APA, Harvard, Vancouver, ISO, and other styles
28

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
29

Sivanantha, Akhil. "EM-MAC : an energy-aware multi-channel medium access control protocol for multi-hop wireless networks." Thesis, 2012. http://hdl.handle.net/1957/28857.

Full text
Abstract:
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access capabilities while minimizing energy consumption. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium contention on the common control channel, and to select the best available data channel for data communication. Our protocol saves energy by allowing devices that have not gained access to the medium to switch to doze mode until the channel becomes idle again. The pair of devices that gains access to the data channel reserves and uses the channel until the end of the reservation period. At the end of each reservation period, devices belonging to a given data channel contend again for the medium, and only the pair of devices that wins access to the medium is allowed to communicate on the channel while all other devices switch to doze mode. Using simulations, we show that EM-MAC yields substantial energy savings when compared with iMAC.
Graduation date: 2012
APA, Harvard, Vancouver, ISO, and other styles
30

Liu, Kuang-Hao. "Design, Modeling, and Analysis for MAC Protocols in Ultra-wideband Networks." Thesis, 2008. http://hdl.handle.net/10012/3639.

Full text
Abstract:
Ultra-wideband (UWB) is an appealing transmission technology for short-range, bandwidth demanded wireless communications. With the data rate of several hundred megabits per second, UWB demonstrates great potential in supporting multimedia streams such as high-definition television (HDTV), voice over Internet Protocol (VoIP), and console gaming in office or home networks, known as the wireless personal area network (WPAN). While vast research effort has been made on the physical layer issues of UWB, the corresponding medium access control (MAC) protocols that exploit UWB technology have not been well developed. Given an extremely wide bandwidth of UWB, a fundamental problem on how to manage multiple users to efficiently utilize the bandwidth is a MAC design issue. Without explicitly considering the physical properties of UWB, existing MAC protocols are not optimized for UWB-based networks. In addition, the limited processing capability of UWB devices poses challenges to the design of low-complexity MAC protocols. In this thesis, we comprehensively investigate the MAC protocols for UWB networks. The objective is to link the physical characteristics of UWB with the MAC protocols to fully exploit its advantage. We consider two themes: centralized and distributed UWB networks. For centralized networks, the most critical issue surrounding the MAC protocol is the resource allocation with fairness and quality of service (QoS) provisioning. We address this issue by breaking down into two scenarios: homogeneous and heterogeneous network configurations. In the homogeneous case, users have the same bandwidth requirement, and the objective of resource allocation is to maximize the network throughput. In the heterogeneous case, users have different bandwidth requirements, and the objective of resource allocation is to provide differentiated services. For both design objectives, the optimal scheduling problem is NP-hard. Our contributions lie in the development of low-complexity scheduling algorithms that fully exploit the characteristics of UWB. For distributed networks, the MAC becomes node-based problems, rather than link-based problems as in centralized networks. Each node either contends for channel access or reserves transmission opportunity through negotiation. We investigate two representative protocols that have been adopted in the WiMedia specification for future UWB-based WPANs. One is a contention-based protocol called prioritized channel access (PCA), which employs the same mechanisms as the enhanced distributed channel access (EDCA) in IEEE 802.11e for providing differentiated services. The other is a reservation-based protocol called distributed reservation protocol (DRP), which allows time slots to be reserved in a distributed manner. Our goal is to identify the capabilities of these two protocols in supporting multimedia applications for UWB networks. To achieve this, we develop analytical models and conduct detailed analysis for respective protocols. The proposed analytical models have several merits. They are accurate and provide close-form expressions with low computational effort. Through a cross-layer approach, our analytical models can capture the near-realistic protocol behaviors, thus useful insights into the protocol can be obtained to improve or fine-tune the protocol operations. The proposed models can also be readily extended to incorporate more sophisticated considerations, which should benefit future UWB network design.
APA, Harvard, Vancouver, ISO, and other styles
31

Maiya, Megha. "iMAC : improved medium access control for multi-channel multi-hop wireless networks." Thesis, 2010. http://hdl.handle.net/1957/18086.

Full text
Abstract:
Trends in wireless networks are increasingly pointing towards a future with multi-hop networks deployed in multi-channel environments. In this thesis, we present the design for iMAC—a protocol targeted at medium access control in such environments. iMAC uses control packets on a common control channel to faciliate a three-way handshake between the sender and receiver for every packet transmission. This handshake enables the sender and receiver to come to consensus on a channel to use for data transmission and also signals to neighboring nodes about the contention on that channel. iMAC then uses a mechanism similar to 802.11 for data communication. Our evaluation of iMAC shows that it provides significant gains in throughput in comparison with uninformed channel selection, especially when contention for channel bandwidth is neither too low nor too high; intelligent selection of channels by iMAC is necessary to harness available bandwidth resources in the presence of medium levels of contention.
Graduation date: 2011
APA, Harvard, Vancouver, ISO, and other styles
32

Wu, Qian. "Performance Study on a Dual Prohibition Multiple Access Protocol in Mobile Ad Hoc and Wireless Mesh Networks." Thesis, 2007. http://hdl.handle.net/1974/849.

Full text
Abstract:
Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2007-09-27 21:48:20.594
Wireless networks are less reliable than wired networks because channels are “exposed” to the surrounding environment that is susceptible to interference and noise. To minimize losses of data due to collisions, wireless networks need a mechanism to regulate the access on the transmission medium. Medium Access Control (MAC) protocols control access to the shared communication medium so that it can be used efficiently. In this thesis, we first describe the collision-controlled Dual Prohibition Multiple Access (DPMA) protocol [45]. The main mechanisms implemented in DPMA, such as binary dual prohibition, power control, interference control, and support for differentiated services (DiffServ), are presented in detail. We conducted a thorough simulation study on DPMA protocol from several aspects. First, we conduct simulations to observe the effects of binary competition number (BCN), unit slot length and safe margin on the performance of DPMA. Secondly, the DiffServ capability of DPMA is demonstrated through simulation results. Finally, we compare the DPMA protocol with the CSMA/CA protocol and find that DPMA with optimal configuration has better performance than CSMA/CA under both low and high network density.
Master
APA, Harvard, Vancouver, ISO, and other styles
33

Vivek, Kumar *. "Use Of Directional Antennas For Energy-Efficient Design Of Coordinator And Cluster Protocols In Ad hoc Wireless Networks." Thesis, 2004. http://etd.iisc.ernet.in/handle/2005/1309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rambim, Dorothy Apondi. "Transmission control protocol (TCP) and medium access control (MAC) cross-layer enchancement in wireless." Thesis, 2011. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000384.

Full text
Abstract:
M. Tech. Electrical Engineering.
Widespread deployment of wireless local area networks (WLANs) and a gradual increase in streaming applications have brought about a demand for improved Quality of Service (QoS) in wireless networks. The IEEE 802.11e standard was proposed to provide QoS mechanisms for assigning high priority to delay-sensitive applications. However, Internet traffic is still dominated by TCP based applications, and the negative effects of the IEEE 802.11e service differentiation scheme on TCP performance in the presence of high priority traffic are becoming a challenging issue. TCP has been found to perform poorly in wireless networks, including IEEE 802.11e; more applications with higher QoS demands use UDP in the transport layer than TCP. Therefore, the QoS of low priority traffic in 802.11e is not guaranteed in networks highly loaded with high priority traffic. This is aggravated by the class differentiation introduced in current QoS protocols, which results in TCP applications being starved during high traffic load. The motivation of this work is to enhance the interaction between the TCP and MAC protocols in order to improve TCP performance in WLANs.
APA, Harvard, Vancouver, ISO, and other styles
35

Huang, Lui-Zhong, and 黃劉中. "A Simulation Study on a Medium Access Control (MAC) Protocol for Personal Communications." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/89217253085279888047.

Full text
Abstract:
碩士
國立交通大學
電信研究所
82
In this report, a Medium Access Control (MAC) protocol for a personal communication system is presented and simulated. This protocol is a hybrid of random access and controlled protocol and can accommodate both voice and data information. In order to study the performance of this protocol, we proposed a list- directed discrete event simulation method and two-way traffic models for both voice and data traffic to simulate this MAC protocol. We evaluated system performance such as throughput, voice dropping probability, and average data transmission delay.
APA, Harvard, Vancouver, ISO, and other styles
36

HU, JEN-HUA, and 胡仁華. "A probing-based Bluetooth medium access control (MAC) protocol in the ISM band wireless network." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/73690578437288213008.

Full text
Abstract:
碩士
國立臺灣大學
資訊工程學研究所
90
As time goes on, distributed computing evolved into mobile computing in 90s, and then pervasive computing substitutes mobile computing recently [18]. Specifically, existing wired technologies are going to be enhanced or complimented by novel wireless technologies, e.g., mobile phone, and wireless LAN in replace of traditional phone and wired LAN. Light and thin computing devices (e.g., notebook, PDA) supersedes heavy and thick devices for portability. Pervasive computing environment could be characterized as one saturated with computing and communication capability, yet elegant integrated with human users. Bluetooth, a short range, low power, and low cost radio technology operating in ISM band plays an critical role to enable pervasive computing due to the ability to be embedded in any type of device. Since the ISM band is license-free, Bluetooth might experience interference from other wireless communication systems, or even Bluetooth devices themselves. Once the interference occurs, packets of transmission may be dropped seriously. Bluetooth may retransmit a packet several times and it costs power and time. Two major types of interferences could jeopardize Bluetooth connections. Caused by other overlapping Bluetooth devices, the influence may interfere the current discrete channels, and leave uncertainty of interfering the next slot since the characteristic of FHSS. The other type of interference source may come from WLAN. This type may interfere in a continuous sub-band and the interference is predictable. A modern device will be highly expected to have an intelligent policy for probing wireless environment and adjusting its medium access method to avoid transmission collision in MAC layer (media access control). This thesis proposes a new MAC mechanism based on the information probed by the master. The proposed protocol adopts a packet scheduler and a suspension scheme in a sub-band to cope with interference caused by WLAN. As the interference caused by other Bluetooth piconets gets serious, the proposed mechanism exploits a random backoff algorithm to resolve it. Through the simulation and analytical experiments, the probing-based MAC will reduce power consumption, reduce the packet delay, and upgrade the system throughput.
APA, Harvard, Vancouver, ISO, and other styles
37

"Robust and Efficient Medium Access Despite Jamming." Doctoral diss., 2012. http://hdl.handle.net/2286/R.I.15087.

Full text
Abstract:
abstract: Interference constitutes a major challenge for communication networks operating over a shared medium where availability is imperative. This dissertation studies the problem of designing and analyzing efficient medium access protocols which are robust against strong adversarial jamming. More specifically, four medium access (MAC) protocols (i.e., JADE, ANTIJAM, COMAC, and SINRMAC) which aim to achieve high throughput despite jamming activities under a variety of network and adversary models are presented. We also propose a self-stabilizing leader election protocol, SELECT, that can effectively elect a leader in the network with the existence of a strong adversary. Our protocols can not only deal with internal interference without the exact knowledge on the number of participants in the network, but they are also robust to unintentional or intentional external interference, e.g., due to co-existing networks or jammers. We model the external interference by a powerful adaptive and/or reactive adversary which can jam a (1 − ε)-portion of the time steps, where 0 < ε ≤ 1 is an arbitrary constant. We allow the adversary to be adaptive and to have complete knowledge of the entire protocol history. Moreover, in case the adversary is also reactive, it uses carrier sensing to make informed decisions to disrupt communications. Among the proposed protocols, JADE, ANTIJAM and COMAC are able to achieve Θ(1)-competitive throughput with the presence of the strong adversary; while SINRMAC is the first attempt to apply SINR model (i.e., Signal to Interference plus Noise Ratio), in robust medium access protocols design; the derived principles are also useful to build applications on top of the MAC layer, and we present SELECT, which is an exemplary study for leader election, which is one of the most fundamental tasks in distributed computing.
Dissertation/Thesis
Ph.D. Computer Science 2012
APA, Harvard, Vancouver, ISO, and other styles
38

Gao, J. L., J. Hu, Geyong Min, and L. Xu. "Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic." 2013. http://hdl.handle.net/10454/9655.

Full text
Abstract:
No
Supported by the IEEE 802.15.4 standard, embedded sensor networks have become popular and been widely deployed in recent years. The IEEE 802.15.4 medium access control (MAC) protocol is uniquely designed to meet the desirable requirements of the low end-to-end delay, low packet loss, and low power consumption in the low rate wireless personal areas networks (LR-WPANs). This paper develops an analytical model to quantify the key performance metrics of the MAC protocol in LR-WPANs with bursty ONOFF traffic. This study fills the gap in the literature by removing the assumptions of saturated traffic or nonbursty unsaturated traffic conditions, which are unable to capture the characteristics of bursty multimedia traffic in sensor networks. This analytical model can be used to derive the QoS performance metrics in terms of throughput and total delay. The accuracy of the model is verified through NS-2 (http://www.isi.edu/nsnam/ns/) simulation experiments. This model is adopted to investigate the performance of the MAC protocol in LR-WPANs under various traffic patterns, different loads, and various numbers of stations. Numerical results show that the traffic patterns and traffic burstiness have a significant impact on the delay performance of LR-WPANs.
APA, Harvard, Vancouver, ISO, and other styles
39

Gama, Oscar. "A MAC protocol for quality of service provisioning in adaptive biomedical wireless sensor networks." Doctoral thesis, 2011. http://hdl.handle.net/1822/19742.

Full text
Abstract:
Doctorate program on Electronics and Computer Engineering
New healthcare solutions are being explored to improve the quality of care and the quality of life of patients, as well as the sustainability and efficiency of the healthcare services. In this context, wireless sensor networks (WSNs) constitute a key technology for closing the loop between patients and healthcare providers, as WSNs provide sensing ability, as well as mobility and portability, essential characteristics for wide acceptance of wireless healthcare technology. Despite the recent advances in the field, the wide adoption of healthcare WSNs is still conditioned by quality of service (QoS) issues, namely at the medium access control (MAC) level. MAC protocols currently available for WSNs are not able to provide the required QoS to healthcare applications in scenarios of medical emergency or intensive medical care. To cover this shortage, the present work introduces a MAC protocol with novel concepts to assure the required QoS regarding the data transmission robustness, packet delivery deadline, bandwidth efficiency, and energy preservation. The proposed MAC protocol provides a new and efficient dynamic reconfiguration mechanism, so that relevant operational parameters may be redefined dynamically in accordance with the patients’ clinical state. The protocol also provides a channel switching mechanism and the capacity of forwarding frames in two-tier network structures. To test the performance of the proposed MAC protocol and compare it with other MAC protocols, a simulation platform was implemented. In order to validate the simulation results, a physical testbed was implemented to replicate the tests and verify the results. Sensor nodes were specifically designed and assembled to implement this physical testbed. New healthcare solutions are being explored to improve the quality of care and the quality of life of patients, as well as the sustainability and efficiency of the healthcare services. In this context, wireless sensor networks (WSNs) constitute a key technology for closing the loop between patients and healthcare providers, as WSNs provide sensing ability, as well as mobility and portability, essential characteristics for wide acceptance of wireless healthcare technology. Despite the recent advances in the field, the wide adoption of healthcare WSNs is still conditioned by quality of service (QoS) issues, namely at the medium access control (MAC) level. MAC protocols currently available for WSNs are not able to provide the required QoS to healthcare applications in scenarios of medical emergency or intensive medical care. To cover this shortage, the present work introduces a MAC protocol with novel concepts to assure the required QoS regarding the data transmission robustness, packet delivery deadline, bandwidth efficiency, and energy preservation. The proposed MAC protocol provides a new and efficient dynamic reconfiguration mechanism, so that relevant operational parameters may be redefined dynamically in accordance with the patients’ clinical state. The protocol also provides a channel switching mechanism and the capacity of forwarding frames in two-tier network structures. To test the performance of the proposed MAC protocol and compare it with other MAC protocols, a simulation platform was implemented. In order to validate the simulation results, a physical testbed was implemented to replicate the tests and verify the results. Sensor nodes were specifically designed and assembled to implement this physical testbed. Preliminary tests using the simulation and physical platforms showed that simulation results diverge significantly from reality, if the performance of the WSN software components is not considered. Therefore, a parametric model was developed to reflect the impact of this aspect on a physical WSN. Simulation tests using the parametric model revealed that the results match satisfactorily those obtained in reality. After validating the simulation platform, comparative tests against IEEE 802.15.4, a prominent standard used in many wireless healthcare systems, showed that the proposed MAC protocol leads to a performance increase regarding diverse QoS metrics, such as packet loss and bandwidth efficiency, as well as scalability, adaptability, and power consumption. In this way, AR-MAC is a valuable contribution to the deployment of wireless e-health technology and related applications.
Novas soluções de cuidados de saúde estão a ser exploradas para melhorar a qualidade de tratamento e a qualidade de vida dos pacientes, assim como a sustentabilidade e eficiência dos serviços de cuidado de saúde. Neste contexto, as redes de sensores sem fios (wireless sensor networks - WSN) são uma tecnologia chave para fecharem o ciclo entre os pacientes e os prestadores de cuidados de saúde, uma vez que as WSNs proporcionam não só capacidade sensorial mas também mobilidade e portabilidade, caracteristicas essenciais para a aceitação à larga escala da tecnologia dos cuidados de saúde sem fios. Apesar dos avanços recentes na área, a aceitação genérica das WSNs de cuidados de saúde ainda está condicionada por aspectos relacionados com a qualidade de serviço (quality of service - QoS), nomeadamente ao nível do controlo de acesso ao meio (medium access control - MAC). Os protocolos MAC actualmente disponíveis para WSNs são incapazes de fornecer a QoS desejada pelas aplicações médicas em cenários de emergência ou cuidados médicos intensivos. Para suprimir esta carência, o presente trabalho apresenta um protocolo MAC com novos conceitos a fim de assegurar a QoS respeitante à robustez de transmissão de dados, ao limite temporal da entrega de pacotes, à utilização da largura de banda e à preservação da energia eléctrica. O protocolo MAC proposto dispõe de um novo e eficiente mecanismo de reconfiguração para que os parâmetros operacionais relevantes possam ser redefinidos dinamicamente de acordo com o estado de saúde do paciente. O protocolo também oferece um mecanismo autónomo de comutação de canal, bem como a capacidade de encaminhar pacotes em redes de duas camadas. Para testar o desempenho do protocolo MAC proposto e compará-lo com outros protocolos MAC foi implementada uma plataforma de simulação. A fim de validar os resultados da simulação foi também implementada uma plataforma física para permitir replicar os testes e verificar os resultados. Esta plataforma física inclui nós sensoriais concebidos e construídos de raiz para o efeito. Testes preliminares usando as plataformas de simulação e física mostraram que os resultados de simulação divergem significativamente da realidade, caso o desempenho dos componentes do software presentes nos componentes da WSN não seja considerado. Por conseguinte, desenvolveu-se um modelo paramétrico para reflectir o impacto deste aspecto numa WSN real. Testes de simulação efectuados com o modelo paramétrico apresentaram resultados muito satisfatórios quando comparados com os obtidos na realidade. Uma vez validada a plataforma de simulação, efectuaram-se testes comparativos com a norma IEEE 802.15.4, proeminentemente usada em projectos académicos de cuidados de saúde sem fios. Os resultados mostraram que o protocolo MAC conduz a um desempenho superior no tocante a diversas métricas QoS, tais como perdas de pacotes e utilização de largura de banda, bem como no respeitante à escalabilidade, adaptabilidade e consumo de energia eléctrica. Assim sendo, o protocolo MAC proposto representa um valioso contributo para a concretização efectiva dos cuidados de saúde sem fios e suas aplicações.
APA, Harvard, Vancouver, ISO, and other styles
40

Mishra, Rajan. "Performance Analysis Of MAC Layer Of High Rate Wireless Personal Area Network (HR WPAN)." Thesis, 2005. http://etd.iisc.ernet.in/handle/2005/1407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Afzal, Humaira, Irfan U. Awan, Muhammad R. Mufti, and Ray E. Sheriff. "Modeling of initial contention window size for successful initial ranging process in IEEE 802.22 WRAN cell." 2014. http://hdl.handle.net/10454/9110.

Full text
Abstract:
No
Avoiding collision among contending customer premise equipments (CPEs) attempting to associate with a base station (BS) in a wireless regional area network (WRAN) is a challenging issue. The collision probability is highly dependent upon the size of the initial contention window and the number of contending CPEs. To reduce the collision probability among CPEs in order to start the ranging process in an IEEE 802.22 network, the BS needs to adjust the initial contention window size. This paper provides an analytical framework to estimate the ranging request collision probability depending upon the size of the initial contention window and the number of CPEs attempting to join the IEEE WRAN cell. The accuracy of the estimated curve is analyzed for various numbers of contention CPEs on the basis of the relative errors. The numerical results confirm that the approximation works reasonably well for finding the ranging request collision probability for any number of contention CPEs at a particular value of initial contention window size. Moreover, this approximation provides the threshold size for a contention window to start the initial ranging process for any number of CPEs in an IEEE 802.22 network. (C) 2014 Elsevier B.V. All rights reserved.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography