scholarly journals Wireless Network MAC Layer Performance Evaluation with Full-Duplex Capable Nodes

Author(s):  
William Jones ◽  
R. Eddie Willson ◽  
Mahesh Sooriyabandara ◽  
Angela Doufexi
Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 556
Author(s):  
Lucia Lo Bello ◽  
Gaetano Patti ◽  
Giancarlo Vasta

The IEEE 802.1Q-2018 standard embeds in Ethernet bridges novel features that are very important for automated driving, such as the support for time-driven communications. However, cars move in a world where unpredictable events may occur and determine unforeseen situations. To properly react to such situations, the in-car communication system has to support event-driven transmissions with very low and bounded delays. This work provides the performance evaluation of EDSched, a traffic management scheme for IEEE 802.1Q bridges and end nodes that introduces explicit support for event-driven real-time traffic. EDSched works at the MAC layer and builds upon the mechanisms defined in the IEEE 802.1Q-2018 standard.


2012 ◽  
Vol 8 (1) ◽  
pp. 834784 ◽  
Author(s):  
Joseph Kabara ◽  
Maria Calle

Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). However, medium access control (MAC) layer requirements for communications in wireless sensor networks (WSNs) vary because the network is usually optimized for specific applications. Thus, one particular standard will hardly be suitable for every possible application. Two general categories of MAC techniques exist: contention based and schedule based. This paper explains these two main approaches and includes examples of each one. The paper concludes with a unique performance analysis and comparison of benefits and limitations of each protocol with respect to WSNs.


Author(s):  
Rajni Dubey ◽  
Sanjeev Sharma ◽  
Lokesh Chouhan

Most of the frequency spectrum bands have already been licensed, and the licensed spectrum is not being utilized efficiently. Cognitive Radio Networks (CRNs) are the kind of full duplex radio that automatically altered its transmission or reception parameters, in such a way that the entire wireless communication network of which it is a node communicates efficiently, while avoiding interference with primary or secondary users. In this chapter, the authors introduce the concept of security threats that may pose a serious attack in CRN. Due to the unique characteristics of CRN, such network is highly vulnerable to security attacks compared to wireless network or infrastructure-based wireless network. The main objective of this chapter is to assist CR designers and the CR application engineers to consider the security factors in the early development stage of CR techniques. Challenges and various security issues are explored with respect to OSI (Open Systems Interconnection) reference model. Various possible and attacks are discussed broadly and respective solutions are also proposed by this chapter. Different architectures and models are also explained, and compared with the existing models.


2020 ◽  
Vol 17 (3) ◽  
pp. 160-170
Author(s):  
Peter Reji ◽  
K. Natarajan ◽  
K. R. Shobha

Sign in / Sign up

Export Citation Format

Share Document