scholarly journals Enhanced Wireless Grid Technologies for the Harmonized Devices in Future IoT Systems

Author(s):  
Fumihide Kojima

Abstract The paper proposes the enhanced wireless grid technologies for the future Internet of Things (IoT) systems. The paper shows a realization of the wireless grid by suitably exploiting the existing wireless Smart Utility Networks (SUN) that is standardized by IEEE 802.15.4g/4e task groups and is certified by Wi-SUN alliance. Medium Access Control (MAC) layer functions that is mainly defined by IEEE 802.15.4e standard and IEEE 802.15.10 recommended practice are effectively modified according to the assumed IoT services and satisfy the requirement of harmonized mesh activities by massive radio devices. In order to realize this function, SUN radio devices that exploit Layer 2 Routing (L2R) control scheme in IEEE 802.15.10 are employed to realize the autonomous mesh management function as well as the multiple service supporting function. The performance is evaluated through the experiments by employing the developed SUN devices as well as simulator evaluations. The paper also proposes novel data retransmission schemes by exploiting the data concatenation functions in IEEE 802.15.10 as well as evaluating its performances by computer simulations and experiments. Consequently, this paper confirms that the obtained results through both simulator evaluations and experiments matches to each other.

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Xin Yang ◽  
Ling Wang ◽  
Jian Xie ◽  
Zhaolin Zhang

Wireless sensors network (WSN) is widely used in the Internet of Things at present. However, limited energy source is a critical problem in the improvement and practical applications of WSN, so it is necessary to improve the energy efficiency. As another important evaluation criterion of transmission performance, throughput should be improved too. To mitigate both of the problems at the same time, by taking the advantages of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) at the medium access control (MAC) layer of WSN, we propose a hybrid TDMA/CSMA MAC layer protocol. Meanwhile, we design a novel power control scheme to further reduce the energy consumption and optimize the transmission slots. The simulation results demonstrate that the proposed protocol significantly improves the throughput and energy efficiency.


IEEE 802.15.4e defines the specification of PHY layer and MAC layer. Although distinguished by its popularity and strength for Wireless Sensor Networks (WSNs), it still suffers from several limitations that deteriorates its performance. One such restriction is a high collision probability that degrades the performance of a dense network. In this article, we develop a Slotted Access Window (SAW) mechanism, a medium access technique to mitigate high collision probability and energy consumption in dense and battery constrained networks. An accurate analytical model is presented to assess the effectiveness of SAW mechanism and validated using the ns-3 simulator. Finally, results show that the SAW mechanism significantly improves the throughput, energy efficiency, and delay in contrast to the default medium access mechanism.


2012 ◽  
Vol 8 (1) ◽  
pp. 834784 ◽  
Author(s):  
Joseph Kabara ◽  
Maria Calle

Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). However, medium access control (MAC) layer requirements for communications in wireless sensor networks (WSNs) vary because the network is usually optimized for specific applications. Thus, one particular standard will hardly be suitable for every possible application. Two general categories of MAC techniques exist: contention based and schedule based. This paper explains these two main approaches and includes examples of each one. The paper concludes with a unique performance analysis and comparison of benefits and limitations of each protocol with respect to WSNs.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4206
Author(s):  
Sun ◽  
Liu ◽  
Paolini

In this paper, a dynamic access probability adjustment strategy for coded random accessschemes based on successive interference cancellation (SIC) is proposed. The developed protocolconsists of judiciously tuning the access probability, therefore controlling the number of transmittingusers, in order to resolve medium access control (MAC) layer congestion states in high load conditions.The protocol is comprised of two steps: Estimation of the number of transmitting users during thecurrent MAC frame and adjustment of the access probability to the subsequent MAC frame, based onthe performed estimation. The estimation algorithm exploits a posteriori information, i.e., availableinformation at the end of the SIC process, in particular it relies on both the frame configuration(residual number of collision slots) and the recovered users configuration (vector of recovered users)to effectively reduce mean-square error (MSE). During the access probability adjustment phase, atarget load threshold is employed, tailored to the packet loss rate in the finite frame length case.Simulation results revealed that the developed estimator was able to achieve remarkable performanceowing to the information gathered from the SIC procedure. It also illustrated how the proposeddynamic access probability strategy can resolve congestion states efficiently.


10.5772/9476 ◽  
2010 ◽  
Author(s):  
Jesus Alonso-Zarate ◽  
Elli Kartsakli ◽  
Luis Alonso ◽  
Christos Verikoukis

2008 ◽  
Vol 7 (10) ◽  
pp. 3988-3998 ◽  
Author(s):  
Hai Jiang ◽  
Ping Wang ◽  
Weihua Zhuang ◽  
H.V. Poor

2013 ◽  
pp. 83-108
Author(s):  
Weiping Sun ◽  
Munhwan Choi ◽  
Sunghyun Choi

IEEE 802.11ah is an emerging Wireless LAN (WLAN) standard that defines a WLAN system operating at sub 1 GHz license-exempt bands. Thanks to the favorable propagation characteristics of the low frequency spectra, 802.11ah can provide much improved transmission range compared with the conventional 802.11 WLANs operating at 2.4 GHz and 5 GHz bands. 802.11ah can be used for various purposes including large scale sensor networks, extended range hotspot, and outdoor Wi-Fi for cellular traffic offloading, whereas the available bandwidth is relatively narrow. In this paper, we give a technical overview of 802.11ah Physical (PHY) layer and Medium Access Control (MAC) layer. For the 802.11ah PHY, which is designed based on the down-clocked operation of IEEE 802.11ac’s PHY layer, we describe its channelization and transmission modes. Besides, 802.11ah MAC layer has adopted some enhancements to fulfill the expected system requirements. These enhancements include the improvement of power saving features, support of large number of stations, efficient medium access mechanisms and throughput enhancements by greater compactness of various frame formats. Through the numerical analysis, we evaluate the transmission range for indoor and outdoor environments and the theoretical throughput with newly defined channel access mechanisms.


2013 ◽  
Vol 16 (2) ◽  
Author(s):  
Ana Morales ◽  
María Villapol

In most of the communication protocol specification documents, there is little, if any, use of more formal techniques for specifying the protocols, such as state and service primitive tables. Thus, these documents are sometimes ambiguous, difficult to understand, and imprecise. The IEEE 802.16 standard document is responsible for specifying and describing the air interface of the BWA systems (Broadband Wireless Access Systems) point to multipoint fixed and mobile networks, and is limited to the description of the MAC(Medium Access Control) layer and physical (PHY). Since the MAC layer is connection-oriented, the standard defines how the connection management service is provided. The service is specified as the occurrence of a set of well-defined service primitives. However, the description of the service specification is somehow informal and presents some ambiguities and inconsistences. So in this paper, we describe the omissions, uncertainties and discrepancies found in the standard documents and propose some solutions to fix these problems. We also provide a formal description of the connection management service specification using Finite State Automata (FSA).


Author(s):  
Pranav M. Pawar ◽  
Rasmus H. Nielsen ◽  
Neeli R. Prasad ◽  
Shingo Ohmori ◽  
Ramjee Prasad

Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, medium access control (MAC) layer attacks are considered the most harmful as they directly affect the available resources and thus the nodes’ energy consumption.The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it. The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of a WSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure mechanisms to reduce the degradation of the performance in WSNs due to an attack. Lastly, the paper proposes some solutions to reduce the effects of an attack.


Sign in / Sign up

Export Citation Format

Share Document