On the Impact of priority-based MAC Layer Scheduling in 5G V2N multi-application Scenarios

Author(s):  
Thomas Deinlein ◽  
Moustafa Roshdi ◽  
Tianxiang Nan ◽  
Thomas Heyn ◽  
Anatoli Djanatliev ◽  
...  
Keyword(s):  
Author(s):  
Shehan Perera ◽  
Harsha Sirisena ◽  
Krzysztof Pawlikowski

An analysis of the impact of the packetization interval for constant bit rate traffic has been done in the context of the IEEE 802.16 MAC layer. Bandwidth used for overheads which include lower layer headers as well as retransmissions at the MAC layer is considered. An optimal packetization interval selection method for delay sensitive applications such as VoIP is proposed. Enhancements to the Unsolicited Grant Service retransmission strategy are proposed to further improve delay and minimize packet loss while making efficient use of the limited bandwidth resource.


Author(s):  
Monali Mavani ◽  
Krishna Asawa

: The privacy enabled IPv6 addressing mechanism ensures the privacy of node's identification in the communication messages. It makes adversaries difficult to track nodes and link any activities with the node's IP or the MAC address. Scalability of the privacy enabled IPv6 addressing scheme for 6LoWPAN may be affected due to underlying MAC layer mechanisms. Hence, this study aims to explore such impact. Addressing scheme is implemented in Contiki operating system which uses duty cycling at the MAC layer along with CSMA channel access mechanism. ContikiMAC and CXMAC are widely used duty cycling protocols in Contiki. An analytical study is presented in this paper, which analyses the IPv6 address configuration delay with ContikiMAC and CXMAC. Simulation is performed to corroborate the presented analytical model. The address configuration latency limits the scalability of the network. Hence, this paper studies the impact of duty cycling of the nodes on the address configuration latency and estimates the size of a single hop PAN. It is observed that ContikiMAC duty cycling protocol can achieve better performance compared to CXMAC protocol in terms of address configuration latency. In order to make up for the delay due to duty cycling, network can be divided into multiple PANs of smaller size where addressing process runs simultaneously.


2021 ◽  
Author(s):  
Roberto Valentini ◽  
Piergiuseppe Di Marco ◽  
Roberto Alesii ◽  
Fortunato Santucci

In this paper, we propose a framework for cross-layer analysis of multi-static passive RFID systems. The model takes into account details of the shared wireless channel, including fading and capture effect, whereas, at the medium access control (MAC) layer, the anti-collision mechanism proposed in the EPC Generation 2 standard is taken as a reference.<br>To address the complexity of the system model, we rely on a semi-analytical approach, that combines a moment matching approximation method to abstract the physical layer and Monte-Carlo simulations to describe the MAC dynamics.<br>Furthermore, based on the space diversity feature offered by the multi-static settings, we introduce the concept of capture deiversity and propose a modification to the standard to fully support this form of diversity.<br>Numerical results show the impact of deployment conditions and the relative positions of interrogator, tags, and detection points on the performance of tags' identification. We show how the number of detection points impacts the system performance under various channel conditions and MAC parameters' settings. Finally, we validate the proposed update of the MAC protocol, showing substantial performance improvement with respect to the standard collision resolution policy.


2021 ◽  
Author(s):  
Nargis Khan

The purpose of this dissertation work is to investigate the perspective of the application areas of machine to machine (M2M) communications specifically to build smart city. To have ubiquitous coverage over the city, we consider cellular infrastructure. We propose a M2M overlay network over the physical random access channel (PRACH) of LTE. Based on this architecture, we conduct a case study in a vehicular context and proposed a non-priority CSMA/CA based vehicular M2M (VM2M) overlay networks. The overlay architecture is implemented using a dedicated subset of preambles at the physical layer, and a carrier sense multiple access with collision avoidance (CSMA/CA) mechanism similar to the one used in IEEE 802.15.4 at the medium access control (MAC) layer. We evaluate the performance and interaction of regular human to human (H2H) traffic and VM2M traffic, in particular, the impact of RACH resource configuration and preamble format (PF) in large cells. We have shown that the proposed LTE based VM2M architecture is better suited for smart city scenarios with higher vehicular speed and larger distances without sacrificing performance of H2H traffic. To transmit priority messages with high data rate and more reliably, we also propose a novel priority based CSMA/CA machine to machine (PM2M) overlay network over LTE. The PM2M overlay‘s MAC is more sophisticated with priorities. The architecture is same in the physical layer with dedicated preambles and in MAC layer priority based CSMA/CA is used, which is similar to the one of IEEE 802.15.6. Finally, We propose an analytical model to evaluate the impact of error in the MAC layer of overlay networks during sensing the medium. We develop a 3 dimensional Discrete Time Markov chain (DTMCs) in order to model the backoff procedure of CSMA/CA mechanism with backoff error. We investigated the capacity of PM2M networks for with and without considering backoff error. We have shown that overlay network allows fair coexistence of PM2M and H2H traffic. To validate our scheme we compare the proposed approach with a reference approach. By performance evaluation, we have shown that PM2M overlay out performs compared with reference approach.


2018 ◽  
Vol 2018 ◽  
pp. 1-17 ◽  
Author(s):  
Shuja Ansari ◽  
Marvin Sánchez ◽  
Tuleen Boutaleb ◽  
Sinan Sinanovic ◽  
Carlos Gamio ◽  
...  

Vehicular safety applications have much significance in preventing road accidents and fatalities. Among others, cellular networks have been under investigation for the procurement of these applications subject to stringent requirements for latency, transmission parameters, and successful delivery of messages. Earlier contributions have studied utilization of Long-Term Evolution (LTE) under single cell, Friis radio, or simplified higher layer. In this paper, we study the utilization of LTE under multicell and multipath fading environment and introduce the use of adaptive awareness range. Then, we propose an algorithm that uses the concept of quality of service (QoS) class identifiers (QCIs) along with dynamic adaptive awareness range. Furthermore, we investigate the impact of background traffic on the proposed algorithm. Finally, we utilize medium access control (MAC) layer elements in order to fulfill vehicular application requirements through extensive system-level simulations. The results show that, by using an awareness range of up to 250 m, the LTE system is capable of fulfilling the safety application requirements for up to 10 beacons/s with 150 vehicles in an area of 2 × 2 km2. The urban vehicular radio environment has a significant impact and decreases the probability for end-to-end delay to be ≤100 ms from 93%–97% to 76%–78% compared to the Friis radio environment. The proposed algorithm reduces the amount of vehicular application traffic from 21 Mbps to 13 Mbps, while improving the probability of end-to-end delay being ≤100 ms by 20%. Lastly, use of MAC layer control elements brings the processing of messages towards the edge of network increasing capacity of the system by about 50%.


2021 ◽  
Author(s):  
Roberto Valentini ◽  
Piergiuseppe Di Marco ◽  
Roberto Alesii ◽  
Fortunato Santucci

In this paper, we propose a framework for cross-layer analysis of multi-static passive RFID systems. The model takes into account details of the shared wireless channel, including fading and capture effect, whereas, at the medium access control (MAC) layer, the anti-collision mechanism proposed in the EPC Generation 2 standard is taken as a reference.<br>To address the complexity of the system model, we rely on a semi-analytical approach, that combines a moment matching approximation method to abstract the physical layer and Monte-Carlo simulations to describe the MAC dynamics.<br>Furthermore, based on the space diversity feature offered by the multi-static settings, we introduce the concept of capture deiversity and propose a modification to the standard to fully support this form of diversity.<br>Numerical results show the impact of deployment conditions and the relative positions of interrogator, tags, and detection points on the performance of tags' identification. We show how the number of detection points impacts the system performance under various channel conditions and MAC parameters' settings. Finally, we validate the proposed update of the MAC protocol, showing substantial performance improvement with respect to the standard collision resolution policy.


Sign in / Sign up

Export Citation Format

Share Document