scholarly journals MSAM: Modular Statistical Analytical Model for MAC and Queuing Latency of VLC Networks under ICS Conditions

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1371
Author(s):  
Mohammed Baz ◽  
Abdullah Baz

Visible Light Communication (VLC) offers distinctive advantages over conventional radio frequency; wide unlicensed spectrum, resistance to electrometric interference and low susceptibility to security risks, are few to name. Excitingly, VLC becomes a cornerstone in several communication systems such as light fidelity, optical camera communication and the Internet of Radio Light. Most of these networks adopt the Carrier Sensing Multiple Access-Collision Avoidance (CSMA-CA) of IEEE 802.15.7, the official standard for the VLC, as a Medium Access Control (MAC) protocol. Motivated by the crucial roles of MAC in shaping the performance of the VLC and the wide variety of operational conditions demanded by the enormous applications, this paper proposes a Modular Statistical Analytical Model (MSAM). The fundamental approach of MSAM is to segregate the interacting stochastic processes imposed by the CSMA-CA protocol into a set of its elementary subprocesses. The MSAM then synthesises these processes in such a way that quantifies their mutual dependency without making a strict assumption on their characteristics; thus, different operational conditions can be assessed without a need to reconstruct the model. Besides, MSAM employs the radiometry and photometry of VLC to derive mathematical expressions describing the hidden and exposed nodes from which the Imperfect Carrier Sensing (ICS) conditions are defined. The MSAM exploits statistical and queuing theorems to model a VLC as a network of G/G/1 queues from which several probability distributions, characterising the operations of VLC from different perspectives, are derived. Inter-departure, queuing, service time and successful service time are the main distributions in conjunction with throughput, total delay, probability of exposed and hidden node collisions, which are the main outputs of MSAM. Validation for the integrity of the MSAM under different scenarios is carried out by conducting a head-to-head comparison between its results and simulation outcomes.

Author(s):  
S. Mehta ◽  
B. H. Kim ◽  
K.S. Kwak

Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is a suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Another important aspect of WSNs are their ad-hoc topology. In such ad-hoc and distributed environment, selfish nodes can easily obtain the unfair share of the bandwidth by not following the medium access control (MAC) protocol. This selfish behavior, at the expense of well behaved nodes, can degrade the performance of overall network. In this chapter, the authors use the concepts of game theory to design an energy efficient MAC protocol for WSNs. This allows them to introduce persistent/non-persistent sift protocol for energy efficient MAC protocol and to counteract the selfish behavior of nodes in WSNs. Finally, the research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2706
Author(s):  
Jaehyoung Park ◽  
Yonggang Kim ◽  
Gyungmin Kim ◽  
Hyuk Lim

In wireless local area networks (WLANs), the effect of interference signals between neighboring nodes increases as the number of wireless nodes using limited radio frequency resources in a limited space increases, which can significantly degrade the reliability of data transmission. In high-density WLANs, there can be several neighboring access points (APs) that can receive uplink transmission from a station. In conventional medium access control (MAC) protocols, uplink data frames containing errors or transmitted from a non-associated station are discarded at APs. Alternatively, we propose a MAC protocol using redundant wireless links between neighboring APs and the non-associated stations. In the proposed MAC protocol, we consider a centralized WLAN with a control node that performs error corrections of erroneous uplink data frames via a majority voting algorithm-based link-layer diversity scheme using uplink data received from multiple APs to increase the reliability of data transmission. In addition, we propose an adaptive carrier sensing ranging mechanism to improve the uplink network throughput in the proposed centralized WLAN system. Further, we conduct simulation studies and software-defined radio-based experiments to evaluate the performance of the proposed MAC protocol in various WLAN scenarios.


2013 ◽  
pp. 1475-1497
Author(s):  
S. Mehta ◽  
B. H. Kim ◽  
K.S. Kwak

Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is a suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Another important aspect of WSNs are their ad-hoc topology. In such ad-hoc and distributed environment, selfish nodes can easily obtain the unfair share of the bandwidth by not following the medium access control (MAC) protocol. This selfish behavior, at the expense of well behaved nodes, can degrade the performance of overall network. In this chapter, the authors use the concepts of game theory to design an energy efficient MAC protocol for WSNs. This allows them to introduce persistent/non-persistent sift protocol for energy efficient MAC protocol and to counteract the selfish behavior of nodes in WSNs. Finally, the research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs.


2019 ◽  
Vol 78 (13) ◽  
pp. 1213-1222
Author(s):  
A. A. Abdulkafi ◽  
S. M. Hardan ◽  
M. K. Hussein ◽  
Ibrahim K. Sileh

Author(s):  
Rinkuben N. Patel ◽  
Nirav V. Bhatt

Background: WSN is a network of smart tiny electromechanical devices named as sensors. Sensors perform various tasks like sensing the environment as per its range, transmit the data using transmission units, store the data in the storage unit and perform an action based on captured data. As they are installed in an unfriendly environment, to recharge the sensors are not possible every time which leads to a limited lifetime of a network. To enhance the life of a sensor network, the network required energy-efficient protocols. Various energy-efficient MAC protocols are developed by Research community, but very few of them are integrated with the priority-based environment which performs the priority-based data transmission. Another challenge of WSN is, most of the WSN areas are delay-sensitive because it is implemented in critical fields like military, disaster management, and health monitoring. Energy, Delay, and throughput are major quality factors that affect the sensor network. Objective: In this paper, the aim is to design and develop a MAC Protocol for a field like the military where the system requires energy efficiency and priority-based data transmission. Method: In the proposed model, the cluster-based network with priority queues are formed that can achieve higher power efficiency and less delay for sensitive data. Results: In this research simulation of Proposed MAC, TMAC and SMAC are done with different numbers of nodes, same inter-packet intervals, and variant inter-packet intervals. Based on the script simulation, result graphs are generated. Conclusion: The proposed work achieves greater lifetime compared to TMAC and SMAC using priority-based data transmission.


Sign in / Sign up

Export Citation Format

Share Document