scholarly journals Power Efficient Time-Division Random-Access Model Based in Wireless Communication Networks

2021 ◽  
Vol 2 (4) ◽  
pp. 155-159
Author(s):  
Suma V

The conventional infrastructure for mobile-communication is used for providing internet-of-things (IoT) services by the third-generation partnership project (3GPP) with the help of the recently developed cellular internet-of-things (CIoT) scheme. Random-access procedure can be used for connecting the large number of IoT devices using the CIoT systems. This process is advantages as the huge devices are accessed in a concurrent manner. When random access procedures are used simultaneously on a massive number of devices, the probability of congestion is high. This can be controlled to a certain extent through the time division scheme. A power efficient time-division random access model is developed in this paper to offer reliable coverage enhancement (CE) based on the coverage levels (CL). The quality of radio-channel is used for categorization of the CIoT devices after assigning them with CLs. The performance of random-access model can be improved and the instantaneous contention is relaxed greatly by distributing the loads based on their coverage levels into different time periods. Markov chain is used for mathematical analysis of the behavior and state of the devices. The probability of blocking access, success rate and collision control are enhanced by a significant level using this model in comparison to the conventional schemes.

Author(s):  
Е.Е. Девяткин ◽  
Д.Н. Федоров ◽  
Я.М. Гасс ◽  
М.В. Иванкович

Рассмотрены и классифицированы существующие узкополосные беспроводные сети связи (УБСС), реализованные с использованием конвергентных решений. Показано, что появление нового объекта регулирования УБСС интернета вещей усиливает необходимость перехода от локальных корректировок законодательства в сфере связи к созданию инфо- коммуникационного кодекса Российской Федерации. Existing narrowband wireless communication networks using convergent solutions are reviewed and classified. It is shown that the emergence of narrowband wireless networks of Internet of things increases the need for transition from local adjustments of legislation in the field of communications to the creation of the Infocommunication Code of the Russian Federation.


Author(s):  
Stavroula Vassaki ◽  
George Pitsiladis ◽  
Stavros E. Sagkriotis ◽  
Athanasios D. Panagopoulos

Machine type communications (or Machine-to-Machine / M2M) communications have emerged as an important paradigm in wireless communication networks. The current M2M standardization activities are presented and their implementation in 4G/LTE networks is described in detail. The chapter is divided in three parts that are related to the evolution of the Future M2M communication Networks. The first part focuses on existing random access management schemes for M2M communications that are presented in the literature. The second part is devoted on spectrum sharing methods and on M2M clustering and it presents the spatial distribution of heterogeneous networks and its impact on their connectivity. Finally, the last part refers to energy efficiency issues of the future M2M communication systems and their implementation using distributed power control and MAC/scheduling algorithms.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5106 ◽  
Author(s):  
Taewon Song ◽  
Taeyoon Kim

Internet of Things (IoT) technology is rapidly expanding the use of its application, from individuals to industries. Owing to this, the number of IoT devices has been exponentially increasing. Considering the massive number of the devices, overall energy consumption is becoming more serious. From this point of view, attaching low-power wake-up radio (WUR) to the devices can be one of the candidate solutions to deal with this problem. With WUR, IoT devices can go to sleep until WUR receives a wake-up signal, which enables a significant reduction of its power consumption. Meanwhile, one concern for WUR operation is the addressing mechanism, since operational efficiency of the wake-up feature can significantly vary depending on the addressing mechanism. We therefore introduce addressing mechanisms for IoT devices equipped with WUR and analyze their performances, such as elapsed time to wake up, false positive probability and power/energy consumption, to provide appropriate addressing mechanisms over practical environments for IoT devices with WUR.


2005 ◽  
Vol 1 (3-4) ◽  
pp. 283-304 ◽  
Author(s):  
Kosuke Sekiyama ◽  
Yuki Kubo ◽  
Shigeru Fukunaga ◽  
Masaaki Date

This paper proposes a novel communication timing control for wireless sensor networks, named Phase Diffusion Time Division method. This is based on the mutual synchronization of coupled phase oscillatory dynamics with a stochastic adaptation, according to the history of collision frequency in communication nodes. Through local and fully distributed interactions in the communication network, the coupled phase dynamics self-organizes an efficient time division pattern of the communication so that the network reduces the collision frequency by diffusion of the phase pattern, while it sustains sufficient throughput of the communications. We introduce the built-in virtual node dynamics model for sensor device, to implement impulse signal based interactions. This method is designed for applications in a regular grid model of the wireless network, but it can be extended to an irregular grid model as simulation results illustrate, where the proposed method outperforms CSMA method in the efficiency.


Author(s):  
Neha Gupta

Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired, cellular, or adhoc networks. Wireless sensor networks, actuator networks, and vehicular networks have received a great attention in society and industry. In recent years, the internet of things (IoT) has received considerable research attention. The IoT is considered as future of the internet. In the future, IoT will play a vital role and will change our living styles, standards, as well as business models. The usage of IoT in different applications is expected to rise rapidly in the coming years. The IoT allows billions of devices, peoples, and services to connect with others and exchange information. Due to the increased usage of IoT devices, the IoT networks are prone to various security attacks.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2191
Author(s):  
Waqas Tariq Toor ◽  
Maira Alvi ◽  
Mamta Agiwal

This paper focuses on proposing a new access barring scheme for internet of things (IoT) devices in long term evolution advanced (LTE/LTE-A) and 5G networks. Massive number of IoT devices communicating simultaneously is one of the hallmarks of the future communication networks such as 5G and beyond. The problem of congestion also comes with this massive communication for which access barring is one of the solutions. So, it is required that sophisticated access barring techniques are designed such that the congestion is avoided and these devices get served in less time. Legacy access barring schemes like access class barring (ACB) and extended access barring (EAB) suffer from high energy consumption and high access delay respectively. However, our proposed scheme provides less energy consumption than ACB while giving less access delay than EAB. The proposed scheme maximizes the success probability while reducing the number of collisions at the same time. The scheme is based on an approximation of the number of IoT devices based on details available to the eNodeB of the number of idle, successful and collided preambles. Extensive Matlab simulations are performed to validate our claims and analysis.


Sign in / Sign up

Export Citation Format

Share Document