channel access
Recently Published Documents


TOTAL DOCUMENTS

904
(FIVE YEARS 176)

H-INDEX

38
(FIVE YEARS 5)

2022 ◽  
Vol 69 (1) ◽  
Author(s):  
Godwin Onyekachi Ugwu ◽  
Udora Nwabuoku Nwawelu ◽  
Mamilus Aginwa Ahaneku ◽  
Cosmas Ikechukwu Ani

AbstractThe enhanced distributed channel access (EDCA) protocol is a supplement to IEEE 802.11 medium access control (MAC), ratified by IEEE 802.11e task group to support quality of service (QoS) requirements of both data and real-time applications. Previous research show that it supports priority scheme for multimedia traffic but strict QoS is not guaranteed. This can be attributed to inappropriate tuning of the medium access parameters. Thus, an in-depth analysis of the EDCA protocol and ways of tuning medium access parameters to improve QoS requirements for multimedia traffic is presented in this work. An EDCA model was developed and simulated using MATLAB to assess the effect of differentiating contention window (CW) and arbitration inter-frame space (AIFS) of different traffic on QoS parameters. The optimal performance, delay, and maximum sustainable throughput for each traffic type were computed under saturation load. Insight shows that traffic with higher priority values acquired most of the available channels and starved traffic with lower priority values. The AIFS has more influence on the QoS of EDCA protocol. It was also observed that small CW values generate higher packet drops and collision rate probability. Thus, EDCA protocol provides mechanism for service differentiation which strongly depends on channel access parameters: CW sizes and AIFS.


2021 ◽  
Vol 7 (3) ◽  
pp. 379
Author(s):  
Oka Sudana ◽  
Angga Kusuma ◽  
Sunia Raharja ◽  
Ayu Wirdiani

Bengkel kendaraan sebagai usaha layanan jasa yang banyak ditekuni oleh masyarakat kecil sebagai mata pencaharian utama. Saat perkembangan teknologi informasi yang sangat pesat, masih banyak usaha bengkel kendaraan bermotor yang menerapkan tata Kelola secara konvensional. Tata kelola secara konvensional berisiko sangat rawan terjadi kehilangan dan kerusakan data yang menyebabkan kerugian pada perusahaan. Penelitian ini berfokus pada pengembangan Sistem E-Bengkel terintegrasi berbasis web untuk memperbaiki tata kelola manual pada Bagian Front Office dan Bagian Layanan bengkel konvensional. Bagian Front Office pada bengkel merupakan bagian yang menangani proses pendaftaran pelanggan, penjualan spare part, dan check-in service. Bagian layanan pada bengkel merupakan bagian yang menangani proses penerimaan service dan pencatatan pengerjaan service kendaraan. Hasil dari sistem informasi manajemen ini yaitu berupa aplikasi berbasis web yang sesuai dengan proses bisnis Front Office dan layanan suatu bengkel kendaraan. Sistem ini menerapkan model Single Sign-On (SSO) sebagai model manajemen satu gerbang masuk untuk semua modul, manajemen session, serta manajemen semua hak akses pengguna. Model Multi-Channel Access (MCA) dipergunakan untuk memperkaya dan mempermudah akses informasi ke pemilik, pelanggan dan pegawai. Implementasi sistem berbasis komputer dengan Model SSO dan MCA diharapkan mampu meningkatkan pelayanan dan peluang bisnis dari Usaha Kecil Bengkel.


2021 ◽  
Vol 31 (1) ◽  
pp. 95-103
Author(s):  
Saif Mohammed Ali ◽  
Amer S. Elameer ◽  
Mustafa Musa Jaber

Abstract Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, and priority violation attack. The created method classifies the transmission outcomes used to predict the transmission state, whether it is jam data transmission or sensing data. After that, the sensing data is applied for network training that predicts the intermediate attacks. In addition to this, the channel access algorithm is used to validate the channel for every access that minimizes unauthorized access. After validating the channel according to the neural network, data have been transmitted over the network. The defined process is implemented, and the system minimizes different attacks on various levels of energy consumption. The effectiveness of the system is implemented using TensorFlow, and the system ensures the 99.02% of detection rate when compared with other techniques.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7974
Author(s):  
Wisnu Murti ◽  
Ji-Hoon Yun

Multi-link operation is a new feature of IEEE 802.11be Extremely High Throughput (EHT) that enables the utilization of multiple links using individual frequency channels to transmit and receive between EHT devices. This paper aims to illustrate enhanced multi-link channel access schemes, identify the associated coexistence challenge, and propose solutions. First, we describe the multi-link operation of IEEE 802.11be and how the asynchronous and synchronous channel access schemes facilitate multi-link utilization. Next, we describe the design variants of the synchronous channel access scheme and demonstrate the associated coexistence challenge. Subsequently, we propose four features to address this challenge by assigning penalties to multi-link devices (repicking a backoff count, doubling the contention window size, switching to another contention window set, and compensating the backoff count) as well as five coexistence solutions derived from combinations of these features. Comparative simulation results are provided and analyzed for dense single-spot and indoor random deployment scenarios, demonstrating that the throughput and latency gains of multi-link operation differ between schemes. At the same time, we investigate the coexistence performance of multi-link operation with and without the capability of simultaneous transmission and reception and demonstrate that the proposed solutions mitigate the coexistence problem. In particular, compensating the backoff count achieves the highest coexistence performance among the proposed solutions, with a marginal throughput decrease of multi-link devices. A metric for evaluating both the throughput and latency gains and the coexistence performance of a multi-link channel access scheme using a single value is also proposed.


2021 ◽  
Vol 13 (11) ◽  
pp. 287
Author(s):  
Lopamudra Hota ◽  
Biraja Prasad Nayak ◽  
Arun Kumar ◽  
G. G. Md. Nawaz Ali ◽  
Peter Han Joo Chong

Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely delivery of safety and non-safety messages is necessary for traffic congestion control and for avoiding road mishaps. For efficient resource sharing and optimized channel utilization, the media access control (MAC) protocol plays a vital role. An efficient MAC protocol design can provide fair channel access and can delay constraint safety message dissemination, improving road safety. This paper reviews the applications, characteristics, and challenges faced in the design of MAC protocols. A classification of the MAC protocol is presented based on contention mechanisms and channel access. The classification based on contention is oriented as contention-based, contention-free, and hybrid, whereas the classification based on channel access is categorized as distributed, centralized, cluster-based, cooperative, token-based, and random access. These are further sub-classified as single-channel and multi-channel, based on the type of channel resources they utilize. This paper gives an analysis of the objectives, mechanisms, advantages/disadvantages, and simulators used in specified protocols. Finally, the paper concludes with a discussion on the future scope and open challenges for improving the MAC protocol design.


Sign in / Sign up

Export Citation Format

Share Document