clear channel
Recently Published Documents


TOTAL DOCUMENTS

80
(FIVE YEARS 16)

H-INDEX

10
(FIVE YEARS 2)

Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 825
Author(s):  
Congduc Pham ◽  
Muhammad Ehsan

With worldwide deployment of LoRa/LoRaWAN LPWAN networks in a large variety of applications, it is crucial to improve the robustness of LoRa channel access which is largely ALOHA-like to support environments with higher node density. This article presents extensive experiments on LoRa Channel Activity Detection and Capture Effect property in order to better understand how a competition-based channel access mechanisms can be optimized for LoRa LPWAN radio technology. In the light of these experimentation results, the contribution continues by identifying design guidelines for a channel access mechanism in LoRa and by proposing a channel access method with a lightweight collision avoidance mechanism that can operate without a reliable Clear Channel Assessment procedure. The proposed channel access mechanism has been implemented and preliminary tests show promising capabilities in increasing the Packet Delivery Rate in dense configurations.


Author(s):  
Manjunath G. Asuti ◽  
Prabhugoud I. Basarkod

Design of the MAC protocol is crucial in all wireless sensor networks (WSNs) due to its influence on the performance of the transceiver, i.e. the most energy-consuming component of each sensor node. A mechanism known as “carrier sense multiple access with collision avoidance” (CSMA/CA) is used for accessing the wireless channel in the IEEE 802.15.4 standard-based MAC protocol in order to avoid collisions between the network’s communicating nodes. CSMA/CA relies on two clear channel assessments (CCA=2) for checking the status of the channel. In this paper, we develop an additional CCA algorithm for the two scenarios encountered in star topology-enabled WSNs. Next, we investigate the impact of an additional clear channel assessment (CCA=3) on performance in IEEE 802.15.4. We develop a Markov chain model for the proposed methodology, and validate it using Matlab. Simulation results show that there is a significant improvement of performance metrics in the IEEE 802.15.4 standard-based MAC protocol with an additional CCA


2020 ◽  
Author(s):  
Lafdal Abdelwedoud ◽  
Anthony Busson ◽  
Isabelle Guérin‐Lassous ◽  
Marion Foare ◽  
Mohamed L. Diakité ◽  
...  

Data ◽  
2020 ◽  
Vol 5 (3) ◽  
pp. 64 ◽  
Author(s):  
Pere Tuset-Peiró ◽  
Ruan D. Gomes ◽  
Pascal Thubert ◽  
Eva Cuerva ◽  
Eduard Egusquiza ◽  
...  

This article presents a dataset obtained from the deployment of an IEEE 802.15.4g SUN (Smart Utility Network) single-hop network (11 nodes) in a large industrial scenario (110,044 m 2 ) for a long period of time (99 days). The dataset contains ∼11 M entries with RSSI (Received Signal Strength Indicator), CCA (Clear Channel Assessment), and PDR (Packet Delivery Ratio) values. The analyzed results show a high variability in the average RSSI (i.e., between −82.1 dBm and −101.7 dBm) and CCA (i.e., between −111.2 dBm and −119.9 dBm) values, which is caused by the effects of multi-path propagation and external interference. Despite being above the sensitivity limit for each modulation, these values result in poor average PDR values (i.e., from 65.9% to 87.4%), indicating that additional schemes are needed to meet the link reliability requirements of industrial applications. Hence, the presented dataset will allow researchers and practitioners to propose novel mechanisms and evaluate their performance using realistic conditions, enabling the dependability vision of the RAW (Reliable and Available Wireless) WG (Working Group) at the IETF (Internet Engineering Task Force).


Author(s):  
Jaehyuk Choi

Wi-Fi tethering using a mobile device (e.g., a smartphone or a tablet) as a hotspot for other devices has become a common practice. Despite the potential benefits of Wi-Fi tethering, the open source nature of mobile operating systems (e.g., Google Android) can be abused by a selfish device to manipulate channel-access parameters to gain an unfair advantage in throughput performance. This can cause serious performance problems within a well-planned Wi-Fi network due to an unauthorized selfish or misconfigured tethering device interfering with nearby well-planned access points (APs). In this paper, we demonstrate that the selfish behavior of a tethering node that adjusts the clear channel assessment (CCA) threshold has strong adverse effects in a multi-AP network, while providing the selfish node a high throughput gain. To mitigate this problem, we present a passive online detection scheme that identifies the network condition and detects selfish tethering nodes with high accuracy by exploiting the packet loss information of on-going transmissions. To the best of our knowledge, this is the first research to consider the problem of detecting a selfish tethering node in managed Wi-Fi networks.


Sign in / Sign up

Export Citation Format

Share Document