Search results for "MAC protocol"
showing 6 items of 6 documents
MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach
2011
In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…
Design of energy efficient MAC protocols in wireless sensor networks
2014
Masteroppgave i Informasjons- og kommunikasjonsteknologi IKT590 Universitetet i Agder 2014 Wireless sensor networks (WSNs) have been used in variety of applications such as in military and defense, process control industry and health monitoring applications. In WSNs, sensors are in small size with limited battery capacity and idle listening is a crucial problem which consumes more energy. Duty cycling (DC) is a technique which is used in many medium access control (MAC) protocols to reduce idle listening. In this thesis, we propose an asynchronous DC protocol, namely energy balancing asynchronous cooperative transmission medium access control (EB-ACT-MAC), which balances the remaining energ…
Performance Analysis of Synchronous Duty-Cycled MAC Protocols
2015
In this letter, we propose an analytical model to evaluate the performance of the S-MAC protocol. The proposed model improves the accuracy of previous models in two aspects. First, it incorporates the dependence among the nodes within a cluster by defining a DTMC that models the number of active nodes, whereas the previous models considered that nodes were mutually independent. Second, it proposes new methods for calculating packet delay and energy consumption. The analytical model is validated through discrete-event based simulations. Numerical results demonstrate that the proposed analytical model and methods yield accurate results under realistic assumptions
Coexistence between IEEE802.15.4 and IEEE802.11 through cross-technology signaling
2017
When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and requiring technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using different technologies. To this end, this paper proposes an architecture that allows crosstechnology medium access by means of a Time Division Multiple Access (TDMA) scheme. In order to achieve cross-technology synchronization, which is required for the TDMA solution, an energy pattern beacon…
Method of changing the operation of wireless network nodes
2013
Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation
2014
The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…