Search results for "MAC protocol"

showing 6 items of 6 documents

MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach

2011

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…

FOS: Computer and information sciencesgame theorycheating nodeaccess protocolsmobile nodesComputer sciencegame-theoretic approachMAC designDistributed coordination functionUpload[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]MAC protocolschannel access policyComputer Science - Computer Science and Game TheoryFOS: MathematicsElectrical and Electronic EngineeringMathematics - Optimization and Controlwireless LANdistributed coordination functionMechanism designcheating nodesWiFi infrastructure networksbusiness.industryApplied MathematicsNode (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiFi; cheating nodes; game theory; MAC protocolsComputer Science ApplicationsShared resourceprogrammable cardsOptimization and Control (math.OC)game-theoretic analysisBest responserandom access schemebusinessrandom access protocolRandom accessCommunication channelComputer networkComputer Science and Game Theory (cs.GT)
researchProduct

Design of energy efficient MAC protocols in wireless sensor networks

2014

Masteroppgave i Informasjons- og kommunikasjonsteknologi IKT590 Universitetet i Agder 2014 Wireless sensor networks (WSNs) have been used in variety of applications such as in military and defense, process control industry and health monitoring applications. In WSNs, sensors are in small size with limited battery capacity and idle listening is a crucial problem which consumes more energy. Duty cycling (DC) is a technique which is used in many medium access control (MAC) protocols to reduce idle listening. In this thesis, we propose an asynchronous DC protocol, namely energy balancing asynchronous cooperative transmission medium access control (EB-ACT-MAC), which balances the remaining energ…

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Technology: 500::Information and communication technology: 550Wireless sensor network ; MAC protocol ; duty cycling ; energy balancing ; cooperative transmission
researchProduct

Performance Analysis of Synchronous Duty-Cycled MAC Protocols

2015

In this letter, we propose an analytical model to evaluate the performance of the S-MAC protocol. The proposed model improves the accuracy of previous models in two aspects. First, it incorporates the dependence among the nodes within a cluster by defining a DTMC that models the number of active nodes, whereas the previous models considered that nodes were mutually independent. Second, it proposes new methods for calculating packet delay and energy consumption. The analytical model is validated through discrete-event based simulations. Numerical results demonstrate that the proposed analytical model and methods yield accurate results under realistic assumptions

Protocol (science)Markov modelingMarkov chainComputer scienceNetwork packetLoad modelingReal-time computingEnergy consumptionINGENIERIA TELEMATICAMarkov modelWSNsDelay and energy consumptionControl and Systems EngineeringPacket lossDuty-cycled MAC protocolsCluster (physics)Electrical and Electronic EngineeringAlgorithm
researchProduct

Coexistence between IEEE802.15.4 and IEEE802.11 through cross-technology signaling

2017

When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and requiring technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using different technologies. To this end, this paper proposes an architecture that allows crosstechnology medium access by means of a Time Division Multiple Access (TDMA) scheme. In order to achieve cross-technology synchronization, which is required for the TDMA solution, an energy pattern beacon…

Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedTime division multiple access020206 networking & telecommunications02 engineering and technologyInterference (wave propagation)Radio spectrumSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringWirelessIBCN020201 artificial intelligence & image processingMAC protocols interference mitigation crosstechnology TDMA scheme energy pattern beacon parameter negotiationbusinessEnergy (signal processing)Degradation (telecommunications)2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

Method of changing the operation of wireless network nodes

2013

Settore ING-INF/03 - Telecomunicazioniwireless network node MAC protocol finite state machine
researchProduct

Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation

2014

The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…

Technology and EngineeringCognitive networksComputer Networks and CommunicationsComputer scienceDynamic MAC adaptationTime division multiple access02 engineering and technologyMAC protocolMAC protocols0202 electrical engineering electronic engineering information engineeringWirelessCross-technology interferenceINTERFERENCEProtocol prototypingSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsCognitive networkComputer Science ApplicationsEmbedded systemSignal ProcessingInterference avoidanceIBCNWireless network control020201 artificial intelligence & image processingbusinessCognitive networkDecoupling (electronics)Communication channelComputer networkEURASIP Journal on Wireless Communications and Networking
researchProduct