Search results for "NETWORKS"
showing 10 items of 3260 documents
DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks
2016
Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…
Bluetooth throughput measures for cardiomyocyte extracellular signal telemetry
2006
In this contribution the suitability of the Bluetooth transmission system is analyzed for its application to the realtime transmission of cardiac signals captured by micro-electrode array sensors. The required data rates for this type of cardiac signals are calculated to be 180 kbps for every single micro- electrode. The mean throughput value varies with the selected packet size: for packet sizes less than 1000 bytes the mean throughput is smaller than 180 kbps while for packet sizes greater than 1000 bytes the mean throughput saturates at around 230 kbps. This mean throughput value is guaranteed for over 80% of the time. Compression algorithms running on the sensor array allow the reductio…
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs
2011
How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.
Channel Occupancy-Based Dynamic Spectrum Leasing in Multichannel CRNs: Strategies and Performance Evaluation
2016
Spectrum leasing has been proposed as an effective approach for enabling more flexible spectrum utilization in CRNs. In CRNs, a primary network (PN) which consists of multiple primary users (PUs) can lease part of the licensed spectrum to secondary users (SUs) in exchange for operational benefits. The focus of this study is to investigate how and to what extent the PN allows spectrum leasing in CRNs, considering the QoS requirements of the PN and the secondary network (SN). Correspondingly, we propose two dynamic spectrum leasing strategies, which can improve the QoS performance of SUs while ensuring sufficient remuneration for PUs. In order to dynamically adjust the portion of leased bandw…
Temporal Fairness Provisioning in Multi-Rate Contention-Based 802.11e WLANs
2005
The IEEE 802.11e extensions for QoS support in WLAN define the transmission opportunity (TXOP) concept, in order to limit the channel holding times of the contending stations in the presence of delay-sensitive traffic. We evaluate the use of TXOP for a different purpose: "temporal fairness" provisioning among stations employing different data rates. We show that the equalization of the channel access times allows each station to obtain its throughput basically (1) proportional to its transmission rate, and (2) independent of the transmitted frame length. This also improves the aggregate throughput of the overall WLAN. For a given TXOP limit, i.e., a granted channel access time, a station is…
Energy consumption and optimal relay node placement for cooperative retransmissions
2010
Previous work on cooperative MAC design has shown significant performance improvement in terms of throughput and packet delivery ratio. However, little attention has been paid to extra energy cost at the relay node in order to achieve such benefit. In this paper, we focus on analyzing energy consumption at a relay node in cooperative retransmission networks with mixed Rayleigh and Rician fading channels. Furthermore, optimal relay location is studied with respect to energy efficiency in different scenarios. The simulation and calculation results coincide with each other, both showing the optimal location of the relay node is scenario-dependent and can be obtained under given channel conditi…
Learning from Errors: Detecting ZigBee Interference in WiFi Networks
2014
In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…
Analysis of the Effect of Human Presence on a Wireless Sensor Network
2011
Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…
Interference Estimation in IEEE 802.11 Networks
2010
This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…
An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…