Search results for "wifi"

showing 10 items of 30 documents

A modified IEEE 802.11 protocol for reliable data transmission in automated power distribution systems

2009

A high level of power quality in distribution networks is obtained by means of a diagnostic software, that establishes on-line the status of the network, by elaborating the measured data. An efficient telecommunication system is necessary, from whose reliability depends the security of the timely interventions on the network in case of fault. In the paper, after a brief examination of the diagnostic method, the telecommunication system is examined. The WiFi system has been considered most suitable, for its economy, for the diagnostic service, besides it is not suitably reliable for how it is managed by the IEEE 802.11 protocol for this application. In this work a new protocol derived by the…

Automated Power Distribution Systems wifi
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

Resource sharing optimality in WiFi infrastructure networks

2009

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - TelecomunicazioniDistributed computingNode (networking)ThroughputDistributed coordination functionShared resourceSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkMobile telephonybusinessGame theory Mechanism Design WiFi Infrastructure NetworksRandom accessCommunication channelComputer network
researchProduct

Performance analysis of selfish access strategies on WiFi infrastructure networks

2009

In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - Telecomunicazionimedia_common.quotation_subjectDistributed computingNode (networking)Physical layerThroughputGame theory distributed wifi networksGame theory; distributed; wifi networksSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkdistributedFunction (engineering)businessGame theoryGame theorywifi networksmedia_commonComputer network
researchProduct

DEMO: Unconventional WiFi-ZigBee communications without gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…

Exploitbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniReading (computer)Node (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork interfacezigbeeEmbedded systemDefault gatewayComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessProtocol (object-oriented programming)Computer networkNeuRFonCommunication channel
researchProduct

MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach

2011

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…

FOS: Computer and information sciencesgame theorycheating nodeaccess protocolsmobile nodesComputer sciencegame-theoretic approachMAC designDistributed coordination functionUpload[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]MAC protocolschannel access policyComputer Science - Computer Science and Game TheoryFOS: MathematicsElectrical and Electronic EngineeringMathematics - Optimization and Controlwireless LANdistributed coordination functionMechanism designcheating nodesWiFi infrastructure networksbusiness.industryApplied MathematicsNode (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiFi; cheating nodes; game theory; MAC protocolsComputer Science ApplicationsShared resourceprogrammable cardsOptimization and Control (math.OC)game-theoretic analysisBest responserandom access schemebusinessrandom access protocolRandom accessCommunication channelComputer networkComputer Science and Game Theory (cs.GT)
researchProduct

Rethinking the IEEE 802.11e EDCA Performance Modeling Methodology

2010

Analytical modeling of the 802.11e enhanced distributed channel access (EDCA) mechanism is today a fairly mature research area, considering the very large number of papers that have appeared in the literature. However, most work in this area models the EDCA operation through per-slot statistics, namely probability of transmission and collisions referred to "slots." In so doing, they still share a methodology originally proposed for the 802.11 Distributed Coordination Function (DCF), although they do extend it by considering differentiated transmission/ collision probabilities over different slots.We aim to show that it is possible to devise 802.11e models that do not rely on per-slot statis…

IEEE 802medium access protocolSettore ING-INF/03 - TelecomunicazioniComputer Networks and Communicationsbusiness.industryComputer scienceWiFiDistributed computingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSQoSThroughputDistributed coordination functionComputer Science ApplicationsTransmission (telecommunications)Wireless lanElectrical and Electronic EngineeringbusinessThroughput (business)SoftwareComputer networkCommunication channelIEEE/ACM Transactions on Networking
researchProduct

Analysis of the limitations of WiFi communications managed by the IEEE 802.11 protocol in data transmission in automated power distribution systems

2010

This paper presents a study on the performances of the IEEE 802.11 protocol used in a Medium Voltage networks management system, carried out using a model for the simulation of WiFi chains architectures. The results of the simulations give some practical indications for the use of the IEEE 802.11 protocol also in presence of transmissions characterized by rigid time intervals, for which this protocol is usually not suitable. Finally the whole communications system is presented.

IEEE 802.11EngineeringIEEE 802IEEE 802.11uSettore ING-INF/03 - Telecomunicazionibusiness.industryInter-Access Point ProtocolWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaIEEE 802.1QEmbedded systemIEEE 802.11g-2003DiagnosticIEEE 802.1XbusinessComputer networkIEEE 802.11sIEEE 802.11r-2008SPEEDAM 2010
researchProduct

Enabling a win-win coexistence mechanism for WiFi and LTE in unlicensed bands

2018

The problem of WiFi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Since the two technologies employ com-pletely different access protocols and frame transmission times, supporting coexistence with minimal modifications on existing protocols is not an easy task. Current solutions are often based on LTE unilateral adaptations, being LTE in unlicensed bands still under definition. In this paper, we demonstrate that it is possible to avoid a subordinated role for WiFi nodes, by simply equipping WiFi nodes with a sensing mechanism based on adaptive tunings of the …

IEEE 802.11Information Systems and ManagementUnlicensed bandbusiness.industryComputer scienceWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesMechanism based050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectrum managementScheduling (computing)Win-win game0508 media and communicationsIEEE 802.11Computer Networks and CommunicationWhite spaces0202 electrical engineering electronic engineering information engineeringLTE-UbusinessComputer networkISM coexistency
researchProduct

Demo abstract: Cross-technology TDMA synchronization using energy pattern beacons

2017

When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and require technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using different technologies. To this end, an architecture that allows cross-technology medium access by means of a Time Division Multiple Access (TDMA) scheme was devised. In order to achieve cross-technology synchronization, which is required for the TDMA solution, an energy pattern beacon is trans…

IoTbusiness.industryComputer scienceWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedReal-time computingTime division multiple access020206 networking & telecommunicationsThroughput02 engineering and technologyInterference (wave propagation)01 natural sciencesBeacon010309 opticsZigBee0103 physical sciencesSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringWirelessIntertecnology interferenceIBCNbusinessWireless sensor network2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct