This document discusses a project that aims to deal with collision problems in the uplink access of Machine Type Communication (MTC) devices on LTE networks. It proposes applying Contention Resolution Diversity Slotted ALOHA (CRDSA) schemes to current OFDMA LTE networks to further increase throughput for a given access load. The document outlines several existing load relief schemes for MTC including Access Class Barring, slotted access, grouping devices, and eNodeB selection. It then discusses limitations of current random access procedures and analyzes applying a multichannel Slotted ALOHA system to the LTE random access frame. The project will simulate applying a CRDSA scheme in an OFDMA LTE
This document discusses the challenges faced when using TCP in mobile ad hoc networks (MANETs). Some key challenges include: media access control issues like hidden terminals; power constraints of mobile nodes; frequent topology changes due to node mobility; multipath fading increasing the likelihood of path breaks; and misinterpreting packet losses as congestion rather than broken routes. TCP was designed for wired networks and assumes packet losses are always due to congestion, which does not hold in MANETs where losses can be from broken routes. Overall, TCP performs poorly in MANETs due to these challenges.
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
Transmission control protocols have been used for data transmission process. TCP has been pre-owned for data transmission over wired communication having different bandwidths and message delays over the network. TCP provides communication using 3-handshake which sends RTS and ACK comes from server end and data message has been transmitted over the bandwidth provided. This does not provide security over flooding attack occurred on the network. TCP provides communication between different nodes of the wired communication but when multi-streaming occurs in a network TCP does not provides proper throughput of the system which is major problem that occurred in the previous system. In the proposed work, to overcome this problem SCTP transmission control protocol has been implemented for the system performance of the system. SCTP provides 4-handshake communication in the message transmit due to which security factor get increases and this also provides communication services over multi-streaming and multi-homing. Multiple sender and receivers can communicate over wired network using various approaches of communication through same routers, which degrades in the TCP protocol. In final we evaluate parameters for performance evaluation. Here, we designed and implemented our test bed using Network Simulator (NS-2.35) to test the performance of both Routing protocols.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE ijwmn
- The document proposes a grouped hierarchical architecture and scheduling technique for smart meter communications over LTE networks. Smart meters are divided into groups, with each group connected to a data concentrator.
- The data concentrator collects smart meter readings and sends a total consumption message to the LTE network on a scheduled basis. It also sends individual smart meter readings.
- This grouped approach reduces the number of LTE modules needed and ensures real-time monitoring while avoiding overloading the LTE network, making LTE a promising solution for smart grid communications.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
The document discusses various network services and protocols for multimedia communications. It covers protocol layers, local area networks and access network technologies, Internet technologies and protocols, quality of service for multimedia, and protocols for multimedia transmission and interaction. Specifically, it describes the OSI reference model layers, common LAN standards and technologies like Ethernet, Token Ring, FDDI, and digital subscriber line access networks. It also discusses the TCP/IP protocol suite and key protocols like IP, TCP, and UDP.
This document discusses the challenges faced when using TCP in mobile ad hoc networks (MANETs). Some key challenges include: media access control issues like hidden terminals; power constraints of mobile nodes; frequent topology changes due to node mobility; multipath fading increasing the likelihood of path breaks; and misinterpreting packet losses as congestion rather than broken routes. TCP was designed for wired networks and assumes packet losses are always due to congestion, which does not hold in MANETs where losses can be from broken routes. Overall, TCP performs poorly in MANETs due to these challenges.
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
Transmission control protocols have been used for data transmission process. TCP has been pre-owned for data transmission over wired communication having different bandwidths and message delays over the network. TCP provides communication using 3-handshake which sends RTS and ACK comes from server end and data message has been transmitted over the bandwidth provided. This does not provide security over flooding attack occurred on the network. TCP provides communication between different nodes of the wired communication but when multi-streaming occurs in a network TCP does not provides proper throughput of the system which is major problem that occurred in the previous system. In the proposed work, to overcome this problem SCTP transmission control protocol has been implemented for the system performance of the system. SCTP provides 4-handshake communication in the message transmit due to which security factor get increases and this also provides communication services over multi-streaming and multi-homing. Multiple sender and receivers can communicate over wired network using various approaches of communication through same routers, which degrades in the TCP protocol. In final we evaluate parameters for performance evaluation. Here, we designed and implemented our test bed using Network Simulator (NS-2.35) to test the performance of both Routing protocols.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE ijwmn
- The document proposes a grouped hierarchical architecture and scheduling technique for smart meter communications over LTE networks. Smart meters are divided into groups, with each group connected to a data concentrator.
- The data concentrator collects smart meter readings and sends a total consumption message to the LTE network on a scheduled basis. It also sends individual smart meter readings.
- This grouped approach reduces the number of LTE modules needed and ensures real-time monitoring while avoiding overloading the LTE network, making LTE a promising solution for smart grid communications.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
The document discusses various network services and protocols for multimedia communications. It covers protocol layers, local area networks and access network technologies, Internet technologies and protocols, quality of service for multimedia, and protocols for multimedia transmission and interaction. Specifically, it describes the OSI reference model layers, common LAN standards and technologies like Ethernet, Token Ring, FDDI, and digital subscriber line access networks. It also discusses the TCP/IP protocol suite and key protocols like IP, TCP, and UDP.
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
1. The document proposes a new routing strategy called Routing Information and Distance Vector (RIDV) to improve data transmission in heterogeneous networks used for Internet of Robotic Things (IoRT) applications.
2. The RIDV strategy activates the Routing Information Protocol version 2 (RIPv2) on routers in wired networks and the Ad-hoc On-demand Distance Vector (AODV) protocol in wireless networks. It unifies their routing tables to reduce congestion.
3. Simulation results show that RIDV improved quality of service over other strategies and individual protocols by reducing data and traffic drop, queue delay, and increasing throughput.
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...IJECEIAES
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks.
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
This document describes a new routing protocol called MCS-RPL for mobile crowd sensing applications in smart cities. MCS-RPL is based on the RPL routing protocol and introduces improvements to address RPL's issues with mobility support. It utilizes a clustering mechanism and 2D grid structure to reduce control overhead from frequent topology changes. The performance evaluation shows MCS-RPL delivers a higher packet delivery ratio and lower power consumption compared to RPL, with reductions in control packet overhead of over 75% in tested scenarios. MCS-RPL provides an alternative for mobile devices in smart city applications to opportunistically send collected sensor data to a central server without using cellular networks.
This document proposes a QoS-Aware Self-Adaptive RAN Overload Control (QoS-Dracon) mechanism to reduce RAN overload in LTE/LTE-A networks while considering users' QoS requirements. It prioritizes delay-sensitive users over delay-tolerant ones during the random access procedure. The mechanism uses an Access Class Barring scheme in the eNodeB to monitor RAN load and block access of delay-tolerant devices when needed. It also employs a QCI-dependent backoff scheme to spread access attempts over time for congested networks. Simulation results show the mechanism maintains low access delays for delay-sensitive users regardless of device type attempting access.
Congestion and overload control techniques in massive M2M systems: a surveyapnegrao
Lilatul Ferdouse1, Alagan Anpalagan1* and Sudip Misra2
1 WINCORE Lab, Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada
2 School of Information Technology, Indian Institute of Technology, Kharagpur, India
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
The document summarizes a research paper that evaluates the performance of a new downlink scheduling algorithm called Exponential Modified Largest Weighted Delay First (EXP-MLWDF) in an LTE network under high mobility and dense user scenarios. It compares the performance of EXP-MLWDF to other scheduling algorithms such as Proportional Fair (PF), Exponential Proportional Fairness (EXP/PF), Logarithm Rule (LOG-Rule), Exponential Rule (EXP-Rule) and Modified Largest Weighted Delay First (MLWDF) in terms of system throughput, delay and packet loss ratio based on simulations. The simulations showed that EXP-MLWDF satisfies quality of service requirements for real-time traffic better than the other algorithms
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...MNIT Jaipur
IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 14, NO. 1, FEBRUARY 1998
PPT ON Wireless Communications and a Priority
Access Protocol for Multiple Mobile
Terminals in Factory Automation
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
The document discusses optical OFDM for passive optical networks. It describes how PON uses either TDM or WDM to connect multiple ONUs to an OLT, with TDM requiring complex scheduling and WDM extending the reach of PON. PON provides a cost effective solution for optical access networks to meet increasing bandwidth demands through either point-to-point or point-to-multipoint topologies.
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...ijcsse
This document summarizes a research paper that examines the impact of randomness on MAC layer schedulers in high-speed wireless campus networks using IEEE 802.11e. It investigates how using different seed values to generate random numbers affects the performance of scheduling algorithms. The paper proposes evaluating three MAC layer schedulers - FIFO, RED, and WRED - under different seed values. Simulation results are presented on the effect of randomness on throughput and end-to-end delay for multimedia traffic over the wireless campus network. The goal is to better understand how randomness impacts scheduler performance in order to improve quality of service for real-time applications.
This document proposes a new millimeter-wave non-orthogonal multiple access (mmWave-NOMA) transmission scheme for cellular machine-to-machine (M2M) communications to support massive connectivity and low latency for Internet of Things applications. It considers downlink transmission where multiple MTC devices share communication resources. Three MTC device pairing schemes are introduced based on the distance between devices and base station: 1) random near and far devices, 2) nearest near and far devices, 3) nearest near and farthest far devices. The performance of the schemes is analyzed by deriving expressions for outage probability and sum rate. Analysis and simulations show the proposed system improves outage probability over mmWave with orthogonal multiple access schemes.
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MatLab based LTE System Level Simulator performance.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfYAAKOVSOLOMON1
This white paper explores key research directions for machine type communication (MTC) towards 6G networks by 2030. It discusses the main societal drivers of MTC, such as autonomous mobility and smart manufacturing. Representative MTC use cases are presented across various industries. Emerging MTC services are expected to have highly diverse requirements in terms of performance metrics like reliability, latency, energy efficiency, and scalability. The white paper investigates potential enabling technologies for building a holistic MTC network architecture in 6G that can efficiently support both massive and critical MTC services.
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
1. The document proposes a new routing strategy called Routing Information and Distance Vector (RIDV) to improve data transmission in heterogeneous networks used for Internet of Robotic Things (IoRT) applications.
2. The RIDV strategy activates the Routing Information Protocol version 2 (RIPv2) on routers in wired networks and the Ad-hoc On-demand Distance Vector (AODV) protocol in wireless networks. It unifies their routing tables to reduce congestion.
3. Simulation results show that RIDV improved quality of service over other strategies and individual protocols by reducing data and traffic drop, queue delay, and increasing throughput.
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
A New Scheme of Group-based AKA for Machine Type Communication over LTE Netwo...IJECEIAES
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks.
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
This document describes a new routing protocol called MCS-RPL for mobile crowd sensing applications in smart cities. MCS-RPL is based on the RPL routing protocol and introduces improvements to address RPL's issues with mobility support. It utilizes a clustering mechanism and 2D grid structure to reduce control overhead from frequent topology changes. The performance evaluation shows MCS-RPL delivers a higher packet delivery ratio and lower power consumption compared to RPL, with reductions in control packet overhead of over 75% in tested scenarios. MCS-RPL provides an alternative for mobile devices in smart city applications to opportunistically send collected sensor data to a central server without using cellular networks.
This document proposes a QoS-Aware Self-Adaptive RAN Overload Control (QoS-Dracon) mechanism to reduce RAN overload in LTE/LTE-A networks while considering users' QoS requirements. It prioritizes delay-sensitive users over delay-tolerant ones during the random access procedure. The mechanism uses an Access Class Barring scheme in the eNodeB to monitor RAN load and block access of delay-tolerant devices when needed. It also employs a QCI-dependent backoff scheme to spread access attempts over time for congested networks. Simulation results show the mechanism maintains low access delays for delay-sensitive users regardless of device type attempting access.
Congestion and overload control techniques in massive M2M systems: a surveyapnegrao
Lilatul Ferdouse1, Alagan Anpalagan1* and Sudip Misra2
1 WINCORE Lab, Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada
2 School of Information Technology, Indian Institute of Technology, Kharagpur, India
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
The document summarizes a research paper that evaluates the performance of a new downlink scheduling algorithm called Exponential Modified Largest Weighted Delay First (EXP-MLWDF) in an LTE network under high mobility and dense user scenarios. It compares the performance of EXP-MLWDF to other scheduling algorithms such as Proportional Fair (PF), Exponential Proportional Fairness (EXP/PF), Logarithm Rule (LOG-Rule), Exponential Rule (EXP-Rule) and Modified Largest Weighted Delay First (MLWDF) in terms of system throughput, delay and packet loss ratio based on simulations. The simulations showed that EXP-MLWDF satisfies quality of service requirements for real-time traffic better than the other algorithms
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...MNIT Jaipur
IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 14, NO. 1, FEBRUARY 1998
PPT ON Wireless Communications and a Priority
Access Protocol for Multiple Mobile
Terminals in Factory Automation
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
The document discusses optical OFDM for passive optical networks. It describes how PON uses either TDM or WDM to connect multiple ONUs to an OLT, with TDM requiring complex scheduling and WDM extending the reach of PON. PON provides a cost effective solution for optical access networks to meet increasing bandwidth demands through either point-to-point or point-to-multipoint topologies.
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...ijcsse
This document summarizes a research paper that examines the impact of randomness on MAC layer schedulers in high-speed wireless campus networks using IEEE 802.11e. It investigates how using different seed values to generate random numbers affects the performance of scheduling algorithms. The paper proposes evaluating three MAC layer schedulers - FIFO, RED, and WRED - under different seed values. Simulation results are presented on the effect of randomness on throughput and end-to-end delay for multimedia traffic over the wireless campus network. The goal is to better understand how randomness impacts scheduler performance in order to improve quality of service for real-time applications.
This document proposes a new millimeter-wave non-orthogonal multiple access (mmWave-NOMA) transmission scheme for cellular machine-to-machine (M2M) communications to support massive connectivity and low latency for Internet of Things applications. It considers downlink transmission where multiple MTC devices share communication resources. Three MTC device pairing schemes are introduced based on the distance between devices and base station: 1) random near and far devices, 2) nearest near and far devices, 3) nearest near and farthest far devices. The performance of the schemes is analyzed by deriving expressions for outage probability and sum rate. Analysis and simulations show the proposed system improves outage probability over mmWave with orthogonal multiple access schemes.
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MatLab based LTE System Level Simulator performance.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Similar to Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf (20)
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfYAAKOVSOLOMON1
This white paper explores key research directions for machine type communication (MTC) towards 6G networks by 2030. It discusses the main societal drivers of MTC, such as autonomous mobility and smart manufacturing. Representative MTC use cases are presented across various industries. Emerging MTC services are expected to have highly diverse requirements in terms of performance metrics like reliability, latency, energy efficiency, and scalability. The white paper investigates potential enabling technologies for building a holistic MTC network architecture in 6G that can efficiently support both massive and critical MTC services.
This document provides an overview and table of contents for the book "IoT and Low-Power Wireless: Circuits, Architectures, and Techniques". The book is edited by Christopher Siu and Krzysztof Iniewski and contains 12 chapters covering various topics related to Internet of Things (IoT) and low-power wireless technologies. The table of contents lists the chapter titles and authors for each chapter in the book. The document also provides information about the book series that this book is part of.
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdfYAAKOVSOLOMON1
This document summarizes a research paper on optimizing random MAC protocols for IoT communication. It begins by introducing the growth of IoT and issues with collisions that can occur without central coordination. It then discusses how IRSA and CRDSA protocols attempt to reduce collisions by using random repetition of packets. The document reviews the history of IoT and key technologies like TCP/IP that enabled its development. Finally, it outlines important characteristics of IoT like scalability, critical applications, and the need for low-cost communication protocols to support the large number of connected devices expected in the future.
Multi-slot Coded ALOHA with Irregular Degree.pdfYAAKOVSOLOMON1
This document proposes an improvement to the Multi-slot Coded ALOHA (MuSCA) random multiple access scheme for satellite communications. The improvement involves applying variable code rates and irregular user degree distributions, where the code rate and degree for each user are selected according to a probability distribution. This allows the system to achieve higher throughput compared to the original MuSCA scheme and other related schemes like Contention Resolution Diversity Slotted ALOHA (CRDSA). The document describes how the system would work, including encoding data into codewords that are split into multiple bursts and transmitted on random slots, and decoding the received signal using successive interference cancellation. It analyzes the potential throughput gain from optimizing the irregular degree distribution.
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdfYAAKOVSOLOMON1
This document is a dissertation submitted by Yue Li for the degree of Doctor of Philosophy at the University of Victoria. The dissertation focuses on improving transmission efficiency for machine-type communication (MTC) devices in 5G cellular systems. Specifically, it proposes applying network coding and device-to-device communications to MTC devices to improve efficiency. It also proposes using floating relays deployed via unmanned aerial vehicles to proactively improve channel quality for MTC devices experiencing high shadowing. The dissertation provides theoretical analyses and performance evaluations of the proposed approaches.
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfYAAKOVSOLOMON1
The document provides an overview of 5G mobile networks and their ability to support massive machine-type communications (mMTC). Some key points:
- 5G networks are expected to be operational by 2020 and will enable up to 50 billion connected devices through technologies like M2M, D2D, and V2V communications.
- 5G aims to consolidate all existing machine-type communications onto a single platform based on the Internet of Things (IoT) concept to create an Internet of Everything enabling smart cities and a fully networked society.
- 5G is expected to significantly increase data speeds, reduce latency, improve energy efficiency, and support a vast number of low-power devices and new applications.
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdfYAAKOVSOLOMON1
The document is a dissertation submitted by Shun Ogata for the degree of Doctor of Philosophy. It proposes novel random access schemes for massive multiple access networks using frameless ALOHA. Specifically, it proposes ZigZag decodable frameless ALOHA, which introduces ZigZag decoding to resolve collisions in frameless ALOHA. It also proposes frameless ALOHA with multiple base station cooperation, where base stations share retrieved packets over a backhaul network. Finally, it combines ZigZag decoding and multiple base station cooperation in a single scheme. Analysis and simulations show the proposed schemes achieve higher throughput than conventional schemes.
Massive MTC An Overview and Perspectives Towards 5G (2).pdfYAAKOVSOLOMON1
This document provides an overview of massive machine-type communications (MMC) and perspectives towards 5G networks. It discusses how 5G will enable the integration of all known machine-to-machine communication technologies through a single infrastructure, creating an environment for smart cities and a fully networked society under the new Internet of Everything concept. By 2020, it is predicted that 5G networks will support up to 50 billion connected devices and provide higher data speeds, lower latency, and improved quality of service compared to 4G networks. This will allow for new applications in areas like automation, transportation, healthcare, and more.
This document is the thesis submitted by Oscar del Río Herrero for the degree of Doctor of Philosophy at Universitat Ramon Llull in Barcelona, Spain in 2015. The thesis proposes three novel random access schemes for satellite communications: Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA), and Enhanced Spread Spectrum Aloha (E-SSA). CRDSA uses strong error correction codes and successive interference cancellation to achieve high throughput for slotted systems. ACRDA extends this technique to unslotted systems using spreading sequences. E-SSA applies similar concepts to spread spectrum systems. The performance of the schemes is
Extended LTE Coverage for Indoor Machine Type Communication.pdfYAAKOVSOLOMON1
This document discusses extending LTE coverage for indoor machine type communication. It proposes using repetition to increase coverage without requiring hardware upgrades. Simulations show that with a 20 dB coverage increase through repetition, coverage can be almost complete for inter-site distances up to 2500 m, where standard LTE has gaps. Higher resource usage is required but the number of supported users is limited more by coverage at longer distances than resources. Uplink performance is also evaluated through link and system level simulations.
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfYAAKOVSOLOMON1
The document discusses key enabling technologies of 5G wireless mobile communication. It provides an overview of 5G technology, including its features such as high speed, low latency and high capacity. It describes 5G's equipment providers and the countries that have conducted early experiments with 5G including India, South Korea and San Marino. The document outlines 5G's architecture and discusses several key enabling technologies that are used in 5G networks, such as device-to-device communication, machine-to-machine communication, and millimeter wave technology.
This document proposes a new random access method called coherent contention resolution diversity slotted ALOHA (C-CRDSA) to improve the throughput of existing contention resolution diversity slotted ALOHA (CRDSA) for satellite Internet of Things systems. C-CRDSA accumulates replicated packets coherently at the receiver to increase the signal-to-noise ratio and enable better interference cancellation. It uses a sliding window approach to coherently accumulate potential virtual subframes across the access frame. Simulation results show C-CRDSA improves throughput, especially under heavy loads, by leveraging the diversity and coherence of transmitted packets.
The document discusses coded slotted ALOHA (CSA) and other coded random access schemes for massive machine-type communications. It begins with background on the increasing problem of multiple access for large populations of users. It then reviews classical random access schemes like slotted ALOHA and more modern coded schemes like CRDSA, IRSA, and CSA. CSA uses error correcting codes, where users transmit encoded segments of data over randomly selected slots, allowing throughput higher than traditional schemes to be achieved without feedback. The performance of CSA and related protocols is analyzed using a bipartite graph representation and density evolution techniques from coding theory.
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdfYAAKOVSOLOMON1
Finite-Length Performance Analysis of Slotted ALOHA with Interference Cancellation analyzes the performance of Irregular Repetition Slotted ALOHA (IRSA) for finite frame lengths. It develops a matrix-based analysis to derive a semi-analytical expression for packet loss rate. Through computer simulations, it shows the proposed analysis allows exact computation of packet loss rate for small user numbers and frame lengths, unlike previous asymptotic analyses for infinite users and frames.
6G Internet of Things - A Comprehensive Survey.pdfYAAKOVSOLOMON1
The document provides a comprehensive survey of the convergence of 6G technologies and Internet of Things (IoT). It discusses how 6G is expected to empower future IoT networks through technologies like edge intelligence, reconfigurable intelligent surfaces, terahertz communications, and blockchain. It then explores the opportunities brought by 6G for various emerging IoT applications in domains like healthcare, vehicular networking, satellites, and industry. The survey identifies key research challenges in areas such as security, energy efficiency, and standardization and points to potential directions for future 6G-IoT research.
Frameless ALOHA is a random access protocol inspired by rateless codes that uses successive interference cancellation (SIC) to resolve packet collisions. It operates without a predefined frame length, adding slots until a stopping criterion is met like resolving a certain fraction of users. The analysis shows the protocol can achieve high throughput asymptotically by optimizing the slot access probability. The capture effect from stronger signals can further boost performance by enabling intra-slot SIC. Noise impacts the achievable throughput, requiring higher optimized slot degrees to counter its effects.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
1. Massive Connectivity for Internet of
Things
by
Zhongtian Tang
Master of Engineering (Telecommunications)
Submitted: October 24, 2016
2. Abstract
Machine Type Communication (MTC) for IoT is a significant technology for
future smart city. The project aims to deal with collision problem in uplink
access of MTC with the background of LTE networks. Plentiful load relief
schemes (e.g. Access Class Barring (ACB), slotted access, grouping and eNB
selection) have been proposed to alleviate the problem. To further improve the
system, this project applies Contention Resolution Diversity Slotted ALOHA
(CRDSA) schemes to current OFDMA LTE network, which could further
increase throughput for given access load.
3. Abbreviations
IoT Internet of Things
MTC Machine Type Communication
OFDMA Orthogonal Frequency Division Multiple Access
CRDSA Contention Resolution Diversity Slotted ALOHA
eNB evolved Node Base station
LTE Long Term Evolution
RA Random Access
ACB Access Class Barring
IC Interference Cancellation
1
5. Charpter 1
Introduction
The Internet of Things (IoT) is the network for physical objects (e.g. sensors,
controllers, etc.) with minimal human intervention, which is firstly
forwarded by Professor Kevin Ashton from MIT in 1991. The concept of
smart city has been proposed in recent year to achieve the
intelligentization of city management, which brings that the IoT should
focus on not only indoor but also outdoor network construction [1] - [6]. The
key technology to achieve the IoT is the Machine Type Communication
(MTC) distinguished from human device (e.g. mobile phone, personal
computer and tablet) communication.
In [7], the Third Generation Partnership Project (3GPP) organization
proposes several service requirements for MTC, including
Surveillance and security: helping police monitoring public area and
auto alert;
e-Health: supporting remote diagnosis and health information update;
Infrastructure management: real-time interaction between
infrastructures to provide better public service;
Smart home: monitoring, remote control or automatic action of home
machines to provide better living environment and saving energy
resource.
6. Apparently, such smart city applications need a large number of devices
(e.g. sensors, cameras, controllers, etc.) sharing information at the same
time. Therefore, the MTC has the feature of frequent uplink transmission
with small packet size from massive devices. The MTC devices should do
random uplink access to network to initiate the uplink transmission.
According to the feature of MTC, the system is easy to be overloaded
during such uplink access procedure. Then several devices would contend
for the same uplink access resource, which would lead to severe collision
problem and system throughput performance would be catastrophic.
The aim of this project is to deal with collision problem during the uplink
access of MTC devices and reduce packet loss rate to improve system
throughput performance. This paper is divided into 8 chapters. MTC access
networks and project system model will be introduced in Chapter 2. In
Chapter 3, certain existing load relief schemes will be discussed. Chapter 4
will analyse the imperfection of current system with load relief schemes.
Chapter 5 will introduce CRDSA scheme which is the key technique of the
project. Chapter 6 will propose an OFDMA uplink access system applying
CRDSA with signal processing details. Its simulation results and analysis
will be demonstrated in Chapter 7. Chapter 8 will conclude the whole
paper and state some future work.
7. Charpter 2
MTC networks and System model
2.1 MTC Access Networks
There are plentiful types of access networks for human device (e.g. PC,
mobile phone and laptop) communication currently, so are for MTC [8]-[10].
The access network can be either wired, such as cable or optical fibre, or
wireless, such as Wireless Local Area Network (WLAN), ZigBee or cellular.
Wired networks possess the feature of high robust and high data rate but
low mobility, low scalability and high cost in complex terrain environment
with large number of access devices. As for WLAN, although its power cost
is less, the small coverage range and poor outdoor performance make it not
suitable for MTC network in smart city. In contrast, cellular, or Long Term
Evolution (LTE), provides ubiquitous coverage, high mobility and good
scalability, which make it an ideal type of main access network for IoT
devices to realize MTC in smart city.
[11] gives a conceptual graph (shown in Figure 2.1) of MTC in LTE
networks. In the radio access network (RAN), human devices (e.g. mobile
phone or mobile broadband device) and MTC devices share the same access
to one evolved Node-Base station (eNB) in one cell. In some situation, some
8. MTC devices, such as e-Health and camera sensor, access to eNB via MTC
Gateway (MTCG) which provides local control for MTC devices through
low-power WLAN.
Figure 2.1 [11]
2.2 Uplink access
As mentioned in the previous section, the main challenge of massive
connectivity for IoT is the uplink collision due to frequent access attempt
from large amount of MTC devices. In LTE network, Random Access (RA)
is an inevitable procedure for devices requesting uplink resource. Current
LTE (4G) network’s RA procedure is mainly for human devices, which
initiates in the slotted Physical Random Access Channel (PRACH). The
steps of RA procedure can be summarized as follows [11]:
1. Devices randomly choose one preamble and transmit it to eNB in slotted
PRACH;
2. The eNB transmits Random Access Response (RAR), including preamble
ID, cell radio network temporary identifier (C-RNTI) and information of
transmission schedule;
3. According to schedule information in RAR, device transmit actual RA
9. message as well as C-RNTI and International Mobile Subscriber Identity
(IMSI);
4. eNB sends contention resolution message (e.g. Back-off message) if the
RA message is unable to decode (i.e. contention is detected).
Contention will occur if different devices choose same preamble in step 1,
which will lead to RA message interference in step 3.
However, this current RA procedure may not be suitable for MTC. As a
huge number of devices in one cell as well as limited available preambles,
the collision probability is extremely high. For example, according to [12],
assuming 1000 users in one cell with 64 available PRACH preambles, the
collision probability is nearly 99.97% if the packet arrival interval is 30ms.
Additionally, with frequent RA from large number of devices, coordination
process (step 2) of eNB could increase system latency and power
consumption. Therefore, in the future LTE networks (e.g. 5G), coordination
should be given up, at least in MTC.
2.3 System Model
Coordination scheme is not suitable for MTC, so in the project model, a
pure RA Orthogonal Frequency Division Multiple Access (OFDMA) is
settled. OFDMA system has been widely used in LTE’s access system
because of its flexibility [13]-[17]. Also, OFDMA could be more energy
efficient if access resources are allocated appropriately [18] - [36]. When a
device attempting to access the network, it will randomly choose a
Time-Frequency slot in one OFDMA frame to transmit the uplink access
packet which includes not only just preamble but also payload part
containing actual uplink access message.
In this model, the collision problem will happen if several devices chose the
same Time-Frequency slot to transmit packets. This situation would
frequently happen if the system is overloaded. Therefore, plenty of schemes
10. have been proposed (introduced in the following section) to relieve the
system load.
11. Charpter 3
Load Relief Schemes
Currently, plenty of papers have proposed various methods and schemes to
alleviate the severe collision in RA procedure in MTC. In this part, certain
good schemes will be presented.
3.1 Access Class Barring (ACB)
The original ACB scheme is proposed in [37] and [38]. The eNBs initially
broadcast the access probability and access class (AC) barring time to all
the devices in the cell. When a device attempts to perform RA, it randomly
generates a number between 0 and 1. If the generated number is less than
access probability, then the device will proceed the RA. Otherwise, it will
wait for AC time to try again. Also, if the device fails the RA (e.g. collision),
the back-off time will be still AC.
There are also some enhanced versions of ACB scheme. The extended
access barring (EAB) is presented by 3GPP in [39]. In this scheme, ACs are
different in different type of devices. For example, devices which can
tolerant high delay time would possess large AC. The eNB only have to
broadcasts access probability to devices according to its RA load.
12. Cooperative ACB [40] is an advanced ACB scheme where all the ACB
parameters (access probability and AC) are dynamic, selected by eNB
according to the RA load in the system and the type of devices.
The ACB schemes use parameters to control the permission and back-off
time of RA among devices which are classified according to their ACs, so
that can relieve the RA load of each eNB. Therefore, the collision in RA
could be alleviated.
3.2 Slotted Access
In this scheme, the RA frame is built in the MAC layer, which is divided
into several time slots. Each of device is allowed to transmit RA packet in
one dedicated slot. The number of slots in the RA frame is first broadcast
by the eNB. Then the devices can calculate its allowable packet
transmission slot by the number of slot and its own ID.
The slotted access scheme spreads the all devices in the cell on several time
slots, which builds several parallel RA channel, so it could alleviate the
collision and increase throughput. However, collision still could happen if
several devices attempting RA are allocated in the same slot. Additionally,
the situation that collision happens in one slot while other slots are unused
could happen, which wastes the precious time slot recourse in RA.
3.3 Grouping devices
In [41], the scheme grouping or clustering the MTC devices are proposed
based on QoS requirements. The devices are grouped according to their
types or locations. Then there should be a group head which could be one of
the grouped devices or a gateway. The group head is as functional as a
replay point communicating with eNB in LTE networks on behalf of the
grouped devices.
13. As for the network in the group, it can be wired or WLAN. [42] introduces a
WLAN standard (still in research) dedicated to MTC called IEEE 802.11ah
which is firstly proposed in [43]. The IEEE 802.11ah is an improved
version of conventional WLAN standard (IEEE 802.11) and aims to support
cellular offloading and MTC. In comparison to conventional IEEE 802.11,
the carrier frequency of IEEE 802.11ah is below than 1GHz, so the
transmission range can be up to 1km. Also, it is more suitable for small
data transmission and operate in low power. In downlink, it adopts bitmap
and could support up to 6000 devices. As for uplink, the IEEE 802.11ah
uses slotted access and in each slot it adopts Distributed Coordinate
Function (DCF) and optional Point Coordination Function (PCF) which are
already used in conventional IEEE 802.11 standard and can support up to
50 devices for uplink, so the number of devices the IEEE 802.11ah can
support is n
⋅
50 where n is the number of slots in the MAC access frame.
Grouping scheme is another effective method to release the RA load of the
eNB. It could reduce collision rate, thus improving the throughput
performance.
3.4 eNB selection
The learning-based eNB selection scheme is proposed in [11], which aims to
minimize the network overload. In this scheme, the devices in the
overlapped area of several eNBs covered range are allowed to choose the
eNB who has the lowest load to perform RA. The selection algorithm is
called Q-learning algorithm which can be summarized as follows
(assuming the device is in the overlapped cover-area of n eNBs
{ }
n
b
b
b
B ,...,
, 2
1
= ):
1. The device initializes the Q-values ( )
a
s
Q , for all s anda B
∈ , where s
is the current selected eNB and a is the new eNB about to choose;
14. 2. Assume the device is currently connecting to x
b (i.e. x
b
s = ). As for
parameter a , there is a small probability (e.g. 3%) that the device would
randomly choose an eNB, which is called exploration step. Otherwise, the
device will perform exploitation step by choosing ( )
a
b
Q
a x
B
a
,
max
arg
∈
= . Let us
assume y
b
a = in this step;
3. The device observes the QoS performance (i.e. Delay performance) of the
communication to the current eNB x
b denoted by x
b
D ;
4. The device updates the particular Q-values as
))
,
(
max
(
)
,
(
)
1
(
)
,
( a
b
Q
D
b
b
Q
b
b
Q y
B
a
b
y
x
y
x x ∈
+
+
−
← γ
κ
κ ,
where κ is the learning rate and γ is the discount rate;
5. Go to step 2.
The eNB selection scheme is another effective scheme to transfer the RA
load from one overloaded eNB to relatively less loaded one. Although the
devices adapting to this algorithm are in the overlapping area of the eNBs
cover range, which may be a small fraction of the devices in the whole cell,
it still could be applied with other load relief schemes together to further
control the instant RA load of each uplink access frame.
3.5 Group paging
The above schemes presented are called push-based schemes. In contrast,
there is also a pull-based scheme called group paging [41] in which the eNB
cyclically pages a part of the devices in the cell. Each device is allowed to
proceed RA only when it receives page message. The frequency of paging
and the number of devices that be paged at a time are dynamic according to
the eNB RA load and the device type.
Although this scheme can alleviate the RA load thus resolving the collision,
it cannot be combined to other plentiful push-based schemes to improve the
15. whole system. Moreover, if the scheme wants to be suitable for the MTC
feature of frequent uplink transmission, the frequency of paging has to be
quite high, which would consume much extra channel and power resources.
Therefore, this method may not be suitable for the system.
16. Charpter 4
System Imperfection
Most of current methods dealing with the contention of RA in LTE
networks for MTC are overload control mechanisms which decrease instant
number of devices attempting RA procedure with one eNB. However, for
constant RA load of one eNB, the throughput is not improved at all.
Therefore, the project work is decided to focus on RA procedure design to
improve the system throughput without reliving the RA load, which can
still add overload control mechanisms in the whole scenario.
As a basic RA model system in telecommunication, Slotted ALOHA (SA)
[44], [45] system has been widely researched and evaluated. For
single-channel SA, [46] analyses the capacity of SA system and computes
the throughput, while [47] presents the average access delay of devices
according to the throughput of the single-channel SA system. Additionally,
for MTC in LTE networks, [48] focuses on the collision and success rate,
applying conventional (human device) RA procedure.
The RA procedure in LTE can be considered as a multichannel SA system.
The scheme first sets a RA frame in MAC layer. During the period of RA
frame, each device is allowed to randomly choose only one slot to transmit
a burst (physical layer packet). This is called framed SA of which a received
17. RA frame example with 8 slots is shown in Figure 4.2. In this example,
there are 6 devices attempting to access network and 4 of them collide
during RA.
Figure 4.2
The simulation result of the framed SA is shown in Figure4.3. The blue line
is perfect throughput performance with 100% throughput of the system
load, while red line is the simulated framed SA throughput performance
with much collision during RA. The object of the design is to increase the
fraction of throughput to system load, which means making the red curve
as close as possible to the blue curve in the graph.
Figure 4.3
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Thgoughput
(normalized)
System Load (normalized)
System Throughput
Perfect
Performance
Real Framed
ALOHA
18.
19. Charpter 5
Contention Resolution Diversity
Slotted ALOHA (CRDSA) Scheme
Certain enhanced versions of framed SA have also been proposed. Diversity
Slotted ALOHA (DSA) is introduced in [49]. The DSA allows every device to
generate another replicas of the same burst which is also transmitted in a
random-picked slot within the same RA frame. Therefore, in DSA scheme,
the received RA frame in Figure 4.3 could be changed as shown in Figure
5.1. The throughput of DSA is slightly improved at small or medium RA
load as it increases the success rate of transmission. However, the
performance of DSA is worse than framed SA when RA load is high. [50]
proposes Dynamic Frame Length ALOHA which is an enhanced version of
framed SA. In this protocol, the frame length is dynamic according to
colliding, successful and empty slots in the previous RA activities. The
normalized RA load is given by n
m
G /
= , where m is the number of
devices attempting transmit a burst and n is the number of slots in one
RA frame. Therefore, Dynamic Frame Length ALOHA can have a dynamic
normalized RA load G thus be able to keep a high successful rate of
transmission, which can also be helpful to DSA remaining low RA load.
20. Figure 5.1
Contention Resolution Diversity Slotted ALOHA (CRDSA) is the main
inspiration of the project design, which is first proposed in [51]. At
transmitter side, the transmission scheme of CRDSA is similar to DSA.
The MAC frame is composed of M slots. Each device randomly picks two
of these M slots to transmit replica bursts when attempting RA. Each
packet transmitted by device contains pre
N preamble symbols and pay
N
payload symbols, while guard
N symbols are also needed between every two
slots. We assume that there are N symbols in each slot. Therefore, we
have M
N ⋅ symbols in one frame, where pay
pre
guard N
N
N
N +
+
= .
The key novelty of CRDSA is that it applies iterated Interference
Cancellation (IC) at receiver side to cancel the interference generated by
the twin burst of the successfully decoded packets. The burst preamble in
CRDSA is a pseudo-random sequence randomly chosen among a code
family series by each device in each frame. The sequences in the family
provide good auto and cross-correlation properties, which is for carrier
phase estimation on the slot during the IC algorithm process. Although the
real identification information is in the payload, preamble can be used to
tell from each other in the one MAC frame. There is a small probability
21. that same sequence is reused in the burst transmitted by different device
in the same frame. However, according to the research in [51], the process
will be sabotaged only when two packets from different devices reusing
same preamble sequence are arriving within 1 symbol time of absolute
differential delay. The payload is the actual RA message. In CRDSA, it also
contains the slot pointer (protected by FEC) of its twin burst position in the
same frame. The process of IC algorithm can be summarized as follows:
1.Initially set iteration counter 1
=
iter
N and maximum number of iteration
max
iter
N ;
2.Demodulation and decode all the ‘clean’ bursts (bursts that can achieve
preamble recognition and payload decoding and passed the CRC check);
3.Record the number of recovered bursts in current iteration ]
[
cov iter
re N
N
and output useful payload bits;
4.Stop if max
iter
iter N
N = or no clean burst in the step 2 (i.e. 0
]
[
cov =
iter
re N
N );
5.Get all information for twin burst regeneration, including:
(a) FEC encoded bits of current slot information bits and useful payload
bits;
(b) Twin slot information bits;
(c) Channel Estimation;
(d) Twin burst preamble sequence;
(e) Twin slot phase estimation (position is derived from twin slot
information);
6.Regenerate twin burst;
7.Repeat step 5 and 6 until all the ]
[
cov iter
re N
N twin bursts are regenerated;
8.Cancel all the known bursts (regenerated and clean) in the signal
9.Get the interference canceled signal in to step 2 and 1
+
= iter
iter N
N .
The numerical results shown in [51] and [52] proved that the CRDSA
performs much better than framed SA and DSA, even at high normalized
22. load. [52] proposed an improved version of CRDSA called Irregular
Repetition Slotted ALOHA (IRSA). In the MAC frame of IRSA, the number
of burst replicas of each device are different and settable according to the
regular and irregular graphs defined by the author, which can improve the
throughput further. However, the designs and algorithms in [51] and [52]
are based on the Multi-Frequency Time Division Multiple Access
(MF-TDMA) system in satellite communication networks which is quite
different from the MTC in LTE networks, although both MTC and satellite
communication possess the feature of small-sized and frequent uplink
burst. Therefore, much details should be designed in both transmitter and
receiver scenario if applying CRDSA/IRSA to MTC in LTE networks.
23. Charpter 6
Applying CRDSA in OFDMA LTE
Network
6.1 Transmitter
The conceptual system diagram of applying CRDSA in OFDMA LTE
network at transmitter side (device) is shown in Figure 6.1.
Figure 6.1
Access packets on the MAC layer would be first stored in a buffer which is
controlled by a Load Relief Controller. Multiple Load Relief Schemes
24. mentioned in Chapter 3 are applied on this controller, such as ACB
schemes, Slotted Access, Grouping Devices and eNB selection. Once the
packet is permitted to transmit, the CRDSA controller will start processing
transmission. Two time-frequency slots will be randomly picked by the
controller. Then the Twin Packets Generator will copy the incoming
packets and add pointer bits among them according to position information
from controller. After that, packets bit will be encoded and modulated then
added preambles to form into bursts. The bursts will be fed into OFDMA
transmitter and ready to be transmitted in the next frame time.
Briefly, the state diagram of CRDSA controller and system is shown in
Figure 6.2. There are only 4 states overall. The first number indicates the
number of processing packet, the second number indicates the number of
packets in OFDMA transmitter buffer (ready and waiting to be transmitted
in the next frame time) and the third tag is the state of the controller.
Figure 6.2
6.2 Receiver
At receiver side, the system diagram is shown in Figure 6.3.
25. Figure 6.3
When received an OFDMA frame, the OFDMA receiver will demodulate
received OFDM blocks into samples of basic modulation (e.g. BPSK, QPSK
or QAM) and send its Access Channel Estimation parameter (e.g.
frequency shift of OFDM sub-channels) to Twin Burst Recover. Then
payload bits will be decoded from clean packets, which includes pointer bits
and useful bits. Twin Burst Recover will integrate useful bits, current
pointer bits and twin preamble bits and re-modulate them into basic
modulation samples then shift them according to twin position information,
Access Channel Estimation (frequency shift) and Payload Channel
Estimation (time, phase and carrier). The Twin Burst IC Processor will
cancel the twin packets according to recovered packets.
The state diagram of receiver applying CRDSA is shown in Figure 6.4
which could briefly demonstrate the system.
26. Figure 6.4
The receiver system mainly includes two states – ‘Hold’ and ‘Demodulate’.
When receiving new OFDMA frame, the system state will be changed from
‘Hold’ to ‘Demodulation’. Specifically, the demodulate state includes two
sub-states – ‘Decoding’ and ‘Packet Recover and IC’. The system will keep
decoding and doing packet recover and IC iteratively until the system
achieves 100% throughput, meet maximum iteration set or there is no
longer clean packet in the sample memory.
27. Charpter 7
Simulation Results and Analysis
The above CRDSA-applied OFDMA LTE system (Figure 6.1 ~ 6.4) is
simulated in Matlab. The simulation stays on the MAC layer and the
Matlab code is shown in the Appendix. For OFDMA access frame setting,
number time slots is set as 64 and number of frequency slot is set as 32, so
there are 2048 time-frequency slots in one OFDMA uplink frame. Because
it is a random access simulation, each result is taken from the mean of 500
test results.
7.1 Performance
Figure 7.1 shows the throughput performance of 3 schemes, which is
indicated by packet loss rate versus normalized load. The blue curve
represents original Frame ALOHA, while the green curve is the CRDSA
scheme with maximum iteration set as 1. Red curve represents CRDSA
scheme without any maximum iteration set, which means the iteration will
stop if system achieves 100% throughput or no clean packet in the sample
memory. From Figure 7.1, we can see that original Frame ALOHA already
start losing packet, while CRDSA (red curve) only starts losing packets
28. when load is larger than 45%. Also, we can see that CRDSA packet loss
rate increase significantly after 60% load, but it is still better than Frame
ALOHA. CRDSA with 1 iteration maximum set could save more time and
power than non-maximum-set CRDSA, but the performance is much worse.
However, its packet loss rate is still lower than Frame ALOHA before 75%
load.
Figure 7.1
Figure 7.2 shows the frame utilization of 3 schemes mentioned above with
increase of normalized load. For Frame ALOHA, it achieves its maximum
utilization of 37% when load is full. In comparison, CRDSA achieves
maximum frame utilization when load is nearly 0.6. For CRDSA without
maximum iteration set, throughput is able to achieve 53% of the frame
slots.
29. Figure 7.2
Figure 7.1 and 7.2 proves that CRDSA is able to achieve much lower packet
loss rate and higher frame utilization than original Frame ALOHA.
Additionally, they also provide configuration suggestions for Load Relief
schemes and frame size setting. For example, if frame resource is quite
precious, frame size could be set as a relatively small number and Load
Relief schemes should control the normalized load no more than 0.6 at
most of time. On the other hand, if throughput performance is primary,
frame size could be slightly increased, combined with Load Relief schemes
control, to make normalized load no more than 0.4.
However, the cost of CRDSA scheme is the uncertainty of time delay and
power consumption caused from increasing iteration. Therefore, actual
operation iteration should be limited. However, over-small iteration
limitation would sabotage CRDSA performance like 1-iter CRDSA in
Figure 7.1 and 7.2. The following analysis suitable maximum iteration set
of CRDSA.
30. 7.2 Trade-offs
Figure 7.3 shows the actual operation iteration of CRDSA scheme without
maximum iteration set with increase of normalized load. We can see that
the iteration increase sharply after 0.4 normalized load and peak at nearly
14 at load of 0.55. The reason why it decreases after is because collision is
getting high and no clean packet could be detected after certain iteration.
Figure 7.3
Figure 7.4 show the iteration efficiency of CRDSA without iteration limit.
Specifically, iteration efficiency is defined as decreased loss rate from
Frame ALOHA over the cost of total iteration. We can see that iteration
efficiency is high between 0.1 and 0.4 load but quite low at 0.55 load.
Combined with Figure 7.3, this means that the 2nd to 6th iterations
decrease much more packet loss rate than the subsequent iterations.
Therefore, in consideration of delay and power efficiency, the maximum
iteration is suggested to be set as 6.
31. Figure 7.4
7.3 Reliability
In practical, unstable channels could lead to inaccurate access and payload
channel estimation, which could sabotage the accuracy of packet recover,
thus decreasing the success rate of IC.
Figure 7.5 shows the throughput performance of 6-iter-CRDSA and Frame
ALOHA at different IC success rate with normalized load set as 0.5.
Although packet loss rate increases with drop of IC success rate, it still
performs better than Frame ALOHA until IC success rate drops to around
only 3%. Therefore, CRDSA is a feasible and reliable approach to be
applied on OFDMA LTE network to reduce uplink packet loss rate
(increase throughput for given frame load).
33. Charpter 8
Conclusion
Various smart city applications require IoT to support ideal outdoor
performance. In this case, MTC has to be taken into consideration in future
LTE network scenario (e.g. 5G). However, collision problem caused by
massive connectivity of smart city devices is the major obligation. To deal
with this, several load relief schemes have been proposed, including ACB,
eNB selection, slotted access and grouping devices. In this project, CRDSA
is applied to OFDMA LTE network.
Simulation shows CRDSA is a feasible and reliable approach to reduce
packet loss rate in uplink random access in OFDMA system for given RA
load. Collision problem of massive connectivity for IoT could be remarkably
alleviated by CRDSA but requires existing load relief schemes to control
the RA load. According to simulation results, RA load is suggested to be
controlled no more than 0.4~0.6 at most of time and maximum iteration is
suggested to be set as 6.
Future work includes practical test of time delay and power consumption
caused by whole system, which is vital because of iterative demodulation in
CRDSA. In addition, IC success rate is also important because it directly
affects the amount of increased throughput for given RA load. Therefore,
34. future research could focus on what type of channel environment could
significantly affect the IC success rate in OFDMA-based CRDSA system.
35. Bibliography
[1] J. Belissent, “Getting Clever About Smart Cities: New Opportunities Require
New Business Models”, Forrester Research Inc., 2010.
[2] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey”, Computer
Network, vol. 54, no. 15, pp. 2787–2805, 2010.
[3] “Smart Networked Objects and Internet of Things”, white paper, Association
Institutes Carnot, 2011.
[4] T. S. Lopez, D. Ranasinghe, M. Harrison and D. McFarlane, “Adding sense to the
Internet of Things an architecture framework for smart object systems”, Personal
and Ubiquitous Computing, vol. 16, no. 3, pp. 291–308, 2012.
[5] J. Yick, B. Mukherjee and D. Ghosal, “Wireless sensor network survey”,
Computer Network, vol. 52, pp. 2292–2330, 2008.
[6] J. Vasseur and A. Dunkels, Interconnecting Smart Objects with IP: The
Next Internet, Elsevier, 2010.
[7] 3GPP TS 22.368 V11.5.0, “Service Requirements for Machine-Type
Communications”, June 2012.
[8] C. Perera et al., “Context Aware Computing for the Internet of Things: A Survey”,
IEEE Communications Surveys & Tutorials, vol. 16, no. 1, Feb. 2014, pp. 414–
454.
[9] J. Joung, C. K. Ho and S. Sun, “Spectral Efficiency and Energy Efficiency of
OFDM Systems: Impact of Power Amplifiers and Countermeasures”, IEEE JSAC,
vol. 32, no. 2, Feb., 2014, pp. 208–220.
[10] T. Maksymyuk et al.,“Quasi-Quadrature Modulation Method for Power Efficient
Video Transmission over LTE Networks,”IEEE Transactions Vehic. Tech., vol. 63,
no. 5, pp. 2083-92, June 2014.
[11] E. Hossain, D. Niyato and M. Hasan, “Random Access for Machine-to-Machine
Communication in LTE-Advanced Networks: Issues and Approaches”, IEEE
Communications Magazine, pp. 86-93, June 2013.
[12] K. Zhou, N. Nikaein, “Packet aggregation for machine type communications in
LTE with random access channel”, IEEE Transaction on Wireless
Communications and Networking Conference (WCNC), 2013, pp. 262–267, April
2013.
[13] M. Luise, R. Reggiannini and G. Vitetta, “Blind equalization/detection for OFDM
signals over frequency-selective channels”, IEEE J. Select. Areas
36. Communications, vol. 16, pp. 1568–1578, Oct. 1998.
[14] U. Mengali and M. Morelli, “Data-aided frequency estimation for burst digital
transmission”, IEEE Transactions on Communications, vol. 45, pp. 23–25, Jan.
1997.
[15] M. Morelli and U. Mengali, “An improved frequency offset estimator for OFDM
applications”, IEEE Communications Letters, vol. 3, pp. 75–77, Mar. 1999.
[16] U. Mengali and A. Andrea, Synchronization Techniques for Digital Modems, New
York: Plenum, 1997.
[17] M. Speth, S. Fechtel, G. Fock and H. Meyr, “Optimum receiver design for wireless
broadband systems using OFDM – Part I”, IEEE Transactions on
Communications, vol. 47, pp. 1668–1677, Nov. 1999.
[18] D. W. K. Ng, E. S. Lo and R. Schober, “Energy-efficient resource allocation in
multi-cell OFDMA systems with limited backhaul capacity”, IEEE Transactions
Wireless Communications, vol. 11, pp. 3618–3631, Oct. 2012.
[19] D. W. K. Ng, E. S. Lo and R. Schober, "Energy-efficient resource allocation in
OFDMA systems with hybrid energy harvesting base station", IEEE Transactions
on Wireless Communications, vol.12, no.7, pp: 3412-3427, 2013.
[20] D. W. K. Ng, E. S. Lo and R. Schober, "Energy-efficient resource allocation in
OFDMA systems with large numbers of base station antennas", IEEE
Transactions on Wireless Communications, vol.11, no.9, pp: 3292-3304, 2012.
[21] D. W. K. Ng, E. S. Lo and R. Schober, "Energy-efficient resource allocation for
secure OFDMA systems", IEEE Transactions on Vehicular Technology, vol.61,
no.6, pp: 2572-2585, 2012.
[22] D. W. K. Ng, E. S. Lo and R. Schober, "Dynamic resource allocation in
MIMO-OFDMA systems with full-duplex and hybrid relaying", IEEE
Transactions on Communications, vol.60, no.5, pp: 1291-1304, 2012.
[23] D. W. K. Ng, E. S. Lo and R. Schober, "Secure resource allocation and scheduling
for OFDMA decode-and-forward relay networks", IEEE Transactions on Wireless
Communications, vol.10, no.10, pp: 3528-3540, 2011.
[24] D. W. K. Ng, E. S. Lo and R. Schober, "Resource Allocation and Scheduling in
Multi-Cell OFDMA Decode-and-Forward Relaying Networks", Global
Telecommunications Conference, IEEE, 2010.
[25] D. W. K. Ng, E. S. Lo and R. Schober, "Cross-layer scheduling for OFDMA
amplify-and-forward relay networks", IEEE Transactions on Vehicular
Technology, vol.59, no.3, pp: 3528-3540, 2011.
[26] V. K. Lau, W. K. Ng, and D. S. W. Hui. "Asymptotic tradeoff between cross-layer
goodput gain and outage diversity in OFDMA systems with slow fading and
delayed CSIT", IEEE transactions on wireless communications, vol.7, no.7, pp:
2732-2739, 2008.
[27] D. W. K. Ng, E. S. Lo and R. Schober, "Wireless information and power transfer:
Energy efficiency optimization in OFDMA systems", IEEE Transactions on
Wireless Communications, vol.12, no.12, pp: 6352-6370, 2013.
[28] H. Zhu and J. Wang, “Chunk-based resource allocation in OFDMA systems –part
II: joint chunk, power and bit allocation”, IEEE Transactions on Communications,
37. vol. 60, pp. 499–509, Feb. 2012.
[29] K. Seong, M. Mohseni and J. Cioffi, “Optimal resource allocation for OFDMA
downlink systems”, IEEE International Symposium on Information Theory, pp.
1394–1398, 2006.
[30] Y. Chen, S. Zhang, S. Xu and G. Li, “Fundamental trade-offs on green wireless
networks”, IEEE Communications Magazine, vol. 49, pp. 30–37, Jun. 2011.
[31] C. Han, et al, “Green radio: radio techniques to enable energy-efficient wireless
networks”, IEEE Communications Magazine, vol. 49, pp. 46–54, Jun. 2011.
[32] H. Bogucka and A. Conti, “Degrees of freedom for energy savings in practical
adaptive wireless systems”, IEEE Communications Magazine, vol. 49, pp. 38–45,
Jun. 2011.
[33] G. P. Fettweis and E. Zimmermann, “ICT energy consumption—trends and
challenges”, International Symposium on Wireless Personal Multimedia
Communications, pp. 1–5, 2008.
[34] C. Li, S. Song, J. Zhang and K. Letaief, “Maximizing energy efficiency in wireless
networks with a minimum average throughput requirement”, IEEE Wireless
Communications and Networking Conference, pp. 1130– 1134, 2012.
[35] G. Miao, N. Himayat, and G. Li, “Energy-efficient link adaptation in
frequency-selective channels”, IEEE Transactions on Communications, vol. 58, pp.
545– 554, Feb. 2010.
[36] G. Miao, N. Himayat, G. Li and S. Talwar, “Low-complexity energy efficient
scheduling for uplink OFDMA”, IEEE Transactions on Communications, vol. 60,
pp. 112–120, Jan. 2012.
[37] CATT, “R2-100182: access control of MTC devices”, in 2010 3GPP TSG RAN WG2
Meeting 68bis.
[38] ZTE, “R2-104662: MTC simulation results with specific solutions”, in 2010 3GPP
TSG RAN WG2 Meeting 71.
[39] 3GPP TR 37.868 V11.0.0, “Study on RAN Improvements for Machine Type
Communications”, September 2011.
[40] S. Lien, T. Liau, C. Kao and K. Chen, "Cooperative Access Class Barring for
Machine-to-Machine Communications", IEEE Transactions on Wireless
Communications, vol. 11, no. 1, January 2012
[41] K. Chatzikokolakis1 et al., "On the Way to Massive Access in 5G: Challenges and
Solutions for Massive Machine Communications", Cognitive Radio Oriented
Wireless Networks, Lecture Notes of the Institute for Computer Sciences, Social
Informatics and Telecommunications Engineering, vol. 156, pp. 708-717, October
2015.
[42] Y. Zhou et al., "Advances in IEEE 802.11ah Standardization for Machine-Type
Communications in Sub-1GHz WLAN", IEEE International Conference on
Communications 2013: IEEE ICC'13 (Second IEEE Workshop on
Telecommunication Standards: From Research to Standards), pp. 1269-1273,
2013.
[43] R. D. Vegt, Potential compromise for 802.11ah use case document, doc.: IEEE
802.11-11/0457r0, March 2011.
38. [44] L. G. Roberts, “ALOHA packet systems with and without slots and capture”,
ARPANET System Note 8 (NIC11290), June 1972.
[45] N. Abramson, "The throughput of packet broadcasting channels", IEEE
Transactions on Communications, vol. 25, pp. 117–128, Jan. 1977.
[46] J. C. Arnbak and W. Van Blitterswijk, "Capacity of slotted ALOHA in
Rayleigh-fading channels", IEEE J. Sel. Areas Communications, vol. 5, no. 2, pp.
261–269, February 1987.
[47] L. Kleinrock and S. S. Lam, "Packet switching in a multi-access broadcast
channel: Performance evaluation", IEEE Transactions on Communications, vol.
COM-23, no. 4, pp. 410–423, April 1975.
[48] R. Cheng, C. Wei, S. Tsao and F Ren, "RACH collision probability for
machine-type communications", IEEE 75th Vehicle Technology Conference, pp.
1–5, May 2012.
[49] G. L. Choudhury and S. S. Rappaport, "Diversity ALOHA - A random access
scheme for satellite communications", IEEE Transactions on Communications,
vol. 31, pp. 450–457, March 1983.
[50] F. Schoute, "Dynamic Frame Length ALOHA", IEEE Transactions on
Communications, vol. COM-31, no. 4, pp. 565–568, April 1983.
[51] E. Casini, R. Gaudenzi and O. Herrero, "Contention Resolution Diversity Slotted
ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access
Packet Networks", IEEE Transactions on wireless communications, vol. 6, no. 4,
pp.1408-1419, April 2007.
[52] G. Liva, "Graph-Based Analysis and Optimization of Contention Resolution
Diversity Slotted ALOHA", IEEE Transactions on Communications, vol. 59, no. 2,
pp.477-487, February 2011.
39. Appendix
simCRDSA.m (Matlab Fuction)
function [throughput,iter]=simCRDSA(m,n,u,r,iterMax)
%[throughput,iter]=simCRDSA(m,n,u,r,iterMax)
%m t-slot of OFDMA frame
%n f-slot of OFDMA frame
%u load
%r rate of good packet recover leading successful
IC
%iterMax maximum iteraion set (0 means iteraion stops
when no new clean packet or throughput achieves 100%)
%Transimitter
s=cell(m,n);
for k=1:u
p1=floor(rand*m*n);
if p1==m*n
p1=p1-1;
end
p2=floor(rand.*(m*n-1));
if p2==(m*n-1)
p2=p2-1;
end
if p2==p1
p2=m*n-1;
end
m1=floor(p1/n)+1;
n1=rem(p1,n)+1;
m2=floor(p2/n)+1;
n2=rem(p2,n)+1; %random pick 2 TFslots
s{m1,n1}=[s{m1,n1};[k,m2,n2]]; %add packet [preamble,pointer] to frame
s{m2,n2}=[s{m2,n2};[k,m1,n1]];
40. end
%Receiver
throughput=0;
newCleanPacket=1;
iter=0;
while newCleanPacket && ((iterMax==0) ||(iter<iterMax)) && (throughput<u)
iter=iter+1;
newCleanPacket=0;
for i=1:m
for j=1:n
if ((size(s{i,j},1)==1) && (s{i,j}(1,1)>0)) %detect 'clean'
packtet
throughput=throughput+1;
newCleanPacket=1;
userTag=s{i,j}(1,1);
TS=s{i,j}(1,2);
FS=s{i,j}(1,3);
twin=s{TS,FS}(:,1)==userTag;
if rand<=r %proceed packet recover & IC
s{TS,FS}(twin,:)=[];
else
s{TS,FS}(twin,:)=[0];
end
s{i,j}=[]; %remove self
end
end
end
end
simFrameALOHA.m (Matlab Function)
function throughput=simFrameALOHA(m,n,u)
%throughput=simFrameALOHA(m,n,u)
%m t-slot of OFDMA frame
%n f-slot of OFDMA frame
%u load
%Transimitter
s=cell(m,n);
for k=1:u
p=floor(rand*m*n);
if p==m*n
41. p=p-1;
end
m1=floor(p/n)+1;
n1=rem(p,n)+1;
s{m1,n1}=[s{m1,n1};[k]]; %random pick 1 TFslot
end
%Receiver
throughput=0;
for i=1:m
for j=1:n
if size(s{i,j},1)==1 %non colision packtet
throughput=throughput+1;
end
end
end
DataAcquire.m (Matlab Script for Load test)
TimeSlots=64;
FreqSlots=32;
TestIter=500;
Slots=TimeSlots*FreqSlots;
ItTag=0;
for PktLoad=1:(floor(0.05*Slots)):Slots
ItTag=ItTag+1;
for ii=1:TestIter
[t1(ii,1),itr(ii,1)]=simCRDSA(TimeSlots,FreqSlots,PktLoad,1,0);
[t2(ii,1)]=simFrameALOHA(TimeSlots,FreqSlots,PktLoad);
[t3(ii,1),itrd(ii,1)]=simCRDSA(TimeSlots,FreqSlots,PktLoad,1,1);
end
TrptCRDSA(ItTag,1)=mean(t1);
IterCRDSA(ItTag,1)=mean(itr);
TrptFAloha(ItTag,1)=mean(t2);
TrptDSA(ItTag,1)=mean(t3);
IterDSA(ItTag,1)=mean(itrd);
LoadMarix(ItTag,1)=PktLoad;
end
DataAcquire2.m (Matlab Script for IC Succest Rate test)
TimeSlots=64;
FreqSlots=32;