• Title/Summary/Keyword: CSMA

Search Result 314, Processing Time 0.028 seconds

A Detection Method of Interference from WiFi Network in IEEE 802.15.4 Network (IEEE 802.15.4 네트워크에서 WiFi 네트워크의 간섭 탐지 방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.13-24
    • /
    • 2013
  • IEEE 802.15.4 network and WiFi network are installed to overlap each other and configured to use adjacent frequency bands in which case the communication service required by applications can not be guaranteed because of randomly increased frame transmission delay and frequent frame transmission failures at nodes in IEEE 802.15.4 network. In this paper, transmission delay model at IEEE 802.15.4 nodes and an experimental system to evaluate the interference from WiFi traffic are described, then elements for the evaluation of interference are measured with the analysis of their characteristics. A sequential method of using medium access layer and physical layer elements of IEEE 802.15.4 protocols is proposed to decide interference from WiFi network. With the proposed method, if an evaluation function having frame transmission failures and transmission delay as variables returns a value greater than a threshold, intensive measurements of wireless channel power are carried out subsequently and the final decision of interference is made by the calculated average channel power. Experimental results of the method show that the decision time is reduced with increased frequency of decision in comparison to an other similar method.

Partitioned Contention Access Mechanism to Enhance the Performance of IEEE 802.15.4 MAC Layer (IEEE 802.15.4 MAC 계층의 성능 향상을 위한 분할 경합 접근 방식)

  • Bae, Sueng-Jae;Ki, Hyung-Joo;Lee, Tae-Jin;Chung, Min-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.436-440
    • /
    • 2008
  • In IEEE 802.15.4 beacon-enabled mode, performance decreases as the number of devices competing in the contention access period(CAP) increases. In this letter, we propose partitioned contention access mechanism(PCAM) to compensate performance degradation. In PCAM, the PAN coordinator divides CAP into two sub-periods and activity of devices is delimited in their assigned sub-periods. Since PCAM reduces the number of devices which compete at the same time by half, collision probability between transmitted frames can be reduced. In addition, devices can save their power consumption because PCAM shorten the duration that devices stay in active state into half. We perform simulations to compare the performance of PCAM with that of the IEEE 802.15.4 standard. From the result, PCAM yields better performance than IEEE 802.15.4 standard.

Device-to-Device assisted user clustering for Multiple Access in MIMO WLAN

  • Hongyi, Zhao;Weimin, Wu;li, Lu;Yingzhuang, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2972-2991
    • /
    • 2016
  • WLAN is the best choice in the place where complex network is hard to set up. Intelligent terminals are more and more assembled in some areas now. However, according to IEEE 802.11n/802.11ac, the access-point (AP) can only serve one user at a single frequency channel. The spectrum efficiency urgently needs to be improved. In theory, AP with multi-antenna can serve multiple users if these users do not interfere with each other. In this paper, we propose a user clustering scheme that could achieve multi-user selection through the mutual cooperation among users. We focus on two points, one is to achieve multi-user communication with multiple antennas technique at a single frequency channel, and the other one is to use a way of distributed users' collaboration to determine the multi-user selection for user clustering. Firstly, we use the CSMA/CA protocol to select the first user, and then we set this user as a source node using users' cooperation to search other proper users. With the help of the users' broadcast cooperation, we can search and select other appropriate user (while the number of access users is limited by the number of antennas in AP) to access AP with the first user simultaneously. In the network node searching, we propose a maximum degree energy routing searching algorithm, which uses the shortest time and traverses as many users as possible. We carried out the necessary analysis and simulation to prove the feasibility of the scheme. We hope this work may provide a new idea for the solution of the multiple access problem.

An Analytical Model for LR-WPAN Performance in the Presence of Hidden Nodes (은닉노드를 고려한 LR-WPAN 성능의 분석적 모델)

  • Lee, Kang-Woo;Shin, Youn-Soon;Hyun, Gyu-Wan;Ahn, Jong-Suk;Kim, Hie-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.133-142
    • /
    • 2009
  • This paper proposes an analytical performance model of IEEE 802.15.4 in the presence of hidden nodes. Conventional 802.15.4 mathematical models assume ideal situations where every node can detect the transmission signal of every other nodes different from the realistic environments. Since nodes can be randomly located in real environments so that some nodes' presence is hidden from other ones, this assumption leads to wrong performance evaluation of 802.15.4. For solving this problem, we develop an extended performance model which combines the traditional 802.15.4 performance model with one for accounting the presence of hidden nodes. The extended model predicts the rapid performance degradation of 802.15.4 due to the small number of hidden nodes. The performance, for example, degrades by 62% at maximum when 5% of the total nodes are hidden. These predictions are confirmed to be equal to those of ns-2 simulations by less than 6% difference.

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

Enhanced Segmentized Clear Channel Assessment Method for IEEE 802.15.4 Network (IEEE 802.15.4 Network의 전송효율 향상을 위한 Enhanced Semgentized Clear Channel Assessment 기법)

  • Son, Kyou Jung;Chang, Tae Gyu
    • Journal of IKEEE
    • /
    • v.20 no.3
    • /
    • pp.322-325
    • /
    • 2016
  • This paper proposed Enhanced Segmentized Clear Channel Assesment(ESCCA) for the IEEE 802.15.4 networks. This method divides original CCA into two groups to check precise channel status and perform additional CCA to increase throughput performance. Through the proposed method, the device can access the channel more often, so the transmission efficiency of the IEEE 802.15.4 network improves. To confirm the feasibility and usability of the proposed method, computer simulation has been performed. In the simulation, a star topology with one coordinator and a lot of devices is considered and the traffic flows are all one way, with the communication directed to the coordinator. Simulation results_ show the proposed method is improving maximum 10 kbps of throughput and decreasing maximum 15 of the average number of total CCA than IEEE 802.15.4 CCA method.

Group Node Contention Algorithm for Avoiding Continuous Collisions in LR-WPAN (무선 저속 PAN에서 연속된 충돌 회피를 위한 그룹 노드 경쟁 알고리즘)

  • Lee, Ju-Hyun;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1066-1074
    • /
    • 2008
  • In this paper, we proposed an efficient algorithm using pulse signal based on group-node-contention in LR-WPAN. The purpose of IEEE 802.15.4 is low speed, low cost and low power consumption. Recently, as applications of LR-WPAN have been extended, there is a strong probability of collision as well and almost collision occurs because of hidden node problem. Moreover, if the collision continuously occurs due to hidden node collision, network performance could be decreased. Nowadays, although several papers focus on the hidden node collision, algorithms waste the channel resource if continuous collisions frequently occur. In this paper, we assume that PAN has been already formed groups, and by using pulse signal, coordinator allocates channel and orders, and then, nodes in the allocated group can compete each other. Hence, contention nodes are reduced significantly, channel wastage caused by collision is decreased, and data transmission rate is improving. Finally, this algorithm can protect the network from disruption caused by frequent collisions. Simulation shows that this algorithm can improve the performance.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

A Study on Application Boundary of Wireless LAN's Communication for Space Variation (공간변화에 따른 Wireless LAN의 통신 활용 범위에 관한 연구)

  • Cha, Jin-Man;Kang, Min-Soo;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.499-503
    • /
    • 2005
  • The objective of this thesis is to measure the limit of the real space where wireless Local Area Network(LAN) is used, and to apply this result as reference to set up a real Wireless LAN environment. The organized circumference was composed of Wireless LAN based on IEEE 802.11b of the American standard, and the examination is carried out on the campus. On the real condition of office environment and open space, the ratio of available distance to a signal at each distance was measured and this result was studied as data to embody wireless LAN on the campus. The measurement under an indoor environment was executed under circumstance having two wall and open space, however, was executed respectively under three circumstances : Where no obstacle, where one wall exists, and where two or more walls exist.

  • PDF

An Energy and Delay Efficient Hybrid MAC Protocol for Multi-Hop Wireless Sensor Networks (멀티 홉 무선센서네트워크에서 에너지와 지연에 효율적인 하이브리드 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.471-476
    • /
    • 2015
  • In this paper, we propose an energy efficient hybrid MAC protocol for multi-hop wireless sensor networks. The proposed MAC protocol used a hybrid mechanism, in which contention-based MAC protocol and contention free MAC protocol are combined. The sensor nodes located far from the sink node usually send few data packet since they try to send measured data by themselves. So contention-based MAC protocol is useful among them. But other nodes located near sink node usually have lots of data packets since they plays as a relay node. Contention-based MAC protocol among them is not suitable. Using contention-based MAC protocol in heavy data traffic environment, packet collisions and transmission delay may increase. In this paper, slot assignment between sender nodes by sink node is used. The proposed mechanism is efficient in energy and latency. Results showed that our MAC protocol outperformed other protocol in terms of data packet delivery delay and energy consumption.