25 results on '"IEEE 802.11ah"'
Search Results
2. MAC Protocols for IEEE 802.11ah-Based Internet of Things: A Survey
- Author
-
Ferdous A. Barbhuiya, Nurzaman Ahmed, Md. Iftekhar Hussain, and Debashis De
- Subjects
Protocol (science) ,Standardization ,Computer Networks and Communications ,Computer science ,business.industry ,Provisioning ,Access control ,Computer Science Applications ,Identification (information) ,Hardware and Architecture ,Problem domain ,Signal Processing ,Scalability ,business ,Information Systems ,IEEE 802.11ah ,Computer network - Abstract
The IEEE 802.11ah, also known as WiFi HaLow, is a scalable solution for medium-range communication in Internet of Things (IoT). While provisioning support for the IoT and Machine-to-Machine (M2M) communication, IEEE 802.11ah leverages various innovative Medium Access Control (MAC) layer concepts such as Restricted Access Window (RAW), hierarchical Association IDentification (AID), Traffic Indication Map (TIM) Segmentation etc. This paper presents a survey on various MAC protocols for IEEE 802.11ah. While discussing the essential features of IEEE 802.11ah, this survey points out various issues and limitations of such MAC protocols. Although there are some surveys available for MAC protocols of IEEE 802.11ah, they do not include a large number of schemes that have been recently proposed to solve different standardization and implementation-based issues. This paper individually surveys issues and challenges in the different problem domains of IEEE 802.11ah MAC protocol and analyzes the recently proposed solutions. Moreover, this paper identifies various factors for further improvement of these protocols. Compared to other relevant surveys, this paper emphasizes the issues and challenges to enable researchers to easily identify the problem domain.
- Published
- 2022
3. ASIC Implementation of Low PAPR Multidevice Variable-Rate Architecture for IEEE 802.11ah
- Author
-
Amit Kumar Panda, Kailash Chandra Ray, and Rakesh Palisetty
- Subjects
Computer science ,business.industry ,020208 electrical & electronic engineering ,Physical layer ,02 engineering and technology ,Integrated circuit ,Multiplexing ,law.invention ,Application-specific integrated circuit ,law ,0202 electrical engineering, electronic engineering, information engineering ,Bit error rate ,Electrical and Electronic Engineering ,business ,Instrumentation ,Computer hardware ,Phase-shift keying ,IEEE 802.11ah - Abstract
The advancement of next-generation systems has led to a rapid increase in day-to-day applications by connecting billions of devices. Mobile networks require a considerable cost to support these billions of devices, and conventional IEEE 802.11 is meant for the usage of small-scale applications. To support long-range applications, IEEE task group-ah has proposed a new standard named IEEE 802.11ah. However, it has challenges like efficient device grouping based on variable sampling rates and power consumption. This standard employs orthogonal frequency-division multiplexing as a multicarrier scheme that suffers from high peak-to-average power ratio (PAPR). Hence, to support multiple devices of variable rates in the physical layer along with low PAPR and acceptable bit error rate, a new framework and an optimized architecture of carrier interferometry-group orthogonal–orthogonal frequency-division multiple access architecture is proposed. The proposed architecture reduces the 16-point inverse fast Fourier transform area by 57.1%, device padding area by 50% along with three extra adders functional area compared with the existing architecture. Furthermore, the proposed architecture is prototyped on Virtex5 field-programmable gate array for on-chip validation, and the hardware parameters are measured in real time. The area-timing complexity of the proposed architecture is estimated and further achieves the lowest area- and power-delay product than the existing architecture. Application-specific integrated circuit implementation is carried out using commercially available 32 - nm technology library, where the postlayout results reported less area utilization and low power consumption.
- Published
- 2021
4. Sub-1 GHz Frequency Band Wireless Coexistence for the Internet of Things
- Author
-
Yukimasa Nagai, Jianlin Guo, Philip Orlik, Takenori Sumi, Benjamin A. Rolfe, and Hiroshi Mineno
- Subjects
General Computer Science ,Wireless coexistence ,Computer science ,business.industry ,Network packet ,Frequency band ,IEEE 802.19.3 ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Interoperability ,General Engineering ,IEEE 802.15.4g ,Interference (wave propagation) ,IEEE 802.11ah ,TK1-9971 ,Smart city ,Wireless ,General Materials Science ,sub-1 GHz band ,Electrical engineering. Electronics. Nuclear engineering ,interference mitigation ,business ,Protocol (object-oriented programming) ,Communication channel ,Computer network - Abstract
Motivated by the explosion of the Internet of Things (IoT), we examined Sub-1 GHz (frequencies below 1 GHz) band wireless technologies that are essential to enable various IoT applications. IEEE 802.15.4g and IEEE 802.11ah are two wireless technologies developed for outdoor IoT applications such as smart utility, smart city and infrastructure monitoring for which both technologies operate in Sub-1 GHz Bands. Our coexistence simulation of IEEE 802.15.4g and IEEE 802.11ah using standard defined coexistence mechanisms shows serious interference problems due to fundamental protocol differences and channel access parameter differences. Accordingly, we proposed IEEE 802.19.3 Task Group formation to lead the IEEE 802.19.3 standard development of IEEE 802.15.4g and IEEE 802.11ah coexistence in the Sub-1 GHz band. In addition to our coexistence methods contributed to IEEE 802.19.3 standard, we propose a novel Active Carrier Sense based CSMA/CA mechanism for IEEE 802.15.4g to reduce CSMA/CA failure packet discard under interference from IEEE 802.11ah traffic and to keep interoperability with conventional IEEE 802.15.4g CSMA/CA mechanism. Our proposed coexistence techniques can improve fair spectrum sharing between IEEE 802.15.4g and IEEE 802.11ah networks for IoT applications.
- Published
- 2021
5. Mitigation of PA Nonlinearity for IEEE 802.11ah Power-Efficient Uplink via Iterative Subcarrier Regularization
- Author
-
Li Cho, Xianhua Yu, Chau-Yun Hsu, and Pin-Han Ho
- Subjects
Orthogonal frequency division multiplexing (OFDM) ,General Computer Science ,Signal reconstruction ,Orthogonal frequency-division multiplexing ,Computer science ,Amplifier ,Transmitter ,General Engineering ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,802.11ah ,Subcarrier ,Power (physics) ,nonlinear noise ,0203 mechanical engineering ,Telecommunications link ,Papoulis-Gerchberg algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,peak-to-average power ratio (PAPR) ,lcsh:TK1-9971 ,IEEE 802.11ah - Abstract
An orthogonal frequency division multiplexing (OFDM) transmitter for 802.11ah uplink may consume unnecessarily high power due to the malicious effect of a large peak-to-average power ratio (PAPR). This is particularly a problem for client devices (CDs) under the low-power wide-area (LPWA) technology in an Internet of thing (IoT) system, where high PAPR signals may drive the power amplifier (PA) to operate with large input back-off (IBO). This article focuses on receiver-side signal compensation (SC) techniques and introduces a novel scheme called iterative subcarrier regularization (ISR), which is based on the generalization of Papoulis-Gerchberg algorithm (GPGA). We claim that the proposed scheme is completely compatible with 802.11ah as it only exploits the prior information available in the standard operations and popular system-build-in functions in the iterative signal reconstruction process. Extensive numerical evaluations demonstrate that the proposed scheme can improve PA efficiency by 4-9 dB for uplink signaling.
- Published
- 2021
6. Data Rate-Based Grouping to Resolve Performance Anomaly of Multi-Rate IEEE 802.11ah IoT Networks
- Author
-
Miriyala Mahesh, V. P. Harigovindan, and Badarla Sri Pavan
- Subjects
Scheme (programming language) ,Computer science ,Distributed computing ,Aggregate (data warehouse) ,Overhead (computing) ,Throughput ,Anomaly (physics) ,computer ,Communication channel ,Degradation (telecommunications) ,computer.programming_language ,IEEE 802.11ah - Abstract
In this letter, we consider IEEE 802.11ah based IoT network with rate adaptation, where all the devices contend for the channel access using group-based restricted access window (RAW) mechanism with default uniform grouping scheme. In such multi-rate networks, as each group contains distinct data rate devices, we have observed drastic degradation of throughput performance due to performance anomaly. To resolve this problem, we propose a novel grouping scheme based on data rates. Analytical and simulation results show that the proposed scheme significantly improves aggregate throughput of RAW mechanism with minimal additional overhead, when compared to default uniform grouping scheme.
- Published
- 2020
7. Periodic Traffic Scheduling for IEEE 802.11ah Networks
- Author
-
Md. Iftekhar Hussain and Nurzaman Ahmed
- Subjects
business.industry ,Computer science ,Network packet ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Energy consumption ,Computer Science Applications ,Scheduling (computing) ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Computer network ,Communication channel ,IEEE 802.11ah - Abstract
In this letter, we propose a novel channel access mechanism for IEEE 802.11ah to reduce delay and energy consumption in large-scale networks. The proposed protocol predicts the service interval of a monitoring application and schedules the subsequent frames before their arrivals without requiring any further contention. By doing so, the proposed protocol significantly reduces access delay and unnecessary wake-ups. In saturated network conditions, the proposed protocol shows throughput improvement up to 25%, and reduces average packet latency and energy consumption up to 55.5% and 48.4% respectively as compared to the traditional scheme.
- Published
- 2020
8. Fast and Reliable Alert Delivery in Mission-Critical Wi-Fi HaLow Sensor Networks
- Author
-
Evgeny Khorov, Andrey Lyakhov, Ivan Nasedkin, Ruslan Yusupov, Jeroen Famaey, and Ian F. Akyildiz
- Subjects
Computer. Automation ,General Computer Science ,alert ,business.industry ,Event (computing) ,Computer science ,Reliability (computer networking) ,restricted access window ,Mission critical ,General Engineering ,020206 networking & telecommunications ,02 engineering and technology ,IEEE 802.11ah ,Critical infrastructure ,Mass communications ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Engineering sciences. Technology ,lcsh:TK1-9971 ,Wireless sensor network ,sensor network ,Computer network - Abstract
Rapidly evolving, the Internet of Things imposes new challenges for the developers of wireless networks. Various critical infrastructure monitoring scenarios require fast and reliable alert delivery. In such systems, multiple sensors are entrusted to react to the same emergency event. Thus, it is enough to receive an alert message from any of these sensors. However, such a message shall be reliably delivered as soon as possible. The recently published Wi-Fi HaLow standard defines the Restricted Access Window (RAW) mechanism that coordinates transmissions of numerous devices. Thus, it can improve reliability and reduce delays. The paper is the first to study the usage of RAW in a scenario of emergency alerts, where the alert shall be received from at least one sensor. The paper presents an easy-to-calculate mathematical model of alert delivery with RAW. The model allows dynamic online reconfiguration of RAW parameters to select such parameters that minimize consumed channel timeshare while providing satisfactory reliability and delivery delay for an alert. Intensive performance evaluation shows that the RAW is fruitful for mission-critical data delivery in the considered scenario.
- Published
- 2020
9. Modeling of Real-Time Multimedia Streaming in Wi-Fi Networks With Periodic Reservations
- Author
-
Alexander Ivanov, Andrey Lyakhov, Evgeny Khorov, and Ian F. Akyildiz
- Subjects
Schedule ,General Computer Science ,business.industry ,Computer science ,Quality of service ,General Engineering ,QoS ,IEEE 802.11ad ,IEEE 802.11ah ,IEEE 802.11ax ,IEEE 802.11aa ,Wireless ,Channel access method ,IEEE 802.11s ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Wi-Fi ,lcsh:TK1-9971 ,Communication channel ,Computer network - Abstract
An important problem of modern Wi-Fis is the interferences caused by hidden stations active in the same area, or in multihop communications. All these issues significantly degrade the efficiency of the random channel access methods. Recent standardization and research activities are focused on solving coordination problems between various Wi-Fi devices. For example, the ongoing development of Wi-Fi 7 includes a coordinated schedule between the access points as a candidate solution. Consequently, Wi-Fi has many deterministic channel access mechanisms, which schedule channel time in a periodic manner well in advance and, thus, are utilized for streaming QoS sensitive data. However, both random traffic intensity and error-prone nature of the wireless channel complicate choosing such reservation parameters, i.e., the duration and the period of the reserved time intervals, that satisfy QoS requirements while minimizing channel time consumption. This paper introduces a general mathematical framework to solve the problem of choosing appropriate reservations parameters. The comparison of the analytical and simulation results show the high accuracy of the proposed framework. Finally, the paper gives an example of how to use the developed framework to maximize the network capacity.
- Published
- 2020
10. IEEE 802.11ah-Enabled Internet-of-Drone Architecture
- Author
-
Rakesh Matam, Nurzaman Ahmed, Mehbub Alam, and Ferdous A. Barbhuiya
- Subjects
business.industry ,Computer science ,Node (networking) ,Latency (audio) ,Throughput ,Drone ,law.invention ,Relay ,law ,Scalability ,business ,Communication channel ,IEEE 802.11ah ,Computer network - Abstract
IEEE 802.11ah is considered as a promising and scalable solution for connecting a large number of drones. With the support of sub-1GHz channel bands, relay, and group-based channel access mechanism, 802.11ah can help drone stations for collecting commands, sending data, and processing response to the control room. However, achieving required throughput and latency is still challenging due to high mobility and dynamic relaying requirement. This article proposes an IEEE 802.11ahbased Internet-of-Drones (IoD) architecture for surveillance and remote control. Our scheme predicts the location of a drone and places the required association and channel access configuration to a relay node dynamically. Moreover, the current mode of a drone station is switched to relay from station as per the location. The relay nodes use transmission opportunity (TXOP) with implicit acknowledgement to increase the efficiency of the network. The performance analysis shows significant improvement in terms of throughput and latency.
- Published
- 2021
11. Evaluating the Suitability of IEEE 802.11ah for Low-Latency Time-Critical Control Loops
- Author
-
Jeroen Hoebeke, Ingrid Moerman, Eli De Poorter, and Amina Seferagic
- Subjects
wireless control loop ,Technology and Engineering ,Computer Networks and Communications ,business.industry ,Computer science ,Wi-Fi HaLow ,Time division multiple access ,Throughput ,IEEE 802.11ah ,Computer Science Applications ,M2M communication ,Hardware and Architecture ,Signal Processing ,Telecommunications link ,Wireless ,IIoT ,business ,Wireless sensor network ,Information Systems ,Computer network ,Jitter - Abstract
A number of industrial wireless technologies have emerged over the last decade, promising to replace the need for wires in a variety of use cases. Except for customized time division multiple access (TDMA)-based wireless technologies that can achieve ultralow latency over a very limited area, wireless communication generally has reliability and latency issues when it comes to industrial applications. Closed loop communication requires high reliability (over 99%), limited jitter and latency, which poses a challenge especially over a wide area measuring in hundreds of meters. Extended coverage is promised with the advent of sub-GHz technologies, one of them being IEEE 802.11ah which is the only one that offers sufficient data rate for frequent bidirectional communication. Thus, we evaluated IEEE 802.11ah for low-latency time-critical control loops. We propose the network setup for adjusting the network dynamics to that of control loops, enabling limited jitter and high reliability. We explore the scalability of IEEE 802.11ah network hosting both control loops and monitoring sensors that periodically transmit measurements. Assigning the control loop end-nodes to dedicated restricted access window (RAW) slot results in over 99.99% successful deliveries. Furthermore, interpacket delay is concentrated around the cycle-time in the following or preceding beacon interval in case the beacon interval is at least half the value of the shortest cycle-time. Adjusting the beacon interval to the fastest control loop in the network ensures latency requirements at the cost of maximum achievable throughput and energy consumption.
- Published
- 2019
12. Traffic-Aware Sensor Grouping for IEEE 802.11ah Networks: Regression Based Analysis and Design
- Author
-
Kate Ching-Ju Lin, Tung-Chun Chang, Chi-Han Lin, and Wen-Tsuen Chen
- Subjects
Computer Networks and Communications ,business.industry ,Wireless network ,Computer science ,Mobile computing ,020206 networking & telecommunications ,02 engineering and technology ,Partition (database) ,Regression ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Electrical and Electronic Engineering ,business ,Software ,IEEE 802.11ah ,Computer network - Abstract
Traditional IEEE 802.11 network is designed for the use of small scale local wireless networks. However, the emergence of the Internet of Things (IoT) has changed the scene of wireless communications. Thus, recently, the IEEE task group ah (TGah) has been dedicated to the standardization of a new protocol, called IEEE 802.11ah, which is customized for this type of large-scale networks. IEEE 802.11ah adopts a grouping-based MAC protocol to reduce the contention overhead for each group of devices. However, most existing designs simply randomly partition devices into groups, and less attention has been paid to the problem of forming efficient groups. Therefore, in this paper, we argue that the performance of grouping is closely related to heterogeneity in traffic demands of devices, and propose a traffic-aware grouping algorithm to improve channel utilization. Since channel utilization of a group closely depends on the collision probability, we further derive a regression-based analytical model to estimate the contention success probability with consideration of sensors’ heterogeneous traffic demands. The evaluation via NS-3 simulations shows that the proposed regression-based model is quite accurate even when clients have diverse traffic demands, and our traffic-aware grouping outperforms other baseline approaches, especially when the network is nearly saturated.
- Published
- 2019
13. Enabling Communication Networks for Water Quality Monitoring Applications: A Survey
- Author
-
Segun O. Olatinwo and Trudi-H. Joubert
- Subjects
IoT ,General Computer Science ,Computer science ,water quality monitoring ,QoS ,02 engineering and technology ,LoRa ,01 natural sciences ,Field (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,General Materials Science ,Electrical and Electronic Engineering ,Scope (project management) ,business.industry ,010401 analytical chemistry ,General Engineering ,020206 networking & telecommunications ,WSN ,Telecommunications network ,0104 chemical sciences ,Sigfox ,Key (cryptography) ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Wireless sensor network ,Efficient energy use ,Computer network ,IEEE 802.11ah - Abstract
This paper considers newly emerging wireless technologies that can be explored for potential exploitation in the future wireless sensor network solutions for water quality monitoring applications. The reviewed technologies promise to address long-standing issues that confront existing wireless sensor network solutions devoted to the monitoring of water quality parameters. Such issues include energy efficiency and long-range water quality data communication. These issues can be attributed to the shortcomings of legacy communication networks commonly combined with wireless sensor network solutions, due to a discrepancy caused by traditionally powering the sensors nodes using batteries. In particular, some of the legacy communication networks suffer from short communication range, while others are limited by high power consumption. These shortcomings provide scope for the utilization of newly emerging solutions identified in this study to advance the field of a wireless sensor network for water quality monitoring. To achieve this, three key categories of communication networks have been recommended in this paper, including their architectural design and network deployment for water quality monitoring applications. Also, this paper provides future directions on the identified communication networks to enhance their performance for the next-generation of wireless sensor network solutions for water quality monitoring applications.
- Published
- 2019
14. E-model: an analytical tool for fast adaptation of IEEE 802.11 ah RAW grouping strategies
- Author
-
Universitat Politècnica de Catalunya. Doctorat en Enginyeria Telemàtica, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, Universitat Politècnica de Catalunya. WNG - Grup de xarxes sense fils, Baños González, Víctor Hugo, López Aguilera, M. Elena, García Villegas, Eduard, Universitat Politècnica de Catalunya. Doctorat en Enginyeria Telemàtica, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, Universitat Politècnica de Catalunya. WNG - Grup de xarxes sense fils, Baños González, Víctor Hugo, López Aguilera, M. Elena, and García Villegas, Eduard
- Abstract
IEEE 802.11ah is an Internet of Things enabling technology, where the efficient management of thousands of devices is a key function. To this aim, IEEE 802.11ah provides the restricted access window (RAW) mechanism, which reduces contention by enabling transmissions for small groups of stations. Optimal grouping of RAW stations requires an evaluation of many possible configurations. In this paper, we propose an analytical model (named e-model) that provides an evaluation of the RAW configuration performance, allowing a fast adaptation of RAW grouping policies, in accordance to varying channel conditions. We base the e-model in known saturation models, which we adapted to include the IEEE 802.11ah’s PHY and MAC layer modifications and to support different bitrates and packet sizes. As a proof of concept, we use the proposed model to compare the performance of different grouping strategies, showing that the e-model is a useful analysis tool in RAW-enabled scenarios. We validate the model with existing IEEE 802.11ah implementation for NS-3., Peer Reviewed, Postprint (author's final draft)
- Published
- 2020
15. E-model: an analytical tool for fast adaptation of IEEE 802.11 ah RAW grouping strategies
- Author
-
Victor Banos-Gonzalez, Elena Lopez-Aguilera, Eduard Garcia-Villegas, Universitat Politècnica de Catalunya. Doctorat en Enginyeria Telemàtica, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, and Universitat Politècnica de Catalunya. WNG - Grup de xarxes sense fils
- Subjects
Halow ,IoT ,WAP (Protocol d'aplicació sense fil) ,Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC] ,Computer science ,Network packet ,Distributed computing ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,Throughput ,Detectors ,02 engineering and technology ,Wireless Application Protocol (Computer network protocol) ,IEEE 802.11ah ,0508 media and communications ,IEEE 802.11 ,Random Access window ,Enginyeria electrònica::Instrumentació i mesura::Sensors i actuadors [Àrees temàtiques de la UPC] ,PHY ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,RAW ,Communication channel - Abstract
IEEE 802.11ah is an Internet of Things enabling technology, where the efficient management of thousands of devices is a key function. To this aim, IEEE 802.11ah provides the restricted access window (RAW) mechanism, which reduces contention by enabling transmissions for small groups of stations. Optimal grouping of RAW stations requires an evaluation of many possible configurations. In this paper, we propose an analytical model (named e-model) that provides an evaluation of the RAW configuration performance, allowing a fast adaptation of RAW grouping policies, in accordance to varying channel conditions. We base the e-model in known saturation models, which we adapted to include the IEEE 802.11ah’s PHY and MAC layer modifications and to support different bitrates and packet sizes. As a proof of concept, we use the proposed model to compare the performance of different grouping strategies, showing that the e-model is a useful analysis tool in RAW-enabled scenarios. We validate the model with existing IEEE 802.11ah implementation for NS-3.
- Published
- 2020
- Full Text
- View/download PDF
16. Receiver for IEEE 802.11ah in Interference Limited Environments
- Author
-
Abhijeet Bishnu and Vimal Bhatia
- Subjects
Computer Networks and Communications ,Computer science ,Orthogonal frequency-division multiplexing ,Frequency band ,020208 electrical & electronic engineering ,Estimator ,020206 networking & telecommunications ,02 engineering and technology ,Viterbi algorithm ,Computer Science Applications ,symbols.namesake ,Additive white Gaussian noise ,Viterbi decoder ,Interference (communication) ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Electronic engineering ,Bit error rate ,Decoding methods ,Computer Science::Information Theory ,Information Systems ,Communication channel ,IEEE 802.11ah - Abstract
Recently, IEEE 802.11ah standard has been proposed to extend the range of wireless local area network operating in the sub-1-GHz frequency band. This standard along with other protocols can provide communication services to the Internet of Things applications. However, in future, this band is also expected to be crowded like 2.45 GHz ISM band and cause interference to other devices operating in the same band. For a communication channel affected by additive white Gaussian noise, the least square (LS)-based estimator and Euclidean distance-based Viterbi decoder give optimal performance. However, the receiver’s performance with LS estimator followed by the Viterbi decoder degrades for high interference affected communication channels. In this paper, a new orthogonal frequency division multiplexing-based receiver structure operating in high interference environment is proposed. The proposed receiver is based on nonparametric maximum likelihood channel estimation followed by Viterbi decoder. The Viterbi decoder’s branch metric is updated based on the distribution of residual error. The proposed receiver structure is tested on IEEE 802.11ah-based receiver in two different type of additive interference: 1) IEEE 802.15.4 device and 2) impulsive noise. Both simulations and real-world experimental results on standard compliant platform show that the proposed algorithm performs better in terms of bit error rate than other receivers in all the considered interference models. Additionally, we also derive analytical expression for the probability of symbol error.
- Published
- 2018
17. Hybrid Slotted-CSMA/CA-TDMA for Efficient Massive Registration of IoT Devices
- Author
-
Rashid Ali, Nurullah Shahin, and Young-Tak Kim
- Subjects
General Computer Science ,Computer science ,Time division multiple access ,050801 communication & media studies ,Access control ,hybrid CSMA/CA-TDMA ,02 engineering and technology ,0508 media and communications ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,M2M networks ,Protocol (object-oriented programming) ,Authentication ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,association ,General Engineering ,020206 networking & telecommunications ,IEEE 802.11ah ,Internet of Things (IoT) ,Transmission (telecommunications) ,authentication ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Carrier sense multiple access with collision avoidance ,Computer network - Abstract
Recently, the Wi-Fi alliance announced a new Wi-Fi standard known as IEEE 802.11ah (or Wi-Fi HaLow) to efficiently support Internet of Things (IoT) applications. However, the existing registration method under IEEE 802.11ah, based on carrier-sense multiple access with collision avoidance (CSMA/CA), was analyzed as not efficient enough for registration of large-scale machine-to-machine (M2M) communications where a massive number of devices try to access a single, centralized access point (AP). In this paper, we propose a hybrid slotted-CSMA/CA-time-division multiple access (TDMA) (HSCT) medium access control (MAC) protocol for efficient massive registration of IoT devices (up to 8000) in M2M networks. We focus on situations, where a large number of M2M devices simultaneously try to register at a single, centralized AP. In the proposed HSCT, contention-based slotted-CSMA/CA allows devices to send an authentication request via randomly selected backoff slots, whereas contention-free TDMA permits those devices to send/receive the subsequent association request/association response via an individually allocated TDMA slot. In addition, a centralized authentication control (CAC)-based mechanism with modified algorithms for optimal selection of CAC parameters and the slotted fixed-window CSMA protocol with Sift geometric probability distribution are used to mitigate severe contention between massive registrations upon network (re-)initialization from an AP reboot. This paper also analyzes the performance of the proposed scheme and determines the optimal configuration to enhance registration performance. Simulation results demonstrate that the proposed HSCT MAC protocol achieves substantial improvement, compared with the contention-free transmission, a combined authentication/association scheme, and the conventional IEEE 802.11ah with CSMA/CA.
- Published
- 2018
18. Wireless Infrastructure M2M Network For Distributed Power Grid Monitoring
- Author
-
Bin Hu and Hamid Gharavi
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,020209 energy ,Distributed power ,020206 networking & telecommunications ,02 engineering and technology ,Transmission system ,Grid ,Telecommunications network ,Article ,Electric power system ,Smart grid ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,business ,Software ,Information Systems ,Computer network ,IEEE 802.11ah - Abstract
With the massive integration of distributed renewable energy sources (RESs) into the power system, the demand for timely and reliable network quality monitoring, control, and fault analysis is rapidly growing. Following the successful deployment of Phasor Measurement Units (PMUs) in transmission systems for power monitoring, a new opportunity to utilize PMU measurement data for power quality assessment in distribution grid systems is emerging. The main problem however, is that a distribution grid system does not normally have the support of an infrastructure network. Therefore, the main objective in this paper is to develop a Machine-to-Machine (M2M) communication network that can support wide ranging sensory data, including high rate synchrophasor data for real-time communication. In particular, we evaluate the suitability of the emerging IEEE 802.11ah standard by exploiting its important features, such as classifying the power grid sensory data into different categories according to their traffic characteristics. For performance evaluation we use our hardware in the loop grid communication network testbed to access the performance of the network.
- Published
- 2017
19. IEEE 802.11ah: sub-1-GHz license-exempt operation for the internet of things
- Author
-
Minyoung Park
- Subjects
IEEE 802.11u ,IEEE 802 ,Computer Networks and Communications ,Computer science ,Inter-Access Point Protocol ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,IEEE 802.11a-1999 ,IEEE 802.11 ,IEEE 802.2 ,IEEE 802.11g-2003 ,Electrical and Electronic Engineering ,IEEE 802.11s ,IEEE 802.11w-2009 ,business.industry ,Physical layer ,Network allocation vector ,Computer Science Applications ,IEEE 802.1Q ,IEEE 802.11b-1999 ,IEEE 802.11i-2004 ,IEEE 802.11e-2005 ,IEEE 802.1X ,Telecommunications ,business ,IEEE 802.11r-2008 ,Computer network ,IEEE 802.11ah - Abstract
IEEE 802.11ah Task Group has been developing an amendment to the 802.11 standard to define sub-1-GHz license-exempt operation to support sensors and Internet of Things applications. This article presents an overview of major physical layer and MAC layer features of 802.11ah.
- Published
- 2015
20. Emerging technologies for WLAN
- Author
-
Hemanth Sampath and Vk Jones
- Subjects
Computer Networks and Communications ,Emerging technologies ,business.industry ,Computer science ,MIMO ,Multi-user MIMO ,Computer Science Applications ,IEEE 802.11ac ,Wireless lan ,Electrical and Electronic Engineering ,Telecommunications ,business ,IEEE 802.11ai ,IEEE 802.11ah ,Communication channel - Abstract
New technologies continue to be introduced for WLAN applications at a robust pace. We review the value proposition for some of the key features of 802.11ac such as larger bandwidth, higher order modulation, and MIMO and MUMIMO transmission modes, explaining how each feature translates to improved user experience. We present channel measurements and prototype performance data to demonstrate the gains of MIMO and MU-MIMO in an indoor environment. Next, we discuss the value proposition of some key features of 802.11ah. Measurement data of 802.11ah performance is provided, showing how it is a compelling technology for the growing Internet of Things market. We conclude with a preview of emerging technologies that promise to improve user experience — 802.11ai for fast network acquisition and 802.11ax for high-efficiency networking in dense indoor and outdoor networks.
- Published
- 2015
21. Outdoor Long-Range WLANs: A Lesson for IEEE 802.11ah
- Author
-
Ignas Niemegeers, Stefan Aust, R. Venkatesha Prasad, Electro-Optical Communication, and Center for Wireless Technology Eindhoven
- Subjects
wireless sensor ,business.industry ,Inter-Access Point Protocol ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical layer ,outdoor ,Wireless LAN controller ,IEEE 802.11ah ,long-range ,WLAN ,IEEE 802.11 ,sub- 1GHz ,Media access control ,IEEE 802.11e-2005 ,Electrical and Electronic Engineering ,business ,Telecommunications ,Wireless sensor network ,Computer network - Abstract
Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to multiple kilometers using carrier frequencies at 900 MHz. However, limitations of WLAN outdoor installations have been found of the plethora of WLAN protocols in experimental studies. This article summarizes the challenges and provides a comprehensive overview of suggested improvements. As the standardization of the IEEE 802.11ah is reaching its final stage, important protocol aspects as well as new features are to be outlined. Interference problems and issues with the WLAN configuration, the physical layer (PHY), and media access control (MAC) are of paramount importance in outdoor WLAN networks, and thus, are discussed in detail. Further, we examine the reported upper boundaries in throughput and link reliability of long-range WLANs in different environments, including sea-surfaces, unmanned aerial vehicles (UAVs), and tunnels. At the end of this study, we reflect on the major issues regarding sub-1 GHz (S1G) WLANs and propose avenues for further research.
- Published
- 2015
22. Performance Analysis of Group-Synchronized DCF for Dense IEEE 802.11 Networks
- Author
-
Lin Cai, Klaus Doppler, Jianping Pan, Chittabrata Ghosh, Lei Zheng, and Minming Ni
- Subjects
IEEE 802 ,Channel allocation schemes ,Computer science ,business.industry ,Wireless network ,Applied Mathematics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Multimedia Extensions ,Throughput ,Network allocation vector ,Distributed coordination function ,Computer Science Applications ,IEEE 802.11 ,Media access control ,Wireless ,Electrical and Electronic Engineering ,business ,Throughput (business) ,Power control ,Computer network ,IEEE 802.11ah - Abstract
In dense IEEE 802.11 networks, improving the efficiency of contention-based media access control is an important and challenging issue. Recently, the IEEE802.11ah Task Group has discussed a group-synchronized distributed coordination function (GS-DCF) for densely deployed wireless networks with a large number of stations. By using the restricted access window (RAW) and RAW slots, the GS-DCF is anticipated to improve the throughput substantially, primarily due to relieving the channel contention. However, optimizing the MAC configurations for the RAW, i.e., the number and duration of RAW slots, is still an open issue. In this paper, we first build an analytical model to track the performance of the GS-DCF in saturated 802.11 networks. Then, we study and compare the GS-DCF throughput using both centralized and decentralized grouping schemes. The accuracy of our model has been validated with simulation results. It is observed that the GS-DCF obtains a throughput gain of seven times or more over DCF in a network of 512 or more stations. Moreover, it is demonstrated that the decentralized grouping scheme can be implemented with a small throughput loss when compared with the centralized grouping scheme.
- Published
- 2014
23. Enhancement of IEEE 802.11ah MAC for M2M Communications
- Author
-
Tae-Jin Lee, Duckdong Hwang, and Chul Wan Park
- Subjects
Hidden node problem ,Computer science ,business.industry ,Inter-Access Point Protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Wireless LAN controller ,Computer Science Applications ,Modeling and Simulation ,Wireless lan ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,Multiple Access with Collision Avoidance for Wireless ,Media access control ,Channel access method ,IEEE 802.11e-2005 ,Electrical and Electronic Engineering ,IEEE 802.1X ,business ,IEEE 802.11ah ,Computer network ,Wireless distribution system - Abstract
Machine-to-machine (M2M) communications is expected to be supported in the next-generation wireless LAN, IEEE 802.11ah. One of the most important issues for M2M communications is designing an effective medium access scheme to handle many devices. In this letter, we propose a new medium access control (MAC) enhancement to increase the uplink access efficiency. The proposed algorithm estimates the number of devices for the uplink access from the success probability. In the proposed algorithm, an access point (AP) determines the optimal size of the restricted access window (RAW) considering the relationship between the estimated number of devices and the size of RAW. We show that the success probability for the uplink access is improved by using our proposed algorithm through analysis and simulations.
- Published
- 2014
24. WLAN Power Save with Offset Listen Interval for Machine-to-Machine Communications
- Author
-
Iain B. Collings, Gordon J. Sutton, and Ren Ping Liu
- Subjects
Network architecture ,Network packet ,Computer science ,business.industry ,Applied Mathematics ,Real-time computing ,Energy consumption ,Telecommunications network ,Computer Science Applications ,Machine to machine ,Wireless lan ,Algorithm design ,Electrical and Electronic Engineering ,Networking & Telecommunications ,business ,Efficient energy use ,IEEE 802.11ah ,Computer network - Abstract
Large scale deployment of machine-to-machine (M2M) communication networks hinges on the cost and energy efficient design of the embedded devices. Standard WLAN power save mechanisms, which are designed for human communications, experience performance degradation and unbalanced energy consumptions in M2M communication networks. We develop a novel analytical model that takes into account the fundamentally different network architecture and traffic patterns of M2M communications. Our model accurately characterizes the high contention and long packet delay found in M2M communication networks, while previous models underestimate such measures. To combat such performance decline, we propose a new algorithm that enhances existing power save mechanisms to extend the lifetime of a M2M communication network. We call this the Offset ListenInterval (OLi) Algorithm. The OLi algorithm spreads the M2M traffic evenly with calculated offsets to alleviate network contention and reduce packet delay. Our analytical model is then used to evaluate the energy efficiency of our OLi algorithm and compare with the standard power save mechanisms. Our results show that the proposed OLi algorithm extends the lifetime by up to 40%, and scales up to thousands of nodes in a M2M communication network. © 2002-2012 IEEE.
- Published
- 2014
25. Performance analysis of the IEEE 802.11 distributed coordination function
- Author
-
Giuseppe Bianchi
- Subjects
IEEE 802 ,Exponential backoff ,Computer Networks and Communications ,Inter-Access Point Protocol ,computer.internet_protocol ,Computer science ,Throughput ,Distributed coordination function ,Point coordination function ,Frame aggregation ,IEEE 802.11 ,Wireless lan ,Multiple Access with Collision Avoidance for Wireless ,IEEE 802.11g-2003 ,Wireless Application Protocol ,Wireless ,IEEE 802.11p ,Electrical and Electronic Engineering ,IEEE 802.11s ,Settore ING-INF/03 - Telecomunicazioni ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,Physical layer ,Mac layer protocol ,Wireless Multimedia Extensions ,Network allocation vector ,LTE in unlicensed spectrum ,IEEE 802.11ax ,IEEE 802.11b-1999 ,IEEE 802.11e-2005 ,IEEE 802.1X ,business ,computer ,Carrier sense multiple access with collision avoidance ,Computer network ,IEEE 802.11ah ,Communication channel - Abstract
The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol.
- Published
- 2000
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.