Is CSMA/CA really efficient against interference in a Wireless Control System? An experimental answer
|
|
|
- Angela Fowler
- 10 years ago
- Views:
Transcription
1 Is CSMA/CA really efficient against interference in a Wireless Control System? An experimental answer M.Bertocco,G.Gamba,A.Sona University of Padova via G. Gradenigo, 6/B Padova, Italy, Phone: , Fax: {matteo.bertocco,giovanni.gamba,alessandro.sona}@unipd.it Abstract The deployment of a wireless control system must cope with a number of effects usually negligible in a wired scenario. To this aim, an experimental analysis on suitable prototypes and testbeds can readably offer a valid and rapid method to forecast the behavior of a real network. In this paper, performance measurement of industrial wireless sensor network in the presence of various type of interference is provided. In particular a Bluetooth, WiFi and Zigbee disturbing network impairs a suitable testbed employing IEEE wireless sensor nodes. The purpose is to optimize the effectiveness of the medium access control mechanism through the choice of a proper mode of use. The analysis will show that from the measurement of certain parameters (number of failed pollings, experimental cycle-time, and alarm latency) interference effects can be effectively recognized and the network setup optimized. 1 Introduction Wireless sensor networks (WSNs) are nowadays a promising and powerful novelty in the scenario of industrial communications [1]. They provide distributed sensing features having interesting properties with respect to the wired networks, such as the absence of infrastructures, low cost, scalability and flexibility. Nevertheless, some key drawbacks are actually delaying a wide deployment of these systems for industrial applications, due to some technical problems still far to be completely solved. One critical issue is, for instance, the poor reliability of WSNs, when some types of in-channel radio interference occur. This situation is typical for WSNs which transmit on radio channels shared with other communication systems and hence crowded of radio disturbances, like for instance the 2.4 GHz industrial, scientific and medical (ISM) band ( GHz). In this band, several sources of interference can be encountered, including for example IEEE [2], IEEE (Bluetooth) [3], and IEEE 82.11b/g [4] compliant devices, microwave ovens, cordless phones, etc. Moreover, severe timing constraints may be often required, meaning that relevant delays and/or uncertainties in data transfer might not be tolerated. The most typical effect of interference is signal degradation, which occurs at the WSN receivers when the incoming useful signal is affected by interference. In order to reduce such effect, some communication standards employ sensing mechanisms like the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. This mechanism enables multiple users to share the same physical medium, avoiding collisions and consequently signal degradation. A CSMA/CA compliant network node typically senses the in-channel power before transmitting. If the measured power is below a given threshold, meaning that the medium is actually not busy, then the transmission can begin. Otherwise, after a random backoff period, another attempt is performed. Common examples of wireless systems using CSMA/CA are IEEE WLANs and IEEE based WSNs. However, further effects of interference may anyway occur. In fact, if the interference at the WSN receivers is higher than a prefixed threshold, the channel is assumed as busy, and any node wishing to transmit is forced to wait and delay the delivery of data packets [1, 5]. In order to properly deal with these interference issues, a special effort is required just at the early designstage. Helpful information can be found either theoretically, through the use of suitable simulation models, or experimentally, through measurements. Useful application notes can be also found in the scientific literature. For instance, in [6] the behavior of the IEEE physical layer in an industrial environment is deeply investigated; in [7] a saturation analysis for IEEE networks is reported; more generally, papers [1], [8] consider the usage of wireless technologies for industrial applications. Finally, papers [9], [1] are concerned with the use of IEEE No analysis comparing the effects of different CSMA/CA operating modes against interference is instead available /8/$ IEEE 885
2 In this paper, the performance of a CSMA/CA based WSN for industrial monitoring in the presence of real-life interference is investigated through a set of experimental tests. In particular, the tests have been performed on a testbed enlisting a real life IEEE WSN for which a specific industrial monitoring protocol is used [5], capable both of cyclic polling and acyclic alarm management. Different kind of interfering networks have been deployed, comprising IEEE (WiFi), IEEE (Bluetooth) and IEEE (ZigBee) two-node networks. The outline of the paper is as follows. Section 2 provides a brief overview of the IEEE standard and of interfering sources. In Section 3, the key features of the monitoring protocol used for tests are presented. Section 4 describes the setup of the testbed and the measurement process. Section 5.1 and 5.2 describe the outcomes of an extensive experimental session carried out for the cyclic polling task, whereas, Section 5.3 does the same for the acyclic alarm task. Finally, Section 6 highlights some meaningful obtained results. 2 Standards Overview 2.1 IEEE standard IEEE is a standard defined for Low Rate Wireless Personal Area Networks, characterized by low cost of the components, reduced coverage area, low power transmission, bit rate and energy consumption [2]. Such characteristics make the standard very suitable for WSN applications. Similarly to the other networks standardized by the IEEE 82 committee, IEEE defines only the first two layers of the open system interconnection stack, namely: Physical Layer (PHY) and Medium Access Control (MAC) [2]. In the PHY layer, the following functions are carried out: (i) in-channel power energy detection, (ii) link quality indication, (iii) communication channel selection, (iv) Clear Channel Assessment (CCA), and (v) packet transmission and reception through the radio channel. The standard also defines three bands: MHz, MHz, and MHz, in which 26 separate channels are available. In particular, the latter (ISM band) is the most commonly used band and includes 16 channels, each of 3 MHz bandwidth, uniformly spaced as shown in Fig. 1(a). The MAC layer is responsible for regulating channel access. In particular, two different types of operating schemes are available. The first one, called beacon mode, is based on CSMA/CA with a superimposed time-slot allocation, which schedules the network access. The second one, called non-beacon mode, is based on a pure CSMA/CA protocol. As it will be clarified in the following, due to the characteristics of the sensor nodes deployed in experiments, attention will be hereinafter exclusively focused on the non-beacon mode scheme. In non-beacon mode, each station wishing to transmit: Figure 1. Frequency channels of (a) IEEE , (b) IEEE and (c) IEEE inside the ISM band. waits for a random backoff period uniformly distributed in the interval (, 2 BE 1) BP, where BE is a term called Backoff Exponent and BP is a basic period; senses the status of the channel (free or busy) through a Clear Channel Assessment (CCA) procedure; if the channel is free, transmits; else, if the channel is busy, then increments BE by one, up to a maximum BE level; if the retransmission number (NB) overpasses a preassigned maximum threshold, then signals failure, else restarts from the beginning. The CCA procedure can be carried out in three different modes: 1. CCA mode 1: medium is assumed busy if the measured power level (Received Signal Strength Indication, RSSI)is higher than a prefixed threshold, CCA TH. 2. CCA mode 2: medium is assumed busy if at least one signal with the modulation and spreading characteristics of IEEE is detected. 3. CCA mode 3: medium is assumed busy if both the above assumptions are detected. Throughout the paper it is shown how the choice of the CCA mode can affect the performance of a IEEE network in the presence of interference: as can be easily understood, CCA mode 1 is the most sensible to interference, leading often to worse performance. 886
3 2.2 IEEE standard Another standard deployed for wireless personal area networks (WPANs) is IEEE [3], in the following simply referred with the commercial term Bluetooth. This standard defines the first two layers, PHY and MAC of the protocol stack. Bluetooth systems operate in the 2.4 GHz ISM band. In a majority of countries, the range of this frequency band is 24 MHz MHz. As depicted in Fig. 1(c), the frequency spectrum is divided into 79 channels, spaced 1 MHz apart and characterized by carrier frequencies f k, with f k = k MHz and with k =,...,78. The most interesting feature of Bluetooth systems is the transmission technique. In fact Bluetooth employs a technique called Frequency Hopping Spread Spectrum (FHSS) whereby the carrier frequency of the transmitter changes up to 16 times per second. Another interesting issue of Bluetooth is the transmitted power. In particular, devices are divided into three classes, each associated to a maximum transmitted power level. The devices deployed in the following experiments areinclass1,i.e. with a maximum 1 mw power and power control. used: for a more general analysis of the proposed solution the reader is referred to [5]. 3.1 Cyclic task The cyclic task consists in a round robin polling of each slave. In the case of a single slave, the master node queries the slave every polling time, T p maintaining a sort of timeslot division. The master samples a virtual sensor that is physically mounted on the slave: this task is basically an abstraction of the physical sampling. A key feature of a sampling process is to assure an almost fixed sampling period (T p ), especially if the industrial monitoring application is involved in a control chain. In Fig. 2, a schematic representation of a master/slave communication is shown (n indicates the sequence number of the corresponding cycle). 2.3 IEEE standard The IEEE [4] is a wireless local area network (WLAN) standard defining a total of 14 frequency channels, each of which characterized by 22 MHz bandwidth. As sketched in Fig. 1(b), these channels are partially overlapped, and only three channels at a time, e.g. 3, 8, and 13, can be used without mutual interference. In a typical communication, an AP transmits periodically a frame called beacon, which contains information like a network identifier (ID), the beacon and channel parameters, and other traffic information. Each network station receives the beacon, and if it is intentioned to access the network, it sends a request for authentication. Once authenticated, a station may communicate to the AP or vice versa according to a CSMA/CA protocol. Usually, to assess the channel status, the Clear Channel Assessment (CCA) technique in mode 1 is implemented [4]. In this mode, the channel is assumed idle if the channel power level is below a given user selectable threshold, called CCA threshold, otherwise it is assumed busy. 3 Industrial Monitoring protocol An high layer protocol, based on a master-slave relationship, has been designed and implemented on a wireless sensor network for industrial monitoring. The protocol performs two classic tasks: a periodical polling of each slave for receiving data (e.g. readings of temperature, luminosity, humidity, pressure, rotation angle, etc.) from monitoring sensors (cyclic task), and an asynchronous alarm transmission, able to handle critical events from peripheral sensors (acyclic task). Without loss of generality, throughout the paper only one master and one slave are Figure 2. Packets exchange between master and slave inside a polling time. Once gained the channel, the master begins querying the slave with a request packet (containing information like the destination node address, the sequence number of the performed cycle and time stamps). The slave, after a fixed delay defined by the IEEE standard (12 symbol periods), replies with an ACK, and then sends a message containing the process data, after a second carrier sensing. In the case of correct reception, the master issues an ACK and waits for the expiration of the polling time before restarting the next cycle. If the handshake is not performed correctly (i.e. either the master or the slave does not receive the ACK frame), then the polling of that slave is considered failed and no retransmission is attempted. Within a cycle, the entire polling process is consists of the following steps. 887
4 At the instant S n, the master starts the request: afirst variable period, τ bm, is used to gain the channel and the transmission of the request packet plus the ACK takes another fixed period, T req. After that, the slave performs several tasks and, once obtained the channel (after a variable τ bs period), sends the response to the master (the transmission of the response plus the ACK takes a fixed period, T resp ). Hence, τ bm and τ bs are the initial backoff period needed to access the channel by the master and the slave, according to the CSMA/CA protocol. The master completes the polling cycle at the instant R n, that is: R n = S n + τ bm + T req + τ bs + T resp. (1) The difference between R n and S n is the polling latency, L p, which represents the time employed by the master to execute a complete query of a slave or, equivalently, the delay between the actual sampling instant and the ideal one. It may vary from a cycle to another. The general expression of L p is: L p = R n S n = τ bm + τ bs + T req + T resp. (2) } {{ } } {{ } random deterministic The master samples his virtual sensor connected to the slave at S n but receives the wanted data sample only at R n. From the study of this parameter interesting results can be deduced about the interference effects on the network. For instance in the absence of interference, only one channel access attempt is performed by both master and slave and, consequently, τ bm e τ bs are expected to be uniformly-distributed independent random variables. Consequently, a triangular distribution of L p values is also expected. Conversely, in the presence of interference, more attempts to access the channel are possible, since the channel may be erroneously sensed as busy. Consequently, both τ bm e τ bs are no longer expected to be uniformly-distributed independent random variables and, hence, different distribution of L p values are expected, depending on the interference characteristics. Another fundamental parameter is the effective cycle time (C p ), defined as: C p = R n R n 1 = S n S n 1 +(L p(n) L p(n 1) ). } {{ } } {{ } deterministic random (3) Theoretically, C p should be as fixed as possible, because it is the effective polling period visible at the application layer that a control chain can use. As shown in equation (3), C p accounts for two different contributions: the first one, S n S n 1 is deterministic since it represents the time elapsed between two subsequent transmissions of the request frame from the master to the same slave. The second contribution, L p(n) L p(n 1), is a random variable, since it is given by the difference between L p values evaluated for cycles n and n 1. In this case, a different distribution of C p values is expected depending whether the interference is present or not. In particular, the outcoming experimental probability density function (pdf) will be gaussian-like only in the absence of interference, since in this case both L p(n) and L p(n 1) have triangular shaped pdfs and their difference leads to a gaussian-like pdf. 3.2 Acyclic task The acyclic task allows for the direct transmission of alarms from slave to master. When an alarm occurs at the slave side, it is put in a specific queue and the acyclic task is responsible of its transmission. Several techniques could be used by the acyclic task to access the physical medium in order to transmit alarms [8]. The proposed experiments rely on the immediate policy described in [8]. In practice, when an alarm has to be sent, the slave, irrespective of the activity carried out of the network, tries to gain access to the channel and, if successful, transmits the alarm. This is possible thanks to IEEE CSMA/CA technique which makes each device able to autonomously access the network. Also this transmission is acknowledged by an ACK frame as in the case of polling task. The alarm can not be lost, so the transmission is retried until success. This queued policy does not allow to predict any upper bound to the alarm latency, L a, that is the time that the slave takes to successfully deliver the alarm to the master. 4 Measurement System and Setup The experimental session has been carried out by using the testbed sketched in Fig. 3, which comprises a twonodes IEEE network connected to a personal computer (PC) and a two-node interfering network. For the sake of simplicity, a single link network has been chosen since the monitoring protocol induces a time scheduling that gives similar results regardless of the number of slaves, as reported in [5]. The experiments have been performed in a non-anechoic room in order to emulate a real life environment. Preliminary measurements made with a Agilent E447B spectrum analyzer inside the used band have been performed to assure the absence of external uncontrolled interferences. The WSN enlists t-mote sky wireless sensors (motes) available from Moteiv [11, 12], based on the IEEE communication radio system [13]. They are equipped with an universal serial bus (USB) port for programming, a 12 bits analog-to-digital converter, and a light sensor. A software named WSN driver (available free online [14]), purposely developed in Boomerang TinyOS IDE and Java, is used to implement the high layer protocol in non-beacon mode [15, 16]. The channel used is number 25 (centered at GHz). 888
5 No Interference: no interfering network is active. This case is used to evaluate best achievable performance. Bluetooth: a file transfer (always on) between two Bluetooth (IEEE ) class 1 usb adapters (1 mw power) is performed at the maximum achievable rate. The distance between this network and WSN is d=1 m, while the distance between the two Bluetooth devices is l=2 m. Figure 3. Testbed architecture. This channel has been chosen suitably far away from external interference due to near operating WiFi Access Points. The master, M, and the slave, S, are positioned at a height of 1 m from the ground floor, with a distance r =1mfrom each other, assuring at least a -5 dbm received signal power, i.e. far above the receiver s sensitivity. The PC is used both to setup the network parameters at the beginning of the test, and to collect all the data coming from M via the USB port during the test. The PC is also equipped with a purposely developed software interface providing an user-friendly way to control the network and to perform the monitoring-process [14]. The slave s clock is also synchronized to the master s one at each polling cycle, so that the polling and alarm latencies can be correctly measured. Each experimental session consists of 1 cycles, with a polling time T p =3ms. This value guarantees a null packet loss in absence of alarms and interference [5]. Alarms are software generated by a Poisson process with mean alarm inter-arrival time of 1 ms (i.e. a stressful condition of nearly one alarm/second). All the collected data are post processed with Matlab. The following CCA modes have been used for the sensor network, in order to evaluate the immunity of the network with respect to interference: CCA 1: the channel is sensed busy if an arbitrary interfering source causes: RSSI CCA TH, with CCA TH = 77dBm (default value). CCA 2: the channel busy only if another IEEE transmission is revealed (Carrier detection). : motes do not perform CCA, and the backoff basic period (BP defined in section 2.1) is set to zero, switching the backoff delay off. The interfering network has been set-up with different communication standards. The physical layout (distance d and l) of the interfering network has been chosen to emulate a typical indoor factory environment and according to specific transmission ranges of each standard: WiFi: a file transfer (always on) between a WiFi (IEEE 82.11g) access point (Netgear KWGR614) and a wifi usb adapter (D-link DWLG122) is performed at the maximum achievable rate (nominal 54 Mbps). In order to evaluate the influence of the distance on the WSN performance, two distancies are considered: d=1 m and 6 m. The two WiFi devices are separated by a distance l=2 m and the chosen channel is 13 (overlapping the transmission channel of the WSN). ZigBee: a same network of the one under test is used as a further interferer. It deploys the same channel, in CCA mode 1 and with the same T p and mean alarm interarrival time. It operates at a distance d=.5 m, and with l=1 m between the two ZigBee devices. 5 Experimental Results 5.1 Packet Error Rate A first set of results from the experiments have been obtained in terms of Packet Error Rate (PER). For every interference configuration described in section 4, three tests have been performed varying the CCA mode. The results are summarized in Fig. 4. PER [%] No Interf. Bluetooth WiFi 1m WiFi 6m ZigBee CCA 1 CCA 2 Figure 4. Measured PER for all the considered configurations. 889
6 As can be seen, with no interference, only minimum values of PER occur, which are due to higher-priority transmissions, like alarms. It is worth noting that the CCA has little or no effect on performance: in fact in the mode the PER does not worsen significantly (1.5%). Bluetooth does not vary significantly the performance of the WSN. This is due to its frequency-hopping nature and short time-slots, which do not interfere significantly the WSN cycles. Also in this case the CCA mode does not play a key role. In fact, the maximum PER is 2.5% for CCA mode 1, i.e. even greater than the PER in mode ( 2%). The effect of CCA mode in instead really visible in the case of WiFi interferers. In fact, the WiFi channel always overlaps the WSN one, and lets very few windows into which ZigBee can transmit. For both the considered distances (1 and 6 m) from the WSN, the effects are similar and a great distance implies only a weak improvement of performance. The network in CCA mode 1 is heavily impaired by this WiFi interferer, because the received power (about -5 dbm) is always above the CCA threshold (-77 dbm). The behavior in CCA 2 and modes leads to a similar PER. In fact, the interferer is not an IEEE signal and so CCA 2 senses the channel free. The performance improvement in these modes is relevant: for WiFi 1 m away, the PER changes from 75% to less than.5%. In this case the transmission depends only on the Signal to Noise Ratio, that is far above the value for a correct reception. In the case of a ZigBee interferer, a heavy packet loss is visible: long ZigBee packets do not allow the network under test to correctly perform the polling and lead to a PER of about 55% for both CCA 1 and 2. In fact, in this case the interferer is of type IEEE and its power is above the threshold, causing a busy-channel both in CCA 1 and 2 modes. Therefore, in this case WSN performance are weakly improved by disabling the CCA (PER= 16.5%). 5.2 Polling Cycle Time In this subsection, the results in terms of pdf of the polling cycle C p, i.e. the effective polling period, are reported upon the varying of CCA modes. The reported plots are normalized histogram, made of the large amount of collected data (1 samples). They provide an almost complete statistical knowledge of the random variable C p. As stated in section 3.1, the expected pdf in both CCA 1 and 2 modes is gaussian-like (cubic splines), due to the convolution of four equal distributed uniform random variables (due to the initial back-offs). The curve is centered at 3 ms, with a minimum value of 1 ms and a maximum value of 5 ms. In Fig. 5 the polling cycle pdf in the case of no interference is shown. As predicted, for CCA mode 1 and 2 the back-offs of CSMA/CA protocol lead to an identical shape of the two curves. With CCA disabled, the presence of an impulsive pdf centered exactly at 3 ms (the chosen T p ) means an almost constant and deterministic value of C p. In fact back-offs are disabled and, with no interference, the polling works correctly at the first attempt. For the sake of clarity, in the following only subsequent cycles are analyzed. The cycles comprising a packet loss are ignored to prevent secondary modes in the pdf. Although not reported, even with a Bluetooth interferer the pdfs remain the same of Fig. 5. This interferer only increases the PER without modifying substantially the polling latency. In Fig. 6 the effect of a 6 m far away WiFi interference is shown (the same values are obtained with distance 1 m). As expected, CCA 2 and modes results are quite the same of those observed in the non-interfered example. In these cases the channel is sensed free (because the interferer is not IEEE ) or not sensed at all and so the back-offs are not increased No Interference CCA 1 CCA C p Figure 5. Probability density function for Polling cycle (C p ) with no interference WiFi 6m CCA 1 CCA C p Figure 6. Probability density function for Polling cycle (C p ) with WiFi interference. 89
7 ZigBee CCA 1 CCA 2 The effect of ZigBee interferer is deleterious also on alarm latency. Both with CCA 1 and 2 the latency is enlarged toward 12 ms, and also with a mode, although more concentrated below 4 ms, the latency still reaches 12 ms No Interference CCA1 CCA C p.2.15 Figure 7. Probability density function for Polling cycle (C p ) with ZigBee interference L a Conversely, in the case of CCA 1 the channel is often sensed busy and the CSMA/CA protocol tries to wait to by-pass the interference. This pdf reveals that many attempts to gain the channel have been tried, causing a great dispersion of the pdf that now spans from 1 to 95 ms and is much flatter than the one obtained in the absence of interference. The results summarized in Fig.7 reveal that in this case also with the polling cycle is no longer constant, probably due to the large amount of failed pollings. As expected, both modes 1 and 2 lead to the same results, because with a IEEE interferer above the CCA threshold the channel is sensed busy by both methods. With a ZigBee interferer the choice of is no longer a efficient solution, even if gives a better behavior. 5.3 Alarm Latency In this section the alarm latency pdf analysis is presented, highlighting the CCA mode influence on it. The reported plots are normalized histogram, typically made of 3 samples, i.e. the number of alarms generated, in mean, in a total of 1 polling cycles of 3 ms. The statistical behavior suggested in the following figures, even if based on a small amount of data, remains the same even with a larger and more complete set of samples, as reported in [5]. In Fig. 8 the alarm latency pdf in the absence of interference is shown. For CCA mode 1 and 2 the shape in asymmetrical, exponential like: latency is upper bounded to 4 ms. For latency is smaller, more concentrated below 1 ms with a spike at 3 ms. As for polling cycle, Bluetooth does not influence alarm latency, leading to pdfs similar to those just described. The effect of WiFi interference (Fig. 9), as for polling cycle, is greatly mitigated by the use of CCA 2, or, even better, with. If mode 1 is used, alarm latency is spread toward greater values, even above 1 ms. Figure 8. Probability density function for Alarm latency (L a ) with no interference WiFi 6m CCA1 CCA L a Figure 9. Probability density function for Alarm latency (L a ) with WiFi interference. 6 Conclusions In this paper an experimental answer to the problem of interference on WSN have been provided. The obtained results, although in a qualitative manner, have clearly underlined the effects of Clear Channel Assessment and Backoff periods on parameters like paket error rate, polling cycle pdf and alarm latency pdf. In particular the best performance are obtained with configuration, disabling both the channel sense and the back-offs. 891
8 ZigBee CCA1 CCA L a Figure 1. Probability density function for Alarm latency (L a ) with ZigBee interference. Bluetooth interference, thanks to its frequency hopping nature, does not disturb the network, and in this case the choice of CCA mode is pointless. Only a little packet error rate and pdf distorsion is visible. WiFi has revealed itself as the most disturbing system. In this case the choice of the correct CCA mode is essential: CCA 1 led to poor performance, while using CCA 2 or, better,, performance improvement is huge. A drop of packet loss and pdfs distorsion is noticed in these latter cases. The worst performance have been obtained with a Zig- Bee interferer. As expected, in this case CCA mode 1 and 2 are perfectly equivalent, and the use of mode little improves the performance. The use of CSMA/CA, although optimal in an distributed environment, reveals its problems when used in a real-time system, where latencies must be very low and a worst case bound should be always known. The CSMA/CA is a best effort solution for MAC layer, not optimal for a monitoring system, and even less adequate in an industrial system inserted in a control chain. Moreover, the conservative nature of CSMA/CA under-appreciate the robustness of IEEE modulation layer, preventing transmission (and hence increasing the PER) even when the SNR is good enough for a successful communication. References [1] A. Willig, K.Matheus, A.Wolisz: Wireless Technology in Industrial Networks, Proceedings of the IEEE, Vol. 93, June 25. [2] Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs), IEEE Std (Revision of IEEE Std ), pp. 1 35, 26. [3] Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs), IEEE Std (Revision of IEEE Std ), pp. 1 58, 25. [4] Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std (Revision of IEEE Std ), pp. C1 1184, June [5] M. Bertocco, G. Gamba, A. Sona and S. Vitturi: Performance Measurements of CSMA/CA-Based Wireless Sensor Networks for Industrial Applications, Proc. of IMTC 27, May 27, Warsaw Poland. [6] A. Willig, M. Kubisch, C. Hoene and A. Wolisz: Measurements of a wireless link in an industrial environment using an IEEE compliant physical layer, IEEE Trans. on Ind. Electr., Vol. 49, N. 6, December 22. [7] G. Bianchi: Performance analysis of the IEEE Distributed Coordination Function, IEEE Journal on Sel. Areas in Comm., Vol. 18, N. 3, 2. [8] F. De Pellegrini, D. Miorandi, S. Vitturi, A. Zanella: On the use of wireless networks at low level of factory automation systems, IEEE Transactions on Industrial Informatics,Vol.2, Issue 2, pp , May 26. [9] A. Flammini, D. Marioli, E. Sisinni, A. Taroni and M. Pezzotti: A wireless thermocouples network for temperature control in plastic machinery, Proc. of WFCS 26, pp , June 26, Torino Italy. [1] A. Koubaa, M. Alves and E. Tovar: A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks, Proc. of WFCS 26, pp , June 26, Torino Italy. [11] Moteiv Tmote Sky Data Sheet, Moteiv, 26. [12] MSP43x1xx Family Data Sheet, Texas Instruments, 26. [13] CC242 Data Sheet, Texas Instruments, 26. [14] [Online]. Available: [15] D. Gay, P. Levis, D. Culler: Software Design Patterns for TinyOS, [16] J. Polastre, J. Hui, P. Levis: A Unifying link abstraction for wireless sensor networks, SenSys 5 (site 892
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
APPLICATION NOTE. Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products. Atmel MCU Wireless. Description. Features
APPLICATION NOTE Atmel AT02845: Coexistence between ZigBee and Other 2.4GHz Products Description Atmel MCU Wireless This document introduces all kinds of 2.4GHz RF products. It focuses on analysis of ZigBee
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
A Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
Modeling and Simulation of Quality of Service in VoIP Wireless LAN
Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Mac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany [email protected] January 2010 Contents
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Site Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: [email protected] Ilangko Balasingham 2 2 The
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Metrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
What s so smart about Smart-hopping?
What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world
Spectrum Analysis How-To Guide
Spectrum Analysis How-To Guide MOTOROLA SOLUTIONS and the Stylized M Logo are registered in the US Patent & Trademark Office. Motorola Solutions, Inc. 2012. All rights reserved. Spectrum Analysis 3 Contents
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
Image Transmission over IEEE 802.15.4 and ZigBee Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
CS698T Wireless Networks: Principles and Practice
CS698T Wireless Networks: Principles and Practice Topic 10 IEEE 802.15.4 Bhaskaran Raman, Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/courses/wless-spring2007/ Personal Area Networks
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
VHICLE-TO-VEHICLE (V2V) communication can promote
THE IEEE FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS Space Division Multiple Access (SDMA) for Robust Ad hoc Vehicle Communication Networks Soheila V. Bana, Pravin Varaiya Abstract
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.
1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice By Timo Vanhatupa, Ph.D. Senior Research Scientist at Ekahau Contents Introduction Why capacity matters with Wi-Fi... 3 Part 1: Modeling
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:
The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Ultra Wideband Signal Impact on IEEE802.11b Network Performance
Ultra Wideband Signal Impact on IEEE802.11b Network Performance Matti Hämäläinen 1, Jani Saloranta 1, Juha-Pekka Mäkelä 1, Tero Patana 2, Ian Oppermann 1 1 Centre for Wireless Communications (CWC), University
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
Chapter 2 Principle of Wireless Sensor Networks
Chapter 2 Principle of Wireless Sensor Networks Keywords IEEE 802.15.4 ZigBee 6LowPAN Wireless sensor networks 2.1 Introduction Wireless sensor networks are a subset of wireless networking applications,
How To Configure the WLAN with QoS
How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is
Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks
Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks Marina Petrova, Lili Wu, Petri Mähönen and Janne Riihijärvi Department of Wireless Networks,
How To Improve Quality Of Service For A Smart Grid Distribution Monitoring System
Quality of Service Networking for Smart Grid Distribution Monitoring Wei Sun, Xiaojing Yuan, Jianping Wang, Dong Han and Chongwei Zhang School of Electrical Engineering and Automation, Hefei University
Scanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]
ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring
ENERGINO: Hardware and Software Solution for Energy Consumption Monitoring Karina Gomez, Roberto Riggio, Tinku Rasheed, Daniele Miorandi, Fabrizio Granelli CREATE-NET Research, Trento, Italy Email: [email protected]
High-Density Wi-Fi. Application Note
High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges
