Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
349
result(s) for
"Multiple access protocols (Computer network protocols)"
Sort by:
Spectrum Sharing
by
Slock, Dirk T. M
,
Papadias, Constantinos B
,
Ratnarajah, Tharmalingam
in
Communication, Networking and Broadcast Technologies
,
Multiple access protocols (Computer network protocols)
,
Wireless communication systems
2020
Combines the latest trends in spectrum sharing, both from a research and a standards/regulation/experimental standpoint Written by noted professionals from academia, industry, and research labs, this unique book provides a comprehensive treatment of the principles and architectures for spectrum sharing in order to help with the existing and future spectrum crunch issues. It presents readers with the most current standardization trends, including CEPT / CEE, eLSA, CBRS, MulteFire, LTE-Unlicensed (LTE-U), LTE WLAN integration with Internet Protocol security tunnel (LWIP), and LTE/Wi-Fi aggregation (LWA), and offers substantial trials and experimental results, as well as system-level performance evaluation results. The book also includes a chapter focusing on spectrum policy reinforcement and another on the economics of spectrum sharing. Beginning with the historic form of cognitive radio, Spectrum Sharing: The Next Frontier in Wireless Networks continues with current standardized forms of spectrum sharing, and reviews all of the technical ingredients that may arise in spectrum sharing approaches. It also looks at policy and implementation aspects and ponders the future of the field. White spaces and data base-assisted spectrum sharing are discussed, as well as the licensed shared access approach and cooperative communication techniques. The book also covers reciprocity-based beam forming techniques for spectrum sharing in MIMO networks; resource allocation for shared spectrum networks; large scale wireless spectrum monitoring; and much more. Contains all the latest standardization trends, such as CEPT / ECC, eLSA, CBRS, MulteFire, LTE-Unlicensed (LTE-U), LTE WLAN integration with Internet Protocol security tunnel (LWIP) and LTE/Wi-Fi aggregation (LWA) Presents a number of emerging technologies for future spectrum sharing (collaborative sensing, cooperative communication, reciprocity-based beamforming, etc.), as well as novel spectrum sharing paradigms (e.g. in full duplex and radar systems) Includes substantial trials and experimental results, as well as system-level performance evaluation results Contains a dedicated chapter on spectrum policy reinforcement and one on the economics of spectrum sharing Edited by experts in the field, and featuring contributions by respected professionals in the field world wide Spectrum Sharing: The Next Frontier in Wireless Networks is highly recommended for graduate students and researchers working in the areas of wireless communications and signal processing engineering. It would also benefit radio communications engineers and practitioners.
Multiple access channels : theory and practice
by
NATO Advanced Study Institute on Coding and Analysis of Multiple Access Channels
,
Györfi, László
,
Biglieri, Ezio
in
Computer network protocols
,
Congresses
,
Multiple access protocols (Computer network protocols)
2007
While multiple-access communication dates back to systems invented in the 1870's to transmit simultaneous data through a single wire, the foundation of the discipline now known as 'multiuser information theory' was laid in 1961, when Claude E. Shannon published his paper on two-way channels. Since then, multiuser information theory has been an extremely active research area, and has seen a large number of fundamental contributions, covering, besides the two-way channel studied in, multiple access, interference, broadcast, and wiretap channels. However, several key canonical problems have defied many efforts. This book brings together leading experts working in the fields of information theory, coding theory, multiple user communications, discrete mathematics, etc., who survey recent and general results on multiple-access channels (rate regions, rate splitting, etc.), and give an overview of the problems of current CDMA solutions (fading channels, multi-user detection, multiple-antenna systems, iterative joint decoding, OFDMA, etc.). This publication consist of three parts. The first part includes chapters devoted to the information-theoretical aspects of multiple-access communication. In the second part, multiple-access techniques are discussed and the third part of this volume covers coding techniques.
A Time Synchronization Protocol for Barrage Relay Networks
by
Son, Woong
,
Park, Soobum
,
Lee, Howon
in
Ad hoc networks (Computer networks)
,
barrage relay network
,
Clocks & watches
2023
Time-division multiple access (TDMA)-based medium access control (MAC) protocol has been widely used for avoiding access conflicts in wireless multi-hop ad hoc networks, where the time synchronization among wireless nodes is essential. In this paper, we propose a novel time synchronization protocol for TDMA-based cooperative multi-hop wireless ad hoc networks, which are also called barrage relay networks (BRNs). The proposed time synchronization protocol is based on cooperative relay transmissions to send time synchronization messages. We also propose a network time reference (NTR) selection technique for improving the convergence time and average time error. In the proposed NTR selection technique, each node overhears the user identifier (UID) of other nodes, hop count (HC) from them to itself, and network degree, which denotes the number of 1-hop neighbor nodes. Then, the node with the minimum HC from all other nodes is selected as the NTR node. If there are multiple nodes with the minimum HC, the node with the larger degree is selected as the NTR node. To the best of our knowledge, the proposed time synchronization protocol with the NTR selection is introduced for the first time for cooperative (barrage) relay networks in this paper. Through computer simulations, we validate the proposed time synchronization protocol in terms of the average time error under various practical network scenarios. Furthermore, we also compare the performance of the proposed protocol with the conventional time synchronization methods. It is shown that the proposed protocol significantly outperforms the conventional methods in terms of the average time error and convergence time. The proposed protocol is shown to be more robust against packet loss as well.
Journal Article
Preparing Wi-Fi 7 for Healthcare Internet-of-Things
by
Garcia-Villegas, Eduard
,
Nauman, Ali
,
Kim, Sung Won
in
11be
,
Access control
,
Computer and Information Sciences Computer Science
2022
The healthcare Internet of Things (H-IoT) is an interconnection of devices capable of sensing and transmitting information that conveys the status of an individual’s health. The continuous monitoring of an individual’s health for disease diagnosis and early detection is an important application of H-IoT. Ambient assisted living (AAL) entails monitoring a patient’s health to ensure their well-being. However, ensuring a limit on transmission delays is an essential requirement of such monitoring systems. The uplink (UL) transmission during the orthogonal frequency division multiple access (OFDMA) in the wireless local area networks (WLANs) can incur a delay which may not be acceptable for delay-sensitive applications such as H-IoT due to their random nature. Therefore, we propose a UL OFDMA scheduler for the next Wireless Fidelity (Wi-Fi) standard, the IEEE 802.11be, that is compliant with the latency requirements for healthcare applications. The scheduler allocates the channel resources for UL transmission taking into consideration the traffic class or access category. The results demonstrate that the proposed scheduler can achieve the required latency for H-IoT applications. Additionally, the performance in terms of fairness and throughput is also superior to state-of-the-art schedulers.
Journal Article
New Families of Frequency-Hopping Sequence Sets with a Low-Hit-Zone
2024
As a means of spread spectrum communication, frequency-hopping technology has good performance in anti-jamming, multiple-access, security, covert communications, and so on. In order to meet the needs of different frequency-hopping multiple-access (FHMA) communication scenarios, the research on frequency-hopping sequence (FHS) sets with a low-hit-zone (LHZ) is now becoming more and more crucial. In this paper, a general construction to obtain new families of LHZ-FHS sets is achieved via interleaving technique. Subsequently, based on two different shift sequences, two classes of LHZ-FHS sets with new flexible parameters not covered in the related literature are presented. The requirements for our new LHZ-FHS sets to obtain optimality or near-optimality with respect to the Peng–Fan–Lee bound are also introduced. Furthermore, as long as the base FHS set is fixed, the performances of new LHZ-FHS sets can be analyzed, such that the parameters of all appropriate shift sequences to obtain desired LHZ-FHS sets are also fixed.
Journal Article
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
by
Khalid, Mohd Nor Akmal
,
Nor Rashid, Fadilla Atyka
,
Suhaimi, Nur Hanis Sabrina
in
Access control
,
Analysis
,
Authentication
2024
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation of robust security measures such as authentication has become paramount to safeguarding sensitive data and maintaining the integrity of connected devices. Symmetry in the IoT commonly denotes the uniformity or equilibrium in data distribution and processing across devices or nodes in a network. Leveraging symmetric patterns can enhance the robustness and scalability of IoT authentication. This scoping review aims to provide a comprehensive overview of recent developments in authentication techniques within the IoT paradigm. It subsequently presents recent research on various IoT authentication schemes, organized around several key research questions. The objective is to decipher the intricacies associated with authentication in the IoT by employing a multi-criteria classification approach. This involves a comprehensive analysis of existing authentication protocols, delineating their respective advantages and disadvantages, and gaining insights into the associated security concerns. The research questions highlighted in the review aim to probe the present scenario of authentication systems utilized in IoT, with a focus on identifying trends and discerning shifts. This review synthesizes insights from scholarly articles to provide a roadmap for future research in IoT authentication. It functions as a valuable resource for establishing theoretical foundations and provides practical implications applicable to practitioners, policymakers, and researchers alike. By elucidating the intricacies of IoT authentication, this review cultivates a profound understanding of the transformative potential and the multifaceted challenges. It establishes the foundation for resilient security measures essential for the sustainable growth of the Internet of Things.
Journal Article
Energy-Efficient MAC Protocol for Underwater Sensor Networks Using CSMA/CA, TDMA, and Actor–Critic Reinforcement Learning (AC-RL) Fusion
by
Zong Xin, Sun
,
Gang, Qiao
,
Zhou, Feng
in
Acoustics
,
actor–critic reinforcement learning (AC-RL)
,
Bit error rate
2025
Due to the dynamic and harsh underwater environment, which involves a long propagation delay, high bit error rate, and limited bandwidth, it is challenging to achieve reliable communication in underwater wireless sensor networks (UWSNs) and network support applications, like environmental monitoring and natural disaster prediction, which require energy efficiency and low latency. To tackle these challenges, we introduce AC-RL-based power control (ACRLPC), a novel hybrid MAC protocol that can efficiently integrate Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)-based MAC and Time Division Multiple Access (TDMA) with Actor–Critic Reinforcement Learning (AC-RL). The proposed framework employs adaptive strategies, utilizing adaptive power control and intelligent access methods, which adjust to fluctuating conditions on the network. Harsh and dynamic underwater environment performance evaluations of the proposed scheme confirm a significant outperformance of ACRLPC compared to the current protocols of FDU-MAC, TCH-MAC, and UW-ALOHA-QM in all major performance measures, like energy consumption, throughput, accuracy, latency, and computational complexity. The ACRLPC is an ultra-energy-efficient protocol since it provides higher-grade power efficiency by maximizing the throughput and limiting the latency. Its overcoming of computational complexity makes it an approach that greatly relaxes the processing requirement, especially in the case of large, scalable underwater deployments. The unique hybrid architecture that is proposed effectively combines the best of both worlds, leveraging TDMA for reliable access, and the flexibility of CSMA/CA serves as a robust and holistic mechanism that meets the desired enablers of the system.
Journal Article
An Adaptive Protocol Selection Framework for Energy-Efficient IoT Communication: Dynamic Optimization Through Context-Aware Decision Making
by
Azarskov, Maksim
,
Żatuchin, Dmitrij
in
Access control
,
Adaptation
,
adaptive protocol selection
2025
The rapid growth of Internet of Things (IoT) deployments has created an urgent need for energy-efficient communication strategies that can adapt to dynamic operational conditions. This study presents a novel adaptive protocol selection framework that dynamically optimizes IoT communication energy consumption through context-aware decision making, achieving up to 34% energy reduction compared to static protocol selection. The framework is grounded in a comprehensive empirical evaluation of three widely used IoT communication protocols—MQTT, CoAP, and HTTP—using Intel’s Running Average Power Limit (RAPL) for precise energy measurement across varied network conditions including packet loss (0–20%) and latency variations (1–200 ms). Our key contribution is the design and validation of an adaptive selection mechanism that employs multi-criteria decision making with hysteresis control to prevent oscillation, dynamically switching between protocols based on six runtime metrics: message frequency, payload size, network conditions, packet loss rate, available energy budget, and QoS requirements. Results show MQTT consumes only 40% of HTTP’s energy per byte at high volumes (>10,000 messages), while HTTP remains practical for low-volume traffic (<10 msg/min). A novel finding reveals receiver nodes consistently consume 15–20% more energy than senders, requiring new design considerations for IoT gateways. The framework demonstrates robust performance across simulated real-world conditions, maintaining 92% of optimal performance while requiring 85% less computation than machine learning approaches. These findings offer actionable guidance for IoT architects and developers, positioning this work as a practical solution for energy-aware IoT communication in production environments.
Journal Article
Joint Design of Polar Coding and Physical Network Coding for Two−User Downlink Non−Orthogonal Multiple Access
2023
In this paper, we propose a joint polar coding and physical network coding (PNC) for two−user downlink non−orthogonal multiple access (PN−DNOMA) channels, since the successive–interference–cancellation–aided polar decoding cannot be optimal for finite blocklength transmissions. In the proposed scheme, we first constructed the XORed message of two user messages. Then, the XORed message was superimposed with the message of the weak User 2 for broadcast. By doing so, we can utilize the PNC mapping rule and polar decoding to directly recover the message of User 1, while at User 2, we equivalently constructed a long−length polar decoder to obtain its user message. The channel polarization and decoding performance can be greatly improved for both users. Moreover, we optimized the power allocation of the two users with their channel conditions by considering the user fairness and the performance. The simulation results showed that the proposed PN−DNOMA can achieve performance gains of about 0.4−0.7 dB over the conventional schemes in two−user downlink NOMA systems.
Journal Article