scholarly journals Channel Allocation for Connected Vehicles in Internet of Things Services

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3646
Author(s):  
Ahmed Abdulhakim Al-Absi ◽  
Mohammed Abdulhakim Al-Absi ◽  
Mangal Sain ◽  
Hoon Jae Lee

Based on the existing Internet of Vehicles communication protocol and multi-channel allocation strategy, this paper studies the key issues with vehicle communication. First, the traffic volume is relatively large which depends on the environment (city, highway, and rural). When many vehicles need to communicate, the communication is prone to collision. Secondly, because the traditional multi-channel allocation method divides the time into control time slots and transmission time slots when there are few vehicles, it will cause waste of channels, also when there are more vehicles, the channels will not be enough for more vehicles. However, to maximize the system throughput, the existing model Enhanced Non-Cooperative Cognitive division Multiple Access (ENCCMA) performs amazingly well by connected the Cognitive Radio with Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) for a multi-channel vehicular network. However, this model induces Medium Access Control (MAC) overhead and does not consider the performance evaluation in various environmental conditions. Therefore, this paper proposes a Distributed Medium Channel Allocation (DMCA) strategy, by dividing the control time slot into an appointment and a safety period in the shared channel network. SIMITS simulator was used for experiment evaluation in terms of throughput, collision, and successful packet transmission. However, the outcome shows that our method significantly improved the channel utilization and reduced the occurrence of communication overhead.

Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3283 ◽  
Author(s):  
Al-Absi ◽  
Al-Absi ◽  
Jae Lee

Future safety applications require the timely delivery of messages between vehicles. The 802.11p has been standardized as the standard Medium Access Control (MAC) protocol for vehicular communication. The 802.11p uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) as MAC. CSMA/CA induces unbounded channel access delay. As a result, it induces high collision. To reduce collision, distributed MAC is required for channel allocation. Many existing approaches have adopted Time Division Multiple Access (TDMA) based MAC design for channel allocation. However, these models are not efficient at utilizing bandwidth. Cognitive radio technique is been adopted by various existing approach for channel allocation in shared channel network to maximize system throughput. However, it induces MAC overhead, and channel allocation on a shared channel network is considered to be an NP-hard problem. This work addresses the above issues. Here we present distributed MAC design PECA (Performance Enriching Channel Allocation) for channel allocation in a shared channel network. The PECA model maximizes the system throughput and reduces the collision, which is experimentally proven. Experiments are conducted to evaluate the performance in terms of throughput, collision and successful packet transmission considering a highly congested vehicular ad-hoc network. Experiments are carried out to show the adaptiveness of proposed MAC design considering different environments such City, Highway and Rural (CHR).


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1000
Author(s):  
Mohammed Abdulhakim Al-Absi ◽  
Ahmed Abdulhakim Al-Absi ◽  
Hoon Jae Lee

The growth of the Internet has led to the increasing usage of smart infotainment applications on the vehicular ad-hoc network (VANET). Preserving privacy and security regarding the provision of smart infotainment applications while on the go is most desired. Thus, a secure authentication scheme is required. Many privacy-preserving security schemes have been developed in recent times using cryptography approaches. However, these incur key management and communication overhead. The usage of third-party servers incurs the overhead of key computation, storage and distribution. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. The design of the proposed secure enhanced non-cooperative cognitive division multiple access ( S − ENCCMA ) aims to eliminate the need for the local message available with the parties to be released for provisioning secure safety-related applications. To overcome the research challenges, this work presents a novel security scheme, namely secure non-cooperative cognitive medium access ( S − ENCCMA ). The experiment is conducted to evaluate the overhead incurred in provisioning security to ENCCMA . The outcome shows that the overhead incurred by S − ENCCMA over ENCCMA was negligible to provide the real-time security requirements of smart infotainment applications, which is experimentally shown in this paper in terms of throughput, collision and successful packet transmission considering varied environmental models such as cities, highways and rural areas.


Author(s):  
V. V. Denisenko

The article deals with the modeling of the process of data transmission from sensors in the industrial production of vinyl acetate. The data packets are transferred from the sensors to the control system and the control effect is directed to the temperature regulators of the gas-vapor mixture, the vapor pressure of the refrigerant. oxygen consumption and return acetic acid consumption by industrial Ethernet protocols over a multiple access channel with carrier control and detection of CSMA / CD collisions (Carrier Sense Multiple Access with Collision Detection). The main bottleneck of the system is a limited sensor transmission buffer, which can cause data loss when it overflows, and due to improper regulatory impact. Mathematical modeling of the transmission process was carried out according to the scheme of the Markov process with continuous time and discrete states. The transmitter transmission buffer model was constructed on the basis of the state graph, each state is displayed by two elements [i, j]: i is the number of packets in the queue waiting to be sent; j - number of sent packets pending confirmation. A column of Kolmogorov equations was constructed. The solution was carried out numerically using the Maple mathematical package (Runge-Kutta-Felberg method 4-5th order). Based on the data obtained after modeling, we can conclude that the average packet transmission time, the number of lost packets with different bandwidth and channel load transfer. The adequacy of the model was confirmed with the help of experimental data, it was tested by the Fisher criterion, and the hypothesis at the level of significance of general variances was adopted. The model allows calculating the static and dynamic characteristics of the queue on a network device (they are important for calculating the functioning of the network in real time) systems for monitoring and controlling the production of vinyl acetate


2020 ◽  
Vol 16 (1) ◽  
pp. 1-10
Author(s):  
Kazuki Maruta

This paper newly proposes a frequency domain backoff scheme dedicated to continuous beamforming space division multiple access (CB-SDMA) on massive antenna systems for wireless entrance (MAS-WE). The entrance base station (EBS) has individual base band signal processing units for respective relay stations (RSs) to be accommodated. EBS then continuously applies beamforming weight to transmission/reception signals. CB-SDMA yields virtual point-to-point backhaul link where radio resource control messages and complicated multiuser scheduling are not required. This simplified structure allows RSs to work in a distributed manner. However, one issue remains to be resolved; overloaded multiple access resulting in collision due to its random access nature. The frequency domain backoff mechanism is introduced instead of the time domain one. It can flexibly avoid co-channel interference caused by excessive spatial multiplexing. Computer simulation verifies its superiority in terms of system throughput and packet delay.


2020 ◽  
Author(s):  
Lei Xu ◽  
Jing Yi Yao ◽  
Jing Cai ◽  
Yu Hong Fang ◽  
Hui Xiao Li

Abstract In a real communication scenario, it is very difficult to obtain the real-time Channel State Information(CSI) accurately, so the communication systems with statistical CSI have been researched. In order to maximize the throughput of the downlink Non-Orthogonal Multiple Access (NOMA) system with statistical CSI, the formula of system throughput is derived at first. Then, according to the combinatorial characteristics of the original optimization problem, it is divided into two subproblems, that is user grouping and power allocation. At last, a joint optimization scheme is proposed. In which, Genetic algorithm is introduced to solve the subproblem of power allocation, and Hungarian algorithm is introduced to solve the subproblem of user grouping. By comparing the ergodic date rate of NOMA users with statistical CSI and perfect CSI, the effectiveness of the statistical CSI sorting is verified. Compared with the Orthogonal Multiple Access (OMA) scheme, the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme, the proposed scheme can effectively improve the system throughput.


2021 ◽  
Author(s):  
Suyue Li ◽  
Junhuai Liu ◽  
Anhong Wang

Abstract Non-orthogonal multiple access (NOMA) collaborative communication is extremely beneficial to the users with poor channel conditions. It is essential to examine the performance of different NOMA users with superior cooperative forwarding protocols. This paper addresses the user cooperative NOMA system where one strong user (U2) assists one weak user (U1) to forward messages, and investigates the outage performance of both users with hybrid decode-and-amplify forwarding (HDAF) protocol. First, we derive the outage probability of U2 and U1 with HDAF. Secondly, we provide the closed-form expression for outage probability of U1 with the incremental hybrid decode-and-amplify forward (IHDAF) protocol at U2, which can further enhance the outage performance of U1 compared with HDAF. Moreover, we also present the system throughput expression and provide deep analysis on the effect of different forwarding protocols. Numerical results and Monte Carlo simulations jointly confirm the correctness of all the analytic derivations. In addition to saving the energy consumption of U2, IHDAF can make U1 achieve superior outage performance to HDAF. However, the system throughput almost overlap for both schemes given a threshold rate pair.


Sign in / Sign up

Export Citation Format

Share Document