Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CH4 5

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Chapter Four

Design and Implementation


4.1 Introduction
Emulates the Distributed Formatting (DCF) included in most 802.11 devices operating
in the sub-6 GHz band, That is, the use of carrier sensing mechanisms (such as
CSMA/CA) to detect channel availability and backtracking (ie exponential window
size) to delay transmission and allow fair channel access in the unauthorized band.
The goal of this project is to implement Matlab Medium Access Control (MAC) based
on DCF and understand how parameters such as the number of competing nodes on the
channel or the presence of external interference (i.e. LTE in the unlicensed range) affect
WiFi performance.

- The code provides metrics like:


1. Channel occupancy rate: The part of the time the channel feels busy due to other
continuous WiFi transmissions or external interference.
2. Packets Sent: The number of packets sent over the channel without being hit by a
collision.
3. Collisions: The number of packets that must be retransmitted due to a collision with
another WiFi node.
4. Packet Transmission Time: The average time in milliseconds a WiFi node takes to
reach the channel and successfully send a packet without colliding with any other node
in the network.

4.1 Scenario
It envisions a scenario of deployment by N* WiFi devices scattered in one area and all
in another range, with no RTS/CTS mechanism enabled.
That is, WiFi transmission always causes sensing mechanisms to detect the channel
occupied by each node in the network.
4.3 Project organization
1. DATA SET (The files in the DATA folder contain the external interference
considered in the experiments.

Figure (1) dataset project


The files contain *lteInput_ABS\*. m * on LTE interference when 0, 1, and 5 subframes
are configured as nearly empty subframes (ABS) to allow WiFi transmission.
2. contendWiFiLTE_runnable.m: This is the main script that loads the configuration
of WiFi and external LTE interference.

Figure (2) code of simulate the contention scenario


The code calls fcontend_WiFiLTE.m to simulate the contention scenario, and once that
is done, it calls *contendWiFiLTE_plot.m* to visualize the results.
Figure (3) The name and values (mat-file) results of project
The results are stored in an intermediate variable DATA / lastResults for splitting
execution and visualization.
3. contendWiFiLTE_plot.m : A visual script that plots the results from
contendWiFiLTE_runnable.m

Figure (4) The main script that simulates


4. fcontend_WiFiLTE.m : The main script that simulates the discord scenario as a
separate event simulator (DES), where each event is a time slot and each node key is of
three different states: DIFS (DIFS Time Constant Waiting), TX (packet sending while
current slot) or BO (backtrack time).

Figure (5) Nodes run in saturation mode


always have a packet to send in their queue) and switch their states throughout the
simulation.
In this figures the performance of the proposed solution is analysed according to several
performance measures. These metrics are useful for evaluating mobile robots
communication performance using suggested methods (eg 802.11p and 802.11p neural
threshold)

Figure (6) shows the optimal results of ecdf of the average transmission time (ms)

Figure (7) shows the optimal results of ecdf of the busy rate (%)
Figure (8) shows the optimal results of Average transmission time in milliseconds

Figure (9) shows the optimal results of Total number of transmissions ok


Figure (10) shows the optimal results Average number of collisions

Figure (11) shows the optimal results of Total number of collisions

This subsection presents and discusses the results obtained. All plotted graphs show
error bars for the parameters when the simulations are repeated.
Chapter Five
Results and Conclusion

5.1 Results
The results shown in Figure. 12 and Figure. 13 represent the delay time between the
two references mobiles in accordance to the load of the network. While comparing the
results we got from both the new method and the ABS and LTE method, we can observe
the big difference in the time delay between them; the enhanced method that calls the
neural network function perform a very low time delay as compared to the standard
ABS and LTE method, particularly when the load exceeds 80 packets/sec (Figure. 13).

Figure (12) shows the optimal results of Average transmission time in


milliseconds delay of transmission between the two-reference mobiles when the
load is less than 15 packets/sec.

Figure (13) shows the optimal results of Total number of transmissions ok delay
of transmission between the two reference mobiles when the load exceeds 15
packets/sec
5.2 Conclusion
Distributed Formatting (DCF) included in most 802.11 devices operating in the sub-6
GHz band simulates the use of carrier sensing mechanisms (such as CSMA/CA) to
detect channel availability and backtracking (i.e., exponential window size) to delay
transmission and allow fair channel access in the unauthorized band The goal of this
project is to implement a Matlab Medium Access Control (MAC) based on DCF and
understand how parameters such as the number of competing nodes on the channel or
the presence of external interference (i.e. LTE in the unlicensed range) affect WiFi
performance.
The standard DCF model has some problems when it comes to time delays caused by
collisions or by alternate success. A new method has been proposed to reduce the time
delay where the CW is multiplied by a instead of 2 when a collision occurs and b is
subtracted when the transmission is successful.
The advantages of this method are that before each connection, we choose the values
of LTE and ABS according to the real-time position, urgency of the mobile phones,
data type, and network load, however, in the BEB method, the values of a and b are
constant on 2 and CW constant on CWmin.

5.3 Future work


will focus on exploring improved machine learning methods to deal with the scalability
problem of delivering urgent safety messages in a vehicle environment and improving
the performance of this modified method by finding the best IFS for each mobile phone
based on its priority level.

You might also like