Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications

Total Page:16

File Type:pdf, Size:1020Kb

Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications tv '2s.\--qq T! Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications Theodore V. Buot B.S.Eng (Electro&Comm), M.Eng (Telecomm) Thesis submitted for the degree of Doctor of Philosophy 1n The University of Adelaide Faculty of Engineering Department of Electrical and Electronic Engineering August 1997 Contents Abstract IY Declaration Y Acknowledgments YI List of Publications Yrt List of Abbreviations Ylu Symbols and Notations xi Preface xtv L.Introduction 1 Background, Problems and Trends in Personal Communications and description of this work 2. Literature Review t2 2.1 ALOHA and Random Access Protocols I4 2.1.1 Improvements of the ALOHA Protocol 15 2.1.2 Other RMA Algorithms t6 2.1.3 Random Access Protocols with Channel Sensing 16 2.1.4 Spread Spectrum Multiple Access I7 2.2Fixed Assignment and DAMA Protocols 18 2.3 Protocols for Future Wireless Communications I9 2.3.1 Packet Voice Communications t9 2.3.2Reservation based Protocols for Packet Switching 20 2.3.3 Voice and Data Integration in TDMA Systems 23 3. Teletraffic Source Models for R-TDMA 25 3.1 Arrival Process 26 3.2 Message Length Distribution 29 3.3 Smoothing Effect of Buffered Users 30 3.4 Speech Packet Generation 32 3.4.1 Model for Fast SAD with Hangover 35 3.4.2Bffect of Hangover to the Speech Quality 38 3.5 Video Traffic Models 40 3.5.1 Infinite State Markovian Video Source Model 41 3.5.2 AutoRegressive Video Source Model 43 3.5.3 VBR Source with Channel Load Feedback 43 3.6 Summary 46 4. Performance Analysis of R-TDMA 48 4.1 System Model 48 4.1.1 Channel 49 4.1.2 Slot Reservation 49 4. 1.3 Immediate First Transmission 50 4.l.4Effect of Random Access Collisions 51 4.1.5 Single Carrier System 51 4. 1.6 State (In)DePendence 51 4.2 Analysis Methods 52 4.3 Approximation of a Slotted Random Access Protocol 55 4.3. 1 Finite Population ALOHA 51 4.3.2 Binary Exponential B ack-off 58 4.4 Analysis of the Channel Allocation Queue 6r 4.4.1 System Model (R-TDMA Channel Allocation) 6r 4.4.2 Solving the Steady-State Occupancy 62 4.4.3 Analysis of the Queue 65 4.5 System Model for R-TDMA Protocols 67 4.5.1 S-G Analysis 69 4.5.2 Effect of Retransmission Probability 7l 4.5.3 Stability of ATDMA 73 4.5.4Mean Delay Analysis of ATDMA 75 4.6 Summary 78 5. Reservation-TDMA Protocols for WPC 80 5.1 WPC with R-TDMA Multiaccess Protocol 80 5. 1.1 Logical Channel Structure 83 5.1.2 R-TDMA Support for Voice Traffic 84 5.1.3 R-TDMA Support for Data Traffic 85 5.2 R-TDMA Performance with Packet Voice Traffic 85 5.2.1 Contention Process 86 5.2.2 Channel Allocation Process 87 5.2.3 Results based on the model 89 5.3 Reservation Policy for Data Users 91 5.3.1 Immediate Assignment Allocation Scheme 91 5.3.2 Performance ComParison 92 5.4 Enhancements to the R-TDMA Protocol 94 5.4.1 Effect of Capture and Forward Error Correction 94 5.4.2 Capture and Antenna Beam Overlap 96 5.4.3 R-TDMA with Dynamic Frame Configuration 98 5 .4.4 Integrated Voice lD ata ATDMA Protocol 101 5.5 Multipriority Channel Access 106 5.5.1 Stack Algorithm 107 5.5.2 Approach to Stack Prioritisation 110 5.5.3 Multipriority Stack Algorithm 115 5.6 ATDMA with Stack Algorithm rtl 5.6.1 Analysis of ATDMA with Stack CRA using TFA rt7 5.6.2Yolce and Data Prioritised Stack ATDMA r20 5.7 Random Access and Polling Solution r23 5.7. I Protocol DescriPtion 123 5.1.2 State Transition CYcle 126 5.7.3 ThroughpulDelay Approximation 126 5.7.4 Calcttlation based on the Polling Cycle t28 5.7.5 Stability 130 5.7.6 Simulation Model 131 5.7.7 Base Station Polling Control t32 5.8 Integrated-ScARP Protocol r32 5.9 Summary of Chapter 5 t34 ll 6. MultiMedia Access Protocol 135 6.1 Multislot Reservation for MultiMedia R-TDMA 136 6.1.1 Multislot Allocation Schemes and Fairness Criteria r37 6.1.2 Approximate Analysis using Birth & Death Markov Chains 138 6.1.3 Approximate Analysis using Discrete Markov Analysis r4l 6.2 Multislot Reservation with Multiclass Users 151 6.2.1 Simple Algorithms for Multislot Systems with Heterogeneous Users t52 6.2.2 B est Effort Algorithms for Priori tised Multislot S y stems 153 6.2.3 Simulation Parameters 156 6.3.4 Discussion r59 6.2.5 Summary 160 6.3 Multislot Reservation with Mixed Traffic r63 6.3.1 Reservation Policy for Mixed Traffic t63 6.3.2 Simulation Model 165 6.3.3 Simulation Results and Observations 166 6.4 Variable Coding Rate Multislot Multimedia System 172 6.4.1 Channel Model 173 6.4.2 Channel Coding 174 6.4.3 Simulation Model n5 6.4.4 Summary 17l 6.5 QoS Maintenance for'Wireless Video Transmission 181 6.5.1 System Model 181 6.5.2 Static Optimisation for Video/Data System 183 6.5.3 Video with Dynamic Load Feedback 184 6.5.4 Simulations and Observations r87 6.5.6 Summary of Chapter 6 r87 7. Conclusions 190 7.1 Thesis Summary 190 7.2 Future Work 193 Appendices A Sample Data Source with Buffering 195 B ATDMA Performance 196 C Simulation on the Stability of S-ALOHA 200 D Rough Approximation of R-TDMA with Voice Traffic 202 E Derivation of the Stack Splitting Parameter 203 F Results of the Multiclass Stack Simulations 205 G Results of the SCARP Simulations 208 H Results of the Multiclass Multislot Simulation 2t0 References zll Bibliography 223 lll Abstract Packet switching technology is seen to provide more capacity and flexibility for future Wireless Personal Communications (WPC). A reservation based multiple access protocol has been considered to support packet-switched access in the wireless environment. This thesis is aimed to improve the design and performance of Reservation based Time Division Multiple Access (R-TDMA) protocols for WPC. To provide an efficient voice and data integration, the R-TDMA protocol must support the following, a) fast channel access, b) variable rate transmission and c) fast error recovery. The first two design criteria are essential for all traffic types while the third criteria is required for delay sensitive and error sensitive services. R-TDMA protocol is chosen due to the ease of providing a steady, bursty and variable rate traffic after the design criteria are satisfied. To provide a fast channel access, many possibilities were explored like the use of prioritisation at the random access, the use of stack algorithm, the exploitation of the capture probability by improving the topology and the use of a polling mechanism to support the random access. For the support of a variable rate transmission, the TDMA frame structure is exploited by employing a multislot reservation. It is required by services which are sensitive to the message delivery time and services characterised by multirate transmission. It is used in the provision of priority control for multiclass and mixed traffic. The other aspect of this thesis is the derivation of some performance evaluation tools. The performance evaluation consists of a source traffic modelling and characterisation and the derivations of analytical procedures. Approximations were mainly used and were sustained with simulations. For voice traffic, the packet dropping rate is used as a design benchmark. Multiplexing gains for packet-voice in the order of 1.8 to 2.3 were found to be achievable. For the data traffic, both the mean and the cumulative delay perforrnance benchmarks were considered. The support of video traffic is also investigated which suggests a coding scheme in order to transmit a high quality video. The overall assessment suggests that R-TDMA is a potential technology for WPC. lv Declaration This work contains no material which has been accepted for the award of any other degree or diploma in any university or other tertiary institution and, to the best of my knowledge and belief, contains no material previously published or written by another person, except where due reference has been made in the text. I give consent to this copy of my thesis, when deposited in the University Library, being available for load and photocopying. / ç t¿l étr,tT | ??7 SIGNED DATE: v Acknowledgments I would like to thank all individuals and institutions who on in some way or another has rendered valuable inputs and supports to bring this manuscript into completion. I would like to express my sincere thanks to my supervisor, Prof. Reg Coutts for his constant academic, financial and moral support during my three and a half years of research at the Centre for Telecommunications Information Networking (CTIN) of the University of Adelaide. His very long experience in both industry and research has provided me with valuable inputs regarding the direction of this research. I am indebted to Fujio Watanabe for our constant collaboration during the entire period of this research. His comments and those of his colleagues of the Communications Research Laboratory (CRL, Japan) has provided me with good insights in conducting my performance evaluations. I would also to thank my peers in CTIN, Martin Ostrowski, Dohun Kwon, Yu-ShaoKai and others with there valuable discussions and comments. I am also grateful to John Leske, Derek Rogers, Tony Smith and Sergey Nesterov as well as all the staff of CTIN who answered my needs and not to forget Collette Snowden for editing this document.
Recommended publications
  • Implementing MACA and Other Useful Improvements to Amateur Packet Radio for Throughput and Capacity
    Implementing MACA and Other Useful Improvements to Amateur Packet Radio for Throughput and Capacity John Bonnett – KK6JRA / NCS820 Steven Gunderson – CMoLR Project Manager TAPR DCC – 15 Sept 2018 1 Contents • Introduction – Communication Methodology of Last Resort (CMoLR) • Speed & Throughput Tests – CONNECT & UNPROTO • UX.25 – UNPROTO AX.25 • Multiple Access with Collision Avoidance (MACA) – Hidden Terminals • Directed Packet Networks • Brevity – Directory Services • Trunked Packet • Conclusion 2 Background • Mission County – Proverbial: – Coastline, Earthquake Faults, Mountains & Hills, and Missions – Frequent Natural Disasters • Wildfires, Earthquakes, Floods, Slides & Tsunamis – Extensive Packet Networks • EOCs – Fire & Police Stations – Hospitals • Legacy 1200 Baud Packet Networks • Outpost and Winlink 2000 Messaging Software 3 Background • Mission County – Proverbial: – Coastline, Earthquake Faults, Mountains & Hills, and Missions – Frequent Natural Disasters • Wildfires, Earthquakes, Floods, Slides & Tsunamis – Extensive Packet Networks • EOCs – Fire & Police Stations – Hospitals • Legacy 1200 Baud Packet Networks • Outpost and Winlink 2000 Messaging Software • Community Emergency Response Teams: – OK Drills – Neighborhood Surveys OK – Triage Information • CERT Form #1 – Transmit CERT Triage Data to Public Safety – Situational Awareness 4 Background & Objectives (cont) • Communication Methodology of Last Resort (CMoLR): – Mission County Project: 2012 – 2016 – Enable Emergency Data Comms from CERT to Public Safety 5 Background &
    [Show full text]
  • 2009 IEEE 70Th Vehicular Technology Conference Fall
    2009 IEEE 70th Vehicular Technology Conference Fall (VTC 2009-Fall) Anchorage, Alaska, USA 20 – 23 September 2009 Pages 1-485 IEEE Catalog Number: CFP09VTF-PRT ISBN: 978-1-4244-2514-3 TABLE OF CONTENTS PORTABLE 2009 OPENING KEYNOTE SELF-ORGANIZING NETWORKS IN 3GPP LTE..........................................................................................................1 Seppo Hämäläinen 22W: ELECTRICAL DESIGN II NONINVASIVE CONTINUOUS BLOOD PRESSURE MEASUREMENT AND GPS POSITION MONITORING OF PATIENTS ..........................................................................................................................................3 Ondrej Krejcar, Zdenek Slanina, Jan Stambachr, Petr Silber And Robert Frischer NUMERICAL INVESTIGATION OF ALGORITHMS FOR MULTI-ANTENNA RADIOLOCATION ..............................................................................................................................................................8 Danko Antolovic WBAN MEETS WBAN: SMART MOBILE SPACE OVER WIRELESS BODY AREA NETWORKS.................... 13 Dae-Young Kim And Jinsung Cho AN ALGORITHM FOR SIMULTANEOUS RADIOLOCATION OF MULTIPLE SOURCES................................. 18 Danko Antolovic 2W: PHYSICAL DESIGN MICRO AND NANO ELECTRO MECHANICAL SYSTEMS (MEMS/NEMS) FOR MOBILE COMPUTING SYSTEMS .................................................................................................................................................. 23 M. Abdelmoneum, D. Browning, T. Arabi And Waleed Khalil BATTERY-SENSING INTRUSION PROTECTION SYSTEM
    [Show full text]
  • A Survey on Aloha Protocol for Iot Based Applications
    ISSN: 2277-9655 [Badgotya * et al., 7(5): May, 2018] Impact Factor: 5.164 IC™ Value: 3.00 CODEN: IJESS7 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY ON ALOHA PROTOCOL FOR IOT BASED APPLICATIONS Shikha Badgotya*1 & Prof.Deepti Rai2 *1M.Tech Scholar, Department of EC, Alpine Institute of Technology,, Ujjain (India) 2H.O.D, Department of EC, Alpine Institute of Technology, Ujjain (India) DOI: 10.5281/zenodo.1246995 ABSTRACT With the emergence of IoT based applications in industries and automation, protocols for effective data transfer was the foremost need. The natural choice was a random access protocol like ALOHA which could be incorporated in the ultra narrowband ISM band framework because of its simplicity and lack of overhead. Pure ALOHA faced the limitation of greater rate of collisions among the packets of data and also there was higher level of frame delays. Slotted ALOHA overcame these limitations to some extent in which the transfer of data takes place after channel polling. Though the drawbacks of PURE ALOHA are somewhat resolved in Slotted ALOHA, still some redundant transmissions and delay of frames exist. The present proposed work puts forth an efficient mechanism for Slotted ALOHA which implements polling of channel that is non persistent in nature to reduce the probability of collisions considerably. Further it presents a channel sensing methodology also for prevention of burst errors. Interleaving serves to be useful in case of burst errors and helps in preserving useful information. The survey should pave the path for IoT based applications working on an ultra narrowband architecture.
    [Show full text]
  • GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms
    GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms AAL – ATM Adaptation Layer ADPCM – Adaptive Differential Pulse Code Modulation ADSL – Asymmetric Digital Subscriber Line AIN – Advanced Intelligent Network ALI – Automatic Location Information AMA - Automatic Message Accounting ANI – Automatic Number Identification ANSI –American National Standards Institute API – Applications Programming Interface ATM – Asychronous Transfer Mode BHCA – Busy Hour Call Attempts BHCC – Busy Hour Call Completions B-ISDN – Broadband Integrated Services Digital Network B-ISUP – Broadband ISDN User’s Part BLV – Busy Line Verification BNS – Billed Number Screening BRI – Basic Rate Interface CAC – Carrier Access Code CCS – Centi Call Seconds CCV – Calling Card Validation CDR – Call Detail Record CIC – Circuit Identification Code CLASS – Custom Local Area Signaling CLEC – Competitive Local Exchange Carrier CO – Central Office CPE – Customer Provided/Premise Equipment CPN – Called Party Number CTI – Computer Telephony Intergration DLC – Digital Loop Carrier System DN – Directory Number DSL – Digital Subscriber Line DSLAM – Digital Subscriber Line Access Multiplexer DSP – Digital Signal Processor DTMF – Dual Tone Multi-Frequency ESS – Electronic Switching System ETSI - European Telecommunications Standards Institute GAP – Generic Address Parameter GT – Global Title GTT – Global Title Translations HFC – Hybrid Fiber Coax IAD – Integrated Access Device IAM – Initial Address Message ICP – Integrated Communications Provider ILEC
    [Show full text]
  • Medium Access Control Protocols of the PRMA Type in Non-Geostationary Satellites
    Medium Access Control Protocols of the PRMA Type in non-Geostationary Satellites Giovanni Giambene [email protected] Dipartimento di Ingegneria dell’Informazione Università degli Studi di Siena Via Roma, 53 53100 Siena, Italy Abstract The challenge of future mobile multimedia networks is to provide worldwide tetherless communication services. Low Earth Orbit-Mobile Satellite Systems (LEO-MSSs) will play a significant role by filling the coverage gaps of future generation terrestrial cellular networks. This lecture presents research results on demand-assignment Medium Access Control (MAC) schemes able to share efficiently LEO satellite resources among users and to support isochronous traffics and the ubiquitous access to the Internet. 1 Introduction Future generation mobile communication systems will achieve a global coverage by integrating a terrestrial cellular component and a satellite one [1],[2]. The satellite system will play a complementary role with respect to its terrestrial counterpart; typical operational environments for satellite systems are regions where the provision of the terrestrial coverage is either technically or economically unfeasible. The role of mobile satellite systems is: (i) to allow the global roaming of users; (ii) to provide Quality of Service (QoS) levels comparable with those of terrestrial systems; (iii) to permit the rapid deployment of mobile services in underdeveloped regions. The satellite component of future mobile communication systems will be based (partly or totally) on non-geostationary constellations. In particular, this study focuses on Low Earth Orbit – Mobile Satellite Systems (LEO-MSSs), since they are close to the earth and allow the use of low-power lightweight mobile terminals [3]. In what follows, an earth-fixed cell system [4] will be assumed where antenna beams are steered so as to point towards a given cell on the earth during the satellite visibility time.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • Performance Evaluation of Framed Slotted ALOHA with Reservation Packets and Succesive Interference Cancelation for M2M Networks $
    Performance Evaluation of Framed Slotted ALOHA with Reservation Packets and Succesive Interference Cancelation for M2M Networks I Vicente Casares-Giner, Jorge Martinez-Bauset, Canek Portillo Instituto ITACA, Universitat Polit`ecnica de Val`encia,Spain Abstract Random access protocols like ALOHA have been considered for machine-to-machine (M2M) communication in future networks for their simplicity of operation. This paper evaluates the performance of a Frame Slotted-ALOHA protocol that uses reservation and data packets (FSA-RDP), in a scenario where a controller collects data packets transmitted by a finite number of M2M devices. In FSA-RDP, frames of variable duration are divided in two parts, the reservation and data subframes. During the reservation subframe, active devices send short reservation packets to the controller. The controller assigns reserved slots in the data subframe to those devices that succeeded with the reservation. At devices, the FIFO service discipline and two queue management schemes, tail drop and push-out, have been considered. When the queue size is of one packet, we develop a discrete-time Markov chain to evaluate the protocol performance, including the cumulative distribution function of the delay of data packets that are successfully transmitted. Analytical results are validated by extensive simulations. The simulation model is also used to evaluate the system performance when larger queues are used. In addition, we study the impact that implementing Successive Interference Cancellation (SIC) at the controller has on the system performance. We also evaluate the performance of implementing SIC at the controller together with Irregular Repetition Slotted ALOHA (IRSA) to send the reservation packets.
    [Show full text]
  • On-Demand Routing in Multi-Hop Wireless Mobile Ad Hoc Networks
    Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 7, July 2013, pg.317 – 321 RESEARCH ARTICLE ON-DEMAND ROUTING IN MULTI-HOP WIRELESS MOBILE AD HOC NETWORKS P. Umamaheswari 1, K. Ranjith singh 2 1Periyar University, TamilNadu, India 2Professor of PGP College, TamilNadu, India 1 [email protected]; 2 [email protected] Abstract— An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any preexisting network infrastructure or centralized administration. Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth. This thesis argues that such protocols must operate in an on-demand fashion and that they must carefully limit the number of nodes required to react to a given topology change in the network. I have embodied these two principles in a routing protocol called Dynamic Source Routing (DSR). As a result of its unique design, the protocol adapts quickly to routing changes when node movement is frequent, yet requires little or no overhead during periods in which nodes move less frequently. By presenting a detailed analysis of DSR’s behavior in a variety of situations, this thesis generalizes the lessons learned from DSR so that they can be applied to the many other new routing protocols that have adopted the basic DSR framework. The thesis proves the practicality of the DSR protocol through performance results collected from a full-scale 8 node tested, and it demonstrates several methodologies for experimenting with protocols and applications in an ad hoc network environment, including the emulation of ad hoc networks.
    [Show full text]
  • A DSP GMSK Modem for Mobitex and Other Wireless Infrastructures
    A DSP GMSK Modem for Mobitex and Other Wireless Infrastructures Appliation Report Etienne J. Resweber Synetcom Digital Incorporated SPRA139 October 1994 Printed on Recycled Paper IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to discontinue any semiconductor product or service without notice, and advises its customers to obtain the latest version of relevant information to verify, before placing orders, that the information being relied on is current. TI warrants performance of its semiconductor products and related software to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements. Certain applications using semiconductor products may involve potential risks of death, personal injury, or severe property or environmental damage (“Critical Applications”). TI SEMICONDUCTOR PRODUCTS ARE NOT DESIGNED, INTENDED, AUTHORIZED, OR WARRANTED TO BE SUITABLE FOR USE IN LIFE-SUPPORT APPLICATIONS, DEVICES OR SYSTEMS OR OTHER CRITICAL APPLICATIONS. Inclusion of TI products in such applications is understood to be fully at the risk of the customer. Use of TI products in such applications requires the written approval of an appropriate TI officer. Questions concerning potential risk applications should be directed to TI through a local SC sales office. In order to minimize risks associated with the customer’s applications, adequate design and operating safeguards should be provided by the customer to minimize inherent or procedural hazards.
    [Show full text]
  • A Survey of Mobile Data Networks
    A SURVEY OF MOBILE DATA NETWORKS APOSTOLIS K. SALKINTZIS THE UNIVERSITY OF BRITISH COLUMBIA ABSTRACT The proliferation and development of cellular voice systems over the past several years has exposed the capabilities and the effectiveness of wireless communications and, thus, has paved the way for wide-area wireless data applications as well. The demand for such applications is currently experiencing a significant increase and, therefore, there is a strong call for advanced and efficient mobile data technologies. This article deals with these mobile data technologies and aims to exhibit their potential. It provides a thorough survey of the most important mobile packet data services and technologies, including MOBITEX, CDPD, ARDIS, and the emerging GPRS. For each technology, the article outlines its main technical characteristics, discusses its architectural aspects, and explains the medium access protocol, the services provided, and the mobile routing scheme. istorically, wireless data communications was princi- and have access to external data, wireless data technology pally the domain of large companies with special- plays a significant part because it can offer ubiquitous con- ized needs; for example, large organizations that nectivity, that is, connectivity at any place, any time. For this needed to stay in touch with their mobile sales reason, wireless data technology can be of real value to the Hforce, or delivery services that needed to keep track of their business world since computer users become more productive vehicles and packages. However, this situation is steadily when they exploit the benefits of connectivity. The explosive changing and wireless data communications is becoming as growth of local area network (LAN) installations over the commonplace as its wired counterpart.
    [Show full text]
  • Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link
    NASA/CR—2014-216675 Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link Steven C. Bretmersky MTI Systems, Inc., Cleveland, Ohio William D. Bishop Verizon Federal Network Systems, LLC., Arlington, Virginia Justin E. Dailey MTI Systems, Inc., Cleveland, Ohio Christine T. Chevalier Vantage Partners, LLC, Brook Park, Ohio June 2014 NASA STI Program . in Profi le Since its founding, NASA has been dedicated to the • CONFERENCE PUBLICATION. Collected advancement of aeronautics and space science. The papers from scientifi c and technical NASA Scientifi c and Technical Information (STI) conferences, symposia, seminars, or other program plays a key part in helping NASA maintain meetings sponsored or cosponsored by NASA. this important role. • SPECIAL PUBLICATION. Scientifi c, The NASA STI Program operates under the auspices technical, or historical information from of the Agency Chief Information Offi cer. It collects, NASA programs, projects, and missions, often organizes, provides for archiving, and disseminates concerned with subjects having substantial NASA’s STI. The NASA STI program provides access public interest. to the NASA Aeronautics and Space Database and its public interface, the NASA Technical Reports • TECHNICAL TRANSLATION. English- Server, thus providing one of the largest collections language translations of foreign scientifi c and of aeronautical and space science STI in the world. technical material pertinent to NASA’s mission. Results are published in both non-NASA channels and by NASA in the NASA STI Report Series, which Specialized services also include creating custom includes the following report types: thesauri, building customized databases, organizing and publishing research results. • TECHNICAL PUBLICATION.
    [Show full text]
  • Etsi Tr 102 862 V1.1.1 (2011-12)
    ETSI TR 102 862 V1.1.1 (2011-12) Technical Report Intelligent Transport Systems (ITS); Performance Evaluation of Self-Organizing TDMA as Medium Access Control Method Applied to ITS; Access Layer Part 2 ETSI TR 102 862 V1.1.1 (2011-12) Reference DTR/ITS-0040021 Keywords ITS, MAC, TDMA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]