University of Florida Thesis Or Dissertation Formatting Template

University of Florida Thesis Or Dissertation Formatting Template

HIGH PERFORMANCE CSMA/CA MAC PROTOCOL FOR POWER LINE COMMUNICATION AND SMART GRID By MUHARREM AYAR A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE UNIVERSITY OF FLORIDA 2013 1 © 2013 Muharrem Ayar 2 To my lovely wife and parents 3 ACKNOWLEDGMENTS I would like to express my deepest gratitude to my academic advisor Dr. Haniph A. Latchman for his persevering guidance and support on my thesis studies and research. I am also thankful to Dr. Janise McNair and Dr. Herman Lam for serving on my committee. I am indebted to the National Educational Ministry of Turkey. They gave me the opportunity to pursue my graduate education at University of Florida, USA by supporting me with a full scholarship. In addition, I thank all LIST members for their comments and reviews on my researches. Beside all, I want to thank to my lovely wife who has never given up on supporting me spiritually. Finally, I would like to present my appreciation to my parents. They have always encouraged me throughout my educational. 4 TABLE OF CONTENTS page ACKNOWLEDGMENTS .................................................................................................. 4 LIST OF TABLES ............................................................................................................ 7 LIST OF FIGURES .......................................................................................................... 8 ABSTRACT ..................................................................................................................... 9 CHAPTER 1 OVERVIEW ............................................................................................................ 11 Medium Access Control Protocols .......................................................................... 13 Scheduling ........................................................................................................ 15 Random Access ............................................................................................... 17 Aloha .......................................................................................................... 17 CSMA ........................................................................................................ 18 Conclusion .............................................................................................................. 19 2 ANALYSIS OF CSMA/CA MAC LAYER PROTOCOLS FOR WIRELESS AND PLC ENVIRONMENT ............................................................................................. 21 Wireless Environment ............................................................................................. 21 Standard IEEE 802.11 DCF MAC Protocol ...................................................... 22 Simulation and Results ..................................................................................... 23 Power Line Communication Environment ............................................................... 25 Home Plug 1.0 .................................................................................................. 25 Priority resolution ....................................................................................... 25 Backoff mechanism .................................................................................... 26 Simulation and Results ..................................................................................... 27 3 SURVEY ON CSMA/CA MAC PROTOCOLS FOR BACKOFF ALGORITHMS ...... 29 Exponential Increase Exponential Decrease (EIED) and Linear Decrease (EILD) Backoff ..................................................................................................... 29 The Pause Count Backoff (PCB) Algorithm ............................................................ 30 Dynamic Tuning of IEEE 802.11 Protocol ............................................................... 30 Adaptive Contention Window Backoff (ACWB) with Cross Layer Optimization ...... 32 Adaptive Optimization based on Bayesian Estimation of Competing Terminals ..... 33 Fast Collision Resolution (FCR) .............................................................................. 34 Traffic Adaptive Backoff (TAB) Protocol.................................................................. 36 Semi-Random Backoff (SRB) ................................................................................. 36 Delayed Contention (DC) DCF MAC ...................................................................... 37 Contention Window and Run Time Optimization for IEEE 802.11 DCF .................. 38 5 Batch and Sequential Bayesian Estimator Approach .............................................. 39 Fragmentation Mechanism ..................................................................................... 40 QoS-enabled MAC Architecture for Prioritized Service ........................................... 41 Opportunistic Multi-Radio MAC (OMMAC) .............................................................. 41 Adaptive Backoff Scheme based on Binary Exponential Backoff Algorithm ........... 42 Conditioned Enhanced Distributed Coordination Function (CEDCF) ...................... 43 Enhanced Collision Resolution for Distributed Coordination Function Protocol ...... 44 4 CONSTANT CONTENTION WINDOW BASED CSMA/CA MAC PROTOCOL ...... 46 Introduction ............................................................................................................. 46 System Model ......................................................................................................... 46 Contention Window Optimization ............................................................................ 50 Simulation and Results ........................................................................................... 51 Conclusion .............................................................................................................. 53 5 ADAPTIVE TUNING OF OPTIMAL CONTENTION WINDOW SIZE ...................... 55 Introduction ............................................................................................................. 55 Estimating Number of Contending Stations ............................................................ 56 Mathematical Analysis ............................................................................................ 57 Simulation and Results ........................................................................................... 58 Conclusion .............................................................................................................. 63 6 CONCLUSION AND FUTURE WORK .................................................................... 64 LIST OF REFERENCES ............................................................................................... 66 BIOGRAPHICAL SKETCH ............................................................................................ 69 6 LIST OF TABLES Table page 2-1 Priority function of BPC in terms of CW and DC. ............................................... 26 7 LIST OF FIGURES Figure page 1-1 Sharing a communication medium ..................................................................... 14 1-2 Medium sharing techniques ................................................................................ 15 1-3 Generic representation of scheduling ................................................................. 15 1-4 Polling System.. .................................................................................................. 16 2-1 IEEE 802.11 DCF Protocol ................................................................................. 23 2-2 MAC efficiency for different contention window size ........................................... 24 2-3 Priority resolution slots in Home Plug 1.0. .......................................................... 25 2-4 The MAC efficiency plot of Home Plug 1.0 protocol. .......................................... 28 2-5 Performance comparison between original Home Plug 1.0 and IEEE 802.11protocol. ................................................................................................... 28 4-1 Markov chain Model for constant CW MAC protocol .......................................... 47 4-2 Comparison for finding po with different methods. .............................................. 50 4-3 Optimal contention window size for λ=3. ............................................................ 52 4-4 Optimal contention window size for λ=15. .......................................................... 53 5-1 Estimating number of user individually and dependently .................................... 55 5-2 Estimating number of user individually and independently ................................. 55 5-3 Tracking number of nodes in a variable channel with approximation solution .... 59 5-4 Tracking number of nodes in a variable channel with exact solution. ................. 60 5-5 MAC efficiency comparison for both estimation algorithm. ................................. 60 5-6 Comparison of MAC efficiency for estimation algorithm, for actual number of nodes and the standard HomePlug 1.0. ............................................................. 61 5-7 Zoom view of MAC efficiency comparison for exact and approximation approaches. ........................................................................................................ 62 5-8 MAC efficiency comparison with a smoothed plot. ............................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    69 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us