Just like Ethernet before, IEEE 802.11 is now transcending the borders of its usage from the office environment toward real-time communication on the factory floor. However, similar to Ethernet, the ...availability of synchronized clocks to coordinate and control communication and distributed real-time services is not a built-in feature in WLAN. Over the years, this has led to the design and use of a wide variety of customized protocols with varying complexity and precision, both for wired and wireless networks, in accordance with the increasingly demanding requirements from real-time applications. This survey looks into the details of synchronization over IEEE 802.11 with a particular focus on the infrastructure mode which is most relevant for industrial use cases. It highlights the different parameters which affect the performance of clock synchronization over WLAN and compares the performance of existing synchronization methods to analyze their shortcomings. Finally, it identifies new trends and directions for future research as well as features for wireless clock synchronization which will be required by the applications in the near future.
Spatial Reuse (SR) has recently gained attention to maximize the performance of IEEE 802.11 Wireless Local Area Networks (WLANs). Decentralized mechanisms are expected to be key in the development of ...SR solutions for next-generation WLANs, since many deployments are characterized by being uncoordinated by nature. However, the potential of decentralized mechanisms is limited by the significant lack of knowledge with respect to the overall wireless environment. To shed some light on this subject, we show the main considerations and possibilities of applying online learning to address the SR problem in uncoordinated WLANs. In particular, we provide a solution based on Multi-Armed Bandits (MABs) whereby independent WLANs dynamically adjust their frequency channel, transmit power and sensitivity threshold. To that purpose, we provide two different strategies, which refer to selfish and environment-aware learning. While the former stands for pure individual behavior, the second one considers the performance experienced by surrounding networks, thus taking into account the impact of individual actions on the environment. Through these two strategies we delve into practical issues of applying MABs in wireless networks, such as convergence guarantees or adversarial effects. Our simulation results illustrate the potential of the proposed solutions for enabling SR in future WLANs. We show that substantial improvements on network performance can be achieved regarding throughput and fairness.
Over the last decade, railway industry has seen a huge transition from conventional railway signalling systems to modern, communication-based signalling systems. Communications-based train control ...(CBTC) is a modern communication-based system that uses radio communication to transfer timely and accurate train control information. CBTC is the choice of mass-transit railway operators today, with over a hundred systems currently installed worldwide. The safety-related, time-critical applications such as train control impose stringent reliability and availability requirements on the radio communication technology used. IEEE 802.11 Wi-Fi, despite being originally developed for stationary users within a limited area, has prevailed as the de-facto radio technology for CBTC. Unfortunately, very limited literature is publicly available on this topic due to the highly competitive nature of the railway industry. We believe that this paper fills the much-needed gap. It aims to present a comprehensive tutorial, as well as a survey of the state-of-the-art, of CBTC and the role of radio communication in it. The operation and fundamental components of a CBTC system are discussed. A summary of the evolution of the communication technologies used for modern railway signalling is presented. The benefits and drawbacks of using a radio communication technology, particularly Wi-Fi, and the challenges it introduces, are discussed. Best practices in the design of a CBTC radio network and the measures to optimize its availability are discussed, while using the currently in-progress Copenhagen S-train CBTC project as a reference. An overview of the CBTC standardization efforts, as well as the IEEE CBTC standard-frequently overlooked due to its limited scope-is included. This paper is concluded by providing a number of potential directions for future work.
The increasing interest in ubiquitous networking, and the tremendous popularity gained by IEEE 802.11 WLANs in recent years, is leading to very dense deployments where high levels of channel ...contention may prevent meeting the increasing user demands. To mitigate the negative effects of channel contention, the TWT mechanism included in the IEEE 802.11ax amendment can have a significant role, as it provides an extremely simple but effective mechanism to schedule transmissions in time. Moreover, in addition to reducing the contention between stations, the use of TWT may also contribute to taking full advantage of other novel mechanisms in the IEEE 802.11 universe, such as multiuser transmissions, multi-AP cooperation, spatial reuse and coexistence in high-density WLAN scenarios. Overall, we believe TWT may be a first step toward a practical collision-free and deterministic access in future WLANs.
In IEEE 802.11 WiFi-based waveforms, the receiver performs coarse time and frequency synchronization using the first field of the preamble known as the legacy short training field (L-STF). The L-STF ...occupies upto 40% of the preamble length and takes upto 32 μ s of airtime. With the goal of reducing communication overhead, we propose a modified waveform, where the preamble length is reduced by eliminating the L-STF. To decode this modified waveform, we propose a neural network (NN)-based scheme called PRONTO that performs coarse time and frequency estimations using other preamble fields, specifically the legacy long training field (L-LTF). Our contributions are threefold: (i) We present PRONTO featuring customized convolutional neural networks (CNNs) for packet detection and coarse carrier frequency offset (CFO) estimation, along with data augmentation steps for robust training. (ii) We propose a generalized decision flow that makes PRONTO compatible with legacy waveforms that include the standard L-STF. (iii) We validate the outcomes on an over-the-air WiFi dataset from a testbed of software defined radios (SDRs). Our evaluations show that PRONTO can perform packet detection with 100% accuracy, and coarse CFO estimation with errors as small as 3%. We demonstrate that PRONTO provides upto 40% preamble length reduction with no bit error rate (BER) degradation. We further show that PRONTO is able to achieve the same performance in new environments without the need to re-train the CNNs. Finally, we experimentally show the speedup achieved by PRONTO through GPU parallelization over the corresponding CPU-only implementations.
On the path to zero fatalities on the roadways, all vehicles have to periodically broadcast cooperative awareness messages (CAMs) in a timely and reliable manner, even in areas of high traffic ...density. The carrier senses multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.11, the de-facto standard for vehicular communications, is known to offer no reliability to broadcast packets that cannot be acknowledged, and to poorly perform at high network load due to collisions and interference. In this paper, an enhanced CSMA/CA protocol is analyzed for vehicular networks, which improves the CAM timeliness and reliability by leveraging full-duplex (FD) transceivers on board. FD devices can listen to the channel while transmitting, thus making collision detection viable. A FD vehicle can detect a CAM collision while sending, promptly abort the packet and retransmit it later. Results achieved through an analytical model under mathematically tractable assumptions, and through extensive system-level simulations in a complex urban environment, show the effectiveness of the protocol to cope with direct collisions, especially in high traffic areas, paving the way towards the realization of cooperative automated driving.
To enable large-scale and ubiquitous automotive network access, traditional vehicle-to-everything (V2X) technologies are evolving to the Internet of Vehicles (IoV) for increasing demands on emerging ...advanced vehicular applications, such as intelligent transportation systems (ITS) and autonomous vehicles. In recent years, IoV technologies have been developed and achieved significant progress. However, it is still unclear what is the evolution path and what are the challenges and opportunities brought by IoV. For the aforementioned considerations, this article provides a thorough survey on the historical process and status quo of V2X technologies, as well as demonstration of emerging technology developing directions toward IoV. We first review the early stage when the dedicated short-range communications (DSRC) was issued as an important initial beginning and compared the cellular V2X with IEEE 802.11 V2X communications in terms of both the pros and cons. In addition, considering the advent of big data and cloud-edge regime, we highlight the key technical challenges and pinpoint the opportunities toward the big data-driven IoV and cloud-based IoV, respectively. We believe our comprehensive survey on evolutionary V2X technologies toward IoV can provide beneficial insights and inspirations for both academia and the IoV industry.
A Tutorial on IEEE 802.11ax High Efficiency WLANs Khorov, Evgeny; Kiryanov, Anton; Lyakhov, Andrey ...
IEEE Communications surveys and tutorials,
2019-Firstquarter, Letnik:
21, Številka:
1
Journal Article
Recenzirano
Odprti dostop
While celebrating the 21st year since the very first IEEE 802.11 "legacy" 2 Mbit/s wireless local area network standard, the latest Wi-Fi newborn is today reaching the finish line, topping the ...remarkable speed of 10 Gbit/s. IEEE 802.11ax was launched in May 2014 with the goal of enhancing throughput-per-area in high-density scenarios. The first 802.11ax draft versions, namely, D1.0 and D2.0, were released at the end of 2016 and 2017. Focusing on a more mature version D3.0, in this tutorial paper, we help the reader to smoothly enter into the several major 802.11ax breakthroughs, including a brand new orthogonal frequency-division multiple access-based random access approach as well as novel spatial frequency reuse techniques. In addition, this tutorial will highlight selected significant improvements (including physical layer enhancements, multi-user multiple input multiple output extensions, power saving advances, and so on) which make this standard a very significant step forward with respect to its predecessor 802.11ac.
Incentives for Mobile Crowd Sensing: A Survey Xinglin Zhang; Zheng Yang; Wei Sun ...
IEEE Communications surveys and tutorials,
2016-Firstquarter, Letnik:
18, Številka:
1
Journal Article
Recenzirano
Recent years have witnessed the fast proliferation of mobile devices (e.g., smartphones and wearable devices) in people's lives. In addition, these devices possess powerful computation and ...communication capabilities and are equipped with various built-in functional sensors. The large quantity and advanced functionalities of mobile devices have created a new interface between human beings and environments. Many mobile crowd sensing applications have thus been designed which recruit normal users to contribute their resources for sensing tasks. To guarantee good performance of such applications, it's essential to recruit sufficient participants. Thus, how to effectively and efficiently motivate normal users draws growing attention in the research community. This paper surveys diverse strategies that are proposed in the literature to provide incentives for stimulating users to participate in mobile crowd sensing applications. The incentives are divided into three categories: entertainment, service, and money. Entertainment means that sensing tasks are turned into playable games to attract participants. Incentives of service exchanging are inspired by the principle of mutual benefits. Monetary incentives give participants payments for their contributions. We describe literature works of each type comprehensively and summarize them in a compact form. Further challenges and promising future directions concerning incentive mechanism design are also discussed.
With the fast-growing demand of location-based services in indoor environments, indoor positioning based on fingerprinting has attracted significant interest due to its high accuracy. In this paper, ...we present a novel deep-learning-based indoor fingerprinting system using channel state information (CSI), which is termed DeepFi. Based on three hypotheses on CSI, the DeepFi system architecture includes an offline training phase and an online localization phase. In the offline training phase, deep learning is utilized to train all the weights of a deep network as fingerprints. Moreover, a greedy learning algorithm is used to train the weights layer by layer to reduce complexity. In the online localization phase, we use a probabilistic method based on the radial basis function to obtain the estimated location. Experimental results are presented to confirm that DeepFi can effectively reduce location error, compared with three existing methods in two representative indoor environments.