Improving LoRaWAN Performance Using Reservation ALOHA

نویسنده

  • Dina M. Ibrahim Department of Information Technology, College of Computer, Qassim University, Saudi Arabia.
چکیده مقاله:

LoRaWAN is one of the new and updated standards for IoT applications. However, the expected high density of peripheral devices for each gateway, and the absence of an operative synchronization mechanism between the gateway and peripherals, all of which challenges the networks scalability. In this paper, we propose to normalize the communication of LoRaWAN networks using a Reservation-ALOHA (R-ALOHA) instead of the standard ALOHA approach used by LoRa. The implementation is a library package placed on top of the standard LoRaWAN; thus, no modification in pre-existing LoRaWAN structure and libraries is required. Our proposed approach is based on a distributed synchronization service that is suitable for low-cost IoT end-nodes. R-ALOHA LoRaWAN gives better performance in comparison with the previous models; Pure-ALOHA LoRaWAN, Slotted-ALOHA LoRaWAN, and TDMA LoRaWAN. It significantly improves the performance of network regarding the probability of collision, the maximum throughput, and the maximum duty cycle.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling the Energy Performance of LoRaWAN

LoRaWAN is a flagship Low-Power Wide Area Network (LPWAN) technology that has highly attracted much attention from the community in recent years. Many LoRaWAN end-devices, such as sensors or actuators, are expected not to be powered by the electricity grid; therefore, it is crucial to investigate the energy consumption of LoRaWAN. However, published works have only focused on this topic to a li...

متن کامل

Analyzing Split Channel Medium Access Control Schemas with ALOHA Reservation

In order to improve the throughput performance of Medium Access Control (MAC) schemes in wireless communication networks, some researchers proposed to split the single shared channel into two subchannels: a control subchannel and a data subchannel. The control subchannel is used for access reservation to the data subchannel over which the data packets are transmitted, and such reservation can b...

متن کامل

Reservation Aloha Algorithm With Adaptively Prioritized Controlled Capture

-In this paper, we introduce a new mixed priority scheme that utilizes the logarithmically equi-spaced random transmitter power levels (LESRTPL) model to control the assignment of the transmitter power levels, assigned to each priority class, adaptively. Packets, of different priority classes contending simultaneously over the wireless channels to capture a contention slot, will transmit using ...

متن کامل

Analyzing Split Channel Medium Access Control Schemes with ALOHA Reservation

In order to improve the throughput performance of Medium Access Control (MAC) schemes in wireless communication networks, some researchers proposed to split the single shared channel into two subchannels: a control subchannel and a data subchannel. The control subchannel is used for access reservation to the data subchannel over which the data packets are transmitted, and such reservation can b...

متن کامل

Selective Jamming of LoRaWAN using Commodity Hardware

Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the re...

متن کامل

Investigating the practical performance of the LoRaWAN technology

New innovations, technologies, ideas and businesses are driving the realisation of the Internet of Things (IoT) vision. As with many other fields in technology comes competing protocols and standards, ranging from modulation schema used for transmitting data to security standards used to ensure safe operation and the privacy needs for all involved entities. This thesis looks into one of the com...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 12  شماره 2

صفحات  70- 78

تاریخ انتشار 2020-06-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023