"Analysis and simulations of a novel media access control protocol for lora"
Analysis and simulations of a novel media access control protocol for lora
Sprache des Titels:
Today, the research of energy conservation technologies have become more and more important as the greenhouse effect and the energy crisis caused by local wars are increasingly serious. This research project aims to design a novel Media Access Control (MAC) protocol for Long Range (LoRa) technology to centrally and automatically control building facilities, which promotes energy consumption reductions.
First, the requirements of the target application and the relevant wireless communication technologies are introduced. Furthermore, the gap between these two aspects are presented, and a resulting research question is raised. Subsequently, the most promising wireless communication technology, LoRa, which is regarded as a suitable physical layer technology to
address the application challenges, is described. In addition to the physical layer, the issues of the existing MAC layer standard Long Range Wide Area Network (LoRaWAN), which is widely studied, and several state-of-the-art improvements are analyzed.
After referring to CSMA and TDMA technologies, my novel MAC protocol which is
a time-slot based Contention Constrained p-CSMA (CCP) MAC protocol and a novel edge acknowledging network architecture are proposed and detailed for unconfirmed and confirmed messaging.
The performance of my novel MAC protocol is evaluated by means of theory and simulations using the metrics of network throughput and energy consumption per successful transmission. Discrete Time Markov Chains are developed for the modeling of node and channel behaviors, and the simulation which is discrete time driven is implemented in MATLAB.
Extensive and highly consistent results of performance evaluation are derived from analysis and simulations, which validate CCP?s high network throughput and energy efficiency compared to ALOHA and p-CSMA protocols. In addition, the impact of various settings including persistence value, shortened packet length, higher data rate and retransmission attempts are simulated and discussed. Different scenarios where devices conforming to other
MAC protocols exist and the hidden terminal problem is present are also investigated to show the resilience of the protocol to jamming. In the end of this thesis, future work is proposed for further evaluations.