513 research outputs found
Cross-layer Peer-to-Peer Computing in Mobile Ad Hoc Networks
The future information society is expected to rely heavily on wireless technology. Mobile access to the Internet is steadily gaining ground, and could easily end up exceeding the number of connections from the fixed infrastructure. Picking just one example, ad hoc networking is a new paradigm of wireless communication for mobile devices. Initially, ad hoc networking targeted at military applications as well as stretching the access to the Internet beyond one wireless hop. As a matter of fact, it is now expected to be employed in a variety of civilian applications. For this reason, the issue of how to make these systems working efficiently keeps the ad hoc research community active on topics ranging from wireless technologies to networking and application systems.
In contrast to traditional wire-line and wireless networks, ad hoc networks are expected to operate in an environment in which some or all the nodes are mobile, and might suddenly disappear from, or show up in, the network. The lack of any centralized point, leads to the necessity of distributing application services and responsibilities to all available nodes in the network, making the task of developing and deploying application a hard task, and highlighting the necessity of suitable middleware platforms.
This thesis studies the properties and performance of peer-to-peer overlay management algorithms, employing them as communication layers in data sharing oriented middleware platforms. The work primarily develops from the observation that efficient overlays have to be aware of the physical network topology, in order to reduce (or avoid) negative impacts of application layer traffic on the network functioning. We argue that cross-layer cooperation between overlay management algorithms and the underlying layer-3 status and protocols, represents a viable alternative to engineer effective decentralized communication layers, or eventually re-engineer existing ones to foster the interconnection of ad hoc networks with Internet infrastructures. The presented approach is twofold. Firstly, we present an innovative network stack component that supports, at an OS level, the realization of cross-layer protocol interactions. Secondly, we exploit cross-layering to optimize overlay management algorithms in unstructured, structured, and publish/subscribe platforms
A one hop overlay system for Mobile Ad Hoc Networks
Peer-to-Peer (P2P) overlays were initially proposed for use with wired networks.
However, the very rapid proliferation of wireless communication technology has
prompted a need for adoption of P2P systems in mobile networks too. There are
many common characteristics between P2P overlay networks and Mobile Ad-hoc
Networks (MANET). Self-organization, decentralization, a dynamic nature and
changing topology are the most commonly shared features. Furthermore, when
used together, the two approaches complement each other. P2P overlays provide
data storage/retrieval functionality and MANET provides wireless connectivity
between clients without depending on any pre-existing infrastructure. P2P overlay
networks can be deployed over MANET to address content discovery issues.
However, previous research has shown that deploying P2P systems straight over
MANET does not exhibit satisfactory performance. Bandwidth limitation, limited
resources and node mobility are some of the key constraints.
This thesis proposes a novel approach, OneHopOverlay4MANET, to exploit the
synergies between MANET and P2P overlays through cross-layering. It combines
Distributed Hash Table (DHT) based structured P2P overlays with MANET underlay
routing protocols to achieve one logical hop between any pair of overlay
nodes. OneHopOverlay4MANET constructs a cross-layer channel to permit direct
exchange of routing information between the Application layer, where the overlay
operates, and the MANET underlay layer. Consequently, underlay routing information
can be shared and used by the overlay. Thus, OneHopOverlay4MANET
reduces the typical management traffic when deploying traditional P2P systems
over MANET. Moreover, as a result of building one hop overlay, OneHopOverlay4MANET
can eliminate the mismatching issue between overlay and underlay
and hence resolve key lookups in a short time, enhancing the performance of the
overlay.
v
In this thesis, we present OneHopOverlay4MANET and evaluate its performance
when combined with different underlay routing protocols. OneHopOverlay4MANET
has been combined with two proactive underlays (OLSR and BATMAN)
and with three reactive underlay routing protocols (DSR, AODV and
DYMO). In addition, the performance of the proposed system over OLSR has
been compared to two recent structured P2P over MANET systems (MA-SP2P
and E-SP2P) that adopted OLSR as the routing protocol. The results show that
better performance can be achieved using OneHopOverlay4MANET
Airborne Network Data Availability Using Peer to Peer Database Replication on a Distributed Hash Table
The concept of distributing one complex task to several smaller, simpler Unmanned Aerial Vehicles (UAVs) as opposed to one complex UAV is the way of the future for a vast number of surveillance and data collection tasks. One objective for this type of application is to be able to maintain an operational picture of the overall environment. Due to high bandwidth costs, centralizing all data may not be possible, necessitating a distributed storage system such as mobile Distributed Hash Table (DHT). A difficulty with this maintenance is that for an Airborne Network (AN), nodes are vehicles and travel at high rates of speed. Since the nodes travel at high speeds they may be out of contact with other nodes and their data becomes unavailable. To address this the DHT must include a data replication strategy to ensure data availability. This research investigates the percentage of data available throughout the network by balancing data replication and network bandwidth. The DHT used is Pastry with data replication using Beehive, running over an 802.11 wireless environment, simulated in Network Simulator 3. Results show that high levels of replication perform well until nodes are too tightly packed inside a given area which results in too much contention for limited bandwidth
Airborne Directional Networking: Topology Control Protocol Design
This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes
or terminals with wireless communications and networking capability that
communicate with each other without the aid of any centralized administrator
also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it's
an autonomous system in which mobile hosts connected by wireless links are free
to be dynamically and some time act as routers at the same time, and we discuss
in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time, there is no direction
or limit the movement and so on, and thus needed a new optional path Agreement
(Routing Protocol) to identify nodes for these actions communicate with each
other path, An ideal choice way the agreement should not only be able to find
the right path, and the Ad Hoc Network must be able to adapt to changing
network of this type at any time. and we talk in details in this paper all the
information of Mobile Ad Hoc Network which include the History of ad hoc,
wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc
networks, and then we present more than 13 types of the routing Ad Hoc Networks
protocols have been proposed. In this paper, the more representative of routing
protocols, analysis of individual characteristics and advantages and
disadvantages to collate and compare, and present the all applications or the
Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa
Effects of Data Replication on Data Exfiltration in Mobile Ad hoc Networks Utilizing Reactive Protocols
A swarm of autonomous UAVs can provide a significant amount of ISR data where current UAV assets may not be feasible or practical. As such, the availability of the data the resides in the swarm is a topic that will benefit from further investigation. This thesis examines the impact of le replication and swarm characteristics such as node mobility, swarm size, and churn rate on data availability utilizing reactive protocols. This document examines the most prominent factors affecting the networking of nodes in a MANET. Factors include network routing protocols and peer-to-peer le protocols. It compares and contrasts several open source network simulator environments. Experiment implementation is documented, covering design considerations, assumptions, and software implementation, as well as detailing constant, response and variable factors. Collected data is presented and the results show that in swarms of sizes of 30, 45, and 60 nodes, le replication improves data availability until network saturation is reached, with the most significant benefit gained after only one copy is made. Mobility, churn rate, and swarm density all influence the replication impact
- …