424 research outputs found

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements

    Performance of a Busy-Tone Approach on 802.11 Wireless Network

    Get PDF
    The big evolution of modem applications in the wireless networks domain as the wireless videos remote access, big files transfer, streaming and downloading high definition videos etc, has led to using the mmWave technology (60 GHz for example) that represents an important solution for the se applications because of the advantages presented by this frequency band such as the high data rate transmission up to multi gigabits, also the large bandwidth that goes up to 7 GHz. The use of the mm Wave technology requires a MAC protocol which ensures the channel sharing between users in a multi-node network, with directional antennas that increase spatial reuse and cover a wider area compared to the omnidirecti on al antennas. Many access method approaches were used in order to resolve these problems, for instance, the methods that use a signaling channel, then methods that exploit directional antennas with directional frames, and those using beacons and many others .... In our project, we worked on the adaptation of the 'Busy - Tone' method using the 802.11 ad protocol with directional antennas in addition to a coordination between 2.4 GHz and 60 GHz. This method offers a big solution to resolve the collisions of data and control packets that affect and reduce the network capacity and lead to data loss. Simulation results showed the efficiency of this model by reducing collisions caused by hidden terminais, therefore, enhancing the performance of the network in terms oftransmission delay, retransmission attempts and throughput. L'évolution des applications modernes dans le domaine des réseaux sans fils tel que 1 'accès à distance des vidéos sans fils, le transfert des gros fichiers, flux des vidéos à haute définition etc .... nécessite l'utilisation de la bande 60 GHz qui présente une solution très importante pour ces applications grâce aux avantages que présente cette bande tel que le taux de transmission des données qui atteint quelques Gigabits, et aussi grâce à la bande passante du canal qui est environ 7 GHz. L'utilisation de cette bande de fréquence nécessite un protocole MAC qui assure le partage de canal entre les utilisateurs dans un réseau multi-noeuds. Ce protocole doit tenir compte les problèmes et les défis qui se produisent grâce à l'utilisation de la bande 60 GHz, tel que les problèmes des terminales cachées et exposées Dans ce projet on a proposé une méthode qui se base sur l'adaptation de protocole 802.llad avec la méthode 'Busy-Tone 'parce qu'elle représente la solution la plus efficace pour résoudre les problèmes des collisions des paquets de donnés et les paquets de contrôle qui sont causés normalement par la présence des terminales cachées et exposées. L'approche proposée consiste aussi à utiliser les antennes directives qm augmentent la réutilisation spatiale et couvre une portée plus grande par rapport à l'antenne omnidirectionnelle. Ces antennes ont été utilisées à côté des antennes omnidirectionnelles avec une coordination entre les deux, alors les antennes omnidirectionnelles sont utilisées pour envoyer les signaux 'Busy-Tone ' tandis que les antennes directives sont utilisées pour envoyer les paquets de données. Les résultats de la simulation ont montré une amélioration au niveau de la performance du réseau en terme du débit, du délai et les essaies de retransmission en comparant avec le standard 801.11ad. La mise en oeuvre est effectuée dans le logiciel Matlab/Simulink. Les paramètres utilisés dans les simulations sont des valeurs typiques des centrales existantes ou prises dans la littérature. La conformité avec la littérature est réalisée grâce à une validation croisée progressive de chaque sous-ensemble et du système globa

    Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey

    Get PDF
    Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work

    On the use of IEEE 802.15.4/Zigbee for time-sensitive wireless sensor network applications

    Get PDF
    Mestrado em Engenharia Electrotécnica e de ComputadoresRecent advancements in information and communication technologies are paving the way for new paradigms in embedded computing systems. This, allied with an increasing eagerness for monitoring and controlling everything, everywhere, is pushing forward the design of new Wireless Sensor Network (WSN) infrastructures that will tightly interact with the physical environment, in a ubiquitous and pervasive fashion. Such cyber-physical systems require a rethinking of the usual computing and networking concepts, and given that the computing entities closely interact with their environment, timeliness is of increasing importance. This Thesis addresses the use of standard protocols, particularly IEEE 802.15.4 and ZigBee, combined with commercial technologies as a baseline to enable WSN infrastructures capable of supporting the Quality of Service (QoS) requirements (specially timeliness and system lifetime) that future large-scale networked embedded systems will impose. With this purpose, in this Thesis we start by evaluating the network performance of the IEEE 802.15.4 Slotted CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism for different parameter settings, both through simulation and through an experimental testbed. In order to improve the performance of these networks (e.g. throughput, energyefficiency, message delay) against the hidden-terminal problem, a mechanism to mitigate it was implemented and experimentally validated. The effectiveness of this mechanism was also demonstrated in a real application scenario, featuring a target tracking application. A methodology for modelling cluster-tree WSNs and computing the worst-case endto-end delays, buffering and bandwidth requirements was tested and validated experimentally. This work is of paramount importance to understand the behaviour of WSNs under worst-case conditions and also to make the appropriate network settings. Our experimental work enabled us to identify a number of technological constrains, namely related to hardware/software and to the Open-ZB implementation in TinyOS. In this line, a new implementation effort was triggered to port the Open-ZB IEEE 802.15.4/ZigBee protocol stack to the ERIKA real-time operating system. This implementation was validated experimentally and its behaviour compared with the TinyOS–based implementation.Os últimos avanços nas tecnologias de informação e comunicação (ICTs) estão a abrir caminho para novos paradigmas de sistemas computacionais embebidos. Este facto, aliado à tendência crescente em monitorizar e controlar tudo, em qualquer lugar, está a alimentar o desenvolvimento de novas infra-estruturas de Redes de Sensores Sem Fios (WSNs), que irão interagir intimamente com o mundo físico de uma forma ubíqua. Este género de sistemas ciber-físicos de grande escala, requer uma reflexão sobre os conceitos de redes e de computação tradicionais, e tendo em conta a proximidade que estas entidades partilham com ambiente envolvente, o seu comportamento temporal é de acrescida importância. Esta Tese endereça a utilização de protocolos normalizados, em particular do IEEE 802.15.4 e ZigBee em conjunto com tecnologias comerciais, para desenvolver infraestruturas WSN capazes de responder aos requisitos de Qualidade de Serviço (QoS) (especialmente em termos de comportamento temporal e tempo de vida do sistema), que os futuros sistemas embebidos de grande escala deverão exigir. Com este propósito, nesta Tese começamos por analisar a performance do mecanismo de Slotted CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) do IEEE 802.15.4 para diferentes parâmetros, através de simulação e experimentalmente. De modo a melhorar a performance destas redes (ex. throughput, eficiência energética, atrasos) em cenários que contenham nós escondidos (hidden-nodes), foi implementado e validado experimentalmente um mecanismo para eliminar este problema. A eficácia deste mecanismo foi também demonstrada num cenário aplicacional real. Foi testada e validada uma metodologia para modelizar uma WSN em cluster-tree e calcular os piores atrasos das mensagens, necessidades de buffering e de largura de banda. Este trabalho foi de grande importância para compreender o comportamento deste tipo de redes para condições de utilização limite e para as configurar a priori. O nosso trabalho experimental permitiu identificar uma série de limitações tecnológicas, nomeadamente relacionadas com hardware/software e outras relacionadas com a implementação do Open-ZB em TinyOS. Isto desencadeou a migração da pilha protocolar IEEE 802.15.4/ZigBee Open-ZB para o ERIKA, um sistema operativo de tempo-real. Esta implementação foi validada experimentalmente e o seu comportamento comparado com o da implementação baseada em TinyOS

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Channel Access Management in Data Intensive Sensor Networks

    Get PDF
    There are considerable challenges for channel access in Data Intensive Sensor Networks - DISN, supporting Data Intensive Applications like Structural Health Monitoring. As the data load increases, considerable degradation of the key performance parameters of such sensor networks is observed. Successful packet delivery ratio drops due to frequent collisions and retransmissions. The data glut results in increased latency and energy consumption overall. With the considerable limitations on sensor node resources like battery power, this implies that excessive transmissions in response to sensor queries can lead to premature network death. After a certain load threshold the performance characteristics of traditional WSNs become unacceptable. Research work indicates that successful packet delivery ratio in 802.15.4 networks can drop from 95% to 55% as the offered network load increases from 1 packet/sec to 10 packets/sec. This result in conjunction with the fact that it is common for sensors in an SHM system to generate 6-8 packets/sec of vibration data makes it important to design appropriate channel access schemes for such data intensive applications.In this work, we address the problem of significant performance degradation in a special-purpose DISN. Our specific focus is on the medium access control layer since it gives a fine-grained control on managing channel access and reducing energy waste. The goal of this dissertation is to design and evaluate a suite of channel access schemes that ensure graceful performance degradation in special-purpose DISNs as the network traffic load increases.First, we present a case study that investigates two distinct MAC proposals based on random access and scheduling access. The results of the case study provide the motivation to develop hybrid access schemes. Next, we introduce novel hybrid channel access protocols for DISNs ranging from a simple randomized transmission scheme that is robust under channel and topology dynamics to one that utilizes limited topological information about neighboring sensors to minimize collisions and energy waste. The protocols combine randomized transmission with heuristic scheduling to alleviate network performance degradation due to excessive collisions and retransmissions. We then propose a grid-based access scheduling protocol for a mobile DISN that is scalable and decentralized. The grid-based protocol efficiently handles sensor mobility with acceptable data loss and limited overhead. Finally, we extend the randomized transmission protocol from the hybrid approaches to develop an adaptable probability-based data transmission method. This work combines probabilistic transmission with heuristics, i.e., Latin Squares and a grid network, to tune transmission probabilities of sensors, thus meeting specific performance objectives in DISNs. We perform analytical evaluations and run simulation-based examinations to test all of the proposed protocols

    An Optimized Hidden Node Handling Approach For Improving The Coverage And Network Efficiency In Wireless Multimedia Sensor Networks

    Get PDF
    Wireless Multimedia Sensor Networks (WMSNs) are comprised of sensor nodes that form the momentary network and do not rely on the support of any orthodox centralized infrastructure or administration. Such a given situation mandates that every sensor node gets the support of the other sensor nodes in order to advance the packets to the desired destination node, and specifically to the sink node. Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a challenge due to their limited bandwidth and power resources. The existing WMSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs vary as it depends on the correct location of the sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption and synchronization loss between neighboring nodes. The focus is on hidden node problems in WMSNs and how they can affect the network performance. Hidden nodes occur in the networks when nodes that are invisible to each other communicate with another node that is visible to these nodes at a particular period. Eventually, a collision may occur and the node will be unable to receive any packets. In addition, this study looks at the effectiveness of the optimal orientation for the sensor nodes in the environment. This work introduces an Optimized Hidden Node Handling (OHND) approach. The OHND consists of three phases: hidden node handling, message exchange, and location and view handling. These three phases aim to maximize the multimedia node coverage and improve energy efficiency, hidden node handling capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node– continuous neighbor discovery process to handle the mobility of the nodes. To evaluate the performance of the proposed algorithms, the results are compared with other known approaches. The results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage, achieve power efficiency, reduce the end-to-end delay, and improve the throughput. Finally, this study provides an efficient solution for handling the hidden node problem in case mobility

    The improvements in ad hoc routing and network performance with directional antennas

    Get PDF
    The ad hoc network has typically been applied in military and emergency environments. In the past decade, a tremendous amount of MAC protocols and routing protocols have been developed, but most of these protocols are designed for networks where devices equipped with omni-directional antennas. With fast development of the antenna technology, directional antennas have been proposed to improve routing and network performance in ad hoc networks. However, several challenges and design issues (like new hidden terminal problem, deafness problem, neighbor discovery problem and routing overhead problem) arise when applying directional antennas to ad hoc networks, consequently a great number of directional MAC and routing protocols have been proposed. In this thesis the implementation of directional antennas in ad hoc networks is studied from technical point of view. This thesis discusses the problems of utilizing directional antenna in ad hoc networks and reviews several recent proposed MAC algorithms and routing algorithms. The improvement of ad hoc routing and network performance with directional antennas compared with omni-directional antennas are evaluated based on simulations which are done with the QualNet simulator. The main finding of this study is that directional antennas always outperform omni-directional antennas in both static and mobility scenarios, and the advantage of directional antennas is more obvious when channel condition becomes worse or mobility level is larger. This thesis provides a survey of directional MAC and routing protocols in ad hoc networks. The result and principles obtained in this thesis are quite valuable for researchers working in this field. They can use it as reference for further researches. The theory parts of smart antenna technology and IEEE 802.11 MAC protocol can be considered as a technical introduction for beginners

    Self-stabilizing cluster routing in Manet using link-cluster architecture

    Full text link
    We design a self-stabilizing cluster routing algorithm based on the link-cluster architecture of wireless ad hoc networks. The network is divided into clusters. Each cluster has a single special node, called a clusterhead that contains the routing information about inter and intra-cluster communication. A cluster is comprised of all nodes that choose the corresponding clusterhead as their leader. The algorithm consists of two main tasks. First, the set of special nodes (clusterheads) is elected such that it models the link-cluster architecture: any node belongs to a single cluster, it is within two hops of the clusterhead, it knows the direct neighbor on the shortest path towards the clusterhead, and there exist no two adjacent clusterheads. Second, the routing tables are maintained by the clusterheads to store information about nodes both within and outside the cluster. There are two advantages of maintaining routing tables only in the clusterheads. First, as no two neighboring nodes are clusterheads (as per the link-cluster architecture), there is no need to check the consistency of the routing tables. Second, since all other nodes have significantly less work (they only forward messages), they use much less power than the clusterheads. Therefore, if a clusterhead runs out of power, a neighboring node (that is not a clusterhead) can accept the role of a clusterhead. (Abstract shortened by UMI.)
    • …
    corecore