818 research outputs found

    A feedback based solution to emulate hidden terminals in wireless networks

    Get PDF
    Mobile wireless emulation allows the test of real applications and transport protocols over a wired network mimicking the behavior of a mobile wireless network (nodes mobility, radio signal propagation and specific communication protocols). Two-stage IP-level network emulation consists in using a dedicated offline simulation stage to compute an IPlevel emulation scenario, which is played subsequently in the emulation stage. While this type of emulation allows the use of accurate computation models together with a large number of nodes, it currently does not allow to deal with dynamic changes of the real traffic. This lack of reactivity makes it impossible to emulate specific wireless behaviors such as hidden terminals in a realistic way. In this paper we address the need to take into account the real traffic during the emulation stage and we introduce a feedback mechanism. During the simulation several emulation scenarios are computed, each scenario corresponding to alternative traffic conditions related to e.g. occurrence or not of hidden terminals. During the emulation stage, the traffic is observed and the currently played emulation scenario can be changed according to specific network conditions. We propose a solution based on multiple scenarios generation, traffic observers and a feedback mechanism to add a trafficbased dynamic behavior to a two-stage emulation platform. The solution will be illustrated with a simple experiment based on hidden terminals

    Soft fault detection using MIBs in computer networks

    Get PDF
    To improve network reliability and management in today\u27s high-speed communication system, a statistical anomaly network intrusion detection system (NIDS) has been investigated, for network soft faults using the Management Information Base (Mm) traffic parameters provided by Simple Network Management Protocol (SNMP), for both wired and wireless networks. The work done would be a contribution to a system to be designed MIB Anomaly Intrusion Detection, a hierarchical multi-tier and multiobservation-window Anomaly Intrusion Detection system. The data was derived from many experiments that had been carried out in the test bed that monitored 27 MIB traffic parameters simultaneously, focusing on the soft network faults. The work here has been focused on early detection, i.e., detection at low values of the ratio of fault to background traffic. The performance of this system would be measured using traffic intensity scenarios, as the fault traffic decreased from 10% to 0.5% of the background

    Detecting malfunction in wireless sensor networks

    Get PDF
    The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem. Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background traffic. Another program simulated a faulty node. A node was isolated as the faulty node while all other nodes were good. The experiment ran for several hours and the data was captured with tcpdump. The data was analyzed to conclusions based on a statistical comparison of good node versus bad node. The statistical delay on the good node was an average of 0.69 ms while the standard deviation was 0.49. This was much better than the delay on the bad node that was 0.225192 s with a standard deviation of 0.89. This huge difference in the delay indicated that the faulty node was detected statistically. A threshold value of I ms was chosen. The good node was within this value about 98% of the time. The bad node on the other hand was far out of this range and was definitely detected. The channel utilization data provided the same conclusion

    Virtualization-based evaluation of backhaul performance in vehicular applications

    Get PDF
    Next-generation networks, based on SDN and NFV, are expected to support a wide array of services, including vehicular safety applications. Theseservices come with strict delay constraints, and our goal in this paper is to ascertain to which extent SDN/NFV-based networks are able to meetthem. To this end, we build and emulate a vehicular collision detection system, using the popular Mininet and Docker tools,on a real-world topology with mobility information. Using different core network topologies and open- source SDN controllers, we measure (i) thedelay with which vehicle beacons are processed and (ii) the associated overhead and energy consumption. We find that we can indeed meet thelatency constraints associated with vehicular safety applications, and that SDN controllers represent a moderate contribution to the overall energyconsumption but a significant source of additional delay.This work was partially supported by the European Commission through the H2020 5G-TRANSFORMER project (Project ID 761536)
    • 

    corecore