24,547 research outputs found
Issues in providing a reliable multicast facility
Issues involved in point-to-multipoint communication are presented and the literature for proposed solutions and approaches surveyed. Particular attention is focused on the ideas and implementations that align with the requirements of the environment of interest. The attributes of multicast receiver groups that might lead to useful classifications, what the functionality of a management scheme should be, and how the group management module can be implemented are examined. The services that multicasting facilities can offer are presented, followed by mechanisms within the communications protocol that implements these services. The metrics of interest when evaluating a reliable multicast facility are identified and applied to four transport layer protocols that incorporate reliable multicast
Ethernet - a survey on its fields of application
During the last decades, Ethernet progressively became the most widely used local area networking (LAN) technology. Apart from LAN installations, Ethernet became also attractive for many other fields of application, ranging from industry to avionics, telecommunication, and multimedia. The expanded application of this technology is mainly due to its significant assets like reduced cost, backward-compatibility, flexibility, and expandability. However, this new trend raises some problems concerning the services of the protocol and the requirements for each application. Therefore, specific adaptations prove essential to integrate this communication technology in each field of application. Our primary objective is to show how Ethernet has been enhanced to comply with the specific requirements of several application fields, particularly in transport, embedded and multimedia contexts. The paper first describes the common Ethernet LAN technology and highlights its main features. It reviews the most important specific Ethernet versions with respect to each application fieldâs requirements. Finally, we compare these different fields of application and we particularly focus on the fundamental concepts and the quality of service capabilities of each proposal
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful
energy awareness is essential when working with these devices.
Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features.
This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols.
The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and
has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference
publications in IEEE Explore and one workshop paper
Bridge expansion joint in road transition curve: effects assessment on heavy vehicles
Properly-designed road surfaces provide a durable surface on which traffic can pass smoothly and safely. In fact, the main causes that determine the structural decay of the pavement and its parts are the traffic loads. These repeated actions can create undesirable unevennesses on the road surface, which induce vertical accelerations on vehicles, up to hindering contact between pavement and tire, with dangerous consequences on traffic safety. The dynamic actions transmitted by the vehicles depend on these irregularities: often, a bridge expansion joint (BEJ), introducing a necessary discontinuity between different materials, determines from the beginning a geometric irregularity in the running surface. Besides, some structural conditions could emphasize the problem (e.g., local cracking due to the settlement of the subgrade near the abutment or the discontinuity of stiffness due to the presence of different materials). When the BEJ is located in a transition curve, an inevitable vertical irregularity between road and joint can reach values of some centimeters, with serious consequences for the road safety. This paper deals with the analysis of a case study of a BEJ. Several test surveys were performed in order to fully characterize the effects on both vehicles and pavement. The three-dimensional representation of the pavement surface and the acceleration measurements on a heavy test vehicle were performed to analyze the joint behavior under traffic. Finally, a finite element model was implemented to evaluate the stress contribution on vehicle components induced by the vertical irregularities
Recommended from our members
Cognitive radio systems in LTE networks
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London.The most important fact in the mobile industry at the moment is that demand for wireless services will continue to expand in the coming years. Therefore, it is vital to find more spectrums through cognitive radios for the growing numbers of services and users. However, the spectrum reallocations, enhanced receivers, shared use, or secondary markets-will not likely, by themselves or in combination, meet the real exponential increases in demand for wireless resources. Network operators will also need to re-examine network architecture, and consider integrating the fibre and wireless networks to address this issue. This thesis involves driving fibre deeper into cognitive networks, deploying microcells connected through fibre infrastructure to the backbone LTE networks, and developing the algorithms for diverting calls between the wireless and fibre systems, introducing new coexistence models, and mobility management. This research addresses the network deployment scenarios to a microcell-aided cognitive network, specifically slicing the spectrum spatially and providing reliable coverage at either tier. The goal of this research is to propose new method of decentralized-to-distributed management techniques that overcomes the spectrum unavailability barrier overhead in ongoing and future deployments of multi-tiered cognitive network architectures. Such adjustments will propose new opportunities in cognitive radio-to-fibre systematic investment strategies. Specific contributions include:
1) Identifying the radio access technologies and radio over fibre solution for cognitive network infrastructure to increase the uplink capacity analysis in two-tier networks.
2) Coexistence of macro and microcells are studied to propose a roadmap for optimising the deployment of cognitive microcells inside LTE macrocells in the case of considering radio over fibre access systems.
3) New method for roaming mobiles moving between microcells and macrocell coverage areas is proposed for managing spectrum handover, operator database, authentication and accounting by introducing the channel assigning agent entity. The ultimate goal is to reduce unnecessary channel adaptation
- âŚ