1,468 research outputs found

    Modeling the Impact of Protocols on Traffic Burstiness At Large Timescales in Wireless Multi-Hop Networks

    Get PDF
    We investigate the impact of the protocol stack on traffic burstiness at large time-scales in wireless multi-hop network traffic. Origins of traffic burstiness at large scales (like its LRD nature) have been mostly attributed to the heavy-tails in traffic sources. In wired networks, protocol dynamics have little impact on large time-scale dynamics. However, given the nature of wireless networks, the MAC and routing layers together can lead to route flapping or oscillations even in a static network. Hence, we explore whether these dynamics can lead to traffic burstiness and LRD. Using network simulations, we analyze traffic for two MANET routing protocols - OLSR and AODV. By varying the routing protocol parameters, we analyze their role in inducing or preventing route oscillations, and study their impact on traffic LRD. We find that, losses in OLSR control packets, due to congestion at the MAC, can lead to route oscillations and traffic burstiness at large timescales. By tuning the parameters, route oscillations and traffic LRD can be avoided. AODV dynamics show little evidence for traffic LRD, even though we cannot rule out this possibility. We also show that the route oscillations can have heavier body and tail than exponential distribution, and that the Markovian framework for route oscillations is inadequate to explain the observed traffic scaling. Lastly, we give a model that captures the MAC and OLSR routing protocol interactions and depending upon chosen protocol parameters and input load, correctly predicts the presence of traffic LRD. Thus, we use this model to design appropriate choice of protocol parameters to mitigate traffic burstiness at large-timescales.Research supported by the Army Research Office under MURI award W911NF-08-1-0238 and by the National Science Foundation under grant CNS1018346

    Random Access Game and Medium Access Control Design

    Get PDF
    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node utility functions, in which system-wide fairness or service differentiation can be achieved in a distributed manner as long as each node executes a contention resolution algorithm that is designed to achieve the Nash equilibrium. We thus propose a novel medium access method derived from carrier sense multiple access/collision avoidance (CSMA/CA) according to distributed strategy update mechanism achieving the Nash equilibrium of random access game. We present a concrete medium access method that adapts to a continuous contention measure called conditional collision probability, stabilizes the network into a steady state that achieves optimal throughput with targeted fairness (or service differentiation), and can decouple contention control from handling failed transmissions. In addition to guiding medium access control design, the random access game model also provides an analytical framework to understand equilibrium and dynamic properties of different medium access protocols

    A New Adaptive Frame Aggregation Method for Downlink WLAN MU-MIMO Channels

    Get PDF
    Accommodating the heterogeneous traffic demand among streams in the downlink MU-MIMO channel is among the challenges that affect the transmission efficiency since users in the channel do not always have the same traffic demand. Consequently, it is feasible to adjust the frame size to maximize the system throughput. The existing adaptive aggregation solutions do not consider the effects of different traffic scenarios and they use a Poison traffic model which is inadequate to represent the real network traffic scenarios, thus leading to suboptimal solutions. In this study, we propose some adaptive aggregation strategies which employ a novel dynamic adaptive aggregation policy selection algorithm in addressing the challenges of heterogenous traffic demand in the downlink MU-MIMO channel. Different traffic models are proposed to emulate real world traffic scenarios in the network and to analyze the proposed aggregation polices with respect to various traffic models. Finally, through simulation, we demonstrate the performance of our adaptive algorithm over the baseline FIFO aggregation approach in terms of system throughput performance and channel utilization in achieving the optimal frame size of the system

    Packet level measurement over wireless access

    Get PDF
    PhDPerformance Measurement of the IP packet networks mainly comprise of monitoring the network performance in terms of packet losses and delays. If used appropriately, these network parameters (i.e. delay, loss and bandwidth etc) can indicate the performance status of the network and they can be used in fault and performance monitoring, network provisioning, and traffic engineering. Globally, there is a growing need for accurate network measurement to support the commercial use of IP networks. In wireless networks, transmission losses and communication delays strongly affect the performance of the network. Compared to wired networks, wireless networks experience higher levels of data dropouts, and corruption due to issues of channel fading, noise, interference and mobility. Performance monitoring is a vital element in the commercial future of broadband packet networking and the ability to guarantee quality of service in such networks is implicit in Service Level Agreements. Active measurements are performed by injecting probes, and this is widely used to determine the end to end performance. End to end delay in wired networks has been extensively investigated, and in this thesis we report on the accuracy achieved by probing for end to end delay over a wireless scenario. We have compared two probing techniques i.e. Periodic and Poisson probing, and estimated the absolute error for both. The simulations have been performed for single hop and multi- hop wireless networks. In addition to end to end latency, Active measurements have also been performed for packet loss rate. The simulation based analysis has been tried under different traffic scenarios using Poisson Traffic Models. We have sampled the user traffic using Periodic probing at different rates for single hop and multiple hop wireless scenarios. 5 Active probing becomes critical at higher values of load forcing the network to saturation much earlier. We have evaluated the impact of monitoring overheads on the user traffic, and show that even small amount of probing overhead in a wireless medium can cause large degradation in network performance. Although probing at high rate provides a good estimation of delay distribution of user traffic with large variance yet there is a critical tradeoff between the accuracy of measurement and the packet probing overhead. Our results suggest that active probing is highly affected by probe size, rate, pattern, traffic load, and nature of shared medium, available bandwidth and the burstiness of the traffic

    An intelligent surveillance platform for large metropolitan areas with dense sensor deployment

    Get PDF
    Producción CientíficaThis paper presents an intelligent surveillance platform based on the usage of large numbers of inexpensive sensors designed and developed inside the European Eureka Celtic project HuSIMS. With the aim of maximizing the number of deployable units while keeping monetary and resource/bandwidth costs at a minimum, the surveillance platform is based on the usage of inexpensive visual sensors which apply efficient motion detection and tracking algorithms to transform the video signal in a set of motion parameters. In order to automate the analysis of the myriad of data streams generated by the visual sensors, the platform’s control center includes an alarm detection engine which comprises three components applying three different Artificial Intelligence strategies in parallel. These strategies are generic, domain-independent approaches which are able to operate in several domains (traffic surveillance, vandalism prevention, perimeter security, etc.). The architecture is completed with a versatile communication network which facilitates data collection from the visual sensors and alarm and video stream distribution towards the emergency teams. The resulting surveillance system is extremely suitable for its deployment in metropolitan areas, smart cities, and large facilities, mainly because cheap visual sensors and autonomous alarm detection facilitate dense sensor network deployments for wide and detailed coveraMinisterio de Industria, Turismo y Comercio and the Fondo de Desarrollo Regional (FEDER) and the Israeli Chief Scientist Research Grant 43660 inside the European Eureka Celtic project HuSIMS (TSI-020400-2010-102)

    Belaidžio ryšio tinklų terpės prieigos valdymo tyrimas

    Get PDF
    Over the years, consumer requirements for Quality of Service (QoS) has been growing exponentially. Recently, the ratification process of newly IEEE 802.11ad amendment to IEEE 802.11 was finished. The IEEE 802.11ad is the newly con-sumer wireless communication approach, which will gain high spot on the 5G evolution. Major players in wireless market, such as Qualcomm already are inte-grating solutions from unlicensed band, like IEEE 802.11ac, IEEE 802.11ad into their architecture of LTE PRO (the next evolutionary step for 5G networking) (Qualcomm 2013; Parker et al. 2015). As the demand is growing both in enter-prise wireless networking and home consumer markets. Consumers started to no-tice the performance degradation due to overcrowded unlicensed bands. The un-licensed bands such as 2.4 GHz, 5 GHz are widely used for up-to-date IEEE 802.11n/ac technologies with upcoming IEEE 802.11ax. However, overusage of the available frequency leads to severe interference issue and consequences in to-tal system performance degradation, currently existing wireless medium access method can not sustain the increasing intereference and thus wireless needs a new methods of wireless medium access. The main focal point of this dissertation is to improve wireless performance in dense wireless networks. In dissertation both the conceptual and multi-band wireless medium access methods are considered both from theoretical point of view and experimental usage. The introduction chapter presents the investigated problem and it’s objects of research as well as importance of dissertation and it’s scientific novelty in the unlicensed wireless field. Chapter 1 revises used literature. Existing and up-to-date state-of-the-art so-lution are reviewed, evaluated and key point advantages and disadvantages are analyzed. Conclusions are drawn at the end of the chapter. Chapter 2 describes theoretical analysis of wireless medium access protocols and the new wireless medium access method. During analysis theoretical simula-tions are performed. Conclusions are drawn at the end of the chapter. Chapter 3 is focused on the experimental components evaluation for multi-band system, which would be in line with theoretical concept investigations. The experimental results, showed that components of multi-band system can gain sig-nificant performance increase when compared to the existing IEEE 802.11n/ac wireless systems. General conclusions are drawn after analysis of measurement results

    Intrusion Detection for Smart Grid Communication Systems

    Get PDF
    Transformation of the traditional power grid into a smart grid hosts an array of vulnerabilities associated with communication networks. Furthermore, wireless mediums used throughout the smart grid promote an environment where Denial of Service (DoS) attacks are very effective. In wireless mediums, jamming and spoofing attack techniques diminish system operations thus affecting smart grid stability and posing an immediate threat to Confidentiality, Integrity, and Availability (CIA) of the smart grid. Intrusion detection systems (IDS) serve as a primary defense in mitigating network vulnerabilities. In IDS, signatures created from historical data are compared to incoming network traffic to identify abnormalities. In this thesis, intrusion detection algorithms are proposed for attack detection in smart grid networks by means of physical, data link, network, and session layer analysis. Irregularities in these layers provide insight to whether the network is experiencing genuine or malicious activity

    A Cross-Layer Modification to the DSR Routing Protocol in Wireless Mesh Networks

    Get PDF
    A cross-layer modification to the DSR routing protocol that finds high throughput paths in WMNs has been introduced in this work. The Access Efficiency Factor (AEF) has been introduced in this modification as a local congestion avoidance metric for the DSR routing mechanism as an alternative to the hop count (Hc) metric. In this modification, the selected path is identified by finding a path with the highest minimum AEF (max_min_AEF) value. The basis of this study is to compare the performance of the Hc and max_min_AEF as routing metrics for the DSR protocol in WMNs using the OPNET modeler. Performance comparisons between max_min_AEF, Metric Path (MP), and the well known ETT metrics are also carried out in this work. The results of this modification suggest that employing the max_min_AEF as a routing metric outperforms the Hc, ETT, and MP within the DSR protocol in WMNs in terms of throughput. This is because the max_min_AEF is based upon avoiding directing traffic through congested nodes where significant packet loss is likely to occur. This throughput improvement is associated with an increment in the delay time due to the long paths taken to avoid congested regions. To overcome this drawback, a further modification to the routing discovery mechanism has been made by imposing a hop count limit (HCL) on the discovered paths. Tuning the HCL allows the network manager to tradeoff throughput against delay. The choice of congestion avoidance metric exhibits another shortcoming owing to its dependency on the packet size. It penalises the smaller packets over large ones in terms of path lengths. This has been corrected for by introducing a ModAEF metric that explicitly considers the size of the packet. The ModAEF metric includes a tuning factor that allows the operator determine the level of the weighting that should be applied to the packet size to correct for this dependence

    Multimedia

    Get PDF
    The nowadays ubiquitous and effortless digital data capture and processing capabilities offered by the majority of devices, lead to an unprecedented penetration of multimedia content in our everyday life. To make the most of this phenomenon, the rapidly increasing volume and usage of digitised content requires constant re-evaluation and adaptation of multimedia methodologies, in order to meet the relentless change of requirements from both the user and system perspectives. Advances in Multimedia provides readers with an overview of the ever-growing field of multimedia by bringing together various research studies and surveys from different subfields that point out such important aspects. Some of the main topics that this book deals with include: multimedia management in peer-to-peer structures & wireless networks, security characteristics in multimedia, semantic gap bridging for multimedia content and novel multimedia applications
    • …
    corecore