1,058 research outputs found

    Modeling, Analysis and Impact of a Long Transitory Phase in Random Access Protocols

    Get PDF
    In random access protocols, the service rate depends on the number of stations with a packet buffered for transmission. We demonstrate via numerical analysis that this state-dependent rate along with the consideration of Poisson traffic and infinite (or large enough to be considered infinite) buffer size may cause a high-throughput and extremely long (in the order of hours) transitory phase when traffic arrivals are right above the stability limit. We also perform an experimental evaluation to provide further insight into the characterisation of this transitory phase of the network by analysing statistical properties of its duration. The identification of the presence as well as the characterisation of this behaviour is crucial to avoid misprediction, which has a significant potential impact on network performance and optimisation. Furthermore, we discuss practical implications of this finding and propose a distributed and low-complexity mechanism to keep the network operating in the high-throughput phase.Comment: 13 pages, 10 figures, Submitted to IEEE/ACM Transactions on Networkin

    SDDV: scalable data dissemination in vehicular ad hoc networks

    Get PDF
    An important challenge in the domain of vehicular ad hoc networks (VANET) is the scalability of data dissemination. Under dense traffic conditions, the large number of communicating vehicles can easily result in a congested wireless channel. In that situation, delays and packet losses increase to a level where the VANET cannot be applied for road safety applications anymore. This paper introduces scalable data dissemination in vehicular ad hoc networks (SDDV), a holistic solution to this problem. It is composed of several techniques spread across the different layers of the protocol stack. Simulation results are presented that illustrate the severity of the scalability problem when applying common state-of-the-art techniques and parameters. Starting from such a baseline solution, optimization techniques are gradually added to SDDV until the scalability problem is entirely solved. Besides the performance evaluation based on simulations, the paper ends with an evaluation of the final SDDV configuration on real hardware. Experiments including 110 nodes are performed on the iMinds w-iLab.t wireless lab. The results of these experiments confirm the results obtained in the corresponding simulations

    Multipath streaming: fundamental limits and efficient algorithms

    Get PDF
    We investigate streaming over multiple links. A file is split into small units called chunks that may be requested on the various links according to some policy, and received after some random delay. After a start-up time called pre-buffering time, received chunks are played at a fixed speed. There is starvation if the chunk to be played has not yet arrived. We provide lower bounds (fundamental limits) on the starvation probability of any policy. We further propose simple, order-optimal policies that require no feedback. For general delay distributions, we provide tractable upper bounds for the starvation probability of the proposed policies, allowing to select the pre-buffering time appropriately. We specialize our results to: (i) links that employ CSMA or opportunistic scheduling at the packet level, (ii) links shared with a primary user (iii) links that use fair rate sharing at the flow level. We consider a generic model so that our results give insight into the design and performance of media streaming over (a) wired networks with several paths between the source and destination, (b) wireless networks featuring spectrum aggregation and (c) multi-homed wireless networks.Comment: 24 page

    Models and Performance of VANET based Emergency Braking

    Get PDF
    The network research community is working in the field of automotive to provide VANET based safety applications to reduce the number of accidents, deaths, injuries and loss of money. Several approaches are proposed and investigated in VANET literature, but in a completely network-oriented fashion. Most of them do not take into account application requirements and no one considers the dynamics of the vehicles. Moreover, message repropagation schemes are widely proposed without investigating their benefits and using very complicated approaches. This technical report, which is derived from the Master Thesis of Michele Segata, focuses on the Emergency Electronic Brake Lights (EEBL) safety application, meant to send warning messages in the case of an emergency brake, in particular performing a joint analysis of network requirements and provided application level benefits. The EEBL application is integrated within a Collaborative Adaptive Cruise Control (CACC) which uses network-provided information to automatically brake the car if the driver does not react to the warning. Moreover, an information aggregation scheme is proposed to analyze the benefits of repropagation together with the consequent increase of network load. This protocol is compared to a protocol without repropagation and to a rebroadcast protocol found in the literature (namely the weighted p-persistent rebroadcast). The scenario is a highway stretch in which a platoon of vehicles brake down to a complete stop. Simulations are performed using the NS_3 network simulation in which two mobility models have been embedded. The first one, which is called Intelligent Driver Model (IDM) emulates the behavior of a driver trying to reach a desired speed and braking when approaching vehicles in front. The second one (Minimizing Overall Braking Induced by Lane change (MOBIL)), instead, decides when a vehicle has to change lane in order to perform an overtake or optimize its path. The original simulator has been modified by - introducing real physical limits to naturally reproduce real crashes; - implementing a CACC; - implementing the driver reaction when a warning is received; - implementing different network protocols. The tests are performed in different situations, such as different number of lanes (one to five), different average speeds, different network protocols and different market penetration rates and they show that: - the adoption of this technology considerably decreases car accidents since the overall average maximum deceleration is reduced; - network load depends on application-level details, such as the implementation of the CACC; - VANET safety application can improve safety even with a partial market penetration rate; - message repropagation is important to reduce the risk of accidents when not all vehicles are equipped; - benefits are gained not only by equipped vehicles but also by unequipped ones

    A thorough analysis of the performance of delay distribution models for IEEE 802.11 DCF

    Get PDF
    International audienceDeriving the complete distribution of the end-to-end delay in a wireless multi-hop network is of paramount interest when delay-sensitive flows have to be conveyed over such networks. First works have proposed models to derive the total delay distribution of networks assuming the well-known IEEE802.11 DCF medium access (MAC) protocol. Current derivations can be decomposed into two main steps: (i) the calculation of the total delay probability generating function (PGF) and (ii) its numerical inversion. We show in this paper that there is a need for a thorough performance evaluation of these models since both steps introduce errors, naming modeling and inversion errors. We argue that both types of errors have to be analyzed separately to characterize the accuracy of the analytical derivations of the literature. Therefore, this paper defines two performance evaluation metrics that measure the magnitude of both types of errors. Both metrics are illustrated to select and optimize the most accurate model to calculate the single-hop end-to-end delay distribution of nodes using the IEEE802.11 DCF MAC protocol. The most accurate model is extended to calculate the end-to-end delay distribution for a 2-hop wireless communication

    Towards a Practical and Fair Rate Allocation for Multihop Wireless Networks based on a Simple Node Model

    Get PDF
    IEEE 802.11 is often considered as the underlying wireless technology of multihop wireless networks. But the use of 802.11 in such networks raises issues, like efficiency and/or fairness issues. Different kinds of solutions have been proposed to overcome these problems. One approach is to design new MAC protocols that provide alternatives to the IEEE 802.11 MAC protocol. Although these solutions are of some interest, it should probably take some time before new wireless network interface cards based on one of these solutions are developed and released. Another approach is to consider that 802.11 will remain the underlying wireless technology and to design solutions above it. Several solutions based on rate allocation have been proposed so far. The main drawback of the proposed solutions is that they rely on a radio medium sharing model that is difficult to compute in a wireless, distributed and mobile environment. Indeed, very few of these solutions have been derived into a network protocol. In this article, we propose a distributed and dynamic rate allocation solution that is based on a simple sharing model. Due to its simplicity, we can derive a network protocol that can be practically used in multihop wireless networks. This protocol provides a fair bandwidth sharing between end-to-end flows while maintaining an efficient overall throughput in the network. This solution has been implemented in NS2 and evaluated by simulations

    Sensorsimulator: simulation framework for sensor networks

    Get PDF
    Wireless sensor networks have the potential to become significant subsystems of engineering applications. Before relegating important and safety-critical tasks to such subsystems, it is necessary to understand the dynamic behavior of these subsystems in simulation environments. There is an urgent need to develop a simulation platform that is useful to explore both the networking issues and the distributed computing aspects of wireless sensor networks. Current approaches to simulating wireless sensor networks largely focus on the networking issues. These approaches use well-known network simulation tools that are often difficult to extend to explore distributed computing issues. Discrete-event simulation is a trusted platform for modeling and simulation of a variety of systems. SensorSimulator is a discreet event simulation framework for sensor networks built over OMNeT++. It is a customizable and an extensible framework for wireless sensor network simulation. This framework allows the user to debug and test software for distributed sensor networks independent of hardware constraints. The extensibility of SensorSimulator allows developers and researchers to investigate topological, phenomenological, networking, robustness and scaling issues, to explore arbitrary algorithms for distributed sensors, and to defeat those algorithms through simulated failure. The framework provides modules for various layers. Applications can be implemented by using these framework modules by sub classing the framework classes and customizing their behavior at various network layers. We validate and demonstrate the usability of these capabilities through analyzing the simulation results of Directed Diffusion and GEAR. A comparison study of performance of SensorSimulator v/s NS2 for various network densities and traffic have shown that SensorSimulator is able to achieve higher scalability and requires less time for execution

    Flow Control in Wireless Ad-hoc Networks

    Get PDF
    We are interested in maximizing the Transmission Control Protocol (TCP) throughput between two nodes in a single cell wireless ad-hoc network. For this, we follow a cross-layer approach by first developing an analytical model that captures the effect of the wireless channel and the MAC layer to TCP. The analytical model gives the time evolution of the TCP window size which is described by a stochastic differential equation driven by a point process. The point process represents the arrival of acknowledgments sent by the TCP receiver to the sender as part of the self-regulating mechanism of the flow control protocol. Through this point process we achieve a cross-layer integration between the physical layer, the MAC layer and TCP. The intervals between successive points describe how the packet drops at the wireless channel and the delays because of retransmission at the MAC layer affect the window size at the TCP layer. We fully describe the statistical behavior of the point process by computing first the p.d.f. for the inter-arrival intervals and then the compensator and the intensity of the process parametrized by the quantities that describe the MAC layer and the wireless channel. To achieve analytical tractability we concentrate on the pure (unslotted) Aloha for the MAC layer and the Gilbert-Elliott model for the channel. Although the Aloha protocol is simpler than the more popular IEEE 802.11 protocol, it still exhibits the same exponential backoff mechanism which is a key factor for the performance of TCP in a wireless network. Moreover, another reason to study the Aloha protocol is that the protocol and its variants gain popularity as they are used in many of today's wireless networks. Using the analytical model for the TCP window size evolution, we try to increase the TCP throughput between two nodes in a single cell network. We want to achieve this by implicitly informing the TCP sender of the network conditions. We impose this additional constraint so we can achieve compatibility between the standard TCP and the optimized version. This allows the operation of both protocol stacks in the same network. We pose the optimization problem as an optimal stopping problem. For each packet transmitted by the TCP sender to the network, an optimal time instance has to be computed in the absence of an acknowledgment for this packet. This time instance indicates when a timeout has to be declared for the packet. In the absence of an acknowledgment, if the sender waits long for declaring a timeout, the network is underutilized. If the sender declares a timeout soon, it minimizes the transmission rate. Because of the analytical intractability of the optimal stopping time problem, we follow a Markov chain approximation method to solve the problem numerically
    • …
    corecore