263 research outputs found

    Distributed CSMA with pairwise coding

    Get PDF
    We consider distributed strategies for joint routing, scheduling, and network coding to maximize throughput in wireless networks. Network coding allows for an increase in network throughput under certain routing conditions. We previously developed a centralized control policy to jointly optimize for routing and scheduling combined with a simple network coding strategy using max-weight scheduling (MWS) [9]. In this work we focus on pairwise network coding and develop a distributed carrier sense multiple access (CSMA) policy that supports all arrival rates allowed by the network subject to the pairwise coding constraint. We extend our scheme to optimize for packet overhearing to increase the number of beneficial coding opportunities. Simulation results show that the CSMA strategy yields the same throughput as the optimal centralized policy of [9], but at the cost of increased delay. Moreover, overhearing provides up to an additional 25% increase in throughput on random topologies.United States. Dept. of Defense. Assistant Secretary of Defense for Research & EngineeringUnited States. Air Force (Air Force Contract FA8721-05-C-0002

    Computational Intelligence Inspired Data Delivery for Vehicle-to-Roadside Communications

    Get PDF
    We propose a vehicle-to-roadside communication protocol based on distributed clustering where a coalitional game approach is used to stimulate the vehicles to join a cluster, and a fuzzy logic algorithm is employed to generate stable clusters by considering multiple metrics of vehicle velocity, moving pattern, and signal qualities between vehicles. A reinforcement learning algorithm with game theory based reward allocation is employed to guide each vehicle to select the route that can maximize the whole network performance. The protocol is integrated with a multi-hop data delivery virtualization scheme that works on the top of the transport layer and provides high performance for multi-hop end-to-end data transmissions. We conduct realistic computer simulations to show the performance advantage of the protocol over other approaches

    Contention techniques for opportunistic communication in wireless mesh networks

    Get PDF
    Auf dem Gebiet der drahtlosen Kommunikation und insbesondere auf den tieferen Netzwerkschichten sind gewaltige Fortschritte zu verzeichnen. Innovative Konzepte und Technologien auf der physikalischen Schicht (PHY) gehen dabei zeitnah in zelluläre Netze ein. Drahtlose Maschennetzwerke (WMNs) können mit diesem Innovationstempo nicht mithalten. Die Mehrnutzer-Kommunikation ist ein Grundpfeiler vieler angewandter PHY Technologien, die sich in WMNs nur ungenügend auf die etablierte Schichtenarchitektur abbilden lässt. Insbesondere ist das Problem des Scheduling in WMNs inhärent komplex. Erstaunlicherweise ist der Mehrfachzugriff mit Trägerprüfung (CSMA) in WMNs asymptotisch optimal obwohl das Verfahren eine geringe Durchführungskomplexität aufweist. Daher stellt sich die Frage, in welcher Weise das dem CSMA zugrunde liegende Konzept des konkurrierenden Wettbewerbs (engl. Contention) für die Integration innovativer PHY Technologien verwendet werden kann. Opportunistische Kommunikation ist eine Technik, die die inhärenten Besonderheiten des drahtlosen Kanals ausnutzt. In der vorliegenden Dissertation werden CSMA-basierte Protokolle für die opportunistische Kommunikation in WMNs entwickelt und evaluiert. Es werden dabei opportunistisches Routing (OR) im zustandslosen Kanal und opportunistisches Scheduling (OS) im zustandsbehafteten Kanal betrachtet. Ziel ist es, den Durchsatz von elastischen Paketflüssen gerecht zu maximieren. Es werden Modelle für Überlastkontrolle, Routing und konkurrenzbasierte opportunistische Kommunikation vorgestellt. Am Beispiel von IEEE 802.11 wird illustriert, wie der schichtübergreifende Entwurf in einem Netzwerksimulator prototypisch implementiert werden kann. Auf Grundlage der Evaluationsresultate kann der Schluss gezogen werden, dass die opportunistische Kommunikation konkurrenzbasiert realisierbar ist. Darüber hinaus steigern die vorgestellten Protokolle den Durchsatz im Vergleich zu etablierten Lösungen wie etwa DCF, DSR, ExOR, RBAR und ETT.In the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY technologies rely on multi-user communication, so that the established abstraction of the network stack does not work well for WMNs. The scheduling problem in WMNs is inherent complex. Surprisingly, carrier sense multiple access (CSMA) in WMNs is asymptotically utility-optimal even though it has a low computational complexity and does not involve message exchange. Hence, the question arises whether CSMA and the underlying concept of contention allows for the assimilation of advanced PHY technologies into WMNs. In this thesis, we design and evaluate contention protocols based on CSMA for opportunistic communication in WMNs. Opportunistic communication is a technique that relies on multi-user diversity in order to exploit the inherent characteristics of the wireless channel. In particular, we consider opportunistic routing (OR) and opportunistic scheduling (OS) in memoryless and slow fading channels, respectively. We present models for congestion control, routing and contention-based opportunistic communication in WMNs in order to maximize both throughput and fairness of elastic unicast traffic flows. At the instance of IEEE 802.11, we illustrate how the cross-layer algorithms can be implemented within a network simulator prototype. Our evaluation results lead to the conclusion that contention-based opportunistic communication is feasible. Furthermore, the proposed protocols increase both throughput and fairness in comparison to state-of-the-art approaches like DCF, DSR, ExOR, RBAR and ETT

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Network coding aware queue management in multi-rate wireless networks

    Get PDF
    In this thesis we focus on network coding for unicast flows, in particular we take into consideration the COPE architecture. We study what happens when two nodes transmit with different rates and we propose a Markov chain to model this scenario. Furthermore, we propose a queue management algorithm to increase the coding opportunity and the throughput of the network. In COPE, a node codes two or more packets together when packets are headed to different nexthops. When there are just packets for the same nexthop, a node loses a coding opportunity. The queue management algorithm increases the coding opportunity prioritizing the channel access of sender nodes based on the queue information and on PER of the links. We simulate this algorithm on top of COPE in a multi rate scenario with NS 2 and we show that our algorithm yields throughput gains of up to 57\% compared to COP

    Position-Based Multicast for Mobile Ad-hoc Networks

    Get PDF
    In general, routing protocols for mobile ad-hoc networks (MANETs) can be classified into topology-based protocols and position-based protocols. While for unicast routing many proposals for both classes exist, the existing approaches to multicast routing basically implement topology-based algorithms and only a few of them make use of the geographic positions of the network nodes. These have in common that the sending node has to precalculate the multicast tree over which the packets are distributed and store it in each packet header. This involves two main issues: (a) These approaches are not very flexible with regard to topological changes which abandons the advantages that position-based routing has against topology-based routing, and (b) they do not scale with the number of receivers, since every one of them has to be named in the packet header. This thesis solves these issues and further advances position-based multicast routing. Position-Based Multicast (PBM) enhances the flexibility of position-based multicast routing by following the forwarding principle of position-based unicast routing. It transfers the choice of the next hops in the tree from the sender to the forwarding nodes. Based on the positions of their neighboring nodes, these are able to determine the most suitable next hop(s) at the moment when the packet is being forwarded. The scalability with respect to the number of receiving nodes in a group is solved by Scalable Position-Based Multicast (SPBM). It includes a membership management fulfilling different tasks at once. First, it administers group memberships in order to provide multicast sources with information on whether nodes are subscribed to a specific group. Second, it implements a location service providing the multicast sources with the positions of the subscribed receiver nodes. And third, it geographically aggregates membership data in order to achieve the desired scalability. The group management features two modes of operation: The proactive variant produces a bounded overhead scaling well with the size of the network. The reactive alternative, in contrast, reaches low worst-case join delays but does not limit the overhead. Contention-Based Multicast Forwarding (CBMF) addresses the problems that appear in highly mobile networks induced by outdated position information. Instead of basing forwarding decisions on a perception that may no longer be up to date, the packets are addressed only to the final destination; no explicit next hops are specified. The receiving nodes, which are candidate next hops, then decide by means of contention which of them are the most suitable next hop(s) for a packet. Not only is the decision made based on the most currently available data, but this procedure also saves the regular sending of beacon messages, thus reducing the overhead. The lack of multicast congestion control is another unsolved problem obstructing high-bandwidth data transmission. Sending out more and more packets to a multicast group lets the performance decrease. Backpressure Multicast Congestion Control (BMCC) takes care that the network does not need to handle more packets than it is able to. It achieves this by limiting the packet queues on the intermediate hops. A forwarder may not forward the next packet of a stream before it has noticed---by overhearing the transmission of the next hop---that the previous packet has succeeded. If there is congestion in an area, backpressure is implicitly built up towards the source, which then stops sending out packets until the congestion is released. BMCC takes care that every receiving node will receive packets at the same rate. An alternative mode of operation, BMCC with Backpressure Pruning (BMCC-BP) allows the cutting of congested branches for single packets, permitting a higher rate for uncongested receivers. Besides presenting protocols for multicast communication in MANETs, this thesis also describes implementations of two of the above-mentioned protocols. The first one is an implementation of SPBM for the Linux kernel that allows IP applications to send data via UDP to a group of receivers in an ad-hoc network. The implementation resides between the MAC layer and the network/IP layer of the network stack. It is compatible with unmodified standard kernels of versions 2.4 and 2.6, and may be compiled for x86 or ARM processor architectures. The second implementation is an implementation of CBMF for the ScatterWeb MSB430 sensor nodes. Due to their low-level programmability they allow an integration of the routing protocol with the medium access control. The absence of periodic beacon messages makes the protocol especially suitable for energy-constrained sensor networks. Furthermore, other constraints like limited memory and computational power demand special consideration as well

    Wireless Multi Hop Access Networks and Protocols

    Get PDF
    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points to the Internet are available, and the mobile node roams to a new access point, the node has to make a decision when and how to change its point of attachment. The thesis describes how to consider the rapid fluctuations of the wireless medium, how to handle the fact that other nodes on the path to the access point are also mobile which results in frequent link and route breaks, and the impact the change of attachment has on already existing connections. Medium access and routing protocols have been developed that consider both the long term and the short term variations of a mobile wireless network. The long term variations consider the fact that as nodes are mobile, links will frequently break and new links appear and thus the network topology map is constantly redrawn. The short term variations consider the rapid fluctuations of the wireless channel caused by mobility and multi path propagation deviations. In order to achieve diversity forwarding, protocols are presented which consider the network topology and the state of the wireless channel when decisions about forwarding need to be made. The medium access protocols are able to perform multi dimensional fast link adaptation on a per packet level with forwarding considerations. This i ncludes power, rate, code and channel adaptation. This will enable the type of performance improvements that are of significant importance for the success of multi hop wireless networks
    • …
    corecore