549 research outputs found
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected transmission delay effects. Through analytic modeling and simulation, the impact of this interference is determined to identify all facets of the interference issues. Results show that Bluetooth-induced transmission delays improve network performance in many scenarios. When isolating delay effects, the likelihood that WLAN STA signals collide with each other decreases, causing an overall increase in normalized throughput and decrease in expected delay for many network configurations. As wireless communication technologies become an integral part of national defense, it is imperative to understand every performance characteristic. For instance, if the Air Force uses IEEE 802.11 and wants to incorporate a Bluetooth piconet as well, the impact of concurrent operation should be known beforehand. Since IEEE 802.11 and Bluetooth technologies could become vital for the Air Force to maintain its position of air superiority, all the strengths, weaknesses, and limitations of these systems should be understood
Quality aspects of Internet telephony
Internet telephony has had a tremendous impact on how people communicate.
Many now maintain contact using some form of Internet telephony.
Therefore the motivation for this work has been to address the quality aspects
of real-world Internet telephony for both fixed and wireless telecommunication.
The focus has been on the quality aspects of voice communication,
since poor quality leads often to user dissatisfaction. The scope of the work
has been broad in order to address the main factors within IP-based voice
communication.
The first four chapters of this dissertation constitute the background
material. The first chapter outlines where Internet telephony is deployed
today. It also motivates the topics and techniques used in this research.
The second chapter provides the background on Internet telephony including
signalling, speech coding and voice Internetworking. The third chapter
focuses solely on quality measures for packetised voice systems and finally
the fourth chapter is devoted to the history of voice research.
The appendix of this dissertation constitutes the research contributions.
It includes an examination of the access network, focusing on how calls are
multiplexed in wired and wireless systems. Subsequently in the wireless
case, we consider how to handover calls from 802.11 networks to the cellular
infrastructure. We then consider the Internet backbone where most of our
work is devoted to measurements specifically for Internet telephony. The
applications of these measurements have been estimating telephony arrival
processes, measuring call quality, and quantifying the trend in Internet telephony
quality over several years. We also consider the end systems, since
they are responsible for reconstructing a voice stream given loss and delay
constraints. Finally we estimate voice quality using the ITU proposal PESQ
and the packet loss process.
The main contribution of this work is a systematic examination of Internet
telephony. We describe several methods to enable adaptable solutions
for maintaining consistent voice quality. We have also found that relatively
small technical changes can lead to substantial user quality improvements.
A second contribution of this work is a suite of software tools designed to
ascertain voice quality in IP networks. Some of these tools are in use within
commercial systems today
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks
Enhancing the Physical Layer in V2V Communication Using OFDM - MIMO Techniques
Vehicular Ad hoc network (VANET) has recently been attracting the attention of researchers as a new technology in the wireless communication system. Vehicle-to-vehicle V2V communication can be considered an important way to help the drivers to satisfy requirements such as less congestion, accident warning, road exploration, etc. The propagation issues such as multipath fading significantly affect the reliability of V2V communication. The goal of this work is to enhance the performance of the physical layer PHY in V2V communication. However, the cellular phone channel has been used to evaluate the possibility of apply it in the vehicular communication V2V. The simulation results observed that the transmitted signal is affected by a multipath fading channel. In order to overcome this problem two techniques are used: Orthogonal Frequency Division Multiplexing (OFDM) technique and Multiple-Input-MultipleOutput (MIMO) diversity technique. The simulation results showed that the OFDM technique overcomes the multipath fading with high transmission power. On the other hand, MIMO diversity technique called Alamouti Space-Time Code for two transmitters and two receivers (MIMO 2x2) is used to improve the error degradation with less transmission power
Recommended from our members
Robust, Resilient Networked Communication in Challenged Environments
In challenged environments, digital communication infrastructure may be difficult or even impossible to access. This is especially true in rural and developing regions, as well as in any region during a time of political or environmental crisis. We advance the state of the art in wireless networking and security to design networks and applications that rapidly assess changing networking conditions to restore communication and provide local situational awareness. This dissertation examines new systems for responding to current and emerging needs for wireless networks. This work looks across the wireless ecosystem of widely deployed standards. We develop new tools to improve network assessment and to provide robust and reliable network communication. By incorporating new technological breakthroughs, such as the wide commercial success of Unmanned Aircraft Systems (UAS), we introduce novel methods and systems for existing wireless standards for these challenged networks. We assess how existing technologies and standards function in difficult environments: lacking end-end Internet connectivity, experiencing overload or other resource constraints, and operating in three dimensional space. Through this lens, we demonstrate how to optimize networks to serve marginalized communities outside of first world urban cities and make our networks resilient to natural and political crisis that threaten communication
Collaboration Enforcement In Mobile Ad Hoc Networks
Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost
Radio Network Planning and Propagation Models for Urban and Indoor Wireless Communication Networks
As the growing demand for mobile communications is constantly increasing, the need for better coverage, improved capacity, and higher transmission quality rises. Thus, a more efficient use of the radio spectrum and communication systems availability are required. This chapter presents EM propagation models most commonly used for the design of wireless communication systems, computer networks WLAN and WPAN for urban and/or in indoor environments. The review of commercial or University computer codes to assist design of WLAN and WPAN networks were done. An example of computer design and simulation of indoor Bluetooth and WLAN communication systems, in the building of Wroclaw University of Science and Technology, Wroclaw, Poland is shown in Chapter 8
Performance improvement in mobile ad-hoc networks.
The objective of this research is to enhance the network performance under realistic mobile ad-hoc networks environments without modification of the standard. Overview of this research is summarized as follows:
First, a packet-fragmentation technique to improve network throughput under the worst channel
conditions is proposed. While the conventional packet-fragmentation technique research focuses only on random-bit errors, the proposed technique employs both random bit errors and hidden-node collisions. The analytical models based on Markov-chain model shows that the optimal fragmentation technique can effectively reduce the number of retransmissions caused by both collisions from hidden nodes and corrupted packets by random bit errors, and eventually improving throughput in noisy VANETs channels.
As a second contribution, a dynamic service-channel allocation (DSCA) scheme is proposed to maximize the network throughput by dynamically assigning different service channels to the users. The theoretical analysis in this thesis will consider wireless access in the vehicular environment (WAVE) protocol, which is the main characteristic of the vehicular ad-hoc networks standard (the IEEE 802.11p).
To summarize, the main contribution of this research is that two schemes will improve the network throughput significantly without modification of the standard. Therefore, there is no implementation issue to deploy the proposed schemes in real devices.PhDCommittee Chair: Copeland, John; Committee Co-Chair: Chang, Yusun; Committee Member: Ammar, Mostafa; Committee Member: Beyah, Raheem; Committee Member: Owen, Henry; Committee Member: Taylor, Davi
Cooperative communication in wireless networks: algorithms, protocols and systems
Current wireless network solutions are based on a link abstraction where a
single co-channel transmitter transmits in any time duration. This model severely
limits the performance that can be obtained from the network. Being inherently an
extension of a wired network model, this model is also incapable of handling the
unique challenges that arise in a wireless medium. The prevailing theme of this
research is to explore wireless link abstractions that incorporate the broadcast and
space-time varying nature of the wireless channel. Recently, a new paradigm for
wireless networks which uses the idea of 'cooperative transmissions' (CT) has garnered
significant attention. Unlike current approaches where a single transmitter transmits
at a time in any channel, with CT, multiple transmitters transmit concurrently after
appropriately encoding their transmissions. While the physical layer mechanisms for
CT have been well studied, the higher layer applicability of CT has been relatively
unexplored. In this work, we show that when wireless links use CT, several network
performance metrics such as aggregate throughput, security and spatial reuse can
be improved significantly compared to the current state of the art. In this context,
our first contribution is Aegis, a framework for securing wireless networks against
eavesdropping which uses CT with intelligent scheduling and coding in Wireless Local
Area networks. The second contribution is Symbiotic Coding, an approach to encode
information such that successful reception is possible even upon collisions. The third
contribution is Proteus, a routing protocol that improves aggregate throughput in
multi-hop networks by leveraging CT to adapt the rate and range of links in a flow.
Finally, we also explore the practical aspects of realizing CT using real systems.PhDCommittee Chair: Sivakumar, Raghupathy; Committee Member: Ammar, Mostafa; Committee Member: Ingram, Mary Ann; Committee Member: Jayant, Nikil; Committee Member: Riley, Georg
- …