64 research outputs found

    A Greedy Reclaiming Scheduler for IEEE 802.11e HCCA Real-Time Networks

    Get PDF
    The IEEE 802.11e standard introduces Quality of Service (QoS) support for wireless local area networks and suggests how to design a tailored HCF Controlled Channel Access (HCCA) scheduler. However the reference scheduling algorithm is suitable to assure service guarantees only for Constant Bit Rate traffic streams, whereas shows its limits for Variable Bit Rate traffic. Despite the numerous alternative schedulers proposed to improve the QoS support for multimedia applications, in the case of VBR traffic satisfactory real-time performance has not been yet achieved. This paper presents a new scheduling algorithm, Unused Time Shifting Scheduler (UTSS). It integrates a mechanism for bandwidth reclaiming into a HCCA real-time scheduler. UTSS assigns the unused portion of each transmission opportunity to the next scheduled traffic stream. Thanks to such feature, traffic variability is absorbed, reducing the waste of resources. The analytical evaluation, corroborated by the simulation results, shows that UTSS is suitable to reduce the delay experienced by VBR traffic streams and to increase the maximum burstiness sustainable by the network

    A IEEE 802.11e HCCA Scheduler with a Reclaiming Mechanism for Multimedia Applications

    Get PDF
    The QoS offered by the IEEE 802.11e reference scheduler is satisfactory in the case of Constant Bit Rate traffic streams, but not yet in the case of Variable Bit Rate traffic streams, whose variations stress its scheduling behavior. Despite the numerous proposed alternative schedulers with QoS, multimedia applications are looking for refined methods suitable to ensure service differentiation and dynamic update of protocol parameters. In this paper a scheduling algorithm,Unused Time Shifting Scheduler(UTSS), is deeply analyzed. It is designed to cooperate with a HCCA centralized real-time scheduler through the integration of a bandwidth reclaiming scheme, suitable to recover nonexhausted transmission time and assign that to the next polled stations. UTSS dynamically computes with anO(1)complexity transmission time providing an instantaneous resource overprovisioning. The theoretical analysis and the simulation results highlight that this injection of resources does not affect the admission control nor the centralized scheduler but is suitable to improve the performance of the centralized scheduler in terms of mean access delay, transmission queues length, bursts of traffic management, and packets drop rate. These positive effects are more relevant for highly variable bit rate traffic

    Performance modelling of network management schemes for mobile wireless networks

    Get PDF

    Enabling Dynamic Spectrum Allocation in Cognitive Radio Networks

    Get PDF
    The last decade has witnessed the proliferation of innovative wireless technologies, such asWi-Fi, wireless mesh networks, operating in unlicensed bands. Due to the increasing popularity and the wide deployments of these technologies, the unlicensed bands become overcrowded. The wireless devices operating in these bands interfere with each other and hurt the overall performance. To support fast growths of wireless technologies, more spectrums are required. However, as most "prime" spectrum has been allocated, there is no spectrum available to expand these innovative wireless services. Despite the general perception that there is an actual spectral shortage, the recent measurement results released by the FCC (Federal Communications Commission) show that on average only 5% of the spectrum from 30MHz to 30 GHz is used in the US. This indicates that the inefficient spectrum usage is the root cause of the spectral shortage problem. Therefore, this dissertation is focused on improving spectrum utilization and efficiency in tackling the spectral shortage problem to support ever-growing user demands for wireless applications. This dissertation proposes a novel concept of dynamic spectrum allocation, which adaptively divides available spectrum into non-overlapping frequency segments of different bandwidth considering the number of potentially interfering transmissions and the distribution of traffic load in a local environment. The goals are (1) to maximize spectrum efficiency by increasing parallel transmissions and reducing co-channel interferences, and (2) to improve fairness across a network by balancing spectrum assignments. Since existing radio systems offer very limited flexibility, cognitive radios, which can sense and adapt to radio environments, are exploited to support such a dynamic concept. We explore two directions to improve spectrum efficiency by adopting the proposed dynamic allocation concept. First, we build a cognitive wireless system called KNOWS to exploit unoccupied frequencies in the licensed TV bands. KNOWS is a hardware-software platform that includes new radio hardware, a spectrum-aware MAC (medium access control) protocol and an algorithm for implementing the dynamic spectrum allocation. We show that KNOWS accomplishes a remarkable 200% throughput gain over systems based on fixed allocations in common cases. Second, we enhance Wireless LANs (WLANs), the most popular network setting in unlicensed bands, by proposing a dynamic channelization structure and a scalable MAC design. Through analysis and extensive simulations, we show that the new channelization structure and the scalable MAC design improve not only network capacity but per-client fairness by allocating channels of variable width for access points in a WLAN. As a conclusion, we believe that our proposed concept of dynamic spectrum allocation lays down a solid foundation for building systems to efficiently use the invaluable spectrum resource

    Improving the QoS of IEEE 802.11e networks through imprecise computation

    Get PDF
    IEEE 802.11e HCCA reference scheduler is based on fixed value parameters that do not adapt to traffic changes, thus quality of service (QoS) for multimedia applications is a challenge, especially in the case of variable bit rate (VBR) streams, that requires dynamic resource assignment. This paper is focused on immediate dynamic TXOP HCCA (IDTH) scheduling algorithm and its new evolution immediate dynamic TXOP HCCA plus (IDTH+). Their reclaiming mechanisms, refined by the monitoring of transmission duration, aim at overcoming the limits of fixed preallocation of resources by varying the stations transmission time and avoiding waste of resources. Simulations and theoretical analysis based on the imprecise computation model show that the integration of IDTH and IDTH+ can achieve improved network performance in terms of transmission queues length, mean access delay and packets drop rate, and to efficiently manage bursty traffic. Moreover, the performance improvements of IDTH+ with respect to IDTH are highlighted

    Synchronization of hierarchical data

    Get PDF
    Synchronizace a přenos komplexních dat po síti může být náročným problémem. Společnost Pocket Virtuality potřebovala řešení pro svou platformu pro vzdálenou přítomnost, která by poskytovala synchronizační služby mezi zařízeními v této platformě. Tato zařízení musí mít možnost rychle a snadno vyměňovat velká a komplexní hierarchická data ve formě grafů scén obsahujících 3D modely, textury a další binární data a synchronizovat kopie těchto struktur na jiných zařízeních. Tato práce se zabývá analýzou stávajícího prostředí platformy Fata Morgana a jejích požadavků. Tato analýza je pak základem pro seznam funkčních a nefunkčních požadavků na síťové řešení. Knihovna FMLink je výsledkem fáze návrhu a implementace této práce. Jedná se o síťovou knihovnu navrženou pro více platforem, vysoce efektivní a odolnou vůči zhoršeným síťovým podmínkám. Pro splnění bezpečnostních požadavků poskytuje FMLink podporu kryptografického protokolu TLS. Tato knihovna je testována proti mnoha možným degradacím sítě a testována v různých emulovaných síťových podmínkách. Testy prokázaly, že knihovna může být nasazena a použita mnoha aplikacemi v platormě Fata Morgana.Synchronization and transfer of complex data over the network can be a challenging problem. The company Pocket Virtuality needed a solution for its remote-presence platform, which would provide synchronization services between the devices in this platform. These devices need to quickly and easily exchange large and complex hierarchical data in the form of the scene graphs containing 3D models, textures, and other binary data and synchronize copies of these structures on other devices. \par This thesis revolves around the analysis of the existing environment of the Fata Morgana platform and its requirements. This analysis is then the basis for the list of functional and non-functional requirements of the networking solution. \par The FMLink library is the result of the design and implementation phase of this thesis. It is a networking library designed to be multi-platform, highly efficient, and resistant to degraded network conditions. To satisfy the security requirements, FMLink provides support for the TLS cryptographic protocol. \par This library is tested against multiple possible network degradations and tested in various emulated network conditions. The tests proved the library can be deployed and used by many Fata Morgana applications

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient

    Resource Management in Cognitive Radio Networks

    Get PDF
    In the last decade, the world has witnessed rapid increasing applications of wireless networks. However, with the fixed spectrum allocation policy that has been used since the beginning of the spectrum regulation to assign different spectrum bands to different wireless applications, it has been observed that most of the allocated spectrum bands are underutilized. Therefore, if these bands can be opportunistically used by new emerging wireless networks, the spectrum scarcity can be resolved. Cognitive Radio (CR) is a revolutionary and promising technology that can identify and then exploit the spectrum opportunities. In Cognitive Radio Networks (CRNs), the spectrum can be utilized by two kinds of users: Primary Users (PUs) having exclusive licenses to use certain spectrum bands for specific wireless applications, and Secondary Users (SUs) having no spectrum licenses but seeking for any spectrum opportunities. The SUs can make use of the licensed unused spectrum if they do not make any harmful interference to the PUs. However, the variation of the spectrum availability over the time and locations, due to the coexistence with the PUs, and the spread of the spectrum opportunities over wide spectrum bands create a unique trait of the CRNs. This key trait poses great challenges in different aspects of the radio resource management in CRNs such as the spectrum sensing, spectrum access, admission control, channel allocation, Quality-of-Service (QoS) provisioning, etc. In this thesis, we study the resource management of both single-hop and multi-hop CRNs. Since most of the new challenges in CRNs can be tackled by designing an efficient Medium Access Control (MAC) framework, where the solutions of these challenges can be integrated for efficient resource management, we firstly propose a novel MAC framework that integrates a kind of cooperative spectrum sensing method at the physical layer into a cooperative MAC protocol considering the requirements of both the SUs and PUs. For spectrum identification, a computationally simple but efficient sensing algorithm is developed, based on an innovative deterministic sensing policy, to assist each sensing user for identifying the optimum number of channels to sense and the optimum sensing duration. We then develop an admission control scheme and channel allocation policy that can be integrated in the proposed MAC framework to regulate the number of sensing users and number of access users; therefore, the spectrum identification and exploitation can be efficiently balanced. Moreover, we propose a QoS-based spectrum allocation framework that jointly considers the QoS provisioning for heterogeneous secondary Real-Time (RT) and Non-Real Time (NRT) users with the spectrum sensing, spectrum access decision, and call admission control. We analyze the proposed QoS-based spectrum allocation framework and find the optimum numbers of the RT and NRT users that the network can support. Finally, we introduce an innovative user clustering scheme to efficiently manage the spectrum identification and exploitation in multi-hop ad hoc CRNs. We group the SUs into clusters based on their geographical locations and occurring times and use spread spectrum techniques to facilitate using one frequency for the Common Control Channels (CCCs) of the whole secondary network and to reduce the co-channel interference between adjacent clusters by assigning different spreading codes for different clusters. The research results presented in this thesis contribute to realize the concept of the CRNs by developing a practical MAC framework, spectrum sensing, spectrum allocation, user admission control, and QoS provisioning for efficient resource management in these promising networks

    Remote Shutdown of Heavy Duty Vehicles

    Get PDF
    Today, vehicles are equipped with advanced electronics and complex alarm systems but still vehicle and cargo theft is a huge problem around the world. After struggling with this issue for several decades, the government in Brazil finally had enough and voted that all new vehicles manufactured or imported to the country are required to be equipped with an electronic device enabling tracking and immobilization of the vehicle if stolen. Remote immobilization could be a possible solution to prevent vehicle theft and also give the authorities a way to reclaim valuable cargo from stolen vehicles. Since Scania was already developing a telematic unit with the purpose of tracking vehicles and analyzing vehicle data, this thesis was started to investigate if it was possible to use the unit and the current system for remote immobilization as well. Security of the system would be the key issue since a flaw in security could give unauthorized access to stop vehicles and this would certainly be a disaster. A prototype system was created to test the reliability and performance of the system
    corecore