356 research outputs found

    MELOC - memory and location optimized caching for mobile Ad hoc networks

    Get PDF
    The advancement of Mobile ad hoc networks (MANET) is tremendous in the field of social and military applications. Caching and Replication are the two common techniques used to improve data access efficiency in Mobile Ad hoc networks. Caching favors data access efficiency by bringing data closer to the source. Existing caching approaches are deficient in reducing the number of cache locations, thus reducing the number of copies, which is needed for many mission critical applications considering safety and security. Conversely, reducing the number of caches should not affect the efficiency of data access. We design an efficient broker based caching model named Memory and Location Optimized Caching (MELOC) , which reduces the number of cache locations, and at the same time preserves data access efficiency. Our caching model mostly chooses centrally located nodes as cache location. In addition, we cache only essential data closer to the source, saving memory. Hence our approach bears the name Memory and Location Optimized caching (MELOC) . Our initial MELOC model suits only small MANET topology of 30 nodes. We further extend our initial caching model to suit large MANET topology of 100 nodes by overcoming certain disadvantages pertaining to large network topology --Abstract, page iv

    Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas

    Get PDF
    International audienceThe response time to emergency situations in urban areas is considered as a crucial key in limiting material damage or even saving human lives. Thanks to their "bird's eye view" and their flexible mobility, Unmanned Aerial Vehicles (UAVs) can be a promising candidate for several vital applications. Under these perspectives, we investigate the use of communicating UAVs to detect any incident on the road, provide rescue teams with their exact locations, and plot the fastest path to intervene, while considering the constraints of the roads. To efficiently inform the rescue services, a robust routing scheme is introduced to ensure a high level of communication stability based on an efficient backbone, while considering both the high mobility and the restricted energy capacity of UAVs. This allows both predicting any routing path breakage prior to its occurrence, and carrying out a balanced energy consumption among UAVs. To ensure a rapid intervention by rescue teams, UAVs communicate in an ad hoc fashion with existing vehicles on the ground to estimate the fluidity of the roads. Our system is implemented and evaluated through a series of experiments. The reported results show that each part of the system reliably succeeds in achieving its planned objective

    GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration

    Get PDF
    This work was supported by ‘The Cross-Ministry Giga KOREA Project’ grant from the Ministry of Science, ICT and Future Planning, Korea. Also, it was in part supported by the Soonchunhyang University Research Fund.With a more Internet-savvy and sophisticated user base, there are more demands for interactive applications and services. However, it is a challenge for existing radio access networks (e.g. 3G and 4G) to cope with the increasingly demanding requirements such as higher data rates and wider coverage area. One potential solution is the inter-collaborative deployment of multiple radio devices in a 5G setting designed to meet exacting user demands, and facilitate the high data rate requirements in the underlying networks. These heterogeneous 5G networks can readily resolve the data rate and coverage challenges. Networks established using the hybridization of existing networks have diverse military and civilian applications. However, there are inherent limitations in such networks such as irregular breakdown, node failures, and halts during speed transmissions. In recent years, there have been attempts to integrate heterogeneous 5G networks with existing ad hoc networks to provide a robust solution for delay-tolerant transmissions in the form of packet switched networks. However, continuous connectivity is still required in these networks, in order to efficiently regulate the flow to allow the formation of a robust network. Therefore, in this paper, we present a novel network formation consisting of nodes from different network maneuvered by Unmanned Aircraft (UA). The proposed model utilizes the features of a biological aspect of genomes and forms a delay tolerant network with existing network models. This allows us to provide continuous and robust connectivity. We then demonstrate that the proposed network model has an efficient data delivery, lower overheads and lesser delays with high convergence rate in comparison to existing approaches, based on evaluations in both real-time testbed and simulation environment.Yeshttp://www.plosone.org/static/editorial#pee

    Prospects of peer-to-peer SIP for mobile operators

    Get PDF
    Tämän diplomityön tarkoituksena on esitellä kehitteillä oleva Peer-to-Peer Session Initiation Protocol (P2PSIP), jonka avulla käyttäjät voivat itsenäisesti ja helposti luoda keskenään puhe- ja muita multimediayhteyksiä vertaisverkko-tekniikan avulla. Lisäksi tarkoituksena on arvioida P2PSIP protokollan vaikutuksia ja mahdollisuuksia mobiilioperaattoreille, joille sitä voidaan pitää uhkana. Tästä huolimatta, P2PSIP:n ei ole kuitenkaan tarkoitus korvata nykyisiä puhelinverkkoja. Työn alussa esittelemme SIP:n ja vertaisverkkojen (Peer-to-Peer) periaatteet, joihin P2PSIP-protokollan on suunniteltu perustuvan. SIP mahdollistaa multimedia-istuntojen luomisen, sulkemisen ja muokkaamisen verkossa, mutta sen monipuolinen käyttö vaatii keskitettyjen palvelimien käyttöä. Vertaisverkon avulla käyttäjät voivat suorittaa keskitettyjen palvelimien tehtävät keskenään hajautetusti. Tällöin voidaan ylläpitää laajojakin verkkoja tehokkaasti ilman palvelimista aiheutuvia ylläpito-kustannuksia. Mobiilioperaattorit ovat haasteellisen tilanteen edessä, koska teleliikennemaailma on muuttumassa yhä avoimemmaksi. Tällöin operaattoreiden asiakkaille aukeaa mahdollisuuksia käyttää kilpailevia Internet-palveluja (kuten Skype) helpommin ja tulevaisuudessa myös itse muodostamaan kommunikointiverkkoja P2PSIP:n avulla. Tutkimukset osoittavat, että näistä uhista huolimatta myös operaattorit pystyvät näkemään P2PSIP:n mahdollisuutena mukautumisessa nopeasti muuttuvan teleliikennemaailman haasteisiin. Nämä mahdollisuudet sisältävät operaattorin oman verkon optimoinnin lisäksi vaihtoehtoisten ja monipuolisempien palveluiden tarjoamisen asiakkailleen edullisesti. Täytyy kuitenkin muistaa, että näiden mahdollisuuksien toteuttamisten vaikutusten ei tulisi olla ristiriidassa operaattorin muiden palveluiden kanssa. Lisäksi tulisi muistaa, että tällä hetkellä keskeneräisen P2PSIP-standardin lopullinen luonne ja ominaisuudet voivat muuttaa sen vaikutuksia.The purpose of this thesis is to present the Peer-to-Peer Session Initiation Protocol (P2PSIP) being developed. In addition, the purpose of this thesis is to evaluate the impacts and prospects of P2PSIP to mobile operators, to whom it can be regarded as a threat. In P2PSIP, users can independently and easily establish voice and other multimedia connections using peer-to-peer (P2P) networking. However, P2PSIP is not meant to replace the existing telephony networks of the operators. We start by introducing the principles of SIP and P2P networking that the P2PSIP is intended to use. SIP enables to establish, terminate and modify multimedia sessions, but its versatile exploitation requires using centralized servers. By using P2P networking, users can decentralize the functions of centralized servers by performing them among themselves. This enables to maintain large and robust networks without maintenance costs resulted of running such centralized servers. Telecommunications market is transforming to a more open environment, where mobile operators and other service providers are challenged to adapt to the upcoming changes. Subscribers have easier access to rivalling Internet-services (such as Skype) and in future they can form their own communication communities by using P2PSIP. The results show that despite of these threats, telecom operators can find potential from P2PSIP in concurrence in adaptation to the challenges of the rapidly changing telecom environment. These potential roles include optimization of the network of the operator, but as well roles to provide alternative and more versatile services to their subscribers at low cost. However, the usage of P2PSIP should not conflict with the other services of the operator. Also, as P2PSIP is still under development, its final nature and features may change its impacts and prospects

    Resource Management and Pricing in Networks

    Get PDF
    Resource management is important for network design and deployment. Resource management and allocation have been studied under a wide variety of scenarios --- routing in wired networks, scheduling in cellular networks, multiplexing, switching, and channel access in opportunistic networks are but a few examples. In this dissertation, we revisit resource management in the context of routing and scheduling in multihop wireless networks and pricing in single resource systems. The first issue addressed is of delays in multihop wireless networks. The resource under contention is capacity which is allocated by a joint routing and scheduling algorithm. Delay in wireless networks is a key issue gaining interest with the growth of interactive applications and proliferation of wireless networks. We start with an investigation of the back-pressure algorithm (BPA), an algorithm that activates the schedule with the largest sum of link weights in a timeslot. Though the BPA is throughput-optimal, it has poor end-to-end delays. Our investigation identifies poor routing decisions at low loads as one cause for it. We improve the delay performance of max-weight algorithms by proposing a general framework for routing and scheduling algorithms that allow directing packets towards the sink node dynamically. For a stationary environment, we explicitly formulate delay minimization as a static problem while maintaining stability. We see similar improved delay performance with the advantage of reduced per time-slot complexity. Next, the issue of pricing for flow based models is studied. The increasing popularity of cloud computing and the ease of commerce over the Internet is making pricing a key issue requiring greater attention. Although pricing has been extensively studied in the context of maximizing revenue and fairness, we take a different perspective and investigate pricing with predictability. Prior work has studied resource allocations that link insensitivity and predictability. In this dissertation, we present a detailed analysis of pricing under insensitive allocations. We study three common pricing models --- fixed rate pricing, Vickrey-Clarke-Groves (VCG) auctions, and congestion-based pricing, and provide the expected operator revenue and user payments under them. A pre-payment scheme is also proposed where users pay on arrival a fee for their estimated service costs. Such a mechanism is shown to have lower variability in payments under fixed rate pricing and VCG auctions while generating the same long-term revenue as in a post-payment scheme, where users pay the exact charge accrued during their sojourn. Our formulation and techniques further the understanding of pricing mechanisms and decision-making for the operator

    Rebel governance in de facto states

    Get PDF
    De facto states, such as Somaliland (Somalia), are unrecognized separatist enclaves that display characteristics of statehood but lack an international legal status. To acquire domestic and external legitimacy, these actors engage in a wide range of governance practices: they set up military and police forces; executive, legislative, and judicial branches; hospitals; schools; banks; or social security networks. In spite of the obvious gains that can be accrued through the establishment of a complex governance architecture, de facto states exhibit great variation in the range of statelike institutions that they build: some, like Luhansk People’s Republic (Ukraine), put together a rudimentary governance apparatus, while others, like Transnistria (Moldova), manage to construct a complex system of rule. What explains the variation in governance practices across these separatist enclaves? Using original data on governance institutions across all de facto states (1945–2016), this study offers an empirical examination of the key factors that shape separatists’ incentives to supply governance. The findings reveal that de facto state separatists are less likely to provide governance when they have access to lootable mineral resources but are more likely to do so when they receive external military support, when peacekeepers are present, when they have access to relatively immobile assets, when they adopt a Marxist ideology, and when they control the territory for a long time. The findings help us better understand the conditions under which armed nonstate actors supplant sovereign states as de facto authorities and successfully institutionalize their rule
    corecore