21 research outputs found

    PERFORMANCE EVALUATION OF CROSS-LAYER DESIGN WITH DISTRIBUTED AND SEQUENTIAL MAPPING SCHEME FOR VIDEO APPLICATION OVER IEEE 802.11E

    Get PDF
    The rapid development of wireless communication imposes several challenges to support QoS for real-time multimedia applications such as video stream applications. Researchers tackled these challenges from different points of view including the semantics of the video to achieve better QoS requirements. The main goal of this research is to design a UDP protocol to realize a distributed sequential mapping scheme (DSM) with a cross-layer design and evaluate its accuracy under different network conditions. In DSM, the perceived quality of a multi-layer video is addressed by mapping each video layer into channel resources represented as queues or access categories (ACs) existing in IEEE 802.11e MAC layer. This research work further investigates the efficiency of this scheme with actual implementation and thorough simulation experiments. The experiments reported the efficiency of this scheme with the presence of different composite traffic models covering most known traffic scenarios using Expected Reconstructed Video Layers (ERVL) and packet loss rate as accuracy measures. This research work also investigates the accuracy of calculating the ERVL compared to its value using actual readings of layers drop rate. The effect of changing the ACs queue size on the ERVL is studied. The use of this scheme shows zero-drop in the base layer in almost all scenarios where no ongoing traffic is presented except that the testing video sessions between nodes. In these experiments, the ERVL continuously reported high values for the number of expected reconstructed video layers. While these values dramatically vary when introducing ongoing different composite traffic models together with the testing video sessions between nodes. Finally, a 40% increase in the ACs queue size shows significant improvement on ERVL while an increase of the queue size beyond this value has very little significance on ERVL

    A QoS enabling queuing scheme for Fourth Generation wireless access networks

    Get PDF
    Word processed copy.Includes bibliographical references (leaves 70-74).This research proposes a scheme to accomplish the task of network selection; this is achieved by enhancing existing QoS provisioning approaches. The scheme models the radio access network as a network of queuing nodes. With the model, the link layer QoS statistics of user traffic in each available path through the network is determined. The author postulates that the statistics indicate the QoS capabilities of the network and can therefore be used to select the best network to serve the mobile user

    Quality of service based distributed control of wireless networks

    Get PDF

    Reliable Multicast transport of the video over the WiFi network

    Get PDF
    Le transport multicast est une solution efficace pour envoyer le même contenu à plusieurs récepteurs en même temps. Ce mode est principalement utilisé pour fournir des flux multimédia en temps réel. Cependant, le multicast classique de l IEEE 802.11 n'utilise aucun mécanisme d acquittement. Ainsi, l échec de réception implique la perte définitive du paquet. Cela limite la fiabilité du transport multicast et impact la qualité des applications vidéo. Pour résoudre ce problème, 802.11v et 802.11aa sont définis récemment. Le premier amendement propose Direct Multicast Service (DMS). D'autre part, le 802.11aa introduit GroupCast with Retries (GCR). GCR définit deux nouvelles politiques de retransmission : Block Ack (BACK) et Unsolicited Retry (UR).Dans cette thèse, nous évaluons et comparons les performances de 802.11v/aa. Nos résultats montrent que tous les nouveaux protocoles multicast génèrent un overhead de transmission important. En outre, DMS a une scalabilité très limitée, et GCR-BACK n'est pas approprié pour des grands groupes multicast. D autre part, nous montrons que DMS et GCR-BACK génèrent des latences de transmission importantes lorsque le nombre de récepteurs augmente. Par ailleurs, nous étudions les facteurs de pertes dans les réseaux sans fil. Nous montrons que l'indisponibilité du récepteur peut être la cause principale des pertes importantes et de leur nature en rafales. En particulier, nos résultats montrent que la surcharge du processeur peut provoquer un taux de perte de 100%, et que le pourcentage de livraison peut être limité à 35% lorsque la carte 802.11 est en mode d économie d'énergie.Pour éviter les collisions et améliorer la fiabilité du transport multicast, nous définissons le mécanisme Busy Symbol (BS). Nos résultats montrent que BS évite les collisions et assure un taux de succès de transmission très important. Afin d'améliorer davantage la fiabilité du trafic multicast, nous définissons un nouveau protocole multicast, appelé Block Negative Acknowledgement (BNAK). Ce protocole opère comme suit. L AP envoi un bloc de paquets suivi par un Block NAK Request (BNR). Le BNR permet aux membres de détecter les données manquantes et d envoyer une demande de retransmission, c.à.d. un Block NAK Response (BNAK). Un BNAK est transmis en utilisant la procédure classique d accès au canal afin d'éviter toute collision avec d'autres paquets. En plus, cette demande est acquittée. Sous l'hypothèse que 1) le récepteur est situé dans la zone de couverture du débit de transmission utilisé, 2) les collisions sont évitées et 3) le terminal a la bonne configuration, très peu de demandes de retransmission sont envoyées, et la bande passante est préservée. Nos résultats montrent que BNAK a une très grande scalabilité et génère des délais très limités. En outre, nous définissons un algorithme d'adaptation de débit pour BNAK. Nous montrons que le bon débit de transmission est sélectionné moyennant un overhead très réduit de moins de 1%. En plus, la conception de notre protocole supporte la diffusion scalable de lavvidéo. Cette caractéristique vise à résoudre la problématique de la fluctuation de la bande passante, et à prendre en considération l'hétérogénéité des récepteurs dans un réseau sans fil.The multicast transport is an efficient solution to deliver the same content to many receivers at the same time. This mode is mainly used to deliver real-time video streams. However, the conventional multicast transmissions of IEEE 802.11 do not use any feedback policy. Therefore missing packets are definitely lost. This limits the reliability of the multicast transport and impacts the quality of the video applications. To resolve this issue, the IEEE 802.11v/aa amendments have been defined recently. The former proposes the Direct Multicast Service (DMS). On the other hand, 802.11aa introduces Groupcast with Retries (GCR) service. GCR defines two retry policies: Block Ack (BACK) and Unsolicited Retry (UR).In this thesis we evaluate and compare the performance of 802.11v/aa. Our simulation results show that all the defined policies incur an important overhead. Besides, DMS has a very limited scalability, and GCR-BACK is not appropriate for large multicast groups. We show that both DMS and GCR-BACK incur important transmission latencies when the number of the multicast receivers increases. Furthermore, we investigate the loss factors in wireless networks. We show that the device unavailability may be the principal cause of the important packet losses and their bursty nature. Particularly, our results show that the CPU overload may incur a loss rate of 100%, and that the delivery ratio may be limited to 35% when the device is in the power save mode.To avoid the collisions and to enhance the reliability of the multicast transmissions, we define the Busy Symbol (BS) mechanism. Our results show that BS prevents all the collisions and ensures a very high delivery ratio for the multicast packets. To further enhance the reliability of this traffic, we define the Block Negative Acknowledgement (BNAK) retry policy. Using our protocol, the AP transmits a block of multicast packets followed by a Block NAK Request (BNR). Upon reception of a BNR, a multicast member generates a Block NAK Response (BNAK) only if it missed some packets. A BNAK is transmitted after channel contention in order to avoid any eventual collision with other feedbacks, and is acknowledged. Under the assumption that 1) the receiver is located within the coverage area of the used data rate, 2) the collisions are avoided and 3) the terminal has the required configuration, few feedbacks are generated and the bandwidth is saved. Our results show that BNAK has a very high scalability and incurs very low delays. Furthermore, we define a rate adaptation scheme for BNAK. We show that the appropriate rate is selected on the expense of a very limited overhead of less than 1%. Besides, the conception of our protocol is defined to support the scalable video streaming. This capability intends to resolve the bandwidth fluctuation issue and to consider the device heterogeneity of the group members.BORDEAUX1-Bib.electronique (335229901) / SudocSudocFranceF

    Proceedings of the Third Edition of the Annual Conference on Wireless On-demand Network Systems and Services (WONS 2006)

    Get PDF
    Ce fichier regroupe en un seul documents l'ensemble des articles accéptés pour la conférences WONS2006/http://citi.insa-lyon.fr/wons2006/index.htmlThis year, 56 papers were submitted. From the Open Call submissions we accepted 16 papers as full papers (up to 12 pages) and 8 papers as short papers (up to 6 pages). All the accepted papers will be presented orally in the Workshop sessions. More precisely, the selected papers have been organized in 7 session: Channel access and scheduling, Energy-aware Protocols, QoS in Mobile Ad-Hoc networks, Multihop Performance Issues, Wireless Internet, Applications and finally Security Issues. The papers (and authors) come from all parts of the world, confirming the international stature of this Workshop. The majority of the contributions are from Europe (France, Germany, Greece, Italy, Netherlands, Norway, Switzerland, UK). However, a significant number is from Australia, Brazil, Canada, Iran, Korea and USA. The proceedings also include two invited papers. We take this opportunity to thank all the authors who submitted their papers to WONS 2006. You helped make this event again a success

    Mac-Phy Cross-Layer analysis and design of Mimo-Ofdm Wlans based on fast link adaptation

    Get PDF
    The latestWLAN standard, known as IEEE 802.11n, has notably increased the network capacity with respect to its predecessors thanks to the incorporation of the multipleinput multiple-output (MIMO) technology. Nonetheless, the new amendment, as its previous ones, does not specify how crucial configuration mechanisms, most notably the adaptive modulation and coding (AMC) algorithm should be implemented. The AMC process has proved essential to fully exploit the system resources in light of varying channel conditions. In this dissertation, a closed-loop AMC technique, referred to as fast link adaption (FLA) algorithm, that effectively selects themodulation and coding scheme (MCS) for multicarriermultiantennaWLAN networks is proposed. The FLA algorithm determines the MCS that maximizes the throughput while satisfying a quality of service (QoS) constraint, usually defined in the form of an objective packet error rate (PER). To this end, FLA uses a packet/bit error rate prediction methodology based on the exponential effective SNRmetric (EESM). The FLA algorithm performance has been evaluated under IEEE 802.11n systems that thanks to the incorporation of a feedbackmechanismare able to implement closed- loop AMC mechanisms. Initially, this AMC technique relies only on physical layer information but it is subsequently extended to also take into account themediumaccess control (MAC) sublayer performance. At the physical layer, the FLA algorithm has demonstrated its effectivity by performing very close to optimality in terms of throughput, while satisfying a prescribed PER constraint. The FLA algorithm has also been evaluated using imperfect channel information. It has been observed that the proposed FLA technique is rather robust against imperfect channel information, and only in highly-frequency selective channels, imperfect channel knowledge causes a noticeable degradation in throughput. At the MAC sublayer, the FLA algorithm has been complemented with a timeout strategy that weighs down the influence of the available channel information as this becomes outdated. This channel information outdate is caused by the MAC sublayer whose user multiplexing policy potentially results in large delays between acquiring the instant in which the channel state information is acquired and that in which the channel is accessed. Results demonstrate the superiority of FLA when compared to open-loop algorithms under saturated and non-saturated conditions and irrespective of the packet length, number of users, protocol (CSMA/CA or CDMA/E2CA) and access scheme (Basic Access or RTS/CTS). Additionally, several analytical models have been developed to estimate the system performance at the MAC sublayer. These models account for all operational details of the IEEE 802.11n MAC sublayer, such as finite number of retries, anomalous slot or channel errors. In particular, a semi-analytical model that assesses the MAC layer throughput under saturated conditions, considering the AMC performance is first introduced. Then, an analytical model that allows the evaluation of the QoS performance under non-saturated conditions is presented. This model focuses on single MCS and it is able to accurately predict very important system performance metrics such as blocking probability, delay, probability of discard or goodput thanks to the consideration of the finite queues on each station. Finally, the previous non-saturated analytical approach is used to define a semi-analytical model in order to estimate the system performance when considering AMC algorithms (i.e. whenmultiple MCSs are available)La darrera versió de l’estàndard deWLAN, anomenada IEEE 802.11n, ha augmentat la seva capacitat notablement en relació als sistemes anteriors gràcies a la incorporació de la tecnologia de múltiples antenes en transmissió i recepció (MIMO). No obstant això, la nova proposta, al igual que les anteriors, segueix sense especificar com s’han d’implementar elsmecanismes de configuraciómés crucials, un dels quals és l’algoritme de codificació imodulació adaptativa (AMC). Aquests algoritmes ja han demostrat la seva importància a l’hora demaximitzar el rendiment del sistema tenint en compte les condicions canviants del canal. En aquesta tesis s’ha proposat un algoritme AMC de llaç tancat, anomenat adaptació ràpida de l’enllaç (FLA), que selecciona eficientment l’esquema demodulació i codificació adaptativa per xarxes WLAN basades en arquitectures multiportadora multiantena. L’algoritme FLA determina el mode de transmissió capaç de maximitzar el throughput per les condicions de canal actuals, mentre satisfà un requisit de qualitat de servei en forma de taxa d’error per paquet (PER). FLA utilitza una metodologia de predicció de PER basada en l’estimació de la relació senyal renou (SNR) efectiva exponencial (EESM). El rendiment de l’algoritme FLA ha estat avaluat en sistemes IEEE 802.11n, ja que aquests, gràcies a la incorporació d’unmecanisme de realimentació demodes de transmissió, poden adoptar solucions AMC de llaç tancat. En una primera part, l’estudi s’ha centrat a la capa física i després s’ha estès a la subcapa MAC. A la capa física s’ha demostrat l’efectivitat de l’algoritme FLA aconseguint un rendiment molt proper al que ens proporcionaria un esquema AMC òptim en termes de throughput, alhora que es satisfan els requisits de PER objectiu. L’algoritme FLA també ha estat avaluat utilitzant informació imperfecte del canal. S’ha vist que l’algoritme FLA proposat és robust en front dels efectes d’estimació imperfecte del canal, i només en canals altament selectius en freqüència, la informació imperfecte del canal provoca una davallada en el rendiment en termes de throughput. A la subcapa MAC, l’algoritme FLA ha estat complementat amb una estratègia de temps d’espera que disminueix la dependència amb la informació de canal disponible a mesura que aquesta va quedant desfassada respecte de l’estat actual. Aquesta informació de canal desfassada és conseqüència de la subcapa MAC que degut a la multiplexació d’usuaris introdueix grans retards entre que es determina el mode de transmissió més adequat i la seva utilització per a l’accés al canal. Els resultats obtinguts han demostrat la superioritat de FLA respecte d’altres algoritmes de llaç obert en condicions de saturació i de no saturació, i independentment de la longitud de paquet, nombre d’usuaris, protocol (CSMA/CA i CSMA/E2CA) i esquema d’accés (Basic Access i RTS/CTS). Amés, s’han desenvolupat diversosmodels analítics per tal d’estimar el rendiment del sistema a la subcapa MAC. Aquests models consideren tots els detalls de funcionament de la subcapaMAC del 802.11n, comper exemple un nombre finit de retransmissions de cada paquet, l’slot anòmal o els errors introduïts pel canal. Inicialment s’ha proposat unmodel semi-analític que determina el throughtput en condicions de saturació, considerant el rendiment dels algoritmes AMC. Després s’ha presentat un model analític que estima el rendiment del sistema per condicions de no saturació, mitjançat elmodelat de cues finites a cada estació. Aquestmodel consideramodes de transmissió fixes i és capaç de determinar de manera molt precisa mètriques de rendimentmolt importants comsón la probabilitat de bloqueig de cada estació, el retard mitjà del paquets, la probabilitat de descart o la mesura del goodput. Finalment, el model analític de no saturació s’ha utilitzat per definir un model semi-analític per tal d’estimar el rendiment del sistema quan es considera l’ús d’algoritmes AMC

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    An analytical model of IEEE 80211 DCF for multi-hop wireless networks and its application to goodput and energy analysis

    Get PDF
    Ankara : The Department of Electrical and Electronics Engineering and the Institute of Engineering and Sciences of Bilkent University, 2010.Thesis (Ph. D.) -- Bilkent University, 2010.Includes bibliographical references leaves 168-181.In this thesis, we present an analytical model for the IEEE 802.11 DCF in multihop networks that considers hidden terminals and works for a large range of traffic loads. A goodput model which considers rate reduction due to collisions, retransmissions and hidden terminals, and an energy model, which considers energy consumption due to collisions, retransmissions, exponential backoff and freezing mechanisms, and overhearing of nodes, are proposed and used to analyze the goodput and energy performance of various routing strategies in IEEE 802.11 DCF based multi-hop wireless networks. Moreover, an adaptive routing algorithm which determines the optimum routing strategy adaptively according to the network and traffic conditions is suggested. Viewed from goodput aspect the results are as follows: Under light traf- fic, arrival rate of packets is dominant, making any routing strategy equivalently optimum. Under moderate traffic, concurrent transmissions dominate and multihop transmissions become more advantageous. At heavy traffic, multi-hoppingbecomes unstable due to increased packet collisions and excessive traffic congestion, and direct transmission increases goodput. From a throughput aspect, it is shown that throughput is topology dependent rather than traffic load dependent, and multi-hopping is optimum for large networks whereas direct transmissions may increase the throughput for small networks. Viewed from energy aspect similar results are obtained: Under light traf- fic, energy spent during idle mode dominates in the energy model, making any routing strategy nearly optimum. Under moderate traffic, energy spent during idle and receive modes dominates and multi-hop transmissions become more advantageous as the optimum hop number varies with processing power consumed at intermediate nodes. At the very heavy traffic conditions, multi-hopping becomes unstable due to increased collisions and direct transmission becomes more energy-efficient.The choice of hop-count in routing strategy is observed to affect energyefficiency and goodput more for large and homogeneous networks where it is possible to use shorter hops each covering similar distances. The results indicate that a cross-layer routing approach, which takes energy expenditure due to MAC contentions into account and dynamically changes the routing strategy according to the network traffic load, can increase goodput by at least 18% and save energy by at least 21% in a realistic wireless network where the network traffic load changes in time. The goodput gain increases up to 222% and energy saving up to 68% for denser networks where multi-hopping with much shorter hops becomes possible.AydoÄŸdu, CananPh.D

    Real-Time Sensor Networks and Systems for the Industrial IoT

    Get PDF
    The Industrial Internet of Things (Industrial IoT—IIoT) has emerged as the core construct behind the various cyber-physical systems constituting a principal dimension of the fourth Industrial Revolution. While initially born as the concept behind specific industrial applications of generic IoT technologies, for the optimization of operational efficiency in automation and control, it quickly enabled the achievement of the total convergence of Operational (OT) and Information Technologies (IT). The IIoT has now surpassed the traditional borders of automation and control functions in the process and manufacturing industry, shifting towards a wider domain of functions and industries, embraced under the dominant global initiatives and architectural frameworks of Industry 4.0 (or Industrie 4.0) in Germany, Industrial Internet in the US, Society 5.0 in Japan, and Made-in-China 2025 in China. As real-time embedded systems are quickly achieving ubiquity in everyday life and in industrial environments, and many processes already depend on real-time cyber-physical systems and embedded sensors, the integration of IoT with cognitive computing and real-time data exchange is essential for real-time analytics and realization of digital twins in smart environments and services under the various frameworks’ provisions. In this context, real-time sensor networks and systems for the Industrial IoT encompass multiple technologies and raise significant design, optimization, integration and exploitation challenges. The ten articles in this Special Issue describe advances in real-time sensor networks and systems that are significant enablers of the Industrial IoT paradigm. In the relevant landscape, the domain of wireless networking technologies is centrally positioned, as expected
    corecore