2,094 research outputs found

    W-NINE: a two-stage emulation platform for mobile and wireless systems

    Get PDF
    More and more applications and protocols are now running on wireless networks. Testing the implementation of such applications and protocols is a real challenge as the position of the mobile terminals and environmental effects strongly affect the overall performance. Network emulation is often perceived as a good trade-off between experiments on operational wireless networks and discrete-event simulations on Opnet or ns-2. However, ensuring repeatability and realism in network emulation while taking into account mobility in a wireless environment is very difficult. This paper proposes a network emulation platform, called W-NINE, based on off-line computations preceding online pattern-based traffic shaping. The underlying concepts of repeatability, dynamicity, accuracy and realism are defined in the emulation context. Two different simple case studies illustrate the validity of our approach with respect to these concepts

    EMMON - EMbedded MONitoring

    Get PDF
    Despite the steady increase in experimental deployments, most of research work on WSNs has focused only on communication protocols and algorithms, with a clear lack of effective, feasible and usable system architectures, integrated in a modular platform able to address both functional and non–functional requirements. In this paper, we outline EMMON [1], a full WSN-based system architecture for large–scale, dense and real–time embedded monitoring [3] applications. EMMON provides a hierarchical communication architecture together with integrated middleware and command and control software. Then, EM-Set, the EMMON engineering toolset will be presented. EM-Set includes a network deployment planning, worst–case analysis and dimensioning, protocol simulation and automatic remote programming and hardware testing tools. This toolset was crucial for the development of EMMON which was designed to use standard commercially available technologies, while maintaining as much flexibility as possible to meet specific applications requirements. Finally, the EMMON architecture has been validated through extensive simulation and experimental evaluation, including a 300+ nodes testbed

    MetaDetect: Metamorphic Testing Based Anomaly Detection for Multi-UAV Wireless Networks

    Full text link
    The reliability of wireless Ad Hoc Networks (WANET) communication is much lower than wired networks. WANET will be impacted by node overload, routing protocol, weather, obstacle blockage, and many other factors, all those anomalies cannot be avoided. Accurate prediction of the network entirely stopping in advance is essential after people could do networking re-routing or changing to different bands. In the present study, there are two primary goals. Firstly, design anomaly events detection patterns based on Metamorphic Testing (MT) methodology. Secondly, compare the performance of evaluation metrics, such as Transfer Rate, Occupancy rate, and the Number of packets received. Compared to other studies, the most significant advantage of mathematical interpretability, as well as not requiring dependence on physical environmental information, only relies on the networking physical layer and Mac layer data. The analysis of the results demonstrates that the proposed MT detection method is helpful for automatically identifying incidents/accident events on WANET. The physical layer transfer Rate metric could get the best performance.Comment: 9 pages, 7 figure

    Optimised protocols for time-critical applications and internetworking in wehicular ad-hoc networks

    Get PDF
    Vehicular ad-hoc networks (VANETs) that enable communication among vehicles and between vehicles and unmanned aerial vehicles (UAVs) and cellular base stations have recently attracted significant interest from the research community, due to the wide range of practical applications they can facilitate (e.g., road safety, traffic management and rescue missions). Despite this increased research activity, the high vehicle mobility in a VANET raises concerns regarding the robustness and adaptiveness of such networks to support time-critical applications and internetworking. In this thesis, as a first step toward the design of efficient MAC protocol to support time-critical applications and internetworking, we show that it is indeed possible to follow the dynamics of a network and consequently adapt the transmission probability of the Aloha protocol to reduce the interference and maximise the single-hop throughput between adjacent nodes. Extensive simulation validates the proposed analytical model, which thus can serve as a promising tool to improve VANETs performance. By exploiting the parallel between the CSMA/CA and Aloha performance models, the optimal transmission probability for the Aloha protocol as a function of estimated vehicular density is derived. This probability is then used to obtain the optimal maximum CW that can be integrated in an amended CSMA/CA protocol to maximise the single-hop throughput among adjacent vehicles. We show by means of simulation that the beneficial impact the proposed protocol is increased channel throughput and reduced transmission delay when compared with the standardised protocol CSMA/CA in IEEE 802.11p. These results reveal the applicability of the new, optimised protocol to safety applications and clustering techniques with stringent performance requirements. Lastly, we propose a Stable Clustering Algorithm for vehicular ad-hoc networks (SCalE) internetworking. The exchange of the necessary status information to support the efficient clusters formation can firmly relay on the support of our optimised CSMA/CA protocol. The SCalE algorithm makes use of the knowledge of the vehicles behaviour (explained in Chapter 5) for efficient selection of CHs, and selects a backup CH on top of the CH to maintain the stability of cluster structures. The increased stability and improved performance of the SCalE algorithm is studied and compared with existing clustering algorithms.Open Acces

    Interference Mitigation in Frequency Hopping Ad Hoc Networks

    Get PDF
    Radio systems today exhibit a degree of flexibility that was unheard of only a few years ago. Software-defined radio architectures have emerged that are able to service large swathes of spectrum, covering up to several GHz in the UHF bands. This dissertation investigates interference mitigation techniques in frequency hopping ad hoc networks that are capable of exploiting the frequency agility of software-defined radio platforms

    Investigating TCP performance in mobile ad hoc networks

    Get PDF
    Mobile ad hoc networks (MANETs) have become increasingly important in view of their promise of ubiquitous connectivity beyond traditional fixed infrastructure networks. Such networks, consisting of potentially highly mobile nodes, have provided new challenges by introducing special consideration stemming from the unique characteristics of the wireless medium and the dynamic nature of the network topology. The TCP protocol, which has been widely deployed on a multitude of internetworks including the Internet, is naturally viewed as the de facto reliable transport protocol for use in MANETs. However, assumptions made at TCP’s inception reflected characteristics of the prevalent wired infrastructure of networks at the time and could subsequently lead to sub-optimal performance when used in wireless ad hoc environments. The basic presupposition underlying TCP congestion control is that packet losses are predominantly an indication of congestion in the network. The detrimental effect of such an assumption on TCP’s performance in MANET environments has been a long-standing research problem. Hence, previous work has focused on addressing the ambiguity behind the cause of packet loss as perceived by TCP by proposing changes at various levels across the network protocol stack, such as at the MAC mechanism of the transceiver or via coupling with the routing protocol at the network layer. The main challenge addressed by the current work is to propose new methods to ameliorate the illness-effects of TCP’s misinterpretation of the causes of packet loss in MANETs. An assumed restriction on any proposed modifications is that resulting performance increases should be achievable by introducing limited changes confined to the transport layer. Such a restriction aids incremental adoption and ease of deployment by requiring minimal implementation effort. Further, the issue of packet loss ambiguity, from a transport layer perspective, has, by definition, to be dealt with in an end-to-end fashion. As such, a proposed solution may involve implementation at the sender, the receiver or both to address TCP shortcomings. Some attempts at describing TCP behaviour in MANETs have been previously reported in the literature. However, a thorough enquiry into the performance of those TCP agents popular in terms of research and adoption has been lacking. Specifically, very little work has been performed on an exhaustive analysis of TCP variants across different MANET routing protocols and under various mobility conditions. The first part of the dissertation addresses this shortcoming through extensive simulation evaluation in order to ascertain the relative performance merits of each TCP variant in terms of achieved goodput over dynamic topologies. Careful examination reveals sub-par performance of TCP Reno, the largely equivalent performance of NewReno and SACK, whilst the effectiveness of a proactive TCP variant (Vegas) is explicitly stated and justified for the first time in a dynamic MANET environment. Examination of the literature reveals that in addition to losses caused by route breakages, the hidden terminal effect contributes significantly to non-congestion induced packet losses in MANETs, which in turn has noticeably negative impact on TCP goodput. By adapting the conservative slow start mechanism of TCP Vegas into a form suitable for reactive TCP agents, like Reno, NewReno and SACK, the second part of the dissertation proposes a new Reno-based congestion avoidance mechanism which increases TCP goodput considerably across long paths by mitigating the negative effects of hidden terminals and alleviating some of the ambiguity of non-congestion related packet loss in MANETs. The proposed changes maintain intact the end-to-end semantics of TCP and are solely applicable to the sender. The new mechanism is further contrasted with an existing transport layer-focused solution and is shown to perform significantly better in a range of dynamic scenarios. As solution from an end-to-end perspective may be applicable to either or both communicating ends, the idea of implementing receiver-side alterations is also explored. Previous work has been primarily concerned with reducing receiver-generated cumulative ACK responses by “bundling” them into as few packets as possible thereby reducing misinterpretations of packet loss due to hidden terminals. However, a thorough evaluation of such receiver-side solutions reveals limitations in common evaluation practices and the solutions themselves. In an effort to address this shortcoming, the third part of this research work first specifies a tighter problem domain, identifying the circumstances under which the problem may be tackled by an end-to-end solution. Subsequent original analysis reveals that by taking into account optimisations possible in wireless communications, namely the partial or complete omission of the RTS/CTS handshake, noticeable improvements in TCP goodput are achievable especially over long paths. This novel modification is activated in a variety of topologies and is assessed using new metrics to more accurately gauge its effectiveness in a wireless multihop environment

    Contributions to IEEE 802.11-based long range communications

    Get PDF
    The most essential part of the Internet of Things (IoT) infrastructure is the wireless communication system that acts as a bridge for the delivery of data and control messages between the connected things and the Internet. Since the conception of the IoT, a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. However, the existing wireless technologies lack the ability to support a huge amount of data exchange from many battery-driven devices, spread over a wide area. In order to support the IoT paradigm, IEEE 802.11ah is an Internet of Things enabling technology, where the efficient management of thousands of devices is a key function. This is one of the most promising and appealing standards, which aims to bridge the gap between traditional mobile networks and the demands of the IoT. To this aim, IEEE 802.11ah provides the Restricted Access Window (RAW) mechanism, which reduces contention by enabling transmissions for small groups of stations. Optimal grouping of RAW stations requires an evaluation of many possible configurations. In this thesis, we first discuss the main PHY and MAC layer amendments proposed for IEEE 802.11ah. Furthermore, we investigate the operability of IEEE 802.11ah as a backhaul link to connect devices over possibly long distances. Additionally, we compare the aforementioned standard with previous notable IEEE 802.11 amendments (i.e. IEEE 802.11n and IEEE 802.11ac) in terms of throughput (with and without frame aggregation) by utilizing the most robust modulation schemes. The results show an improved performance of IEEE 802.11ah (in terms of power received at long range while experiencing different packet error rates) as compared to previous IEEE 802.11 standards. Additionally, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. In addition, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm. Finally, we propose an analytical model (named e-model) that provides an evaluation of the RAW onfiguration performance, allowing a fast adaptation of RAW grouping policies, in accordance to varying channel conditions. We base the e-model in known saturation models, which we adapted to include the IEEE 802.11ah’s PHY and MAC layer modifications and to support different bit rate and packet sizes. As a proof of concept, we use the proposed model to compare the performance of different grouping strategies,showing that the e-model is a useful analysis tool in RAW-enabled scenarios. We validate the model with existing IEEE 802.11ah implementation for ns-3.La clave del concepto Internet de las cosas (IoT) es que utiliza un sistema de comunicación inalámbrica, el cual actúa como puente para la entrega de datos y mensajes de control entre las "cosas" conectadas y el Internet. Desde la concepción del IoT, se han desarrollado gran cantidad de aplicaciones y tecnologías prometedoras que cambiarán distintos aspectos de nuestra vida diaria.Sin embargo, las tecnologías de redes computacionales inalámbricas existentes carecen de la capacidad de soportar las características del IoT, como las grandes cantidades de envío y recepción de datos desde múltiples dispositivos distribuidos en un área amplia, donde los dispositivos IoT funcionan con baterías. Para respaldar el paradigma del IoT, IEEE 802.11ah, la cual es una tecnología habilitadora del Internet de las cosas, para el cual la gestión eficiente de miles de dispositivos es una función clave. IEEE 802.11ah es uno de los estándares más prometedores y atractivos, desde su concepción orientada para IoT, su objetivo principal es cerrar la brecha entre las redes móviles tradicionales y la demandada por el IoT. Con este objetivo en mente, IEEE 802.11ah incluye entre sus características especificas el mecanismo de ventana de acceso restringido (RAW, por sus siglas en ingles), el cual define un nuevo período de acceso al canal libre de contención, reduciendo la misma al permitir transmisiones para pequeños grupos de estaciones. Nótese que para obtener una agrupación óptima de estaciones RAW, se requiere una evaluación de las distintas configuraciones posibles. En esta tesis, primero discutimos las principales mejoras de las capas PHY y MAC propuestas para IEEE 802.11ah. Además, investigamos la operatividad de IEEE 802.11ah como enlace de backhaul para conectar dispositivos a distancias largas. También, comparamos el estándar antes mencionado con las notables especificaciones IEEE 802.11 anteriores (es decir, IEEE 802.11n y IEEE 802.11ac), en términos de rendimiento (incluyendo y excluyendo la agregación de tramas de datos) y utilizando los esquemas de modulación más robustos. Los resultados muestran mejores resultados en cuanto al rendimiento de IEEE 802.11ah (en términos de potencia recibida a largo alcance, mientras se experimentan diferentes tasas de error de paquetes de datos) en comparación con los estándares IEEE 802.11 anteriores.Además, exponemos las capacidades de IEEE 802.11ah para admitir diferentes aplicaciones de IoT. A su vez, proporcionamos una descripción general de los competidores tecnológicos, los cuales contienden para cubrir el marco de comunicaciones IoT. También se presentan resultados numéricos que muestran cómo la especificación IEEE 802.11ah ofrece las características requeridas por las comunicaciones IoT, presentando así a IEEE 802.11ah como una tecnología que puede satisfacer las necesidades del paradigma de Internet de las cosas.Finalmente, proponemos un modelo analítico (denominado e-model) que proporciona una evaluación del rendimiento utilizando la característica RAW con múltiples configuraciones, el cual permite una rápida adaptación de las políticas de agrupación RAW, de acuerdo con las diferentes condiciones del canal de comunicación. Basamos el e-model en modelos de saturación conocidos, que adaptamos para incluir las modificaciones de la capa MAC y PHY de IEEE 802.11ah y para poder admitir diferentes velocidades de transmisión de datos y tamaños de paquetes. Como prueba de concepto, utilizamos el modelo propuesto para comparar el desempeño de diferentes estrategias de agrupación, mostrando que el e-model es una herramienta de análisis útil en escenarios habilitados para RAW. Cabe mencionar que también validamos el modelo con la implementación IEEE 802.11ah existente para ns-3
    corecore