18 research outputs found
Performance enhancements in next generation wireless networks using network coding : a case study in WiMAX
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from student-submitted PDF version of thesis.Includes bibliographical references (p. 125-130).In this thesis, we design and implement a network-coding-enhanced network architecture for next generation wireless networks. The architecture applies intra-session random linear network coding as a packet erasure code below the IP layer. Using WiMAX as a case study, a series of point-to-point single-interface experiments are conducted to compare the performance of the architecture to that of HARQ and ARQ mechanisms. The performance measures are packet loss percentage, throughput and file transfer delay. The experiments use the Global Environment for Network Innovations (GENI) WiMAX platforms. UDP traffic considered; Iperf and UDP based File Transfer Protocol (UFTP) are used as measurement applications. The proposed architecture substantially decreases packet loss percentage from around 11-32% to nearly 0%. Compared to HARQ and ARQ mechanisms, the architecture can offer up to 5.9 times gain in throughput and 5.5 times reduction in end-to-end fi le transfer delay.by Surat Teerapittayanon.M.Eng
Radio Communications
In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks
Recommended from our members
Efficient Routing and Scheduling in Wireless Networks
The temporal and spatial variation in wireless channel conditions, node mobility make it challenging to design protocols for wireless networks. In this thesis, we design efficient routing and scheduling algorithms which adapt to changing network conditions caused by varying link quality or node mobility to improve user-level performance. We design and analyze routing protocols for static, mobile and heterogeneous wireless networks. We analyze the performance of opportunistic and cooperative forwarding in static mesh networks showing that opportunism outperforms cooperation; we identify interference as the main cause for mitigating the potential gains achievable with cooperative forwarding. For mobile networks, we quantitatively analyze the tradeoff between state information collection (sampling frequency and number of bits per sample) and power consumption for a fixed source-to-destination goodput constraint. For heterogeneous networks comprising of both static and mobile nodes, we propose a greedy algorithm (adaptive-flood) which dynamically classifies individual nodes as routers/flooders depending on network conditions and demonstrate that it achieves performance equivalent to, and in some cases significantly better than, that of network-wide routing or flooding alone. Last, we consider an application-level wireless streaming scenario where multiple clients are streaming different videos from a cellular base station. We design a greedy algorithm for efficiently scheduling multiple video streams from a base station to mobile clients so as to minimize the total number of application-playout stalls. We develop models for coarse timescale wireless channel variation to aid network and application-layer protocol design
Performance analysis of 4G wireless networks using system level simulator
Doutoramento em Engenharia ElectrotécnicaIn the last decade, mobile wireless communications have witnessed an explosive
growth in the user’s penetration rate and their widespread deployment around the
globe. In particular, a research topic of particular relevance in telecommunications
nowadays is related to the design and implementation of mobile communication
systems of 4th generation (4G). 4G networks will be characterized by the support
of multiple radio access technologies in a core network fully compliant with the
Internet Protocol (all IP paradigms). Such networks will sustain the stringent
quality of service (QoS) requirements and the expected high data rates from the
type of multimedia applications (i.e. YouTube and Skype) to be available in the
near future. Therefore, 4G wireless communications system will be of paramount
importance on the development of the information society in the near future.
As 4G wireless services will continue to increase, this will put more and more
pressure on the spectrum availability. There is a worldwide recognition that
methods of spectrum managements have reached their limit and are no longer
optimal, therefore new paradigms must be sought. Studies show that most of the
assigned spectrum is under-utilized, thus the problem in most cases is inefficient
spectrum management rather spectrum shortage. There are currently trends
towards a more liberalized approach of spectrum management, which are tightly
linked to what is commonly termed as Cognitive Radio (CR).
Furthermore, conventional deployment of 4G wireless systems (one BS in cell and
mobile deploy around it) are known to have problems in providing fairness (users
closer to the BS are more benefited relatively to the cell edge users) and in
covering some zones affected by shadowing, therefore the use of relays has been
proposed as a solution.
To evaluate and analyse the performances of 4G wireless systems software tools
are normally used. Software tools have become more and more mature in recent
years and their need to provide a high level evaluation of proposed algorithms and
protocols is now more important. The system level simulation (SLS) tools provide
a fundamental and flexible way to test all the envisioned algorithms and protocols
under realistic conditions, without the need to deal with the problems of live
networks or reduced scope prototypes. Furthermore, the tools allow network
designers a rapid collection of a wide range of performance metrics that are useful
for the analysis and optimization of different algorithms.
This dissertation proposes the design and implementation of conventional system
level simulator (SLS), which afterwards enhances for the 4G wireless technologies
namely cognitive Radios (IEEE802.22) and Relays (IEEE802.16j). SLS is then
used for the analysis of proposed algorithms and protocols.FC
Delay-sensitive Communications Code-Rates, Strategies, and Distributed Control
An ever increasing demand for instant and reliable information on modern communication networks forces codewords to operate in a non-asymptotic regime. To achieve reliability for imperfect channels in this regime, codewords need to be retransmitted from receiver to the transmit buffer, aided by a fast feedback mechanism. Large occupancy of this buffer results in longer communication delays. Therefore, codewords need to be designed carefully to reduce transmit queue-length and thus the delay experienced in this buffer. We first study the consequences of physical layer decisions on the transmit buffer occupancy. We develop an analytical framework to relate physical layer channel to the transmit buffer occupancy. We compute the optimal code-rate for finite-length codewords operating over a correlated channel, under certain communication service guarantees. We show that channel memory has a significant impact on this optimal code-rate.
Next, we study the delay in small ad-hoc networks. In particular, we find out what rates can be supported on a small network, when each flow has a certain end-to-end service guarantee. To this end, service guarantee at each intermediate link is characterized. These results are applied to study the potential benefits of setting up a network suitable for network coding in multicast. In particular, we quantify the gains of network coding over classic routing for service provisioned multicast communication over butterfly networks. In the wireless setting, we study the trade-off between communications gains achieved by network coding and the cost to set-up a network enabling network coding. In particular, we show existence of scenarios where one should not attempt to create a network suitable for coding.
Insights obtained from these studies are applied to design a distributed rate control algorithm in a large network. This algorithm maximizes sum-utility of all flows, while satisfying per-flow end-to-end service guarantees. We introduce a notion of effective-capacity per communication link that captures the service requirements of flows sharing this link. Each link maintains a price and effective-capacity, and each flow maintains rate and dissatisfaction. Flows and links update their respective variables locally, and we show that their decisions drive the system to an optimal point. We implemented our algorithm on a network simulator and studied its convergence behavior on few networks of practical interest
On Information-centric Resiliency and System-level Security in Constrained, Wireless Communication
The Internet of Things (IoT) interconnects many heterogeneous embedded devices either locally between each other, or globally with the Internet. These things are resource-constrained, e.g., powered by battery, and typically communicate via low-power and lossy wireless links. Communication needs to be secured and relies on crypto-operations that are often resource-intensive and in conflict with the device constraints. These challenging operational conditions on the cheapest hardware possible, the unreliable wireless transmission, and the need for protection against common threats of the inter-network, impose severe challenges to IoT networks. In this thesis, we advance the current state of the art in two dimensions.
Part I assesses Information-centric networking (ICN) for the IoT, a network paradigm that promises enhanced reliability for data retrieval in constrained edge networks. ICN lacks a lower layer definition, which, however, is the key to enable device sleep cycles and exclusive wireless media access. This part of the thesis designs and evaluates an effective media access strategy for ICN to reduce the energy consumption and wireless interference on constrained IoT nodes.
Part II examines the performance of hardware and software crypto-operations, executed on off-the-shelf IoT platforms. A novel system design enables the accessibility and auto-configuration of crypto-hardware through an operating system. One main focus is the generation of random numbers in the IoT. This part of the thesis further designs and evaluates Physical Unclonable Functions (PUFs) to provide novel randomness sources that generate highly unpredictable secrets, on low-cost devices that lack hardware-based security features.
This thesis takes a practical view on the constrained IoT and is accompanied by real-world implementations and measurements. We contribute open source software, automation tools, a simulator, and reproducible measurement results from real IoT deployments using off-the-shelf hardware. The large-scale experiments in an open access testbed provide a direct starting point for future research