10 research outputs found
Power Consumption Model of NDN-Based Multicore Software Router Based on Detailed Protocol Analysis
Named data networking (NDN) has received considerable attention recently, mainly due to its built-in caching, which is expected to enable widespread and transparent operator-controlled caching. One of the important research challenges is to reduce the amount of power consumed by NDN networks as it has been shown that NDN's name prefix matching and caching are power-hungry. As a first step to achieving power-efficient NDN networks, in this paper, we develop a power consumption model of a multicore software NDN router. By applying this model to analyze how caching reduces power, we report that caching can reduce power consumption of an NDN network if the power consumption of routers is in proportion to their load and the computation of caching is as light as that of forwarding
Recommended from our members
Availability, Integrity, and Confidentiality for Content Centric Network internet architectures
The Internet as we know it today, despite being ``the result of a series of accidents of choices'' in Prof. Jon Crowcroft's words, has undoubtedly been an amazing success story. However, it has been constantly challenged by the demands of the overwhelming evolution of data traffic types, non-functional needs of applications and users, and device diversity. The phrase ``future internet architecture'' can be interpreted as referring to a revised set of design principles. As Dr David Clark rightfully suggested, we need to ``allow for the future in the face of the present''. Content Centric Networking (CCN) is one of the candidates for a future internet architecture. Security is one of the most significant considerations while designing a future internet architecture. Availability, Integrity, and Confidentiality (AIC) are considered the three most crucial components of security: 1) availability is the assurance of continuous, reliable, and uninterrupted access to the information by authorized people, 2) integrity is the preservation of information and prevention of any change in it caused via accident or malicious intent, and 3) confidentiality is the ability to keep the information secret from unintended audience, intruders, and adversaries. This thesis discusses AIC related security threats and corresponding remedies for Named Data Networking (NDN) which is a promising example of CCN. It also presents a system dynamics modelling approach to bridge the gap between the technical solutions and business strategy by quantifying some of the qualitative variables salient to technology architects, policymakers, lawmakers, regulators, and internet service providers for the design of a future-proof internet architecture
Efficient Control Message Dissemination in Dense Wireless Lighting Networks
Modern lighting systems using LED light sources lead to dense lighting installations. The control of such systems using wireless Machine-to-Machine (M2M) where standard LED light sources are replaced by wirelessly controllable LED light sources create new problems which are investigated in this thesis. Current approaches for control message transmission is such networks are based on broadcasting messages among luminaires. However, adequate communication performance - in particular, sufficiently low latency and synchronicity - is difficult to ensure in such networks, in particular, if the network is part of a wireless building management system and carries not only low-latency broadcast messages but also collects data from sensors. In this thesis, the problem of simultaneously controlling dense wireless lighting control networks with a higher number of luminaires is addressed. Extensive computer simulation shows that current state-of-the-art protocols are not suitable for lighting control applications, especially if complex applications are required such as dimming or colour tuning. The novel D³LC-Suite is proposed, which is specially designed for dense wireless lighting control networks. This suite includes three sub-protocols. First, a protocol to organize a network in form of a cluster tree named CIDER. To ensure that intra-cluster messages can be exchanged simultaneously, a weighted colouring algorithm is applied to reduce the inter cluster interference. To disseminate efficiently control messages a protocol is proposed named RLL. The D³LC-Suite is evaluated and validated using different methods. A convergence analysis show that CIDER is able to form a network in a matter of minutes. Simulation results of RLL indicate that this protocol is well suited for dense wireless applications. In extensive experiments, it is shown that the D³LC-Suite advances the current state-of-the-art in several aspects. The suite is able to deliver control messages across multiple hops meeting the requirements of lighting applications. Especially, it provides a deterministic latency, very promising packet loss ratios in low interference environments, and mechanisms for simultaneous message delivery which is important in terms of Quality of Experience (QoE
Proposta de um protocolo de roteamento autoconfigurável para redes mesh em Bluetooth Low Energy (BLE) baseado em proactive source routing
Orientador: Yuzo IanoTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de ComputaçãoResumo: A Internet das Coisas (Internet of Things ¿ IoT) visa a criação de ambientes inteligentes como domótica, comunicação intra-veicular e redes de sensores sem fio (Wireless Sensor Network ¿ WSN), sendo que atualmente essa tecnologia vem crescendo de forma rápida. Uma das tecnologias sem fio utilizada para aplicações de curta distância que se encontra mais acessível à população, em geral, é o Bluetooth. No final de 2010, o Bluetooth Special Interest Group (Bluetooth SIG), lançou a especificação Bluetooth 4.0 e, como parte dessa especificação, tem-se o Bluetooth Low Energy (BLE). O BLE é uma tecnologia sem fio de baixíssimo consumo de potência, que pode ser alimentada por uma bateria tipo moeda, ou até mesmo por indução elétrica (energy harvesting). A natureza do Bluetooth (e BLE) é baseada na conexão do tipo Mestre/Escravo. Muitos estudos mostram como criar redes mesh baseadas no Bluetooth clássico, que são conhecidas como Scatternets, onde alguns nós são utilizados como escravos com o objetivo de repassar os dados entre os mestres. Contudo, o BLE não tinha suporte para a mudança entre mestre e escravo até o lançamento da especificação Bluetooth 4.1, em 2013. A capacidade de uma tecnologia sem fio para IoT de criar uma rede ad-hoc móvel (Mobile Ad-hoc Network ¿ MANET) é vital para poder suportar uma grande quantidade de sensores, periféricos e dispositivos que possam coexistir em qualquer ambiente. Este trabalho visa propor um novo método de autoconfiguração para BLE, com descoberta de mapa de roteamento e manutenção, sem a necessidade de mudanças entre mestre e escravo, sendo compatível com os dispositivos Bluetooth 4.0, assim como com os 4.1 e mais recentes. Qualquer protocolo de mensagens pode aproveitar o método proposto para descobrir e manter a topologia de rede mesh em cada um dos seus nósAbstract: Nowadays, the Internet of Things (IoT) is spreading rapidly towards creating smart environments. Home automation, intra-vehicular interaction, and wireless sensor networks (WSN) are among the most popular applications discussed in IoT literature. One of the most available and popular wireless technologies for short-range operations is Bluetooth. In late 2010, the Bluetooth Special Interest Group (SIG) launched the Bluetooth 4.0 Specification, which brings Bluetooth Low Energy (BLE) as part of the specification. BLE characterises as being a very low power wireless technology, capable of working on a coin-cell or even by energy scavenging. Nevertheless, the nature of Bluetooth (and BLE) has always been a connection-oriented communication in a Master/Slave configuration. Several studies exist showing how to create mesh networks for Classic Bluetooth, called Scatternets, by utilizing some nodes as slaves to relay data between Masters. However, BLE didn¿t support role changing until the 4.1 Specification released in 2013. The capability of a wireless technology to create a Mobile Ad-Hoc Network (MANET) is vital for supporting the plethora of sensors, peripherals, and devices that could coexist in any IoT environment. This work focuses on proposing a new autoconfiguring dynamic address allocation scheme for a BLE Ad-Hoc network, and a network map discovery and maintenance mechanism that doesn¿t require role changing, thus being possible to implement it in 4.0 compliant devices as well as 4.1 or later to develop a MANET. Any ad-hoc routing protocol can utilise the proposed method to discover, keep track, and maintain the mesh network node topology in each of their nodesDoutoradoTelecomunicações e TelemáticaDoutor em Engenharia ElétricaCAPE
From Traditional Adaptive Data Caching to Adaptive Context Caching: A Survey
Context data is in demand more than ever with the rapid increase in the
development of many context-aware Internet of Things applications. Research in
context and context-awareness is being conducted to broaden its applicability
in light of many practical and technical challenges. One of the challenges is
improving performance when responding to large number of context queries.
Context Management Platforms that infer and deliver context to applications
measure this problem using Quality of Service (QoS) parameters. Although
caching is a proven way to improve QoS, transiency of context and features such
as variability, heterogeneity of context queries pose an additional real-time
cost management problem. This paper presents a critical survey of
state-of-the-art in adaptive data caching with the objective of developing a
body of knowledge in cost- and performance-efficient adaptive caching
strategies. We comprehensively survey a large number of research publications
and evaluate, compare, and contrast different techniques, policies, approaches,
and schemes in adaptive caching. Our critical analysis is motivated by the
focus on adaptively caching context as a core research problem. A formal
definition for adaptive context caching is then proposed, followed by
identified features and requirements of a well-designed, objective optimal
adaptive context caching strategy.Comment: This paper is currently under review with ACM Computing Surveys
Journal at this time of publishing in arxiv.or
Media Infrastructures and the Politics of Digital Time
Digital media everyday inscribe new patterns of time, promising instant communication, synchronous collaboration, intricate time management, and profound new advantages in speed. The essays in this volume reconsider these outward interfaces of convenience by calling attention to their supporting infrastructures, the networks of digital time that exert pressures of conformity and standardization on the temporalities of lived experience and have important ramifications for social relations, stratifications of power, practices of cooperation, and ways of life. Interdisciplinary in method and international in scope, the volume draws together insights from media and communication studies, cultural studies, and science and technology studies while staging an important encounter between two distinct approaches to the temporal patterning of media infrastructures, a North American strain emphasizing the social and cultural experiences of lived time and a European tradition, prominent especially in Germany, focusing on technological time and time-critical processes
Nascom System Development Plan: System Description, Capabilities and Plans
The NASA Communications (Nascom) System Development Plan (NSDP), reissued annually, describes the organization of Nascom, how it obtains communication services, its current systems, its relationship with other NASA centers and International Partner Agencies, some major spaceflight projects which generate significant operational communication support requirements, and major Nascom projects in various stages of development or implementation