4,370 research outputs found

    Characterisation of real GPRS traffic with analytical tools

    Get PDF
    With GPRS and UMTS networks lunched, wireless multimedia services are commercially becoming the most attractive applications next to voice. Because of the nature of bursty, packet-switched schemes and multiple data rates, the traditional Erlang approach and Poisson models for characterising voice-centric services traffic are not suitable for studying wireless multimedia services traffic. Therefore, research on the characterisation of wireless multimedia services traffic is very challenging. The typical reference for the study of wireless multimedia services traffic is wired Internet services traffic. However, because of the differences in network protocol, bandwidth, and QoS requirements between wired and wireless services, their traffic characterisations may not be similar. Wired network Internet traffic shows self-similarity, long-range dependence and its file sizes exhibit heavy-tailedness. This paper reports the use of existing tools to analyse real GPRS traffic data to establish whether wireless multimedia services traffic have similar properties as wired Internet services traffic

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges

    Interoperability and standardisation in community telecare: a review

    Get PDF

    μ\muNap: Practical Micro-Sleeps for 802.11 WLANs

    Get PDF
    In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design μ\muNap, a local standard-compliant energy-saving mechanism that leverages micro-sleep opportunities inherent to the CSMA operation of 802.11 WLANs. This mechanism is backwards compatible and incrementally deployable, and takes into account the timing limitations of existing hardware, as well as practical CSMA-related issues (e.g., capture effect). According to the performance assessment carried out through trace-based simulation, the use of our scheme would result in a 57% reduction in the time spent in overhearing, thus leading to an energy saving of 15.8% of the activity time.Comment: 15 pages, 12 figure

    Improving fusion of surveillance images in sensor networks using independent component analysis

    Get PDF

    Building an end user focused THz based ultra high bandwidth wireless access network: The TERAPOD approach

    Get PDF
    The TERAPOD project aims to investigate and demonstrate the feasibility of ultra high bandwidth wireless access networks operating in the Terahertz (THz) band. The proposed TERAPOD THz communication system will be developed, driven by end user usage scenario requirements and will be demonstrated within a first adopter operational setting of a Data Centre. In this article, we define the full communications stack approach that will be taken in TERAPOD, highlighting the specific challenges and aimed innovations that are targeted

    Max-min Fairness in 802.11 Mesh Networks

    Get PDF
    In this paper we build upon the recent observation that the 802.11 rate region is log-convex and, for the first time, characterise max-min fair rate allocations for a large class of 802.11 wireless mesh networks. By exploiting features of the 802.11e/n MAC, in particular TXOP packet bursting, we are able to use this characterisation to establish a straightforward, practically implementable approach for achieving max-min throughput fairness. We demonstrate that this approach can be readily extended to encompass time-based fairness in multi-rate 802.11 mesh networks
    corecore