119 research outputs found

    Mitigating hidden node problem in an IEEE 802.16 failure resilient multi-hop wireless backhaul

    Get PDF
    Backhaul networks are used to interconnect access points and further connect them to gateway nodes which are located in regional or metropolitan centres. Conventionally, these backhaul networks are established using metallic cables, optical fibres, microwave or satellite links. With the proliferation of wireless technologies, multi-hop wireless backhaul networks emerge as a potential cost effective and flexible solution to provide extended coverage to areas where the deployment of wired backhaul is difficult or cost-prohibitive, such as the difficult to access and sparsely populated remote areas, which have little or no existing wired infrastructure.Nevertheless, wireless backhaul networks are vulnerable to node or link failures. In order to ensure undisrupted traffic transmission even in the presence of failures, additional nodes and links are introduced to create alternative paths between each source and destination pair. Moreover, the deployment of such extra links and nodes requires careful planning to ensure that available network resources can be fully utilised, while still achieving the specified failure resilience with minimum infrastructure establishment cost.The majority of the current research efforts focus on improving the failure resilience of wired backhaul networks but little is carried out on the wireless counterparts. Most of the existing studies on improving the failure resilience of wireless backhaul networks concern energy-constrained networks such as the wireless sensor and ad hoc networks. Moreover, they tend to focus on maintaining the connectivity of the networks during failure, but neglecting the network performance. As such, it calls for a better approach to design a wireless backhaul network, which can meet the specified failure resilience requirement with minimum network cost, while achieving the specified quality of service (QoS).In this study, a failure resilient wireless backhaul topology, taking the form of a ladder network, is proposed to connect a remote community to a gateway node located in a regional or metropolitan centre. This topology is designed with the use of a minimum number of nodes. Also, it provides at least one backup path between each node pair. With the exception of a few failure scenarios, the proposed ladder network can sustain multiple simultaneous link or node failures. Furthermore, it allows traffic to traverse a minimum number of additional hops to arrive at the destination during failure conditions.WiMax wireless technology, based on the IEEE 802.16 standard, is applied to the proposed ladder network of different hop counts. This wireless technology can operate in either point-to-multipoint single-hop mode or multi-hop mesh mode. For the latter, coordinated distributed scheduling involving a three-way handshake procedure is used for resource allocation. Computer simulations are used to extensively evaluate the performance of the ladder network. It is shown that the three-way handshake suffers from severe hidden node problem, which restrains nodes from data transmission for long period of time. As a result, data packets accumulate in the buffer queue of the affected nodes and these packets will be dropped when the buffer overflows. This in turn results in the degradation of the network throughput and increase of average transmission delay.A new scheme called reverse notification (RN) is proposed to overcome the hidden node problem. With this new scheme, all the nodes will be informed of the minislots requested by their neighbours. This will prevent the nodes from making the same request and increase the chance for the nodes to obtain all their requested resources, and start transmitting data as soon as the handshake is completed. Computer simulations have verified that the use of this RN can significantly reduce the hidden terminal problem and thus increase network throughput, as well as reduce transmission delay.In addition, two new schemes, namely request-resend and dynamic minislot allocation, are proposed to further mitigate the hidden node problem as it deteriorates during failure. The request-resend scheme is proposed to solve the hidden node problem when the RN message failed to arrive in time at the destined node to prevent it from sending a conflicting request. On the other hand, the dynamic minislot allocation scheme is proposed to allocate minislots to a given node according to the amount of traffic that it is currently servicing. It is shown that these two schemes can greatly enhance the network performance under both normal and failure conditions.The performance of the ladder network can be further improved by equipping each node with two transceivers to allow them to transmit concurrently on two different frequency channels. Moreover, a two-channel two-transceiver channel assignment (TTDCA) algorithm is proposed to allocate minislots to the nodes. When operating with this algorithm, a node uses only one of its two transceivers to transmit control messages during control subframe and both transceivers to transmit data packets during data subframe. Also, the frequency channels of the nodes are pre-assigned to more effectively overcome the hidden node problem. It is shown that the use of the TTDCA algorithm, in conjunction with the request-resend and RN schemes, is able to double the maximum achievable throughput of the ladder network, when compared to the single channel case. Also, the throughput remains constant regardless of the hop counts.The TTDCA algorithm is further modified to make use of the second transceiver at each node to transmit control messages during control subframe. Such an approach is referred to as enhanced TTDCA (ETTDCA) algorithm. This algorithm is effective in reducing the duration needed to complete the three-way handshake without sacrificing network throughput. It is shown that the application of the ETTDCA algorithm in ladder networks of different hop counts has greatly reduced the transmission delay to a value which allows the proposed network to not only relay a large amount of data traffic but also delay-sensitive traffics. This suggests that the proposed ladder network is a cost effective solution, which can provide the necessary failure resilience and specified QoS, for delivering broadband multimedia services to the remote rural communities

    Models and Protocols for Resource Optimization in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are built on a mix of fixed and mobile nodes interconnected via wireless links to form a multihop ad hoc network. An emerging application area for wireless mesh networks is their evolution into a converged infrastructure used to share and extend, to mobile users, the wireless Internet connectivity of sparsely deployed fixed lines with heterogeneous capacity, ranging from ISP-owned broadband links to subscriber owned low-speed connections. In this thesis we address different key research issues for this networking scenario. First, we propose an analytical predictive tool, developing a queuing network model capable of predicting the network capacity and we use it in a load aware routing protocol in order to provide, to the end users, a quality of service based on the throughput. We then extend the queuing network model and introduce a multi-class queuing network model to predict analytically the average end-to-end packet delay of the traffic flows among the mobile end users and the Internet. The analytical models are validated against simulation. Second, we propose an address auto-configuration solution to extend the coverage of a wireless mesh network by interconnecting it to a mobile ad hoc network in a transparent way for the infrastructure network (i.e., the legacy Internet interconnected to the wireless mesh network). Third, we implement two real testbed prototypes of the proposed solutions as a proof-of-concept, both for the load aware routing protocol and the auto-configuration protocol. Finally we discuss the issues related to the adoption of ad hoc networking technologies to address the fragility of our communication infrastructure and to build the next generation of dependable, secure and rapidly deployable communications infrastructures

    Backhaul steering em dual band WiFi Mesh

    Get PDF
    Over the years, WiFi became an essential technology to most people. The success of the introduction of wireless devices with WiFi connectivity like laptops, smartphones, IoT sensors and others, increased the demand for better WiFi networks. Since many people have and use WiFi networks in their homes, jobs and in public places, this is an area that draws a lot of attention. The networks need better service and better coverage. To solve this challenge, WiFi Alliance developed WiFi EasyMesh, a standard for WiFi networks that utilize multiple access points that allow an easy setup and compatibility with WiFi certified devices. This technology is able to create wireless mesh networks over the WiFi protocol to increase the signal coverage. Besides this solution, the release of a new WiFi standard (WiFi 6) was also important. This new release improved the overall rates a WiFi transmission can achieve, and also introduced a set of new features that positively impact the users. This dissertation’s main objectives were to show that the use of several frequencies (2.4GHz and 5GHz) in the backhaul links of a mesh network could increase the overall performance, and to create and test a mechanism that would adapt the network topology when needed. After defining several scenarios and executing them, the obtained results showed that there are in fact situations where the use of a different frequency (2.4GHz) beyond 5GHz would increase the network’s performance. The scenarios tested multiple aspects on the mesh network such as the amount of traffic, the number of hops and frequency used by each link. The proposed mechanism showed that it was capable of identifying the need to change the network and actually change it in run-time, so it could benefit from the adoption of a new backhaul topology.Ao longo dos anos, a tecnologia WiFi tornou-se uma tecnologia essencial para a maioria das pessoas. O sucesso da indrodução de dispositivos com conectividade WiFi como computadores, smartphones e sensores IoT causou uma maior necessidade de melhores redes WiFi. Como muitas pessoas utilizam estas redes na sua casa, no seu trabalho e em locais públicos, existe uma maior atenção para esta área das telecomunicações. Estas redes começaram a necessitar de melhor serviço e de melhor cobertura. Para resolver este desafio, a WiFi Alliance desenvolveu o WiFi EasyMesh, uma norma que utiliza múltiplos pontos de acesso que permitem ter um setup rápido e fácil (em dispositivos compativeis com WiFi). Esta tecnologia permite criar uma rede mesh para aumentar a cobertura de uma rede WiFi. Para além desta solução, a introdução do standard 802.11ax (WiFi 6) foi bastante importante para melhorar a qualidade dos serviços. Para além do aumento das taxas máximas nas transmições, esta norma também introduziu novas funcionalidades que têm impacto positivo nos utilizadores. Esta dissertação tem como objetivos mostrar que a utilização de várias frequências (5GHz e 2.4GHz) nas ligações de Backhaul de uma rede mesh podem melhorar o desempenho da mesma, e também desenvolver um mechanismo capaz de alterar e adaptar a rede às suas necessidades. Depois de desenvolver e testar vários cenários, foi comprovado que de facto a utilização de uma ligação em 2.4GHz, além da de 5GHz, poderia melhorar o desempenho da rede. Estes cenários testaram vários aspetos como a quantidade de tráfego na rede, o número de saltos e a frequência utilizada. O mecanismo proposto mostrou ser capaz de identificar cenários onde era necessário alterar a topologia da rede em funcionamento, e também mostrou conseguir realizar as alterações na rede mesh.Mestrado em Engenharia de Computadores e Telemátic

    Simulation of CPRI traffic on Optical Ethernet

    Get PDF
    Evolution of mobile networks calls for novel ways of reducing delays while improving the network capacity. All application types require a system to utilize the expanding data. In the future, the projection is that quality of service (QoS) will be a key measurement of any network. Delay and jitter present a challenge to achieving the QoS needed. This is due to the loss of packets experienced during transmission and retransmission. Hence, the thesis proposes a Hybrid switching solution to increase the efficiency of transport networks for mobile data. This is done by designing a model that reduces the number of wavelengths needed to transport Common Public Radio interface (CPRI) over Ethernet while sharing the same optical resources for conventional backhaul traffic. CPRI over Ethernet is an ideal method to aid in better exploitation of the resources. The proposed strategy minimizes the loss of packets by making use of the available gaps during the transmission. Implementing such a model requires a Guaranteed Service Traffic (GST) class, which does not allow for packet loss and is treated as high priority traffic. Additionally, GST has a fixed low delay that makes it resilient to any form of network failures. Moreover, CPRI assists in saving costs by exploiting the unused wavelength capacity left by the GST traffic. Backhaul traffic can exploit this unused capacity to make the system compact. The thesis considers two classes of service levels with possible set of services that have QoS. These are CPRI over Ethernet (CPRIoE) and traditional packet-based Backhaul traffic. CPRIoE is considered as the GST traffic while Backhaul is the Best Effort (BE) traffic. Both traffics are transported over the same links, sharing wavelength resources. The results indicate the effectiveness of combining services in managing multiple flows, thus saving resources and optimizing the network

    Virtualisation and resource allocation in MECEnabled metro optical networks

    Get PDF
    The appearance of new network services and the ever-increasing network traffic and number of connected devices will push the evolution of current communication networks towards the Future Internet. In the area of optical networks, wavelength routed optical networks (WRONs) are evolving to elastic optical networks (EONs) in which, thanks to the use of OFDM or Nyquist WDM, it is possible to create super-channels with custom-size bandwidth. The basic element in these networks is the lightpath, i.e., all-optical circuits between two network nodes. The establishment of lightpaths requires the selection of the route that they will follow and the portion of the spectrum to be used in order to carry the requested traffic from the source to the destination node. That problem is known as the routing and spectrum assignment (RSA) problem, and new algorithms must be proposed to address this design problem. Some early studies on elastic optical networks studied gridless scenarios, in which a slice of spectrum of variable size is assigned to a request. However, the most common approach to the spectrum allocation is to divide the spectrum into slots of fixed width and allocate multiple, consecutive spectrum slots to each lightpath, depending on the requested bandwidth. Moreover, EONs also allow the proposal of more flexible routing and spectrum assignment techniques, like the split-spectrum approach in which the request is divided into multiple "sub-lightpaths". In this thesis, four RSA algorithms are proposed combining two different levels of flexibility with the well-known k-shortest paths and first fit heuristics. After comparing the performance of those methods, a novel spectrum assignment technique, Best Gap, is proposed to overcome the inefficiencies emerged when combining the first fit heuristic with highly flexible networks. A simulation study is presented to demonstrate that, thanks to the use of Best Gap, EONs can exploit the network flexibility and reduce the blocking ratio. On the other hand, operators must face profound architectural changes to increase the adaptability and flexibility of networks and ease their management. Thanks to the use of network function virtualisation (NFV), the necessary network functions that must be applied to offer a service can be deployed as virtual appliances hosted by commodity servers, which can be located in data centres, network nodes or even end-user premises. The appearance of new computation and networking paradigms, like multi-access edge computing (MEC), may facilitate the adaptation of communication networks to the new demands. Furthermore, the use of MEC technology will enable the possibility of installing those virtual network functions (VNFs) not only at data centres (DCs) and central offices (COs), traditional hosts of VFNs, but also at the edge nodes of the network. Since data processing is performed closer to the enduser, the latency associated to each service connection request can be reduced. MEC nodes will be usually connected between them and with the DCs and COs by optical networks. In such a scenario, deploying a network service requires completing two phases: the VNF-placement, i.e., deciding the number and location of VNFs, and the VNF-chaining, i.e., connecting the VNFs that the traffic associated to a service must transverse in order to establish the connection. In the chaining process, not only the existence of VNFs with available processing capacity, but the availability of network resources must be taken into account to avoid the rejection of the connection request. Taking into consideration that the backhaul of this scenario will be usually based on WRONs or EONs, it is necessary to design the virtual topology (i.e., the set of lightpaths established in the networks) in order to transport the tra c from one node to another. The process of designing the virtual topology includes deciding the number of connections or lightpaths, allocating them a route and spectral resources, and finally grooming the traffic into the created lightpaths. Lastly, a failure in the equipment of a node in an NFV environment can cause the disruption of the SCs traversing the node. This can cause the loss of huge amounts of data and affect thousands of end-users. In consequence, it is key to provide the network with faultmanagement techniques able to guarantee the resilience of the established connections when a node fails. For the mentioned reasons, it is necessary to design orchestration algorithms which solve the VNF-placement, chaining and network resource allocation problems in 5G networks with optical backhaul. Moreover, some versions of those algorithms must also implements protection techniques to guarantee the resilience system in case of failure. This thesis makes contribution in that line. Firstly, a genetic algorithm is proposed to solve the VNF-placement and VNF-chaining problems in a 5G network with optical backhaul based on star topology: GASM (genetic algorithm for effective service mapping). Then, we propose a modification of that algorithm in order to be applied to dynamic scenarios in which the reconfiguration of the planning is allowed. Furthermore, we enhanced the modified algorithm to include a learning step, with the objective of improving the performance of the algorithm. In this thesis, we also propose an algorithm to solve not only the VNF-placement and VNF-chaining problems but also the design of the virtual topology, considering that a WRON is deployed as the backhaul network connecting MEC nodes and CO. Moreover, a version including individual VNF protection against node failure has been also proposed and the effect of using shared/dedicated and end-to-end SC/individual VNF protection schemes are also analysed. Finally, a new algorithm that solves the VNF-placement and chaining problems and the virtual topology design implementing a new chaining technique is also proposed. Its corresponding versions implementing individual VNF protection are also presented. Furthermore, since the method works with any type of WDM mesh topologies, a technoeconomic study is presented to compare the effect of using different network topologies in both the network performance and cost.Departamento de Teoría de la Señal y Comunicaciones e Ingeniería TelemáticaDoctorado en Tecnologías de la Información y las Telecomunicacione

    A Cognitive Routing framework for Self-Organised Knowledge Defined Networks

    Get PDF
    This study investigates the applicability of machine learning methods to the routing protocols for achieving rapid convergence in self-organized knowledge-defined networks. The research explores the constituents of the Self-Organized Networking (SON) paradigm for 5G and beyond, aiming to design a routing protocol that complies with the SON requirements. Further, it also exploits a contemporary discipline called Knowledge-Defined Networking (KDN) to extend the routing capability by calculating the “Most Reliable” path than the shortest one. The research identifies the potential key areas and possible techniques to meet the objectives by surveying the state-of-the-art of the relevant fields, such as QoS aware routing, Hybrid SDN architectures, intelligent routing models, and service migration techniques. The design phase focuses primarily on the mathematical modelling of the routing problem and approaches the solution by optimizing at the structural level. The work contributes Stochastic Temporal Edge Normalization (STEN) technique which fuses link and node utilization for cost calculation; MRoute, a hybrid routing algorithm for SDN that leverages STEN to provide constant-time convergence; Most Reliable Route First (MRRF) that uses a Recurrent Neural Network (RNN) to approximate route-reliability as the metric of MRRF. Additionally, the research outcomes include a cross-platform SDN Integration framework (SDN-SIM) and a secure migration technique for containerized services in a Multi-access Edge Computing environment using Distributed Ledger Technology. The research work now eyes the development of 6G standards and its compliance with Industry-5.0 for enhancing the abilities of the present outcomes in the light of Deep Reinforcement Learning and Quantum Computing

    Failure Analysis in Next-Generation Critical Cellular Communication Infrastructures

    Full text link
    The advent of communication technologies marks a transformative phase in critical infrastructure construction, where the meticulous analysis of failures becomes paramount in achieving the fundamental objectives of continuity, security, and availability. This survey enriches the discourse on failures, failure analysis, and countermeasures in the context of the next-generation critical communication infrastructures. Through an exhaustive examination of existing literature, we discern and categorize prominent research orientations with focuses on, namely resource depletion, security vulnerabilities, and system availability concerns. We also analyze constructive countermeasures tailored to address identified failure scenarios and their prevention. Furthermore, the survey emphasizes the imperative for standardization in addressing failures related to Artificial Intelligence (AI) within the ambit of the sixth-generation (6G) networks, accounting for the forward-looking perspective for the envisioned intelligence of 6G network architecture. By identifying new challenges and delineating future research directions, this survey can help guide stakeholders toward unexplored territories, fostering innovation and resilience in critical communication infrastructure development and failure prevention

    Key Management Scheme for Smart Grid

    Get PDF
    A Smart Grid (SG) is a modern electricity supply system. It uses information and communication technology (ICT) to run, monitor and control data between the generation source and the end user. It comprises a set of technologies that uses sensing, embedded processing and digital communications to intelligently control and monitor an electricity grid with improved reliability, security, and efficiency. SGs are classified as Critical Infrastructures. In the recent past, there have been cyber-attacks on SGs causing substantial damage and loss of services. A recent cyber-attack on Ukraine's SG caused over 2.3 million homes to be without power for around six hours. Apart from the loss of services, some portions of the SG are yet to be operational, due to the damage caused. SGs also face security challenges such as confidentiality, availability, fault tolerance, privacy, and other security issues. Communication and networking technologies integrated into the SG require new and existing security vulnerabilities to be thoroughly investigated. Key management is one of the most important security requirements to achieve data confidentiality and integrity in a SG system. It is not practical to design a single key management scheme/framework for all systems, actors and segments in the smart grid, since the security requirements of various sub-systems in the SG vary. We address two specific sub-systems categorised by the network connectivity layer – the Home Area Network (HAN) and the Neighbourhood Area Network (NAN). Currently, several security schemes and key management solutions for SGs have been proposed. However, these solutions lack better security for preventing common cyber-attacks such as node capture attack, replay attack and Sybil attack. We propose a cryptographic key management scheme that takes into account the differences in the HAN and NAN segments of the SG with respect to topology, authentication and forwarding of data. The scheme complies with the overall performance requirements of the smart grid. The proposed scheme uses group key management and group authentication in order to address end-to-end security for the HAN and NAN scenarios in a smart grid, which fulfils data confidentiality, integrity and scalability requirements. The security scheme is implemented in a multi-hop sensor network using TelosB motes and ZigBee OPNET simulation model. In addition, replay attack, Sybil attack and node capture attack scenarios have been implemented and evaluated in a NAN scenario. Evaluation results show that the scheme is resilient against node capture attacks and replay attacks. Smart Meters in a NAN are able to authenticate themselves in a group rather than authenticating one at a time. This significant improvement over existing schemes is discussed with comparisons with other security schemes

    Towards versatile access networks (Chapter 3)

    Get PDF
    Compared to its previous generations, the 5th generation (5G) cellular network features an additional type of densification, i.e., a large number of active antennas per access point (AP) can be deployed. This technique is known as massive multipleinput multiple-output (mMIMO) [1]. Meanwhile, multiple-input multiple-output (MIMO) evolution, e.g., in channel state information (CSI) enhancement, and also on the study of a larger number of orthogonal demodulation reference signal (DMRS) ports for MU-MIMO, was one of the Release 18 of 3rd generation partnership project (3GPP Rel-18) work item. This release (3GPP Rel-18) package approval, in the fourth quarter of 2021, marked the start of the 5G Advanced evolution in 3GPP. The other items in 3GPP Rel-18 are to study and add functionality in the areas of network energy savings, coverage, mobility support, multicast broadcast services, and positionin

    Improving the Reliability of Optimised Link State Routing Protocol in Smart Grid’s Neighbour Area Network

    Get PDF
    A reliable and resilient communication infrastructure that can cope with variable application traffic types and delay objectives is one of the prerequisites that differentiates a Smart Grid from the conventional electrical grid. However, the legacy communication infrastructure in the existing electrical grid is insufficient, if not incapable of satisfying the diverse communication requirements of the Smart Grid. The IEEE 802.11 ad hoc Wireless Mesh Network (WMN) is re-emerging as one of the communication networks that can significantly extend the reach of Smart Grid to backend devices through the Advanced Metering Infrastructure (AMI). However, the unique characteristics of AMI application traffic in the Smart Grid poses some interesting challenges to conventional communication networks including the ad hoc WMN. Hence, there is a need to modify the conventional ad hoc WMN, to address the uncertainties that may exist in its applicability in a Smart Grid environment. This research carries out an in-depth study of the communication of Smart Grid application traffic types over ad hoc WMN deployed in the Neighbour Area Network (NAN). It begins by conducting a critical review of the application characteristics and traffic requirements of several Smart Grid applications and highlighting some key challenges. Based on the reviews, and assuming that the application traffic types use the internet protocol (IP) as a transport protocol, a number of Smart Grid application traffic profiles were developed. Through experimental and simulation studies, a performance evaluation of an ad hoc WMN using the Optimised Link State Routing (OLSR) routing protocol was carried out. This highlighted some capacity and reliability issues that routing AMI application traffic may face within a conventional ad hoc WMN in a Smart Grid NAN. Given the fact that conventional routing solutions do not consider the traffic requirements when making routing decisions, another key observation is the inability of link metrics in routing protocols to select good quality links across multiple hops to a destination and also provide Quality of Service (QoS) support for target application traffic. As with most routing protocols, OLSR protocol uses a single routing metric acquired at the network layer, which may not be able to accommodate different QoS requirements for application traffic in Smart Grid. To address these problems, a novel multiple link metrics approach to improve the reliability performance of routing in ad hoc WMN when deployed for Smart Grid is presented. It is based on the OLSR protocol and explores the possibility of applying QoS routing for application traffic types in NAN based ad hoc WMN. Though routing in multiple metrics has been identified as a complex problem, Multi-Criteria Decision Making (MCDM) techniques such as the Analytical Hierarchy Process (AHP) and pruning have been used to perform such routing on wired and wireless multimedia applications. The proposed multiple metrics OLSR with AHP is used to offer the best available route, based on a number of considered metric parameters. To accommodate the variable application traffic requirements, a study that allows application traffic to use the most appropriate routing metric is presented. The multiple metrics development is then evaluated in Network Simulator 2.34; the simulation results demonstrate that it outperforms existing routing methods that are based on single metrics in OLSR. It also shows that it can be used to improve the reliability of application traffic types, thereby overcoming some weaknesses of existing single metric routing across multiple hops in NAN. The IEEE 802.11g was used to compare and analyse the performance of OLSR and the IEEE 802.11b was used to implement the multiple metrics framework which demonstrate a better performance than the single metric. However, the multiple metrics can also be applied for routing on different IEEE wireless standards, as well as other communication technologies such as Power Line Communication (PLC) when deployed in Smart Grid NAN
    corecore