1,544 research outputs found
TCP Sintok: Transmission control protocol with delay-based loss detection and contention avoidance mechanisms for mobile ad hoc networks
Mobile Ad hoc Network (MANET) consists of mobile devices that are connected to each other using a wireless channel, forming a temporary network without the aid of fixed infrastructure; in which hosts are free to move randomly as well as free to join or leave. This decentralized nature of MANET comes with new challenges that violate the design concepts of Transmission Control Protocol (TCP); the current dominant protocol of the Internet. TCP always infers packet loss as an indicator of network congestion and causes it to perform a sharp reduction to its sending rate. MANET
suffers from several types of packet losses due to its mobility feature and contention on wireless channel access and these would lead to poor TCP performance. This experimental study investigates mobility and contention issues by proposing a protocol named TCP Sintok. This protocol comprises two mechanisms: Delay-based Loss Detection Mechanism (LDM), and Contention Avoidance Mechanism (CAM). LDM was introduced to determine the cause of the packet loss by monitoring the trend of end-to-end delay samples. CAM was developed to adapt the sending rate (congestion window) according to the current network condition. A series of experimental studies were conducted to validate the effectiveness of TCP Sintok in identifying the cause of packet loss and adapting the sending rate appropriately. Two variants of TCP protocol known as TCP NewReno and ADTCP were chosen to evaluate the performance of TCP Sintok through simulation. The results demonstrate that TCP Sintok improves jitter, delay and throughput as compared to the two variants. The findings have significant
implication in providing reliable data transfer within MANET and supporting its deployment on mobile device communication
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
Controlo de congestionamento em redes sem fios
Doutoramento em Engenharia ElectrotécnicaCongestion control in wireless networks is an important and open issue.
Previous research has proven the poor performance of the Transport
Control Protocol (TCP) in such networks. The factors that contribute
to the poor performance of TCP in wireless environments concern its
unsuitability to identify/detect and react properly to network events,
its TCP window based
ow control algorithm that is not suitable for
the wireless channel, and the congestion collapse due to mobility. New
rate based mechanisms have been proposed to mitigate TCP performance
in wired and wireless networks. However, these mechanisms
also present poor performance, as they lack of suitable bandwidth estimation
techniques for multi-hop wireless networks.
It is thus important to improve congestion control performance in wireless
networks, incorporating components that are suitable for wireless
environments. A congestion control scheme which provides an e -
cient and fair sharing of the underlying network capacity and available
bandwidth among multiple competing applications is crucial to the definition
of new e cient and fair congestion control schemes on wireless
multi-hop networks.
The Thesis is divided in three parts. First, we present a performance
evaluation study of several congestion control protocols against TCP,
in wireless mesh and ad-hoc networks. The obtained results show that
rate based congestion control protocols need an eficient and accurate
underlying available bandwidth estimation technique. The second part
of the Thesis presents a new link capacity and available bandwidth estimation
mechanism denoted as rt-Winf (real time wireless inference).
The estimation is performed in real-time and without the need to intrusively
inject packets in the network. Simulation results show that
rt-Winf obtains the available bandwidth and capacity estimation with
accuracy and without introducing overhead trafic in the network.
The third part of the Thesis proposes the development of new congestion
control mechanisms to address the congestion control problems
of wireless networks. These congestion control mechanisms use cross
layer information, obtained by rt-Winf, to accurately and eficiently estimate
the available bandwidth and the path capacity over a wireless
network path. Evaluation of these new proposed mechanisms, through
ns-2 simulations, shows that the cooperation between rt-Winf and the
congestion control algorithms is able to significantly increase congestion
control eficiency and network performance.O controlo de congestionamento continua a ser extremamente importante
quando se investiga o desempenho das redes sem fios. Trabalhos
anteriores mostram o mau desempenho do Transport Control Proto-
col (TCP) em redes sem fios. Os fatores que contribuem para um
pior desempenho do TCP nesse tipo de redes s~ao: a sua falta de capacidade
para identificar/detetar e reagir adequadamente a eventos da
rede; a utilização de um algoritmo de controlo de
uxo que não é adequado
para o canal sem fios; e o colapso de congestionamento devido
á mobilidade. Para colmatar este problemas foram propostos novos
mecanismos de controlo de congestionamento baseados na taxa de
transmissão. No entanto, estes mecanismos também apresentam um
pior desempenho em redes sem fios, já que não utilizam mecanismos
adequados para a avaliação da largura de banda disponÃvel. Assim, é
importante para melhorar o desempenho do controlo de congestionamento
em redes sem fios, incluir componentes que são adequados para
esse tipo de ambientes. Um esquema de controlo de congestionamento
que permita uma partilha eficiente e justa da capacidade da rede e da
largura de banda disponÃvel entre múltiplas aplicações concorrentes é
crucial para a definição de novos, eficientes e justos mecanismos de
controlo congestionamento para as redes sem fios.
A Tese está dividida em três partes. Primeiro, apresentamos um estudo
sobre a avaliação de desempenho de vários protocolos de controlo de
congestionamento relativamente ao TCP, em redes sem fios em malha
e ad-hoc. Os resultados obtidos mostram que os protocolos baseados
na taxa de transmissão precisam de uma técnica de avaliação da largura
de banda disponÃvel que seja eficiente e precisa . A segunda parte da
Tese apresenta um novo mecanismo de avaliação da capacidade da
ligação e da largura de banda disponÃvel, designada por rt-Winf (real
time wireless inference). A avaliação é realizada em tempo real e sem
a necessidade de inserir tráfego na rede. Os resultados obtidos através
de simulação e emulação mostram que o rt-Winf obtém com precisão
a largura de banda disponÃvel e a capacidade da ligação sem sobrecarregar
a rede. A terceira parte da Tese propõe novos mecanismos de
controlo de congestionamento em redes sem fios. Estes mecanismos
de controlo de congestionamento apresentam um conjunto de caracter
Ãsticas novas para melhorar o seu desempenho, de entre as quais
se destaca a utilização da informação de largura de banda disponÃvel
obtida pelo rt-Winf. Os resultados da avaliação destes mecanismos,
utilizando o simulador ns-2, permitem concluir que a cooperação entre
o rt-Winf e os algoritmos de controlo de congestionamento aumenta
significativamente o desempenho da rede
Price-Based Optimal Resource Allocation in Multi-Hop Wireless Networks
Recent advances in wireless communications and digital electronics have enabled rapid development of a variety of wireless network technologies. The undeniable popularity of wireless network is due to its ubiquity and convenience, which is appreciated by the users.
In this dissertation, we study the problem of resource allocation in multihop wireless networks (so called ad hoc networks). A wireless ad hoc network consists of a collection of wireless nodes without a fixed infrastructure. Two wireless nodes communicate with each other directly, if they are within the transmission range of each other. Otherwise, the communication is achieved through the relays of intermediate nodes. Compared with traditional wireline networks, the unique characteristics of wireless networks pose fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different network flows. Particularly, the following issues of wireless networks need fresh treatment: (1) Interference of wireless communication. Flows not only contend at the same node (contention in the time domain), but also compete for shared channel if they are within the interference ranges of each other (contention in the spatial domain). (2) Multiple resource usage. Sending data from one wireless node to another needs to consume multiple resources, most notably wireless bandwidth and battery energy. (3) Autonomous communication entities. The wireless nodes usually belong to different autonomous entities. They may lack the incentive to contribute to the network functionality in a cooperative way. (4) Rate diversity. Wireless nodes can adaptively change the transmission bit rate based on perceived channel conditions. This leads to a wireless network with rate diversity, where competing flows within the interference range transmit at different rates.
None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-end flows spanning multiple hops. Moreover, strategies proposed for wireline networks are not applicable in the context of wireless ad hoc network, due to its unique characteristics.
In this dissertation, we propose a new price-based resource allocation framework in wireless ad hoc networks to achieve optimal resource utilization and fairness among competing end-to-end flows. We build our pricing framework on the notion of maximal cliques in wireless ad hoc networks, as compared to individual links in traditional wide-area wireline networks. Based on such a price-based theoretical framework, we present a two-tier iterative algorithm. Distributed across wireless nodes, the algorithm converges to a global network optimum with respect to resource allocations. Further, we present a price pair mechanism to coordinate multiple resource allocations, and to provide incentives simultaneously such that cooperation is promoted and the desired global optimal network operating point is reached by convergence with a fully decentralized self-optimizing algorithm. Such desired network-wide global optimum is characterized with the concept of Nash bargaining solution, which not only provides the Pareto optimal point for the network, but is also consistent with the fairness axioms of game theory. Finally, we present a channel aware price generation scheme to decompose the bit rate adjustment and the flow rate allocation. The allocation result achieves channel time fairness where user fairness and channel utilization is balanced.
The major achievements of this dissertation are outlined as follows.
It models a system-wide optimal operation point of a wireless network, and outlines the solution space of resource allocation in a multihop wireless network; It presents a price-based distributed resource allocation algorithm to achieve this global optimal point; It presents a low overhead implementation of the price-based resource allocation algorithm; It presents an incentive mechanism that enables the resource allocation algorithm when users are selfish
Contention techniques for opportunistic communication in wireless mesh networks
Auf dem Gebiet der drahtlosen Kommunikation und insbesondere auf den tieferen Netzwerkschichten sind gewaltige Fortschritte zu verzeichnen. Innovative Konzepte und Technologien auf der physikalischen Schicht (PHY) gehen dabei zeitnah in zelluläre Netze ein. Drahtlose Maschennetzwerke (WMNs) können mit diesem Innovationstempo nicht mithalten. Die Mehrnutzer-Kommunikation ist ein Grundpfeiler vieler angewandter PHY Technologien, die sich in WMNs nur ungenügend auf die etablierte Schichtenarchitektur abbilden lässt. Insbesondere ist das Problem des Scheduling in WMNs inhärent komplex. Erstaunlicherweise ist der Mehrfachzugriff mit Trägerprüfung (CSMA) in WMNs asymptotisch optimal obwohl das Verfahren eine geringe Durchführungskomplexität aufweist. Daher stellt sich die Frage, in welcher Weise das dem CSMA zugrunde liegende Konzept des konkurrierenden Wettbewerbs (engl. Contention) für die Integration innovativer PHY Technologien verwendet werden kann. Opportunistische Kommunikation ist eine Technik, die die inhärenten Besonderheiten des drahtlosen Kanals ausnutzt. In der vorliegenden Dissertation werden CSMA-basierte Protokolle für die opportunistische Kommunikation in WMNs entwickelt und evaluiert. Es werden dabei opportunistisches Routing (OR) im zustandslosen Kanal und opportunistisches Scheduling (OS) im zustandsbehafteten Kanal betrachtet. Ziel ist es, den Durchsatz von elastischen Paketflüssen gerecht zu maximieren. Es werden Modelle für Überlastkontrolle, Routing und konkurrenzbasierte opportunistische Kommunikation vorgestellt. Am Beispiel von IEEE 802.11 wird illustriert, wie der schichtübergreifende Entwurf in einem Netzwerksimulator prototypisch implementiert werden kann. Auf Grundlage der Evaluationsresultate kann der Schluss gezogen werden, dass die opportunistische Kommunikation konkurrenzbasiert realisierbar ist. Darüber hinaus steigern die vorgestellten Protokolle den Durchsatz im Vergleich zu etablierten Lösungen wie etwa DCF, DSR, ExOR, RBAR und ETT.In the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY technologies rely on multi-user communication, so that the established abstraction of the network stack does not work well for WMNs. The scheduling problem in WMNs is inherent complex. Surprisingly, carrier sense multiple access (CSMA) in WMNs is asymptotically utility-optimal even though it has a low computational complexity and does not involve message exchange. Hence, the question arises whether CSMA and the underlying concept of contention allows for the assimilation of advanced PHY technologies into WMNs. In this thesis, we design and evaluate contention protocols based on CSMA for opportunistic communication in WMNs. Opportunistic communication is a technique that relies on multi-user diversity in order to exploit the inherent characteristics of the wireless channel. In particular, we consider opportunistic routing (OR) and opportunistic scheduling (OS) in memoryless and slow fading channels, respectively. We present models for congestion control, routing and contention-based opportunistic communication in WMNs in order to maximize both throughput and fairness of elastic unicast traffic flows. At the instance of IEEE 802.11, we illustrate how the cross-layer algorithms can be implemented within a network simulator prototype. Our evaluation results lead to the conclusion that contention-based opportunistic communication is feasible. Furthermore, the proposed protocols increase both throughput and fairness in comparison to state-of-the-art approaches like DCF, DSR, ExOR, RBAR and ETT
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
- …