1,073 research outputs found
A Survey on the Communication Protocols and Security in Cognitive Radio Networks
A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed users. A cognitive radio network (CRN) is composed of both the secondary users with CR-enabled radios and the primary users whose radios need not be CR-enabled. Most of the active research conducted in the area of CRNs has been so far focused on spectrum sensing, allocation and sharing. There is no comprehensive review paper available on the strategies for medium access control (MAC), routing and transport layer protocols, and the appropriate representative solutions for CRNs. In this paper, we provide an exhaustive analysis of the various techniques/mechanisms that have been proposed in the literature for communication protocols (at the MAC, routing and transport layers), in the context of a CRN, as well as discuss in detail several security attacks that could be launched on CRNs and the countermeasure solutions that have been proposed to avoid or mitigate them. This paper would serve as a good comprehensive review and analysis of the strategies for MAC, routing and transport protocols and security issues for CRNs as well as would lay a strong foundation for someone to further delve onto any particular aspect in greater depth
Practical Aggregation in the Edge
Due to the increasing amounts of data produced by applications and devices, cloud infrastructures
are becoming unable to timely process and provide answers back to users.
This has led to the emergence of the edge computing paradigm that aims at moving
computations closer to end user devices. Edge computing can be defined as performing
computations outside the boundaries of cloud data centres. This however, can be materialised
across very different scenarios considering the broad spectrum of devices that can
be leveraged to perform computations in the edge.
In this thesis, we focus on a concrete scenario of edge computing, that of multiple
devices with wireless capabilities that collectively form a wireless ad hoc network to perform
distributed computations. We aim at devising practical solutions for these scenarios
however, there is a lack of tools to help us in achieving such goal. To address this first
limitation we propose a novel framework, called Yggdrasil, that is specifically tailored to
develop and execute distributed protocols over wireless ad hoc networks on commodity
devices.
As to enable distributed computations in such networks, we focus on the particular
case of distributed data aggregation. In particular, we address a harder variant of this
problem, that we dub distributed continuous aggregation, where input values used for
the computation of the aggregation function may change over time, and propose a novel
distributed continuous aggregation protocol, called MiRAge.
We have implemented and validated both Yggdrasil and MiRAge through an extensive
experimental evaluation using a test-bed composed of 24 Raspberry Pi’s. Our results
show that Yggdrasil provides adequate abstractions and tools to implement and execute
distributed protocols in wireless ad hoc settings. Our evaluation is also composed of a
practical comparative study on distributed continuous aggregation protocols, that shows
that MiRAge is more robust and achieves more precise aggregation results than competing
state-of-the-art alternatives
A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted
An elementary proposition on the dynamic routing problem in wireless networks of sensors
The routing problem (finding an optimal route from one point in a computer network to another) is surrounded by impossibility results. These results are usually expressed as lower and upper bounds on the set of nodes (or the set of links) of a network and represent the complexity of a solution to the routing problem (a routing function).
The routing problem dealt with here, in particular, is a dynamic one (it accounts for network dynamics) and concerns wireless networks of sensors. Sensors form wireless links of limited capacity and time-variable quality to route messages amongst themselves. It is desired that sensors self-organize ad hoc in order to successfully carry out a routing task, e.g. provide daily soil erosion reports for a monitored watershed, or provide immediate indications of an imminent volcanic eruption, in spite of network dynamics.
Link dynamics are the first barrier to finding an optimal route between a node x and a node y in a sensor network. The uncertainty of the outcome (the best next hop) of a routing function lies partially with the quality fluctuations of wireless links. Take, for example, a static network. It is known that, given the set of nodes and their link weights (or costs), a node can compute optimal routes by running, say, Dijkstra's algorithm. Link dynamics however suggest that costs are not static. Hence, sensors need a metric (a measurable quantity of uncertainty) to monitor for fluctuations, either improvements or degradations of quality or load; when a fluctuation is sufficiently large (say, by Delta), sensors ought to update their costs and seek another route. Therein lies the other fundamental barrier to find an optimal route - complexity.
A crude argument would suggest that sensors (and their links) have an upper bound on the number of messages they can transmit, receive and store due to resource constraints. Such messages can be application traffic, in which case it is desirable, or control traffic, in which case it should be kept minimal. The first type of traffic is demand, and a user should provision for it accordingly. The second type of traffic is overhead, and it is necessary if a routing system (or scheme) is to ensure its fidelity to the application requirements (policy). It is possible for a routing scheme to approximate optimal routes (by Delta) by reducing its message and/or memory complexity.
The common denominator of the routing problem and the desire to minimize overhead while approximating optimal routes is Delta, the deviation (or stretch) of a computed route from an optimal one, as computed by a node that has instantaneous knowledge of the set of all nodes and their interaction costs (an oracle). This dissertation deals with both problems in unison. To do so, it needs to translate the policy space (the user objectives) into a metric space (routing objectives). It does so by means of a cost function that normalizes metrics into a number of hops. Then it proceeds to devise, design, and implement a scheme that computes minimum-hop-count routes with manageable complexity.
The theory presented is founded on (well-ordered) sets with respect to an elementary proposition, that a route from a source x to a destination y can be computed either by y sending an advertisement to the set of all nodes, or by x sending a query to the set of all nodes; henceforth the proactive method (of y) and the reactive method (of x), respectively.
The debate between proactive and reactive routing protocols appears in many instances of the routing problem (e.g. routing in mobile networks, routing in delay-tolerant networks, compact routing), and it is focussed on whether nodes should know a priori all routes and then select the best one (with the proactive method), or each node could simply search for a (hopefully best) route on demand (with the reactive method).
The proactive method is stateful, as it requires the entire metric space - the set of nodes and their interaction costs - in memory (in a routing table). The routes computed by the proactive method are optimal and the lower and upper bounds of proactive schemes match those of an oracle. Any attempt to reduce the proactive overhead, e.g. by introducing hierarchies, will result in sub-optimal routes (of known stretch). The reactive method is stateless, as it requires no information whatsoever to compute a route. Reactive schemes - at least as they are presently understood - compute sub-optimal routes (and thus far, of unknown stretch).
This dissertation attempts to answer the following question: "what is the least amount of state required to compute an optimal route from a source to a destination?" A hybrid routing scheme is used to investigate this question, one that uses the proactive method to compute routes to near destinations and the reactive method for distant destinations.
It is shown that there are cases where hybrid schemes can converge to optimal routes, despite possessing incomplete routing state, and that the necessary and sufficient condition to compute optimal routes with local state alone is related neither to the size nor the density of a network; it is rather the circumference (the size of the largest cycle) of a network that matters. Counterexamples, where local state is insufficient, are discussed to derive the worst-case stretch.
The theory is augmented with simulation results and a small experimental testbed to motivate the discussion on how policy space (user requirements) can translate into metric spaces and how different metrics affect performance. On the debate between proactive and reactive protocols, it is shown that the two classes are equivalent. The dissertation concludes with a discussion on the applicability of its results and poses some open problems
Local Coordination for Interpersonal Communication Systems
The decomposition of complex applications into modular units is anacknowledged design principle for creating robust systems and forenabling the flexible re-use of modules in new applicationcontexts. Typically, component frameworks provide mechanisms and rulesfor developing software modules in the scope of a certain programmingparadigm or programming language and a certain computing platform. Forexample, the JavaBeans framework is a component framework for thedevelopment of component-based systems -- in the Java environment.In this thesis, we present a light-weight, platform-independentapproach that views a component-based application as a set of ratherloosely coupled parallel processes that can be distributed on multiplehosts and are coordinated through a protocol. The core of ourframework is the Message Bus (Mbus): an asynchronous, message-orientedcoordination protocol that is based on Internet technologies andprovides group communication between application components.Based on this framework, we have developed a local coordinationarchitecture for decomposed multimedia conferencing applications thatis designed for endpoint and gateway applications. One element of thisarchitecture is an Mbus-based protocol for the coordination of callcontrol components in conferencing applications
MOBILITY SUPPORT ARCHITECTURES FOR NEXT-GENERATION WIRELESS NETWORKS
With the convergence of the wireless networks and the Internet and the booming
demand for multimedia applications, the next-generation (beyond the third generation, or
B3G) wireless systems are expected to be all IP-based and provide real-time and non-real-time
mobile services anywhere and anytime. Powerful and efficient mobility support is
thus the key enabler to fulfil such an attractive vision by supporting various mobility
scenarios. This thesis contributes to this interesting while challenging topic.
After a literature review on mobility support architectures and protocols, the thesis
starts presenting our contributions with a generic multi-layer mobility support framework,
which provides a general approach to meet the challenges of handling comprehensive
mobility issues. The cross-layer design methodology is introduced to coordinate the
protocol layers for optimised system design. Particularly, a flexible and efficient cross-layer
signalling scheme is proposed for interlayer interactions. The proposed generic
framework is then narrowed down with several fundamental building blocks identified to
be focused on as follows.
As widely adopted, we assume that the IP-based access networks are organised into
administrative domains, which are inter-connected through a global IP-based wired core
network. For a mobile user who roams from one domain to another, macro (inter-domain)
mobility management should be in place for global location tracking and effective handoff
support for both real-time and non-real-lime applications. Mobile IP (MIP) and the Session
Initiation Protocol (SIP) are being adopted as the two dominant standard-based macro-mobility
architectures, each of which has mobility entities and messages in its own right.
The work explores the joint optimisations and interactions of MIP and SIP when utilising
the complementary power of both protocols. Two distinctive integrated MIP-SIP
architectures are designed and evaluated, compared with their hybrid alternatives and other
approaches. The overall analytical and simulation results shown significant performance
improvements in terms of cost-efficiency, among other metrics.
Subsequently, for the micro (intra-domain) mobility scenario where a mobile user
moves across IP subnets within a domain, a micro mobility management architecture is
needed to support fast handoffs and constrain signalling messaging loads incurred by intra-domain
movements within the domain. The Hierarchical MIPv6 (HMIPv6) and the Fast
Handovers for MIPv6 (FMIPv6) protocols are selected to fulfil the design requirements.
The work proposes enhancements to these protocols and combines them in an optimised
way. resulting in notably improved performances in contrast to a number of alternative
approaches
- …