1,569 research outputs found

    Experimentation with MANETs of Smartphones

    Full text link
    Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications on top of ad-hoc smartphone networks for experimentation purposes, and introduce a taxonomy to classify them. We present AdHocDroid, an Android package that creates an IP-level MANET of (rooted) Android smartphones, and make it publicly available to the community. AdHocDroid supports standard TCP/IP applications, providing real smartphone IEEE 802.11 MANET and the capability to easily change the routing protocol. We tested our framework on several smartphones and a laptop. We validate the MANET running off-the-shelf applications, and reporting on experimental performance evaluation, including network metrics and battery discharge rate.Comment: 6 pages, 7 figures, 1 tabl

    Data Connectivity and Smart Group Formation in Wi-Fi Direct Multi-group Networks

    Get PDF
    Users of Device-to-Device (D2D) communication need efficient content discovery mechanisms to steer their requests toward the node in their neighborhood that is most likely to satisfy them. The problem is further compounded by the lack of a central coordination entity as well as by the inherent mobility of devices, which leads to volatile topologies. In this paper, we first discuss group-based communication among non-rooted Android devices using Wi-Fi Direct, a protocol recently standardized by the Wi-Fi Alliance. We propose intra- and inter-group communication methodologies, which we validate through a simple testbed where content-centric routing is used. Next, we address the autonomous formation of groups with the goal of achieving efficient device resource utilization as well as full connectivity. Finally, we evaluate the performance of our group formation procedure both in simulation and in a real testbed involving Android devices in different topologies

    Context-Aware Configuration and Management of WiFi Direct Groups for Real Opportunistic Networks

    Full text link
    Wi-Fi Direct is a promising technology for the support of device-to-device communications (D2D) on commercial mobile devices. However, the standard as-it-is is not sufficient to support the real deployment of networking solutions entirely based on D2D such as opportunistic networks. In fact, WiFi Direct presents some characteristics that could limit the autonomous creation of D2D connections among users' personal devices. Specifically, the standard explicitly requires the user's authorization to establish a connection between two or more devices, and it provides a limited support for inter-group communication. In some cases, this might lead to the creation of isolated groups of nodes which cannot communicate among each other. In this paper, we propose a novel middleware-layer protocol for the efficient configuration and management of WiFi Direct groups (WiFi Direct Group Manager, WFD-GM) to enable autonomous connections and inter-group communication. This enables opportunistic networks in real conditions (e.g., variable mobility and network size). WFD-GM defines a context function that takes into account heterogeneous parameters for the creation of the best group configuration in a specific time window, including an index of nodes' stability and power levels. We evaluate the protocol performances by simulating three reference scenarios including different mobility models, geographical areas and number of nodes. Simulations are also supported by experimental results related to the evaluation in a real testbed of the involved context parameters. We compare WFD-GM with the state-of-the-art solutions and we show that it performs significantly better than a Baseline approach in scenarios with medium/low mobility, and it is comparable with it in case of high mobility, without introducing additional overhead.Comment: Accepted by the IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 201

    Quantifying Device-to-Device Data Transfer in 802.11 Wireless Networks

    Get PDF
    Opportunistic contacts can be very short-lived, i.e., they usually last for a few seconds to several minutes. During the short connection window of an opportunistic contact, it is important to maximize the data transfer between the nodes. The amount of data that can be transferred during an opportunistic contact (i.e., contact capability) will depend on the link layer connection establishment delay, IP address acquisition delay as well as on the data throughput. If the opportunistic network is aimed for service provisioning, the delay of the service discovery phase is also needed to be taken into account while defining the capability of the contact. Moreover, the wireless environment where the opportunistic contacts take place, can influence the overall capability of the opportunistic contacts. In the thesis, we get the opportunity to put emphasize on all these factors while quantifying the opportunistic contacts (i.e., device-to-device data transfer) in indoor 802.11b Wi-Fi networks (Infrastructure mode). This thesis makes several original contributions. First, we carefully design the indoor wireless testbed and to facilitate the experiments we build a Service Browser and Service Publisher application. Second, we conduct a site survey in the testbed area to gain an understanding on the indoor RF wave propagation characteristics. Third, we perform experiments, where we collect traces during the link-layer connection establishment, IP address acquisition and service discovery phases of opportunistic contacts. Using the collected data, we measure the delays of the different events/steps that take place during the phases mentioned above. Furthermore, we run experiments to investigate the throughput performance of data transmission between the nodes when TCP is used as the transport layer protocol and thus to check the suitability of TCP in opportunistic networks

    Universal Mobile Service Execution Framework for Device-To-Device Collaborations

    Get PDF
    There are high demands of effective and high-performance of collaborations between mobile devices in the places where traditional Internet connections are unavailable, unreliable, or significantly overburdened, such as on a battlefield, disaster zones, isolated rural areas, or crowded public venues. To enable collaboration among the devices in opportunistic networks, code offloading and Remote Method Invocation are the two major mechanisms to ensure code portions of applications are successfully transmitted to and executed on the remote platforms. Although these domains are highly enjoyed in research for a decade, the limitations of multi-device connectivity, system error handling or cross platform compatibility prohibit these technologies from being broadly applied in the mobile industry. To address the above problems, we designed and developed UMSEF - an Universal Mobile Service Execution Framework, which is an innovative and radical approach for mobile computing in opportunistic networks. Our solution is built as a component-based mobile middleware architecture that is flexible and adaptive with multiple network topologies, tolerant for network errors and compatible for multiple platforms. We provided an effective algorithm to estimate the resource availability of a device for higher performance and energy consumption and a novel platform for mobile remote method invocation based on declarative annotations over multi-group device networks. The experiments in reality exposes our approach not only achieve the better performance and energy consumption, but can be extended to large-scaled ubiquitous or IoT systems
    • …
    corecore