3,175 research outputs found

    Reducing Congestion Effects by Multipath Routing in Wireless Networks

    Get PDF
    We propose a solution to improve fairness and increasethroughput in wireless networks with location information.Our approach consists of a multipath routing protocol, BiasedGeographical Routing (BGR), and two congestion controlalgorithms, In-Network Packet Scatter (IPS) and End-to-EndPacket Scatter (EPS), which leverage BGR to avoid the congestedareas of the network. BGR achieves good performancewhile incurring a communication overhead of just 1 byte perdata packet, and has a computational complexity similar togreedy geographic routing. IPS alleviates transient congestion bysplitting traffic immediately before the congested areas. In contrast,EPS alleviates long term congestion by splitting the flow atthe source, and performing rate control. EPS selects the pathsdynamically, and uses a less aggressive congestion controlmechanism on non-greedy paths to improve energy efficiency.Simulation and experimental results show that our solutionachieves its objectives. Extensive ns-2 simulations show that oursolution improves both fairness and throughput as compared tosingle path greedy routing. Our solution reduces the variance ofthroughput across all flows by 35%, reduction which is mainlyachieved by increasing throughput of long-range flows witharound 70%. Furthermore, overall network throughput increasesby approximately 10%. Experimental results on a 50-node testbed are consistent with our simulation results, suggestingthat BGR is effective in practice

    Cross-layer design of multi-hop wireless networks

    Get PDF
    MULTI -hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others’ data packets. The distributed nature of such networks makes them suitable for a variety of applications where there are no assumed reliable central entities, or controllers, and may significantly improve the scalability issues of conventional single-hop wireless networks. This Ph.D. dissertation mainly investigates two aspects of the research issues related to the efficient multi-hop wireless networks design, namely: (a) network protocols and (b) network management, both in cross-layer design paradigms to ensure the notion of service quality, such as quality of service (QoS) in wireless mesh networks (WMNs) for backhaul applications and quality of information (QoI) in wireless sensor networks (WSNs) for sensing tasks. Throughout the presentation of this Ph.D. dissertation, different network settings are used as illustrative examples, however the proposed algorithms, methodologies, protocols, and models are not restricted in the considered networks, but rather have wide applicability. First, this dissertation proposes a cross-layer design framework integrating a distributed proportional-fair scheduler and a QoS routing algorithm, while using WMNs as an illustrative example. The proposed approach has significant performance gain compared with other network protocols. Second, this dissertation proposes a generic admission control methodology for any packet network, wired and wireless, by modeling the network as a black box, and using a generic mathematical 0. Abstract 3 function and Taylor expansion to capture the admission impact. Third, this dissertation further enhances the previous designs by proposing a negotiation process, to bridge the applications’ service quality demands and the resource management, while using WSNs as an illustrative example. This approach allows the negotiation among different service classes and WSN resource allocations to reach the optimal operational status. Finally, the guarantees of the service quality are extended to the environment of multiple, disconnected, mobile subnetworks, where the question of how to maintain communications using dynamically controlled, unmanned data ferries is investigated

    The Embedding Capacity of Information Flows Under Renewal Traffic

    Full text link
    Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e.g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no traffic analysis can detect it. We study the best undetectable embedding policy and the corresponding maximum flow rate ---that we call the embedding capacity--- under the assumption that the cover traffic can be modeled as arbitrary renewal processes. We find that computing the embedding capacity requires the inversion of very structured linear systems that, for a broad range of renewal models encountered in practice, admits a fully analytical expression in terms of the renewal function of the processes. Our main theoretical contribution is a simple closed form of such relationship. This result enables us to explore properties of the embedding capacity, obtaining closed-form solutions for selected distribution families and a suite of sufficient conditions on the capacity ordering. We evaluate our solution on real network traces, which shows a noticeable match for tight delay constraints. A gap between the predicted and the actual embedding capacities appears for looser constraints, and further investigation reveals that it is caused by inaccuracy of the renewal traffic model rather than of the solution itself.Comment: Sumbitted to IEEE Trans. on Information Theory on March 10, 201

    Energy Harvesting Wireless Communications: A Review of Recent Advances

    Get PDF
    This article summarizes recent contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from the information-theoretic performance limits to transmission scheduling policies and resource allocation, medium access and networking issues. The emerging related area of energy transfer for self-sustaining energy harvesting wireless networks is considered in detail covering both energy cooperation aspects and simultaneous energy and information transfer. Various potential models with energy harvesting nodes at different network scales are reviewed as well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications (Special Issue: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer

    ActMesh- A Cognitive Resource Management paradigm for dynamic mobile Internet Access with Reliability Guarantees

    Get PDF
    Wireless Mesh Networks (WMNs) are going increasing attention as a flexible low-cost networking architecture to provide media Internet access over metropolitan areas to mobile clients requiring multimedia services. In WMNs, Mesh Routers (MRs) from the mesh backbone and accomplish the twofold task of traffic forwarding, as well as providing multimedia access to mobile Mesh Clients (MCs). Due to the intensive bandwidth-resource requested for supporting QoS-demanding multimedia services, performance of the current WMNs is mainly limited by spectrum-crowding and traffic-congestion, as only scarce spectrum-resources is currently licensed for the MCs' access. In principle, this problem could be mitigated by exploiting in a media-friendly (e.g., content-aware) way the context-aware capabilities offered by the Cognitive Radio (CR) paradigm. As integrated exploitation of both content and context-aware system's capabilities is at the basis of our proposed Active Mesh (ActMesh) networking paradigm. This last aims at defining a network-wide architecture for realizing media-friendly Cognitive Mesh nets (e.g., context aware Cognitive Mesh nets). Hence, main contribution of this work is four fold: 1. After introducing main functional blocks of our ActMesh architecture, suitable self-adaptive Belief Propagation and Soft Data Fusion algorithms are designed to provide context-awareness. This is done under both cooperative and noncooperative sensing frameworks. 2. The resulting network-wide resource management problem is modelled as a constrained stochastic Network Utility Maximization (NUM) problem, with the dual (contrasting) objective to maximize spectrum efficiency at the network level, while accounting for the perceived quality of the delivered media flows at the client level. 3. A fully distributed, scalable and self-adaptive implementation of the resulting Active Resource Manager (ARM) is deployed, that explicitly accounts for the energy limits of the battery powered MCs and the effects induced by both fading and client mobility. Due to informationally decentralized architecture of the ActMesh net, the complexity of (possibly, optimal) centralized solutions for resource management becomes prohibitive when number of MCs accessing ActMesh net grow. Furthermore, centralized resource management solutions could required large amounts of time to collect and process the required network information, which, in turn, induce delay that can be unacceptable for delay sensitive media applications, e.g., multimedia streaming. Hence, it is important to develop network-wide ARM policies that are both distributed and scalable by exploiting the radio MCs capabilities to sense, adapt and coordinate themselves. We validate our analytical models via simulation based numerical tests, that support actual effectiveness of the overall ActMesh paradigm, both in terms of objective and subjective performance metrics. In particular, the basic tradeoff among backbone traffic-vs-access traffic arising in the ActMesh net from the bandwidth-efficient opportunistic resource allocation policy pursued by the deployed ARM is numerically characterized. The standardization framework we inspire to is the emerging IEEE 802.16h one

    ActMesh- A Cognitive Resource Management paradigm for dynamic mobile Internet Access with Reliability Guarantees

    Get PDF
    Wireless Mesh Networks (WMNs) are going increasing attention as a flexible low-cost networking architecture to provide media Internet access over metropolitan areas to mobile clients requiring multimedia services. In WMNs, Mesh Routers (MRs) from the mesh backbone and accomplish the twofold task of traffic forwarding, as well as providing multimedia access to mobile Mesh Clients (MCs). Due to the intensive bandwidth-resource requested for supporting QoS-demanding multimedia services, performance of the current WMNs is mainly limited by spectrum-crowding and traffic-congestion, as only scarce spectrum-resources is currently licensed for the MCs' access. In principle, this problem could be mitigated by exploiting in a media-friendly (e.g., content-aware) way the context-aware capabilities offered by the Cognitive Radio (CR) paradigm. As integrated exploitation of both content and context-aware system's capabilities is at the basis of our proposed Active Mesh (ActMesh) networking paradigm. This last aims at defining a network-wide architecture for realizing media-friendly Cognitive Mesh nets (e.g., context aware Cognitive Mesh nets). Hence, main contribution of this work is four fold: 1. After introducing main functional blocks of our ActMesh architecture, suitable self-adaptive Belief Propagation and Soft Data Fusion algorithms are designed to provide context-awareness. This is done under both cooperative and noncooperative sensing frameworks. 2. The resulting network-wide resource management problem is modelled as a constrained stochastic Network Utility Maximization (NUM) problem, with the dual (contrasting) objective to maximize spectrum efficiency at the network level, while accounting for the perceived quality of the delivered media flows at the client level. 3. A fully distributed, scalable and self-adaptive implementation of the resulting Active Resource Manager (ARM) is deployed, that explicitly accounts for the energy limits of the battery powered MCs and the effects induced by both fading and client mobility. Due to informationally decentralized architecture of the ActMesh net, the complexity of (possibly, optimal) centralized solutions for resource management becomes prohibitive when number of MCs accessing ActMesh net grow. Furthermore, centralized resource management solutions could required large amounts of time to collect and process the required network information, which, in turn, induce delay that can be unacceptable for delay sensitive media applications, e.g., multimedia streaming. Hence, it is important to develop network-wide ARM policies that are both distributed and scalable by exploiting the radio MCs capabilities to sense, adapt and coordinate themselves. We validate our analytical models via simulation based numerical tests, that support actual effectiveness of the overall ActMesh paradigm, both in terms of objective and subjective performance metrics. In particular, the basic tradeoff among backbone traffic-vs-access traffic arising in the ActMesh net from the bandwidth-efficient opportunistic resource allocation policy pursued by the deployed ARM is numerically characterized. The standardization framework we inspire to is the emerging IEEE 802.16h one

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Performance Modelling and Optimisation of Multi-hop Networks

    Get PDF
    A major challenge in the design of large-scale networks is to predict and optimise the total time and energy consumption required to deliver a packet from a source node to a destination node. Examples of such complex networks include wireless ad hoc and sensor networks which need to deal with the effects of node mobility, routing inaccuracies, higher packet loss rates, limited or time-varying effective bandwidth, energy constraints, and the computational limitations of the nodes. They also include more reliable communication environments, such as wired networks, that are susceptible to random failures, security threats and malicious behaviours which compromise their quality of service (QoS) guarantees. In such networks, packets traverse a number of hops that cannot be determined in advance and encounter non-homogeneous network conditions that have been largely ignored in the literature. This thesis examines analytical properties of packet travel in large networks and investigates the implications of some packet coding techniques on both QoS and resource utilisation. Specifically, we use a mixed jump and diffusion model to represent packet traversal through large networks. The model accounts for network non-homogeneity regarding routing and the loss rate that a packet experiences as it passes successive segments of a source to destination route. A mixed analytical-numerical method is developed to compute the average packet travel time and the energy it consumes. The model is able to capture the effects of increased loss rate in areas remote from the source and destination, variable rate of advancement towards destination over the route, as well as of defending against malicious packets within a certain distance from the destination. We then consider sending multiple coded packets that follow independent paths to the destination node so as to mitigate the effects of losses and routing inaccuracies. We study a homogeneous medium and obtain the time-dependent properties of the packet’s travel process, allowing us to compare the merits and limitations of coding, both in terms of delivery times and energy efficiency. Finally, we propose models that can assist in the analysis and optimisation of the performance of inter-flow network coding (NC). We analyse two queueing models for a router that carries out NC, in addition to its standard packet routing function. The approach is extended to the study of multiple hops, which leads to an optimisation problem that characterises the optimal time that packets should be held back in a router, waiting for coding opportunities to arise, so that the total packet end-to-end delay is minimised
    • …
    corecore