22 research outputs found

    Contribution to quality of user experience provision over wireless networks

    Get PDF
    The widespread expansion of wireless networks has brought new attractive possibilities to end users. In addition to the mobility capabilities provided by unwired devices, it is worth remarking the easy configuration process that a user has to follow to gain connectivity through a wireless network. Furthermore, the increasing bandwidth provided by the IEEE 802.11 family has made possible accessing to high-demanding services such as multimedia communications. Multimedia traffic has unique characteristics that make it greatly vulnerable against network impairments, such as packet losses, delay, or jitter. Voice over IP (VoIP) communications, video-conference, video-streaming, etc., are examples of these high-demanding services that need to meet very strict requirements in order to be served with acceptable levels of quality. Accomplishing these tough requirements will become extremely important during the next years, taking into account that consumer video traffic will be the predominant traffic in the Internet during the next years. In wired systems, these requirements are achieved by using Quality of Service (QoS) techniques, such as Differentiated Services (DiffServ), traffic engineering, etc. However, employing these methodologies in wireless networks is not that simple as many other factors impact on the quality of the provided service, e.g., fading, interferences, etc. Focusing on the IEEE 802.11g standard, which is the most extended technology for Wireless Local Area Networks (WLANs), it defines two different architecture schemes. On one hand, the infrastructure mode consists of a central point, which manages the network, assuming network controlling tasks such as IP assignment, routing, accessing security, etc. The rest of the nodes composing the network act as hosts, i.e., they send and receive traffic through the central point. On the other hand, the IEEE 802.11 ad-hoc configuration mode is less extended than the infrastructure one. Under this scheme, there is not a central point in the network, but all the nodes composing the network assume both host and router roles, which permits the quick deployment of a network without a pre-existent infrastructure. This type of networks, so called Mobile Ad-hoc NETworks (MANETs), presents interesting characteristics for situations when the fast deployment of a communication system is needed, e.g., tactics networks, disaster events, or temporary networks. The benefits provided by MANETs are varied, including high mobility possibilities provided to the nodes, network coverage extension, or network reliability avoiding single points of failure. The dynamic nature of these networks makes the nodes to react to topology changes as fast as possible. Moreover, as aforementioned, the transmission of multimedia traffic entails real-time constraints, necessary to provide these services with acceptable levels of quality. For those reasons, efficient routing protocols are needed, capable of providing enough reliability to the network and with the minimum impact to the quality of the service flowing through the nodes. Regarding quality measurements, the current trend is estimating what the end user actually perceives when consuming the service. This paradigm is called Quality of user Experience (QoE) and differs from the traditional Quality of Service (QoS) approach in the human perspective given to quality estimations. In order to measure the subjective opinion that a user has about a given service, different approaches can be taken. The most accurate methodology is performing subjective tests in which a panel of human testers rates the quality of the service under evaluation. This approach returns a quality score, so-called Mean Opinion Score (MOS), for the considered service in a scale 1 - 5. This methodology presents several drawbacks such as its high expenses and the impossibility of performing tests at real time. For those reasons, several mathematical models have been presented in order to provide an estimation of the QoE (MOS) reached by different multimedia services In this thesis, the focus is on evaluating and understanding the multimedia-content transmission-process in wireless networks from a QoE perspective. To this end, firstly, the QoE paradigm is explored aiming at understanding how to evaluate the quality of a given multimedia service. Then, the influence of the impairments introduced by the wireless transmission channel on the multimedia communications is analyzed. Besides, the functioning of different WLAN schemes in order to test their suitability to support highly demanding traffic such as the multimedia transmission is evaluated. Finally, as the main contribution of this thesis, new mechanisms or strategies to improve the quality of multimedia services distributed over IEEE 802.11 networks are presented. Concretely, the distribution of multimedia services over ad-hoc networks is deeply studied. Thus, a novel opportunistic routing protocol, so-called JOKER (auto-adJustable Opportunistic acK/timEr-based Routing) is presented. This proposal permits better support to multimedia services while reducing the energy consumption in comparison with the standard ad-hoc routing protocols.Universidad Politécnica de CartagenaPrograma Oficial de Doctorado en Tecnologías de la Información y Comunicacione

    Telecommunication Systems

    Get PDF
    This book is based on both industrial and academic research efforts in which a number of recent advancements and rare insights into telecommunication systems are well presented. The volume is organized into four parts: "Telecommunication Protocol, Optimization, and Security Frameworks", "Next-Generation Optical Access Technologies", "Convergence of Wireless-Optical Networks" and "Advanced Relay and Antenna Systems for Smart Networks." Chapters within these parts are self-contained and cross-referenced to facilitate further study

    JTIT

    Get PDF
    kwartalni

    2022, nr 2, JTIT

    Get PDF
    kwartalni

    Advanced Resource Management Techniques for Next Generation Wireless Networks

    Get PDF
    The increasing penetration of mobile devices in everyday life is posing a broad range of research challenges to meet such a massive data demand. Mobile users seek connectivity "anywhere, at anytime". In addition, killer applications with multimedia contents, like video transmissions, require larger amounts of resources to cope with tight quality constraints. Spectrum scarcity and interference issues represent the key aspects of next generation wireless networks. Consequently, designing proper resource management solutions is critical. To this aim, we first propose a model to better assess the performance of Orthogonal Frequency-Division Multiple Access (OFDMA)-based simulated cellular networks. A link abstraction of the downlink data transmission can provide an accurate performance metric at a low computational cost. Our model combines Mutual Information-based multi-carrier compression metrics with Link-Level performance profiles, thus expressing the dependency of the transmitted data Block Error Rate (BLER) on the SINR values and on the modulation and coding scheme (MCS) being assigned. In addition, we aim at evaluating the impact of Jumboframes transmission in LTE networks, which are packets breaking the 1500-byte legacy value. A comparative evaluation is performed based on diverse network configuration criteria, thus highlighting specific limitations. In particular, we observed rapid buffer saturation under certain circumstances, due to the transmission of oversized packets with scarce radio resources. A novel cross-layer approach is proposed to prevent saturation, and thus tune the transmitted packet size with the instantaneous channel conditions, fed back through standard CQI-based procedures. Recent advances in wireless networking introduce the concept of resource sharing as one promising way to enhance the performance of radio communications. As the wireless spectrum is a scarce resource, and its usage is often found to be inefficient, it may be meaningful to design solutions where multiple operators join their efforts, so that wireless access takes place on shared, rather than proprietary to a single operator, frequency bands. In spite of the conceptual simplicity of this idea, the resulting mathematical analysis may be very complex, since it involves analytical representation of multiple wireless channels. Thus, we propose an evaluative tool for spectrum sharing techniques in OFDMA-based wireless networks, where multiple sharing policies can be easily integrated and, consequently, evaluated. On the other hand, relatively to contention-based broadband wireless access, we target an important issue in mobile ad hoc networks: the intrinsic inefficiency of the standard transmission control protocol (TCP), which presents degraded performance mainly due to mechanisms such as congestion control and avoidance. In fact, TCP was originally designed for wired networks, where packet losses indicate congestion. Conversely, channels in wireless networks might vary rapidly, thus most loss events are due to channel errors or link layer contention. We aim at designing a light-weight cross-layer framework which, differently from many other works in the literature, is based on the cognitive network paradigm. It includes an observation phase, i.e., a training set in which the network parameters are collected; a learning phase, in which the information to be used is extracted from the data; a planning phase, in which we define the strategies to trigger; an acting phase, which corresponds to dynamically applying such strategies during network simulations. The next generation mobile infrastructure frontier relies on the concept of heterogeneous networks. However, the existence of multiple types of access nodes poses new challenges such as more stringent interference constraints due to node densification and self-deployed access. Here, we propose methods that aim at extending femto cells coverage range by enabling idle User Equipments (UE) to serve as relays. This way, UEs otherwise connected to macro cells can be offloaded to femto cells through UE relays. A joint resource allocation and user association scheme based on the solutions of a convex optimization problem is proposed. Another challenging issue to be addressed in such scenarios is admission control, which is in charge of ensuring that, when a new resource reservation is accepted, previously connected users continue having their QoS guarantees honored. Thus, we consider different approaches to compute the aggregate projected capacity in OFDMA-based networks, and propose the E-Diophantine solution, whose mathematical foundation is provided along with the performance improvements to be expected, both in accuracy and computational terms

    Improving TCP behaviour to non-invasively share spectrum with safety messages in VANET

    Get PDF
    There is a broad range of technologies available for wireless communications for moving vehicles, such as Worldwide Interoperability for Microwave Access (WiMax), 3G, Dedicated Short Range Communication (DSRC)/ Wireless Access for Vehicular Environment (WAVE) and Mobile Broadband Wireless Access (MBWA). These technologies are needed to support delay-sensitive safety related applications such as collision avoidance and emergency breaking. Among them, the IEEE802.11p standard (aka DSRC/WAVE), a Wi-Fi based medium RF range technology, is considered to be one of the best suited draft architectures for time-sensitive safety applications. In addition to safety applications, however, services of non-safety nature like electronic toll tax collection, infotainment and traffic control are also becoming important these days. To support delay-insensitive infotainment applications, the DSRC protocol suite also provides facilities to use Internet Protocols. The DSRC architecture actually consists of WAVE Short Messaging Protocol (WSMP) specifically formulated for realtime safety applications as well as the conventional transport layer protocols TCP/UDP for non-safety purposes. But the layer four protocol TCP was originally designed for reliable data delivery only over wired networks, and so the performance quality was not guaranteed for the wireless medium, especially in the highly unstable network topology engendered by fast moving vehicles. The vehicular wireless medium is inherently unreliable because of intermittent disconnections caused by moving vehicles, and in addition, it suffers from multi-path and fading phenomena (and a host of others) that greatly degrade the network performance. One of the TCP problems in the context of vehicular wireless network is that it interprets transmission errors as symptomatic of an incipient congestion situation and as a result, reduces the throughput deliberately by frequently invoking slow-start congestion control algorithms. Despite the availability of many congestion control mechanisms to address this problem, the conventional TCP continues to suffer from poor performance when deployed in the Vehicular Ad-hoc Network (VANET) environment. Moreover, the way non-safety applications, when pressed into service, will treat the existing delay-sensitive safety messaging applications and the way these two types of applications interact between them are not (well) understood, and therefore, in order for them to coexist, the implication and repercussion need to be examined closely. This is especially important as IEEE 802.11p standards are not designed keeping in view the issues TCP raises in relation to safety messages. This dissertation addresses the issues arising out of this situation and in particular confronts the congestion challenges thrown up in the context of heterogenous communication in VANET environment by proposing an innovative solution with two optimized congestion control algorithms. Extensive simulation studies conducted by the author shows that both these algorithms have improved TCP performance in terms of metrics like Packet Delivery Fraction (PDF), Packet Loss and End-to-End Delay (E2ED), and at the same time they encourage the non-safety TCP application to behave unobtrusively and cooperatively to a large extent with DSRC’s safety applications. The first algorithm, called vScalable-TCP – a modification of the existing TCPScalable variant – introduces a reliable transport protocol suitable for DSRC. In the proposed approach, whenever packets are discarded excessively due to congestion, the slow-start mechanism is purposely suppressed temporarily to avoid further congestion and packet loss. The crucial idea here is how to adjust and regulate the behaviour of vScalable-TCP in a way that the existing safety message flows are least disturbed. The simulation results confirm that the new vScalable-TCP provides better performance for real-time safety applications than TCP-Reno and other TCP variants considered in this thesis in terms of standard performance metrics. The second algorithm, named vLP-TCP – a modification of the existing TCP-LP variant – is designed to test and demonstrate that the strategy developed for vScalable-TCP is also compatible with another congestion control mechanism and achieves the same purpose. This expectation is borne out well by the simulation results. The same slow-start congestion management strategy has been employed but with only a few amendments. This modified algorithm also improves substantially the performance of basic safety management applications. The present work thus clearly confirms that both vScalable-TCP and vLP-TCP algorithms – the prefix ‘v’ to the names standing for ‘vehicular’ – outperform the existing unadorned TCP-Scalable and TCP-LP algorithms, in terms of standard performance metrics, while at the same time behaving in a friendly manner, by way of sharing bandwidth non-intrusively with DSRC safety applications. This paves the way for the smooth and harmonious coexistence of these two broad, clearly incompatible or complementary categories of applications – viz. time-sensitive safety applications and delay-tolerant infotainment applications – by narrowing down their apparent impedance or behavioural mismatch, when they are coerced to go hand in hand in a DSRC environment
    corecore