16 research outputs found

    Implementation of Ad-Hoc Protocol On Tandem Multihop Wireless Network

    Get PDF
    The utilization of Internet of Things (IoT) technology, especially in remote areas, is still relatively low, even though the technology is required to implement smart farming or smart villages, which aims to improve the quality of life of people in rural areas. The high investment cost for IoT networks that still use cellular networks or Wi-Fi is one of the causes of the slow implementation of this technology. Our previous research has developed an alternative network for IoT devices in remote areas with the concept of a Tandem Multihop Wireless Network focusing on developing simple message scheduling. This research focuses on implementing ad-hoc routing protocols in tandem with multi-hop wireless to analyze the advantages and disadvantages of the protocol. Each sensor periodically sends data to the monitoring server via IoT devices on each tower. The scenario was implemented using MININET-WIFI. Evaluations were carried out to determine delivery probability, latency average, and jitter. In general, the two Ad-Hoc protocols tested, namely OLSR and BATMAN, had the same performance when the data sent was 1 MB, but when the data size was increased to 2 MB, the OLSR routing protocol on several nodes had better performance than BATMAN.The utilization of Internet of Things (IoT) technology, especially in remote areas, is still relatively low, even though the technology is required to implement smart farming or smart villages, which aims to improve the quality of life of people in rural areas. The high investment cost for IoT networks that still use cellular networks or Wi-Fi is one of the causes of the slow implementation of this technology. Our previous research has developed an alternative network for IoT devices in remote areas with the concept of a Tandem Multihop Wireless Network focusing on developing simple message scheduling. This research focuses on implementing ad-hoc routing protocols in tandem with multi-hop wireless to analyze the advantages and disadvantages of the protocol. Each sensor periodically sends data to the monitoring server via IoT devices on each tower. The scenario was implemented using MININET-WIFI. Evaluations were carried out to determine delivery probability, latency average, and jitter. In general, the two Ad-Hoc protocols tested, namely OLSR and BATMAN, had the same performance when the data sent was 1 MB, but when the data size was increased to 2 MB, the OLSR routing protocol on several nodes had better performance than BATMAN

    An approach to pervasive monitoring in dynamic learning contexts : data sensing, communication support and awareness provision

    Get PDF
    It is within the capabilities of current technology to support the emerging learning paradigms. These paradigms suggest that today’s learning activities and environments are pervas ive and require a higher level of dynamism than the traditional learning contexts. Therefore, we have to rethink our approach to learning and use technology not only as a digital information support, but also as an instrument to reinforce knowledge, foster collaboration, promote creativity and provide richer learning experiences. Particularly, this thesis was motivated by the rapidly growing number of smartphone users and the fact that these devices are increasingly becoming more and more resource-rich, in terms of their communication and sensing technologies, display capabilities battery autonomy, etc. Hence, this dissertation benefits from the ubiquity and development of mobile technology, aiming to bridge the gap between the challenges posed by modern learning requirements and the capabilities of current technology. The sensors embedded in smartphones can be used to capture diverse behavioural and social aspects of the users. For example, using microphone and Bluetooth is possible to identify conversation patterns, discover users in proximity and detect face-to-face meetings. This fact opens up exciting possibilities to monitor the behaviour of the user and to provide meaningful feedback. This feedback offers useful information that can help people be aware of and reflect on their behaviour and its effects, and take the necessary actions to improve them. Consequently, we propose a pervasive monitoring system that take advantage of the capabilities of modern smartphones, us ing them to s upport the awarenes s provis ion about as pects of the activities that take place in today’s pervas ive learning environments. This pervasive monitoring system provides (i) an autonomous sensing platform to capture complex information about processes and interactions that take place across multiple learning environments, (ii) an on-demand and s elf-m anaged communication infras tructure, and (ii) a dis play facility to provide “awarenes s inform ation” to the s tudents and/or lecturers. For the proposed system, we followed a research approach that have three main components. First, the description of a generalized framework for pervasive sensing that enables collaborative sensing interactions between smartphones and other types of devices. By allowing complex data capture interactions with diverse remote sensors, devices and data sources, this framework allows to improve the information quality while saving energy in the local device. Second, the evaluation, through a real-world deployment, of the suitability of ad hoc networks to support the diverse communication processes required for pervasive monitoring. This component also includes a method to improve the scalability and reduce the costs of these networks. Third, the design of two awareness mechanisms to allow flexible provision of information in dynamic and heterogeneous learning contexts. These mechanisms rely on the use of smartphones as adaptable devices that can be used directly as awareness displays or as communication bridges to enable interaction with other remote displays available in the environment. Diverse aspects of the proposed system were evaluated through a number of simulations, real-world experiments, user studies and prototype evaluations. The experimental evaluation of the data capture and communication aspects of the system provided empirical evidence of the usefulness and suitability of the proposed approach to support the development of pervasive monitoring solutions. In addition, the proof-of-concept deployments of the proposed awareness mechanisms, performed in both laboratory and real-world learning environments, provided quantitative and qualitative indicators that such mechanisms improve the quality of the awareness information and the user experienceLa tecnología moderna tiene capacidad de dar apoyo a los paradigmas de aprendizaje emergentes. Estos paradigmas sugieren que las actividades de aprendizaje actuales, caracterizadas por la ubicuidad de entornos, son más dinámicas y complejas que los contextos de aprendizaje tradicionales. Por tanto, tenemos que reformular nuestro acercamiento al aprendizaje, consiguiendo que la tecnología sirva no solo como mero soporte de información, sino como medio para reforzar el conocimiento, fomentar la colaboración, estimular la creatividad y proporcionar experiencias de aprendizaje enriquecedoras. Esta tesis doctoral está motivada por el vertiginoso crecimiento de usuarios de smartphones y el hecho de que estos son cada vez más potentes en cuanto a tecnologías de comunicación, sensores, displays, autonomía energética, etc. Por tanto, esta tesis aprovecha la ubicuidad y el desarrollo de esta tecnología, con el objetivo de reducir la brecha entre los desafíos del aprendizaje moderno y las capacidades de la tecnología actual. Los sensores integrados en los smartphones pueden ser utilizados para reconocer diversos aspectos del comportamiento individual y social de los usuarios. Por ejemplo, a través del micrófono y el Bluetooth, es posible determinar patrones de conversación, encontrar usuarios cercanos y detectar reuniones presenciales. Este hecho abre un interesante abanico de posibilidades, pudiendo monitorizar aspectos del comportamiento del usuario y proveer un feedback significativo. Dicho feedback, puede ayudar a los usuarios a reflexionar sobre su comportamiento y los efectos que provoca, con el fin de tomar medidas necesarias para mejorarlo. Proponemos un sistema de monitorización generalizado que aproveche las capacidades de los smartphones para proporcionar información a los usuarios, ayudándolos a percibir y tomar conciencia sobre diversos aspectos de las actividades que se desarrollan en contextos de aprendizaje modernos. Este sistema ofrece: (i) una plataforma de detección autónoma, que captura información compleja sobre los procesos e interacciones de aprendizaje; (ii) una infraestructura de comunicación autogestionable y; (iii) un servicio de visualización que provee “información de percepción” a estudiantes y/o profesores. Para la elaboración de este sistema nos hemos centrado en tres áreas de investigación. Primero, la descripción de una infraestructura de detección generalizada, que facilita interacciones entre smartphones y otros dispositivos. Al permitir interacciones complejas para la captura de datos entre diversos sensores, dispositivos y fuentes de datos remotos, esta infraestructura consigue mejorar la calidad de la información y ahorrar energía en el dispositivo local. Segundo, la evaluación, a través de pruebas reales, de la idoneidad de las redes ad hoc como apoyo de los diversos procesos de comunicación requeridos en la monitorización generalizada. Este área incluye un método que incrementa la escalabilidad y reduce el coste de estas redes. Tercero, el diseño de dos mecanismos de percepción que permiten la provisión flexible de información en contextos de aprendizaje dinámicos y heterogéneos. Estos mecanismos descansan en la versatilidad de los smartphones, que pueden ser utilizados directamente como displays de percepción o como puentes de comunicación que habilitan la interacción con otros displays remotos del entorno. Diferentes aspectos del sistema propuesto han sido evaluados a través de simulaciones, experimentos reales, estudios de usuarios y evaluaciones de prototipos. La evaluación experimental proporcionó evidencia empírica de la idoneidad del sistema para apoyar el desarrollo de soluciones de monitorización generalizadas. Además, las pruebas de concepto realizadas tanto en entornos de aprendizajes reales como en el laboratorio, aportaron indicadores cuantitativos y cualitativos de que estos mecanismos mejoran la calidad de la información de percepción y la experiencia del usuario.Postprint (published version

    H3N - Analysewerkzeuge für hybride Wegewahl in heterogenen, unterbrechungstoleranten Ad-Hoc-Netzen für Rettungskräfte

    Get PDF
    Rettungskräfte müssen unter widrigen Bedingungen zuverlässig kommunizieren können, um in Rettungseinsätzen effizient arbeiten zu können und somit Leben zu retten. Idealerweise ist dazu ein selbstorganisiertes Ad-Hoc-Netz notwendig, weil die Kommunikationsinfrastruktur ggf. beschädigt oder überlastet sein kann. Um die geforderte Robustheit der Kommunikation auch in Szenarien mit größeren zu überbrückenden Entfernungen zu gewährleisten, werden zusätzlich Mechanismen benötigt, die eine Unterbrechungstoleranz ermöglichen. Verzögerungstolerante Netze (engl. Delay Tolerant Networks, kurz: DTN) stellen solche Mechanismen bereit, erfordern aber zusätzliche Verzögerungen, die für Rettungskommunikation nachteilig sind. Deshalb werden intelligente hybride Wegewahlverfahren benötigt, um die Verzögerung durch DTN-Mechanismen zu begrenzen. Außerdem sollten entsprechende Verfahren heterogene Netze unterstützen. Das ermöglicht zusätzlich eine effizientere Weiterleitung durch die Nutzung von Geräten mit unterschiedlichen Kommunikationstechnologien und damit auch Reichweiten. Um solche Systeme und die dafür benötigten Kommunikationsprotokolle zu entwickeln, werden verschiedene Analysewerkzeuge genutzt. Dazu gehören analytische Modelle, Simulationen und Experimente auf der Zielsystemhardware. Für jede Kategorie gibt es verschiedene Werkzeuge und Frameworks, die sich auf unterschiedliche Aspekte fokussieren. Dadurch unterstützen diese herkömmlichen Analysemethoden jedoch meistens nur einen der oben genannten Punkte, während die Untersuchung von hybriden und/oder heterogenen Ansätzen und Szenarien nicht ohne weiteres möglich ist. Im Falle von Rettungskräften kommt hinzu, dass die charakteristischen Merkmale hinsichtlich der Bewegung der Knoten und des erzeugten Datenverkehrs während eines Einsatzes ebenfalls nicht modelliert werden können. In dieser Arbeit werden deshalb verschiedene Erweiterungen zu existierenden Analysewerkzeugen sowie neue Werkzeuge zur Analyse und Modelle zur Nachbildung realistischer Rettungsmissionen untersucht und entwickelt. Ziel ist es, die Vorteile existierender Werkzeuge miteinander zu kombinieren, um ganzheitliche, realitätsnahe Untersuchungen von hybriden Protokollen für heterogene Netze zu ermöglichen. Die Kombination erfolgt in Form von gezielten Erweiterungen und der Entwicklung ergänzender komplementärer Werkzeuge unter Verwendung existierender Schnittstellen. Erste Ergebnisse unter Verwendung der entwickelten Werkzeuge zeigen Verbesserungspotentiale bei der Verwendung traditioneller Protokolle und erlauben die Bewertung zusätzlicher Maßnahmen, um die Kommunikation zu verbessern. Szenarien zur Kommunikation von Rettungskräften werden dabei als ein Beispiel verwendet, die Tools sind jedoch nicht auf die Analyse dieses Anwendungsfalls beschränkt. Über die reine Analyse verschiedener existierender Ansätze hinaus bildet die entwickelte Evaluationsumgebung eine Grundlage für die Entwicklung und Verifikation von neuartigen hybriden Protokollen für die entsprechenden Systeme.Communication between participating first responders is essential for efficient coordination of rescue missions and thus allowing to save human lives. Ideally, ad hoc-style communication networks are applied to this as the first responders cannot rely on infrastructure-based communication for two reasons. First, the infrastructure could be damaged by the disastrous event or not be available for economic reasons. Second, even if public infrastructure is available and functional, it might be overloaded by users. To guarantee the robustness and reliability requirements of first responders, the Mobile Ad Hoc Networks (MANETs) have to be combined with an approach to mitigate intermittent connectivity due to otherwise limited connectivity. Delay Tolerant Networks (DTNs) provide such a functionality but introduce additional delay which is problematic. Therefore, intelligent hybrid routing approaches are required to limit the delay introduced by DTN mechanisms. Besides that, the approach should be applicable to heterogeneous networks in terms of communication technologies and device capabilities. This is required for cross multi-agency and volunteer communication but also enables the opportunistic exploitation of any given communication option. To evaluate such systems and develop the corresponding communication protocols, various tools for the analysis are available. This includes analytical models, simulations and real-world experiments on target hardware. In each category a wide set of tools is available already. However, each tool is focused on specific aspects usually and thus does not provide methods to analyze hybrid approaches out of the box. Even if the tools are modular and allow an extension, there are often other tools that are better suited for partial aspects of hybrid systems. In addition to this, few tools exist to model the characteristics of first responder networks. Especially the generalized movement during missions and the generated data traffic are difficult to model and integrate into analyses. The focus of this project is therefore to develop selected extensions to existing analysis and simulation tools as well as additional tools and models to realistically capture the characteristics of first responder networks. The goal is to combine the advantages of existing specialized simulation tools to enable thorough evaluations of hybrid protocols for heterogeneous networks based on realistic assumptions. To achieve this, the tools are extended by specifically designing tools that enable the interaction between tools and new tools that complement the existing analysis capabilities. First results obtained via the resulting toolbox clearly indicate further research directions as well as a potential for protocol enhancements. Besides that, the toolbox was used to evaluate various methods to enhance the connectivity between nodes in first responder networks. First responder scenarios are used as an example here. The toolbox itself is however not limited to this use case. In addition to the analysis of existing approaches for hybrid and heterogeneous networks, the developed toolbox provides a base framework for the development and verification of newly developed protocols for such use cases

    Cooperation in open, decentralized, and heterogeneous computer networks

    Get PDF
    Community Networks (CN) are naturally open and decentralized structures, that grow organically with the addition of heterogeneous network devices, contributed and configured as needed by their participants. The continuous growth in popularity and dissemination of CNs in recent years has raised the perception of a mature and sustainable model for the provisioning of networking services. However, because such infrastructures include uncontrolled entities with non delimited responsibilities, every single network entity does indeed represent a potential single-point of failure that can stop the entire network from working, and that no other entity can prevent or even circumvent. Given the open and decentralized nature of CNs, that brings together individuals and organizations with different and even conflicting economic, political, and technical interests, the achievement of no more than basic consensus on the correctness of all network nodes is challenging. In such environment, the lack of self-determination for CN participants in terms of control and security of routing can be regarded as an obstacle for growth or even as a risk of collapse. To address this problem we first consider deployments of existing Wireless CN and we analyze their technology, characteristics, and performance. We perform an experimental evaluation of a production 802.11an Wireless CN, and compare to studies of other Wireless CN deployments in the literature. We compare experimentally obtained throughput traces with path-capacity calculations based on well-known conflict graph models. We observe that in the majority of cases the path chosen by the employed BMX6 routing protocol corresponds with the best identified path in our model. We analyze monitoring and interaction shortcomings of CNs and address these with Network Characterization Tool (NCT), a novel tool that allows users to assess network state and performance, and improve their quality of experience by individually modifying the routing parameters of their devices. We also evaluate performance outcomes when different routing policies are in use. Routing protocols provide self-management mechanisms that allow the continuous operation of a Community Mesh Network (CMN). We focus on three widely used proactive mesh routing protocols and their implementations: BMX6, OLSR, and Babel. We describe the core idea behind these protocols and study the implications of these in terms of scalability, performance, and stability by exposing them to typical but challenging network topologies and scenarios. Our results show the relative merits, costs, and limitations of the three protocols. Built upon the studied characteristics of typical CN deployments, their requirements on open and decentralized cooperation, and the potential controversy on the trustiness of particular components of a network infrastructure, we propose and evaluate SEMTOR, a novel routing-protocol that can satisfy these demands. SEMTOR allows the verifiable and undeniable definition and distributed application of individually trusted topologies for routing traffic towards each node. One unique advantage of SEMTOR is that it does not require a global consensus on the trustiness of any node and thus preserves cooperation among nodes with even oppositional defined trust specification. This gives each node admin the freedom to individually define the subset, and the resulting sub-topology, from the whole set of participating nodes that he considers sufficiently trustworthy to meet their security, data-delivery objectives and concerns. The proposed mechanisms have been realized as a usable and open-source implementation called BMX7, as successor of BMX6. We have evaluated its scalability, contributed robustness, and security. These results show that the usage of SEMTOR for securing trusted routing topologies is feasible, even when executed on real and very cheap (10 Euro, Linux SoC) routers as commonly used in Community Mesh Networks.Las Redes Comunitarias (CNs) son estructuras de naturaleza abierta y descentralizada, que crecen orgánicamente con la adición de dispositivos de red heterogéneos que aportan y configuran sus participantes según sea necesario. Sin embargo, debido a que estas infraestructuras incluyen entidades con responsabilidades poco delimitadas, cada entidad puede representar un punto de fallo que puede impedir que la red funcione y que ninguna otra entidad pueda prevenir o eludir. Dada la naturaleza abierta y descentralizada de las CNs, que agrupa individuos y organizaciones con diferentes e incluso contrapuestos intereses económicos, políticos y técnicos, conseguir poco más que un consenso básico sobre los nodos correctos en la red puede ser un reto. En este entorno, la falta de autodeterminación para los participantes de una CN en cuanto a control y seguridad del encaminamiento puede considerarse un obstáculo para el crecimiento o incluso un riesgo de colapso. Para abordar este problema consideramos las implementaciones de redes comunitarias inalámbricas (WCN) y se analiza su tecnología, características y desempeño. Realizamos una evaluación experimental de una WCN establecida y se compara con estudios de otros despliegues. Comparamos las trazas de rendimiento experimentales con cálculos de la capacidad de los caminos basados en modelos bien conocidos del grafo. Se observa que en la mayoría de los casos el camino elegido por el protocolo de encaminamiento BMX6 corresponde con el mejor camino identificado en nuestro modelo. Analizamos las limitaciones de monitorización e interacción en CNs y los tratamos con NCT, una nueva herramienta que permite evaluar el estado y rendimiento de la red, y mejorar la calidad de experiencia modificando los parámetros de sus dispositivos individuales. También evaluamos el rendimiento resultante para diferentes políticas de encaminamiento. Los protocolos de encaminamiento proporcionan mecanismos de autogestión que hacen posible el funcionamiento continuo de una red comunitaria mesh (CMN). Nos centramos en tres protocolos de encaminamiento proactivos para redes mesh ampliamente utilizados y sus implementaciones: BMX6, OLSR y Babel. Se describe la idea central de estos protocolos y se estudian la implicaciones de éstos en términos de escalabilidad, rendimiento y estabilidad al exponerlos a topologías y escenarios de red típicos pero exigentes. Nuestros resultados muestran los méritos, costes y limitaciones de los tres protocolos. A partir de las características analizadas en despliegues típicos de redes comunitarias, y de las necesidades en cuanto a cooperación abierta y descentralizada, y la esperable divergencia sobre la confiabilidad en ciertos componentes de la infraestructura de red, proponemos y evaluamos SEMTOR, un nuevo protocolo de encaminamiento que puede satisfacer estas necesidades. SEMTOR permite definir de forma verificable e innegable, así como aplicar de forma distribuida, topologías de confianza individualizadas para encaminar tráfico hacia cada nodo. Una ventaja única de SEMTOR es que no precisa de consenso global sobre la confianza en cualquier nodo y por tanto preserva la cooperación entre los nodos, incluso con especificaciones de confianza definidas por oposición. Esto proporciona a cada administrador de nodo la libertad para definir el subconjunto, y la sub-topología resultante, entre el conjunto de todos los nodos participantes que considere dignos de suficiente confianza para cumplir con su objetivo y criterio de seguridad y entrega de datos. Los mecanismos propuestos se han realizado en forma de una implementación utilizable de código abierto llamada BMX7. Se ha evaluado su escalabilidad, robustez y seguridad. Estos resultados demuestran que el uso de SEMTOR para asegurar topologías de encaminamiento de confianza es factible, incluso cuando se ejecuta en routers reales y muy baratos utilizados de forma habitual en WCN.Postprint (published version

    Self-organizing Network Optimization via Placement of Additional Nodes

    Get PDF
    Das Hauptforschungsgebiet des Graduiertenkollegs "International Graduate School on Mobile Communication" (GS Mobicom) der Technischen Universität Ilmenau ist die Kommunikation in Katastrophenszenarien. Wegen eines Desasters oder einer Katastrophe können die terrestrischen Elementen der Infrastruktur eines Kommunikationsnetzwerks beschädigt oder komplett zerstört werden. Dennoch spielen verfügbare Kommunikationsnetze eine sehr wichtige Rolle während der Rettungsmaßnahmen, besonders für die Koordinierung der Rettungstruppen und für die Kommunikation zwischen ihren Mitgliedern. Ein solcher Service kann durch ein mobiles Ad-Hoc-Netzwerk (MANET) zur Verfügung gestellt werden. Ein typisches Problem der MANETs ist Netzwerkpartitionierung, welche zur Isolation von verschiedenen Knotengruppen führt. Eine mögliche Lösung dieses Problems ist die Positionierung von zusätzlichen Knoten, welche die Verbindung zwischen den isolierten Partitionen wiederherstellen können. Hauptziele dieser Arbeit sind die Recherche und die Entwicklung von Algorithmen und Methoden zur Positionierung der zusätzlichen Knoten. Der Fokus der Recherche liegt auf Untersuchung der verteilten Algorithmen zur Bestimmung der Positionen für die zusätzlichen Knoten. Die verteilten Algorithmen benutzen nur die Information, welche in einer lokalen Umgebung eines Knotens verfügbar ist, und dadurch entsteht ein selbstorganisierendes System. Jedoch wird das gesamte Netzwerk hier vor allem innerhalb eines ganz speziellen Szenarios - Katastrophenszenario - betrachtet. In einer solchen Situation kann die Information über die Topologie des zu reparierenden Netzwerks im Voraus erfasst werden und soll, natürlich, für die Wiederherstellung mitbenutzt werden. Dank der eventuell verfügbaren zusätzlichen Information können die Positionen für die zusätzlichen Knoten genauer ermittelt werden. Die Arbeit umfasst eine Beschreibung, Implementierungsdetails und eine Evaluierung eines selbstorganisierendes Systems, welche die Netzwerkwiederherstellung in beiden Szenarien ermöglicht.The main research area of the International Graduate School on Mobile Communication (GS Mobicom) at Ilmenau University of Technology is communication in disaster scenarios. Due to a disaster or an accident, the network infrastructure can be damaged or even completely destroyed. However, available communication networks play a vital role during the rescue activities especially for the coordination of the rescue teams and for the communication between their members. Such a communication service can be provided by a Mobile Ad-Hoc Network (MANET). One of the typical problems of a MANET is network partitioning, when separate groups of nodes become isolated from each other. One possible solution for this problem is the placement of additional nodes in order to reconstruct the communication links between isolated network partitions. The primary goal of this work is the research and development of algorithms and methods for the placement of additional nodes. The focus of this research lies on the investigation of distributed algorithms for the placement of additional nodes, which use only the information from the nodes’ local environment and thus form a self-organizing system. However, during the usage specifics of the system in a disaster scenario, global information about the topology of the network to be recovered can be known or collected in advance. In this case, it is of course reasonable to use this information in order to calculate the placement positions more precisely. The work provides the description, the implementation details and the evaluation of a self-organizing system which is able to recover from network partitioning in both situations

    Estabelecimento de redes de comunidades sobreponíveis

    Get PDF
    Doutoramento em Engenharia InformáticaUma das áreas de investigação em Telecomunicações de interesse crescente prende-se com os futuros sistemas de comunicações móveis de 4a geração e além destes. Nos últimos anos tem sido desenvolvido o conceito de redes comunitárias, no qual os utilizadores se agregam de acordo com interesses comuns. Estes conceitos têm sido explorados de uma forma horizontal em diferentes camadas da comunicação, desde as redes comunitárias de comunicação (Seattle Wireless ou Personal Telco, p.ex.) até às redes de interesses peer-to-peer. No entanto, estas redes são usualmente vistas como redes de overlay, ou simplesmente redes de associação livre. Na prática, a noção de uma rede auto-organizada, completamente orientada ao serviço/comunidade, integralmente suportada em termos de arquitetura, não existe. Assim este trabalho apresenta uma realização original nesta área de criação de redes comunitárias, com uma arquitetura subjacente orientada a serviço, e que suporta integralmente múltiplas redes comunitárias no mesmo dispositivo, com todas as características de segurança, confiança e disponibilização de serviço necessárias neste tipo de cenários (um nó pode pertencer simultaneamente a mais do que uma rede comunitária). Devido à sua importância para os sistemas de redes comunitárias, foi dado particular atenção a aspetos de gestão de recursos e controlo de acessos. Ambos realizados de uma forma descentralizada e considerando mecanismos dotados de grande escalabilidade. Para isso, é apresentada uma linguagem de políticas que suporta a criação de comunidades virtuais. Esta linguagem não é apenas utilizada para o mapeamento da estrutura social dos membros da comunidade, como para, gerir dispositivos, recursos e serviços detidos pelos membros, de uma forma controlada e distribuída.One of the research areas with increasing interest in the field of telecommunications, are the ones related to future telecommunication systems, both 4th generation and beyond. In parallel, during the last years, several concepts have been developed related to clustering of users according to their interested, in the form of community networks. Solutions proposed for these concepts tackle the challenges horizontally, for each layer of the communication stack, ranging from community based communication networks (e.g. Seattle Wireless, or Personal Telco), to interest networks based on peer-to-peer protocols. However, these networks are presented either as free joining, or overlay networks. In practice, the notion of a self-organized, service and community oriented network, with these principles embedded in its design principles, is yet to be developed. This work presents an novel instantiation of a solution in the area of community networks, with a underlying architecture which is fully service oriented, and envisions the support for multiple community networks in the same device. Considerations regarding security, trust and service availability for this type of environments are also taken. Due to the importance of resource management and access control, in the context of community driven communication networks, a special focus was given to the support of scalable and decentralized management and access control methods. For this purpose, it is presented a policy language which supports the creation and management of virtual communities. The language is not only used for mapping the social structure of the community members, but also to, following a distributed approach, manage devices, resources and services owned by each community member

    Feature Papers of Drones - Volume I

    Get PDF
    [EN] The present book is divided into two volumes (Volume I: articles 1–23, and Volume II: articles 24–54) which compile the articles and communications submitted to the Topical Collection ”Feature Papers of Drones” during the years 2020 to 2022 describing novel or new cutting-edge designs, developments, and/or applications of unmanned vehicles (drones). Articles 1–8 are devoted to the developments of drone design, where new concepts and modeling strategies as well as effective designs that improve drone stability and autonomy are introduced. Articles 9–16 focus on the communication aspects of drones as effective strategies for smooth deployment and efficient functioning are required. Therefore, several developments that aim to optimize performance and security are presented. In this regard, one of the most directly related topics is drone swarms, not only in terms of communication but also human-swarm interaction and their applications for science missions, surveillance, and disaster rescue operations. To conclude with the volume I related to drone improvements, articles 17–23 discusses the advancements associated with autonomous navigation, obstacle avoidance, and enhanced flight plannin

    Applying named data networking in mobile ad hoc networks

    Get PDF
    This thesis presents the Name-based Mobile Ad-hoc Network (nMANET) approach to content distribution that ensure and enables responsible research on applying named data networking protocol in mobile ad-hoc networks. The test framework of the nMANET approach allows reproducibility of experiments and validation of expected results based on analysis of experimental data. The area of application for nMANETs is the distribution of humanitarian information in emergency scenarios. Named-Data Networking (NDN) and ad-hoc mobile communication allow exchange of emergency information in situations where central services such as cellular towers and electric systems are disrupted. The implemented prototype enables researchers to reproduce experiments on content distribution that consider constraints on mobile resources, such as the remaining power of mobile devices and available network bandwidth. The nMANET framework validates a set of experiments by measuring network traffic and energy consumption from both real mobile devices and those in a simulated environment. Additionally, this thesis presents results from experiments in which the nMANET forwarding strategies and traditional wireless services, such as hotpost, are analysed and compared. This experimental data represents the evidence that supports and validates the methodology presented in this thesis. The design and implementation of an nMANET prototype, the Java NDN Forwarder Daemon (JNFD) is presented as a testing framework, which follows the principles of continuous integration, continuous testing and continuous deployment. This testing framework is used to validate JNFD and IP-based technologies, such as HTTP in a MANET using the OLSR routing protocol, as well as traditional wireless infrastructure mode wireless. The set of experiments executed, in a small network of Android smart-phones connected in ad-hoc mode and in a virtual ad-hoc network simulator show the advantages of reproducibility using nMANET features. JNFD is open source, all experiments are scripted, they are repeatable and scalable. Additionally, JNFD utilises real GPS traces to simulate mobility of nodes during experiments. This thesis provides experimental evidence to show that nMANET allows reproducibility and validation of a wide range of future experiments applying NDN on MANETs

    Establishing and optimising unmanned airborne relay networks in urban environments

    Get PDF
    This thesis assesses the use of a group of small, low-altitude, low-power (in terms of communication equipment), xed-wing unmanned aerial vehicles (UAVs) as a mobile communication relay nodes to facilitate reliable communication between ground nodes in urban environments. This work focuses on enhancing existing models for optimal trajectory planning and enabling UAV relay implementation in realistic urban scenarios. The performance of the proposed UAV relay algorithms was demonstrated and proved through an indoor simulated urban environment, the rst experiment of its kind.The objective of enabling UAV relay deployment in realistic urban environments is addressed through relaxing the constraints on the assumptions of communication prediction models assumptions, reducing knowledge requirements and improving prediction efficiency. This thesis explores assumptions for urban environment knowledge at three different levels: (i) full knowledge about the urban environment, (ii) partially known urban environments, and (iii) no knowledge about the urban environment. The work starts with exploring models that assume the city size, layout and its effects on wireless communication strength are known, representing full knowledge about the urban environment. [Continues.]</div
    corecore