24 research outputs found

    H3N - Analysewerkzeuge für hybride Wegewahl in heterogenen, unterbrechungstoleranten Ad-Hoc-Netzen für Rettungskräfte

    Get PDF
    Rettungskräfte müssen unter widrigen Bedingungen zuverlässig kommunizieren können, um in Rettungseinsätzen effizient arbeiten zu können und somit Leben zu retten. Idealerweise ist dazu ein selbstorganisiertes Ad-Hoc-Netz notwendig, weil die Kommunikationsinfrastruktur ggf. beschädigt oder überlastet sein kann. Um die geforderte Robustheit der Kommunikation auch in Szenarien mit größeren zu überbrückenden Entfernungen zu gewährleisten, werden zusätzlich Mechanismen benötigt, die eine Unterbrechungstoleranz ermöglichen. Verzögerungstolerante Netze (engl. Delay Tolerant Networks, kurz: DTN) stellen solche Mechanismen bereit, erfordern aber zusätzliche Verzögerungen, die für Rettungskommunikation nachteilig sind. Deshalb werden intelligente hybride Wegewahlverfahren benötigt, um die Verzögerung durch DTN-Mechanismen zu begrenzen. Außerdem sollten entsprechende Verfahren heterogene Netze unterstützen. Das ermöglicht zusätzlich eine effizientere Weiterleitung durch die Nutzung von Geräten mit unterschiedlichen Kommunikationstechnologien und damit auch Reichweiten. Um solche Systeme und die dafür benötigten Kommunikationsprotokolle zu entwickeln, werden verschiedene Analysewerkzeuge genutzt. Dazu gehören analytische Modelle, Simulationen und Experimente auf der Zielsystemhardware. Für jede Kategorie gibt es verschiedene Werkzeuge und Frameworks, die sich auf unterschiedliche Aspekte fokussieren. Dadurch unterstützen diese herkömmlichen Analysemethoden jedoch meistens nur einen der oben genannten Punkte, während die Untersuchung von hybriden und/oder heterogenen Ansätzen und Szenarien nicht ohne weiteres möglich ist. Im Falle von Rettungskräften kommt hinzu, dass die charakteristischen Merkmale hinsichtlich der Bewegung der Knoten und des erzeugten Datenverkehrs während eines Einsatzes ebenfalls nicht modelliert werden können. In dieser Arbeit werden deshalb verschiedene Erweiterungen zu existierenden Analysewerkzeugen sowie neue Werkzeuge zur Analyse und Modelle zur Nachbildung realistischer Rettungsmissionen untersucht und entwickelt. Ziel ist es, die Vorteile existierender Werkzeuge miteinander zu kombinieren, um ganzheitliche, realitätsnahe Untersuchungen von hybriden Protokollen für heterogene Netze zu ermöglichen. Die Kombination erfolgt in Form von gezielten Erweiterungen und der Entwicklung ergänzender komplementärer Werkzeuge unter Verwendung existierender Schnittstellen. Erste Ergebnisse unter Verwendung der entwickelten Werkzeuge zeigen Verbesserungspotentiale bei der Verwendung traditioneller Protokolle und erlauben die Bewertung zusätzlicher Maßnahmen, um die Kommunikation zu verbessern. Szenarien zur Kommunikation von Rettungskräften werden dabei als ein Beispiel verwendet, die Tools sind jedoch nicht auf die Analyse dieses Anwendungsfalls beschränkt. Über die reine Analyse verschiedener existierender Ansätze hinaus bildet die entwickelte Evaluationsumgebung eine Grundlage für die Entwicklung und Verifikation von neuartigen hybriden Protokollen für die entsprechenden Systeme.Communication between participating first responders is essential for efficient coordination of rescue missions and thus allowing to save human lives. Ideally, ad hoc-style communication networks are applied to this as the first responders cannot rely on infrastructure-based communication for two reasons. First, the infrastructure could be damaged by the disastrous event or not be available for economic reasons. Second, even if public infrastructure is available and functional, it might be overloaded by users. To guarantee the robustness and reliability requirements of first responders, the Mobile Ad Hoc Networks (MANETs) have to be combined with an approach to mitigate intermittent connectivity due to otherwise limited connectivity. Delay Tolerant Networks (DTNs) provide such a functionality but introduce additional delay which is problematic. Therefore, intelligent hybrid routing approaches are required to limit the delay introduced by DTN mechanisms. Besides that, the approach should be applicable to heterogeneous networks in terms of communication technologies and device capabilities. This is required for cross multi-agency and volunteer communication but also enables the opportunistic exploitation of any given communication option. To evaluate such systems and develop the corresponding communication protocols, various tools for the analysis are available. This includes analytical models, simulations and real-world experiments on target hardware. In each category a wide set of tools is available already. However, each tool is focused on specific aspects usually and thus does not provide methods to analyze hybrid approaches out of the box. Even if the tools are modular and allow an extension, there are often other tools that are better suited for partial aspects of hybrid systems. In addition to this, few tools exist to model the characteristics of first responder networks. Especially the generalized movement during missions and the generated data traffic are difficult to model and integrate into analyses. The focus of this project is therefore to develop selected extensions to existing analysis and simulation tools as well as additional tools and models to realistically capture the characteristics of first responder networks. The goal is to combine the advantages of existing specialized simulation tools to enable thorough evaluations of hybrid protocols for heterogeneous networks based on realistic assumptions. To achieve this, the tools are extended by specifically designing tools that enable the interaction between tools and new tools that complement the existing analysis capabilities. First results obtained via the resulting toolbox clearly indicate further research directions as well as a potential for protocol enhancements. Besides that, the toolbox was used to evaluate various methods to enhance the connectivity between nodes in first responder networks. First responder scenarios are used as an example here. The toolbox itself is however not limited to this use case. In addition to the analysis of existing approaches for hybrid and heterogeneous networks, the developed toolbox provides a base framework for the development and verification of newly developed protocols for such use cases

    An approach to pervasive monitoring in dynamic learning contexts : data sensing, communication support and awareness provision

    Get PDF
    It is within the capabilities of current technology to support the emerging learning paradigms. These paradigms suggest that today’s learning activities and environments are pervas ive and require a higher level of dynamism than the traditional learning contexts. Therefore, we have to rethink our approach to learning and use technology not only as a digital information support, but also as an instrument to reinforce knowledge, foster collaboration, promote creativity and provide richer learning experiences. Particularly, this thesis was motivated by the rapidly growing number of smartphone users and the fact that these devices are increasingly becoming more and more resource-rich, in terms of their communication and sensing technologies, display capabilities battery autonomy, etc. Hence, this dissertation benefits from the ubiquity and development of mobile technology, aiming to bridge the gap between the challenges posed by modern learning requirements and the capabilities of current technology. The sensors embedded in smartphones can be used to capture diverse behavioural and social aspects of the users. For example, using microphone and Bluetooth is possible to identify conversation patterns, discover users in proximity and detect face-to-face meetings. This fact opens up exciting possibilities to monitor the behaviour of the user and to provide meaningful feedback. This feedback offers useful information that can help people be aware of and reflect on their behaviour and its effects, and take the necessary actions to improve them. Consequently, we propose a pervasive monitoring system that take advantage of the capabilities of modern smartphones, us ing them to s upport the awarenes s provis ion about as pects of the activities that take place in today’s pervas ive learning environments. This pervasive monitoring system provides (i) an autonomous sensing platform to capture complex information about processes and interactions that take place across multiple learning environments, (ii) an on-demand and s elf-m anaged communication infras tructure, and (ii) a dis play facility to provide “awarenes s inform ation” to the s tudents and/or lecturers. For the proposed system, we followed a research approach that have three main components. First, the description of a generalized framework for pervasive sensing that enables collaborative sensing interactions between smartphones and other types of devices. By allowing complex data capture interactions with diverse remote sensors, devices and data sources, this framework allows to improve the information quality while saving energy in the local device. Second, the evaluation, through a real-world deployment, of the suitability of ad hoc networks to support the diverse communication processes required for pervasive monitoring. This component also includes a method to improve the scalability and reduce the costs of these networks. Third, the design of two awareness mechanisms to allow flexible provision of information in dynamic and heterogeneous learning contexts. These mechanisms rely on the use of smartphones as adaptable devices that can be used directly as awareness displays or as communication bridges to enable interaction with other remote displays available in the environment. Diverse aspects of the proposed system were evaluated through a number of simulations, real-world experiments, user studies and prototype evaluations. The experimental evaluation of the data capture and communication aspects of the system provided empirical evidence of the usefulness and suitability of the proposed approach to support the development of pervasive monitoring solutions. In addition, the proof-of-concept deployments of the proposed awareness mechanisms, performed in both laboratory and real-world learning environments, provided quantitative and qualitative indicators that such mechanisms improve the quality of the awareness information and the user experienceLa tecnología moderna tiene capacidad de dar apoyo a los paradigmas de aprendizaje emergentes. Estos paradigmas sugieren que las actividades de aprendizaje actuales, caracterizadas por la ubicuidad de entornos, son más dinámicas y complejas que los contextos de aprendizaje tradicionales. Por tanto, tenemos que reformular nuestro acercamiento al aprendizaje, consiguiendo que la tecnología sirva no solo como mero soporte de información, sino como medio para reforzar el conocimiento, fomentar la colaboración, estimular la creatividad y proporcionar experiencias de aprendizaje enriquecedoras. Esta tesis doctoral está motivada por el vertiginoso crecimiento de usuarios de smartphones y el hecho de que estos son cada vez más potentes en cuanto a tecnologías de comunicación, sensores, displays, autonomía energética, etc. Por tanto, esta tesis aprovecha la ubicuidad y el desarrollo de esta tecnología, con el objetivo de reducir la brecha entre los desafíos del aprendizaje moderno y las capacidades de la tecnología actual. Los sensores integrados en los smartphones pueden ser utilizados para reconocer diversos aspectos del comportamiento individual y social de los usuarios. Por ejemplo, a través del micrófono y el Bluetooth, es posible determinar patrones de conversación, encontrar usuarios cercanos y detectar reuniones presenciales. Este hecho abre un interesante abanico de posibilidades, pudiendo monitorizar aspectos del comportamiento del usuario y proveer un feedback significativo. Dicho feedback, puede ayudar a los usuarios a reflexionar sobre su comportamiento y los efectos que provoca, con el fin de tomar medidas necesarias para mejorarlo. Proponemos un sistema de monitorización generalizado que aproveche las capacidades de los smartphones para proporcionar información a los usuarios, ayudándolos a percibir y tomar conciencia sobre diversos aspectos de las actividades que se desarrollan en contextos de aprendizaje modernos. Este sistema ofrece: (i) una plataforma de detección autónoma, que captura información compleja sobre los procesos e interacciones de aprendizaje; (ii) una infraestructura de comunicación autogestionable y; (iii) un servicio de visualización que provee “información de percepción” a estudiantes y/o profesores. Para la elaboración de este sistema nos hemos centrado en tres áreas de investigación. Primero, la descripción de una infraestructura de detección generalizada, que facilita interacciones entre smartphones y otros dispositivos. Al permitir interacciones complejas para la captura de datos entre diversos sensores, dispositivos y fuentes de datos remotos, esta infraestructura consigue mejorar la calidad de la información y ahorrar energía en el dispositivo local. Segundo, la evaluación, a través de pruebas reales, de la idoneidad de las redes ad hoc como apoyo de los diversos procesos de comunicación requeridos en la monitorización generalizada. Este área incluye un método que incrementa la escalabilidad y reduce el coste de estas redes. Tercero, el diseño de dos mecanismos de percepción que permiten la provisión flexible de información en contextos de aprendizaje dinámicos y heterogéneos. Estos mecanismos descansan en la versatilidad de los smartphones, que pueden ser utilizados directamente como displays de percepción o como puentes de comunicación que habilitan la interacción con otros displays remotos del entorno. Diferentes aspectos del sistema propuesto han sido evaluados a través de simulaciones, experimentos reales, estudios de usuarios y evaluaciones de prototipos. La evaluación experimental proporcionó evidencia empírica de la idoneidad del sistema para apoyar el desarrollo de soluciones de monitorización generalizadas. Además, las pruebas de concepto realizadas tanto en entornos de aprendizajes reales como en el laboratorio, aportaron indicadores cuantitativos y cualitativos de que estos mecanismos mejoran la calidad de la información de percepción y la experiencia del usuario.Postprint (published version

    Development of an Android App to control and manage Cognitive Networks

    Get PDF
    As the interest in Mobile Ad Hoc networks is constantly growing for tactical, disaster-response situation, academic research and civilian contexts, some new protocol must be implemented to let those network scale. Cognitive networking may solve the problem thanks to its network-wide performances goal. The goal of this project is to develop a working testbed that will be exploited in the study and the analysis of cognitive networking mechanism and algorithms. This tool is developed in Androidope

    Routing Protocols for Meshed Communication, Networks Targeting Communication Quality of Service (QoS) in Rural Areas

    Get PDF
    Rural areas in Africa often have poor telecommunication infrastructure. Mobile phones, if available, are frequently unaffordable to most users. Wireless mesh networks (WMNs) offer an alternative possibility of low cost voice and data communications. The focus of this research is a laboratory study of WMNs that mimic conditions found in rural areas. This work investigates routing strategies for the Mesh Potato (MP). The MP is an effective alternative communication technology that has minimal configuration requirements, low cost of deployment, low power consumption and resilience that make it an attractive choice for rural areas. The MP runs a new mesh networking algorithm called the better approach to mobile ad hoc networking (B.A.T.M.A.N or Batman). This allows a WMN to be established in which users can use plain old telephones to talk to each other using Voice over IP (VoIP). Batman daemon (Batmand) is the implementation of Batman algorithm used by the MP. Batmand is a minimalistic routing protocol which performs well in laboratory experiments. The question raised is whether adding more service specific routing metrics improve the quality of service (QoS) observed in Batmand network in practice. The research investigates delay, packet loss, throughput and jitter as performance parameters (metrics) that may serve as options to improve the simplistic Batman algorithms route selection process. These metrics are essential for QoS in voice- and data-sensitive networks. Specific focus was given to delay and it is the metric added to Batmand. In addition the research examines how well the different applications such as voice and data are supported on the Batmand network under different routing scenarios. The research approach adopted in this dissertation was experimental and an indoor testbed was created to replicate the basic scenarios encountered in the rural environment. The essential characteristics found in the Mdumbi region of the Eastern Cape, South Africa, were taken as a case study in this dissertation. The testbed was used to compare the original Batman algorithm implemented as Batmand, referred to here as O-Batmand, routing protocol and the resultant Batmand version obtained from the addition of the delay-routing metric called modified Batmand (M-Batmand). The research produced a number of findings. As the number of hops increased the per-formance of the network decreased for both protocols. O-Batmand is well suited for the task of routing packets inside a wireless network. It is designed and works for voice packets and supports data services. This is also true for the M-Batmand implementation. M-Batmand was developed as an improvement to the O-Batmand implementation at the cost of increased complexity, experienced by the protocol through modifications of its route selection process. The modification involved adding network delay values to its route selection process. This addition resulted in a protocol that is delay sensitive; however, the overall performance gains were inexistent. The main conclusions drawn from this study are that O-Batmand cannot be modified to include additional metrics and be expected to improve its performance. Second conclusion is that M-Batmand did not improve the overall performance of the O-Batmand protocol. The addition of the delay metric actually hindered O-Batmand's performance to the extent that no overall performance gains were realised. Sources of performance degradations are: increased overhead, from added delay data, in the network control packets called originator messages (OGMs). M-Batmand performs calculation which O-Batmand did not increasing CPU cycle needs. Lastly upon further internal protocol investigation it is seen that the rate of route delay data updates is slower than the original metric used by the protocol. This creates route fluctuations as route selection process will change when the updated delay values are added and change again when there are not as the network obtains the updated delay data. Both protocols support voice and data, however, the results show that the quality of the network deteriorates in the testbed with increasing hops. This affects voice more so then it does data as routes become more unstable with each increasing hop. Further Batmand is best at supporting voice and data as it outperforms M-Batmand in the laboratory experiments conducted. This dissertation argues that while there may exist one or a combination of metrics amongst the researched list (delay, packet loss, throughput and jitter) that may actually improve the performance of the protocol, it is extremely hard to realize such gains in practice

    WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Get PDF
    Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an open toolkit aimed at supporting the design of different solutions for wireless mesh networking by enabling real evaluation, validation, and demonstration. The resulting testbed is based on off-the-shelf hardware components and open-source software and is focused on IEEE 802.11 commodity devices. The software toolkit is based on an "open" philosophy and aims at providing the scientific community with a tool for effective and reproducible performance analysis of WMNs. The paper describes the architecture of the toolkit, and its core functionalities, as well as its potential evolutions

    Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Get PDF
    A mobile ad hoc network (MANET) is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP) model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR), destination-sequenced distance-vector routing (DSDV), and ad hoc n-demand distance vector routing (AODV). The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To conclude, it is possible to develop a range of techniques for modelling scenarios applicable to MANETs, and these simulation models could be utilised for the evaluation of routing protocols

    Cooperation in open, decentralized, and heterogeneous computer networks

    Get PDF
    Community Networks (CN) are naturally open and decentralized structures, that grow organically with the addition of heterogeneous network devices, contributed and configured as needed by their participants. The continuous growth in popularity and dissemination of CNs in recent years has raised the perception of a mature and sustainable model for the provisioning of networking services. However, because such infrastructures include uncontrolled entities with non delimited responsibilities, every single network entity does indeed represent a potential single-point of failure that can stop the entire network from working, and that no other entity can prevent or even circumvent. Given the open and decentralized nature of CNs, that brings together individuals and organizations with different and even conflicting economic, political, and technical interests, the achievement of no more than basic consensus on the correctness of all network nodes is challenging. In such environment, the lack of self-determination for CN participants in terms of control and security of routing can be regarded as an obstacle for growth or even as a risk of collapse. To address this problem we first consider deployments of existing Wireless CN and we analyze their technology, characteristics, and performance. We perform an experimental evaluation of a production 802.11an Wireless CN, and compare to studies of other Wireless CN deployments in the literature. We compare experimentally obtained throughput traces with path-capacity calculations based on well-known conflict graph models. We observe that in the majority of cases the path chosen by the employed BMX6 routing protocol corresponds with the best identified path in our model. We analyze monitoring and interaction shortcomings of CNs and address these with Network Characterization Tool (NCT), a novel tool that allows users to assess network state and performance, and improve their quality of experience by individually modifying the routing parameters of their devices. We also evaluate performance outcomes when different routing policies are in use. Routing protocols provide self-management mechanisms that allow the continuous operation of a Community Mesh Network (CMN). We focus on three widely used proactive mesh routing protocols and their implementations: BMX6, OLSR, and Babel. We describe the core idea behind these protocols and study the implications of these in terms of scalability, performance, and stability by exposing them to typical but challenging network topologies and scenarios. Our results show the relative merits, costs, and limitations of the three protocols. Built upon the studied characteristics of typical CN deployments, their requirements on open and decentralized cooperation, and the potential controversy on the trustiness of particular components of a network infrastructure, we propose and evaluate SEMTOR, a novel routing-protocol that can satisfy these demands. SEMTOR allows the verifiable and undeniable definition and distributed application of individually trusted topologies for routing traffic towards each node. One unique advantage of SEMTOR is that it does not require a global consensus on the trustiness of any node and thus preserves cooperation among nodes with even oppositional defined trust specification. This gives each node admin the freedom to individually define the subset, and the resulting sub-topology, from the whole set of participating nodes that he considers sufficiently trustworthy to meet their security, data-delivery objectives and concerns. The proposed mechanisms have been realized as a usable and open-source implementation called BMX7, as successor of BMX6. We have evaluated its scalability, contributed robustness, and security. These results show that the usage of SEMTOR for securing trusted routing topologies is feasible, even when executed on real and very cheap (10 Euro, Linux SoC) routers as commonly used in Community Mesh Networks.Las Redes Comunitarias (CNs) son estructuras de naturaleza abierta y descentralizada, que crecen orgánicamente con la adición de dispositivos de red heterogéneos que aportan y configuran sus participantes según sea necesario. Sin embargo, debido a que estas infraestructuras incluyen entidades con responsabilidades poco delimitadas, cada entidad puede representar un punto de fallo que puede impedir que la red funcione y que ninguna otra entidad pueda prevenir o eludir. Dada la naturaleza abierta y descentralizada de las CNs, que agrupa individuos y organizaciones con diferentes e incluso contrapuestos intereses económicos, políticos y técnicos, conseguir poco más que un consenso básico sobre los nodos correctos en la red puede ser un reto. En este entorno, la falta de autodeterminación para los participantes de una CN en cuanto a control y seguridad del encaminamiento puede considerarse un obstáculo para el crecimiento o incluso un riesgo de colapso. Para abordar este problema consideramos las implementaciones de redes comunitarias inalámbricas (WCN) y se analiza su tecnología, características y desempeño. Realizamos una evaluación experimental de una WCN establecida y se compara con estudios de otros despliegues. Comparamos las trazas de rendimiento experimentales con cálculos de la capacidad de los caminos basados en modelos bien conocidos del grafo. Se observa que en la mayoría de los casos el camino elegido por el protocolo de encaminamiento BMX6 corresponde con el mejor camino identificado en nuestro modelo. Analizamos las limitaciones de monitorización e interacción en CNs y los tratamos con NCT, una nueva herramienta que permite evaluar el estado y rendimiento de la red, y mejorar la calidad de experiencia modificando los parámetros de sus dispositivos individuales. También evaluamos el rendimiento resultante para diferentes políticas de encaminamiento. Los protocolos de encaminamiento proporcionan mecanismos de autogestión que hacen posible el funcionamiento continuo de una red comunitaria mesh (CMN). Nos centramos en tres protocolos de encaminamiento proactivos para redes mesh ampliamente utilizados y sus implementaciones: BMX6, OLSR y Babel. Se describe la idea central de estos protocolos y se estudian la implicaciones de éstos en términos de escalabilidad, rendimiento y estabilidad al exponerlos a topologías y escenarios de red típicos pero exigentes. Nuestros resultados muestran los méritos, costes y limitaciones de los tres protocolos. A partir de las características analizadas en despliegues típicos de redes comunitarias, y de las necesidades en cuanto a cooperación abierta y descentralizada, y la esperable divergencia sobre la confiabilidad en ciertos componentes de la infraestructura de red, proponemos y evaluamos SEMTOR, un nuevo protocolo de encaminamiento que puede satisfacer estas necesidades. SEMTOR permite definir de forma verificable e innegable, así como aplicar de forma distribuida, topologías de confianza individualizadas para encaminar tráfico hacia cada nodo. Una ventaja única de SEMTOR es que no precisa de consenso global sobre la confianza en cualquier nodo y por tanto preserva la cooperación entre los nodos, incluso con especificaciones de confianza definidas por oposición. Esto proporciona a cada administrador de nodo la libertad para definir el subconjunto, y la sub-topología resultante, entre el conjunto de todos los nodos participantes que considere dignos de suficiente confianza para cumplir con su objetivo y criterio de seguridad y entrega de datos. Los mecanismos propuestos se han realizado en forma de una implementación utilizable de código abierto llamada BMX7. Se ha evaluado su escalabilidad, robustez y seguridad. Estos resultados demuestran que el uso de SEMTOR para asegurar topologías de encaminamiento de confianza es factible, incluso cuando se ejecuta en routers reales y muy baratos utilizados de forma habitual en WCN.Postprint (published version

    Voice and rural wireless mesh community networks: a framework to quantify scalability and manage end-user smartphone battery consumption

    Get PDF
    Philosophiae Doctor - PhDCommunity wireless mesh initiatives are a pioneering option to cheap ‘last-mile’ access to network services for rural low-income regions primarily located in Sub-Saharan Africa and Developing Asia. However, researchers have criticized wireless mesh networks for their poor scalability; and scalability quantification research has mostly consisted of modularization of per-node throughput capacity behaviour. A scalability quantification model to design wireless mesh networks to provide adequate quality of service is lacking. However, scalability quantification of community mesh networks alone is inadequate because rural users need affordable devices for access; and they need to know how best to use them. Low-cost low-end smartphones offer handset affordability solutions but require smart management of their small capacity battery. Related work supports the usage of Wi-Fi for communication because it is shown to consume less battery than 2G, 3G or Bluetooth. However, a model to compare Wi-Fi battery consumption amongst different low-end smartphones is missing, as is a comparison of different over-the-top communication applications

    A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform

    Get PDF
    This is a copy of the author's final draft version of an article published in the journal Soft computing.The reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different services. However, for deciding the peer reliability there are needed many parameters, which make the problem NP-hard. In this paper, we present two fuzzy-based systems (called FBRS1 and FBRS2) to improve the reliability of JXTA-overlay P2P platform. In FBRS1, we considered three input parameters: number of interactions (NI), security (S), packet loss (PL) to decide the peer reliability (PR). In FBRS2, we considered four input parameters: NI, S, PL and local score to decide the PR. We compare the proposed systems by computer simulations. Comparing the complexity of FBRS1 and FBRS2, the FBRS2 is more complex than FBRS1. However, it also considers the local score, which makes it more reliable than FBRS1.Peer ReviewedPostprint (author's final draft

    Performance analysis of wireless mesh networks for underground mines

    Get PDF
    Abstract: Underground mines are harsh environments that have unique challenges that limit wireless communication. To ensure the safety and efficiency of mining operations, communication systems play a vital role. Despite the major developments in communication technologies, underground mines are still challenging environments for wireless communication, however, the advent of wireless mesh networks offers a cutting-edge solution to the mining industry and understanding the performance of this technology is fundamental to its application in dynamic areas of underground mines. This research project aims at conducting a performance analysis of wireless mesh networks by developing a prototype system set up of wireless mesh transceivers to conduct a feasibility study of data transmission on the network in underground mines. The second aspect of this study investigates network parameters, such as latency, throughput, and signal-to-noise, as a function of increasing mesh nodes on the network and internode spacing of mesh nodes. By combining theoretical models with real-time performance of the mesh system, realistic conclusions and better recommendations can be given to mining companies with regards to deploying wireless mesh systems in their underground mines.M.Ing. (Electrical and Electronic Engineering Science
    corecore