7 research outputs found

    Actas da 10ÂŞ ConferĂŞncia sobre Redes de Computadores

    Get PDF
    Universidade do MinhoCCTCCentro AlgoritmiCisco SystemsIEEE Portugal Sectio

    Reliable Data Transmission in Challenging Vehicular Network using Delay Tolerant Network

    Get PDF
    In the 21st century, there has been an increasing tendency toward the wide adoption of wireless networks and technologies due to their significant advantages such as flexibility, mobility, accessibility, and low cost. Wireless technologies have therefore become essential factors in the improvement of intra-vehicle road safety in Vehicular Ad-hoc Network (VANET), which potentially reduce road traffic accidents by enabling efficient exchange of information between vehicles in the early stages. However, due to the inherent high mobility and rapid change of topology, there are numerous challenges in VANET. Hence, different software packages have been combined in this project to create the VANET environment, whereby the Objective Modular Network Testbed (OMNeT++) and the Simulation of Urban Mobility (SUMO), along with Vehicles in Network Simulation (VEINS) are integrated to model the VANET environment. Also, Delay Tolerant Network (DTN) are implemented in the Opportunistic Network Environment (ONE) simulator, where the Store-Carry-Forward technique is used to route traffic. When network resources are not limited, a high delivery ratio is possible. However, when network resources are scarce, these protocols will have a low delivery ratio and high overhead. Due to these limitations, in this research, an extensive performance evaluation of various routing protocols for DTN with different buffer management policies, giving insight into the impact of these policies on DTN routing protocol performance has been conducted. The empirical study gave insight into the strengths and limitations of the existing protocols thus enabling the selection of the benchmark protocols utilized in evaluating a new Enhanced Message Replication Technique (EMRT) proposed in this thesis. The main contribution of this thesis is the design, implementation, and evaluation of a novel EMRT that dynamically adjusts the number of message replicas based on a node's ability to quickly disseminate the message and maximize the delivery ratio. EMRT is evaluated using three different quota protocols: Spray&Wait, Encounter Based Routing (EBR), and Destination Based Routing Protocol (DBRP). Simulation results show that applying EMRT to these protocols improves the delivery ratio while reducing overhead ratio and latency average. For example, when combined with Spray&Wait, EBR, and DBRP, the delivery probability is improved by 13%, 8%, and 10%, respectively, while the latency average is reduced by 51%, 14%, and 13%, respectively

    Comparaison des Modèles et Architectures pour un Accès Mobile Restreint et Local au Web de Données: Un état de l’art des architectures et solutions envisageables

    Get PDF
    This document presents a survey prior to a thesis project, which aims to propose solutions allowing local and restricted access to the Web of data. We have explored several relevant mechanisms proposed in the literature, dedicated to various problems and likely to constitute important points for our future contributions. Since our main objective is to offer tools dedicated to mobility situations in environments where internet access is unreliable, we were particularly interested in comparing approaches (P2P, DHT, etc.) allowing to realize a particular fog/edge computing scenario which is restricted and local mobile access to contextually relevant and shared related data. In this context, we have focused some of our research on so-called gossip protocols (or epidemic protocols) that are well suited to the dynamic nature of networks. The dynamic aspect of the peers also led us to consider the solutions that take into account the location of the peers in order to improve the quality of the services offered.In addition, we looked at solutions dealing with semantic heterogeneity in peer-to-peer environments, including ontology alignment mechanisms that allow us to fully benefit from the power of peer-to-peer systems without imposing the use of a common ontology to all peers.Data replication and caching can be an important alternative to accessing remote sources; we have devoted the last part of this document to solutions based on these mechanisms to supply a local access to data.Ce document présente un état de l'art préalable à un projet de thèse qui vise à proposer des solutions permettant un accès local et restreint au Web de données. Nous avons exploré plusieurs mécanismes pertinents proposés dans la littérature, dédiés à des problématiques différentes et pouvant constituer des points importants pour nos futures contributions. Notre objectif principal étant de proposer des outils dédiés à des situations de mobilité dans des environnements ou l’accès internet est peu fiable, nous nous sommes intéressés particulièrement à comparer des approches (P2P, DHT, etc.) permettant de réaliser un scénario de fog/edge computing particulier qui est l'accès mobile restreint et local à des données liées contextuellement pertinentes et partagées. Dans cette optique, nous avons focalisé une partie de nos recherches bibliographiques sur les protocoles dits de « gossip » (ou protocoles épidémiques) qui s’avèrent bien adaptés au caractère dynamique des réseaux. L'aspect dynamique des pairs nous a aussi amené à considérer des solutions qui prennent en compte la localisation des pairs pour améliorer la qualité des services offerts.Nous regardons de plus dans ce document, des solutions traitant de l’hétérogénéité sémantique dans des environnements pair-à-pair, notamment des mécanismes d’alignements d’ontologies qui permettent de profiter pleinement de la puissance des systèmes pair-à-pair sans imposer l’utilisation d’une ontologie commune à tous les pairs.La réplication et le cache de données pouvant constituer une alternative importante à l’accès à des sources distantes, nous avons consacré la dernière partie de ce document aux solutions reposant sur ces mécanismes et offrant ainsi un accès local aux données
    corecore