15 research outputs found

    Titanic smart objects

    Get PDF

    Co-conception contrôle / communication pour économiser l'énergie dans les systèmes commandés en réseau sans fil

    Get PDF
    Energy is a key resource in Networked Control Systems, in particular in applications concerning wireless networks. This thesis investigates how to save energy in wireless sensor nodes with control and communication co-Design. This thesis reviews existing techniques and approaches that are used to save energy from a communication and a control point of view. This review is organized according to the layered communication architecture covering from bottom to top the Physical, Data Link, Network, and Application layers. Then, from the conclusion that the radio chip is an important energy consumer, a joint radio-Mode management and feedback law policy is derived. The radio-Mode management exploits the capabilities of the radio chip to switch to low consuming radio-Modes to save energy, and to adapt the transmission power to the channel conditions. This results in an event-Based control scheme where the system runs open loop at certain time. A natural trade-Off appears between energy savings and control performance. The joint policy is derived in the framework of Optimal Control with the use of Dynamic Programming. This thesis solves the optimal problem in both infinite and finite horizon cases. Stability of the closed loop system is investigated with Input-To-State Stability framework. The main conclusion of this thesis, also shown in simulation, is that cross-Layer design in Networked Control System is essential to save energy in the wireless nodes.L'énergie est une ressource clé dans les systèmes commandés en réseau, en particulier dans les applications concernant les réseaux sans fil. Cette thèse étudie comment économiser l'énergie dans les capteurs sans fil avec une co-Conception contrôle et communication. Cette thèse examine les techniques et les approches existantes qui sont utilisées pour économiser l'énergie d'un point de vue de la communication et du contrôle. Cet étude est organisée selon une architecture de communication par couches couvrant de bas en haut les couches Physique, Liaison, Réseau, et Application. Puis, à partir de la conclusion que la puce radio est un important consommateur d'énergie, une loi conjointe de gestion des modes radio et de contrôle en boucle fermée est établie. La gestion des modes radio exploite les capacités de la puce radio à communter dans des modes de basses consommation pour économiser l'énergie, et d'adapter la puissance de transmission aux conditions du canal. Il en résulte un système de contrôle basé sur des événements où le système fonctionne en boucle ouverte à certains moments. Un compromis naturel apparaît entre l'économie d'énergie et les performances de contrôle. La loi conjointe est établie avec une formulation de contrôle optimal utilisant la Programmation Dynamique. Cette thèse résout le problème optimal dans les deux cas d'horizon infini et fini. La stabilité du système en boucle fermée est étudiée avec la formulation Input-To-State Stability (ISS). La principale conclusion de cette thèse, également illustrée dans la simulation, est que la conception à travers différentes couches dans les systèmes commandés en réseau est essentielle pour économiser l'énergie dans les noeuds sans fil

    End-to-end security in active networks

    Get PDF
    Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea

    Real-time video streaming using peer-to-peer for video distribution

    Get PDF
    The growth of the Internet has led to research and development of several new and useful applications including video streaming. Commercial experiments are underway to determine the feasibility of multimedia broadcasting using packet based data networks alongside traditional over-the-air broadcasting. Broadcasting companies are offering low cost or free versions of video content online to both guage and at the same time generate popularity. In addition to television broadcasting, video streaming is used in a number of application areas including video conferencing, telecommuting and long distance education. Large scale video streaming has not become as widespread or widely deployed as could be expected. The reason for this is the high bandwidth requirement (and thus high cost) associated with video data. Provision of a constant stream of video data on a medium to large scale typically consumes a significant amount of bandwidth. An effect of this is that encoding bit rates are lowered and consequently video quality is degraded resulting in even slower uptake rates for video streaming services. The aim of this dissertation is to investigate peer-to-peer streaming as a potential solution to this bandwidth problem. The proposed peer-to-peer based solution relies on end user co-operation for video data distribution. This approach is highly effective in reducing the outgoing bandwidth requirement for the video streaming server. End users redistribute received video chunks amongst their respective peers and in so doing increase the potential capacity of the entire network for supporting more clients. A secondary effect of such a system is that encoding capabilities (including higher encoding bit rates or encoding of additional sub-channels) can be enhanced. Peer-to-peer distribution enables any regular user to stream video to large streaming networks with many viewers. This research includes a detailed overview of the fields of video streaming and peer-to-peer networking. Techniques for optimal video preparation and data distribution were investigated. A variety of academic and commercial peer-to-peer based multimedia broadcasting systems were analysed as a means to further define and place the proposed implementation in context with respect to other peercasting implementations. A proof-of-concept of the proposed implementation was developed, mathematically analyzed and simulated in a typical deployment scenario. Analysis was carried out to predict simulation performance and as a form of design evaluation and verification. The analysis highlighted some critical areas which resulted in adaptations to the initial design as well as conditions under which performance can be guaranteed. A simulation of the proof-of-concept system was used to determine the extent of bandwidth savings for the video server. The aim of the simulations was to show that it is possible to encode and deliver video data in real time over a peer-to-peer network. The proposed system achieved expectations and showed significant bandwidth savings for a sustantially large video streaming audience. The implementation was able to encode video in real time and continually stream video packets on time to connected peers while continually supporting network growth by connecting additional peers (or stream viewers). The system performed well and showed good performance under typical real world restrictions on available bandwith capacity.Dissertation (MEng)--University of Pretoria, 2009.Electrical, Electronic and Computer Engineeringunrestricte

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF
    corecore