27 research outputs found

    Contributions to the routing of traffic flows in multi-hop IEEE 802.11 wireless networks

    Get PDF
    The IEEE 802.11 standard was not initially designed to provide multi-hop capabilities. Therefore, providing a proper traffic performance in Multi-Hop IEEE 802.11 Wireless Networks (MIWNs) becomes a significant challenge. The approach followed in this thesis has been focused on the routing layer in order to obtain applicable solutions not dependent on a specific hardware or driver. Nevertheless, as is the case of most of the research on this field, a cross-layer design has been adopted. Therefore, one of the first tasks of this work was devoted to the study of the phenomena which affect the performance of the flows in MIWNs. Different estimation methodologies and models are presented and analyzed. The first main contribution of this thesis is related to route creation procedures. First, FB-AODV is introduced, which creates routes and forwards packets according to the flows on the contrary to basic AODV which is destination-based. This enhancement permits to balance the load through the network and gives a finer granularity in the control and monitoring of the flows. Results showed that it clearly benefits the performance of the flows. Secondly, a novel routing metric called Weighted Contention and Interference routing Metric (WCIM) is presented. In all analyzed scenarios, WCIM outperformed the other analyzed state-of-the-art routing metrics due to a proper leveraging of the number of hops, the link quality and the suffered contention and interference. The second main contribution of this thesis is focused on route maintenance. Generally, route recovery procedures are devoted to the detection of link breaks due to mobility or fading. However, other phenomena like the arrival of new flows can degrade the performance of active flows. DEMON, which is designed as an enhancement of FB-AODV, allows the preemptive recovery of degraded routes by passively monitoring the performance of active flows. Results showed that DEMON obtains similar or better results than other published solutions in mobile scenarios, while it clearly outperforms the performance of default AODV under congestion Finally, the last chapter of this thesis deals with channel assignment in multi-radio solutions. The main challenge of this research area relies on the circular relationship between channel assignment and routing; channel assignment determines the routes that can be created, while the created routes decide the real channel diversity of the network and the level of interference between the links. Therefore, proposals which join routing and channel assignment are generally complex, centralized and based on traffic patterns, limiting their practical implementation. On the contrary, the mechanisms presented in this thesis are distributed and readily applicable. First, the Interference-based Dynamic Channel Assignment (IDCA) algorithm is introduced. IDCA is a distributed and dynamic channel assignment based on the interference caused by active flows which uses a common channel in order to assure connectivity. In general, IDCA leads to an interesting trade-off between connectivity preservation and channel diversity. Secondly, MR-DEMON is introduced as way of joining channel assignment and route maintenance. As DEMON, MR-DEMON monitors the performance of the active flows traversing the links, but, instead of alerting the source when noticing degradation, it permits reallocating the flows to less interfered channels. Joining route recovery instead of route creation simplifies its application, since traffic patterns are not needed and channel reassignments can be locally decided. The evaluation of MR-DEMON proved that it clearly benefits the performance of IDCA. Also, it improves DEMON functionality by decreasing the number of route recoveries from the source, leading to a lower overhead.El estándar IEEE 802.11 no fue diseñado inicialmente para soportar capacidades multi-salto. Debido a ello, proveer unas prestaciones adecuadas a los flujos de tráfico que atraviesan redes inalámbricas multi-salto IEEE 802.11 supone un reto significativo. La investigación desarrollada en esta tesis se ha centrado en la capa de encaminamiento con el objetivo de obtener soluciones aplicables y no dependientes de un hardware específico. Sin embargo, debido al gran impacto de fenómenos y parámetros relacionados con las capas físicas y de acceso al medio sobre las prestaciones de los tráficos de datos, se han adoptado soluciones de tipo cross-layer. Es por ello que las primeras tareas de la investigación, presentadas en los capítulos iniciales, se dedicaron al estudio y caracterización de estos fenómenos. La primera contribución principal de esta tesis se centra en mecanismos relacionados con la creación de las rutas. Primero, se introduce una mejora del protocolo AODV, que permite crear rutas y encaminar paquetes en base a los flujos de datos, en lugar de en base a los destinos como se da en el caso básico. Esto permite balacear la carga de la red y otorga un mayor control sobre los flujos activos y sus prestaciones, mejorando el rendimiento general de la red. Seguidamente, se presenta una métrica de encaminamiento sensible a la interferencia de la red y la calidad de los enlaces. Los resultados analizados, basados en la simulación de diferentes escenarios, demuestran que mejora significativamente las prestaciones de otras métricas del estado del arte. La segunda contribución está relacionada con el mantenimiento de las rutas activas. Generalmente, los mecanismos de mantenimiento se centran principalmente en la detección de enlaces rotos debido a la movilidad de los nodos o a la propagación inalámbrica. Sin embargo, otros fenómenos como la interferencia y congestión provocada por la llegada de nuevos flujos pueden degradar de forma significativa las prestaciones de los tráficos activos. En base a ello, se diseña un mecanismo de mantenimiento preventivo de rutas, que monitoriza las prestaciones de los flujos activos y permite su reencaminamiento en caso de detectar rutas degradadas. La evaluación de esta solución muestra una mejora significativa sobre el mantenimiento de rutas básico en escenarios congestionados, mientras que en escenarios con nodos móviles obtiene resultados similares o puntualmente mejores que otros mecanismos preventivos diseñados específicamente para casos con movilidad. Finalmente, el último capítulo de la tesis se centra en la asignación de canales en entornos multi-canal y multi-radio con el objetivo de minimizar la interferencia entre flujos activos. El reto principal en este campo es la dependencia circular que se da entre la asignación de canales y la creación de rutas: la asignación de canales determina los enlaces existentes la red y por ello las rutas que se podrán crear, pero son finalmente las rutas y los tráficos activos quienes determinan el nivel real de interferencia que se dará en la red. Es por ello que las soluciones que proponen unificar la asignación de canales y el encaminamiento de tráficos son generalmente complejas, centralizadas y basadas en patrones de tráfico, lo que limita su implementación en entornos reales. En cambio, en nuestro caso adoptamos una solución distribuida y con mayor aplicabilidad. Primero, se define un algoritmo de selección de canales dinámico basado en la interferencia de los flujos activos, que utiliza un canal común en todos los nodos para asegurar la conectividad de la red. A continuación, se introduce un mecanismo que unifica la asignación de canales con el mantenimiento preventivo de las rutas, permitiendo reasignar flujos degradados a otros canales disponibles en lugar de reencaminarlos completamente. Ambas soluciones demuestran ser beneficiosas en este tipo de entornos.Postprint (published version

    Universal Mobile Application Development (UMAD) On Home Automation

    Get PDF
    At present scenario the market is flooded with many cell phones compatibility issues intended with Operating System and hardware's, so the applications are not made in a manner to suite large mass. Till now the applications made were targeted to a particular Operating System only which restricted there usability. With the limitations of above in mind there is a need of a universal mobile application development (UMAD) platform. So that an application can be developed in a universal XML format which can be easily ported to any other mobile devices.  This paper presents the design and implementation of the Home automation system on one of the Operating System and creation of a unique XML document that can be placed over the server which can be adapted by any other mobile device without any platform issues. The XML format which controls the layout of the screen remains common, only the part which needs to be coded on every platform is the downloading of the XML file from the server and parsing it. This reduces a lot of coding effort as the design part is coded only once, and the same file can be used by every other platform. We have taken Home Automation system as our application, in which all the household devices such as Bulb, Fan, AC etc. all are controlled by a smartphone which is connected to a server containing the XML file via an internet connection. Every change made by the user on the smartphone affects the data in the XML file of server, which thus helps in continuous updating of data and all other users get an updated Graphical User Interface. We have taken Home Automation as one of our application, but the same principle can be implemented in any other applications like Mobile Themes, Games etc. Keywords: Android, Hardware Modulator, Home Automation, iOS, UMAD, Universal Mobile Application, XML

    Device characteristics-based differentiated energy-efficient adaptive solution for multimedia delivery over heterogeneous wireless networks

    Get PDF
    Energy efficiency is a key issue of highest importance to mobile wireless device users, as those devices are powered by batteries with limited power capacity. It is of very high interest to provide device differentiated user centric energy efficient multimedia content delivery based on current application type, energy-oriented device features and user preferences. This thesis presents the following research contributions in the area of energy efficient multimedia delivery over heterogeneous wireless networks: 1. ASP: Energy-oriented Application-based System profiling for mobile devices: This profiling provides services to other contributions in this thesis. By monitoring the running applications and the corresponding power demand on the smart mobile device, a device energy model is obtained. The model is used in conjunction with applications’ power signature to provide device energy constraints posed by running applications. 2. AWERA 3. DEAS: A Device characteristics-based differentiated Energy-efficient Adaptive Solution for video delivery over heterogeneous wireless networks. Based on the energy constraint, DEAS performs energy efficient content delivery adaptation for the current application. Unlike the existing solutions, DEAS takes all the applications running on the system into account and better balances QoS and energy efficiency. 4. EDCAM 5. A comprehensive survey on state-of-the-art energy-efficient network protocols and energy-saving network technologies

    Wireless ad-hoc networks on Android operating system

    Full text link
    Brezžična ad hoc omrežja so omrežja brezžičnih naprav, ki za delovanje ne uporabljajo infrastrukture (dostopovne točke). Naprave, ki tvorijo ad hoc omrežje, so med seboj enakovredne in vse sodelujejo pri usmerjanju podatkov skozi omrežje. Brezžični tehnologiji Bluetooth in Wi-Fi Direct omogočata preprosto izmenjavo podatkov med napravami v dosegu. Zaradi neodvisnosti od infrastrukture lahko Bluetooth in Wi-Fi Direct naprave komunicirajo kjerkoli in kadarkoli. V magistrskem delu smo pregledali možnosti ad hoc povezovanja različnih mobilnih naprav s poudarkom na mobilnem operacijskem sistemu Android. V praktičnem delu naloge smo razvili aplikacijo Android, ki omogoča samodejno povezovanje bližnjih naprav. Za posredovanje podatkov med napravami smo razvili lasten usmerjevalni algoritem, ki v najhitrejšem možnem času poišče najkrajšo pot za prejeti paket podatkov. Vzpostavljeno ad hoc omrežje se prilagaja razmeram s samodejnim povezovanjem. Omenjene so tudi težave in omejitve, na katere smo naleteli pri izdelavi mobilne aplikacije. Te so nastale predvsem zaradi varnostnih zahtev in tehničnih omejitev samih mobilnih naprav in operacijskega sistema.Wireless ad hoc networks are decentralized types of wireless networks which do not rely on infrastructure (such as access points). Devices forming ad hoc networks are equivalent to each other and all participate in the routing process by forwarding data to the other devices. Wireless technologies such as Bluetooth and Wi-Fi Direct allow simple data sharing between devices in reach. Because Bluetooth and Wi-Fi Direct are independent of any infrastructure, devices may communicate anywhere, anytime. This master thesis covers ad hoc connecting possiblities using mobile devices on Android operating system. We developed an Android application that allows automatic ad hoc connecting between mobile devices. For data sharing between devices, we implemented our own routing algorithm that finds the shortest path in the fastest time possible. Established ad hoc network also automatically adapts to any changes. We also mentioned problems and limits that were encountered during the development. Most were a result of a security and technical limits of the mobile devices and operating system

    Pertanika Journal of Science & Technology

    Get PDF

    Pertanika Journal of Science & Technology

    Get PDF

    Информационная безопасность

    Get PDF
    В сборнике опубликованы материалы докладов, представленных на 59-й научной конференции аспирантов, магистрантов и студентов БГУИР. Материалы одобрены оргкомитетом и публикуются в авторской редакции. Для научных и инженерно-технических работников, преподавателей, аспирантов, магистрантов и студентов вузов

    Personality Identification from Social Media Using Deep Learning: A Review

    Get PDF
    Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed

    How\u27s My Network - Incentives and Impediments of Home Network Measurements

    Get PDF
    Gathering meaningful information from Home Networking (HN) environments has presented researchers with measurement strategy challenges. A measurement platform is typically designed around the process of gathering data from a range of devices or usage statistics in a network that are specifically behind the HN firewall. HN studies require a fine balance between incentives and impediments to promote usage and minimize efforts for user participation with the focus on gathering robust datasets and results. In this dissertation we explore how to gather data from the HN Ecosystem (e.g. devices, apps, permissions, configurations) and feedback from HN users across a multitude of HN infrastructures, leveraging low impediment and low/high incentive methods to entice user participation. We look to understand the trade-offs of using a variety of approach types (e.g. Java Applet, Mobile app, survey) for data collections, user preferences, and how HN users react and make changes to the HN environment when presented with privacy/security concerns, norms of comparisons (e.g. comparisons to the local environment and to other HNs) and other HN results. We view that the HN Ecosystem is more than just “the network” as it also includes devices and apps within the HN. We have broken this dissertation down into the following three pillars of work to understand incentives and impediments of user participation and data collections. These pillars include: 1) preliminary work, as part of the How\u27s My Network (HMN) measurement platform, a deployed signed Java applet that provided a user-centered network measurement platform to minimize user impediments for data collection, 2) a HN user survey on preference, comfort, and usability of HNs to understand incentives, and 3) the creation and deployment of a multi-faceted How\u27s My Network Mobile app tool to gather and compare attributes and feedback with high incentives for user participation; as part of this flow we also include related approaches and background work. The HMN Java applet work demonstrated the viability of using a Web browser to obtain network performance data from HNs via a user-centric network measurement platform that minimizes impediments for user participation. The HMN HN survey work found that users prefer to leverage a Mobile app for HN data collections, and can be incentivized to participate in a HN study by providing attributes and characteristics of the HN Ecosystem. The HMN Mobile app was found to provide high incentives, with minimal impediments, for participation with focus on user Privacy and Security concerns. The HMN Mobile app work found that 84\% of users reported a change in perception of privacy and security, 32\% of users uninstalled apps, and 24\% revoked permissions in their HN. As a by-product of this work we found it was possible to gather sensitive information such as previously attached networks, installed apps and devices on the network. This information exposure to any installed app with minimal or no granted permissions is a potential privacy concern
    corecore