185 research outputs found
Application of overlay techniques to network monitoring
Measurement and monitoring are important for correct and efficient operation of a network, since these activities provide reliable information and accurate analysis for characterizing and troubleshooting a network’s performance. The focus of network measurement is to measure the volume and types of traffic on a particular network and to record the raw measurement results. The focus of network monitoring is to initiate measurement tasks, collect raw measurement results, and report aggregated outcomes.
Network systems are continuously evolving: besides incremental change to accommodate new devices, more drastic changes occur to accommodate new applications, such as overlay-based content delivery networks. As a consequence, a network can experience significant increases in size and significant levels of long-range, coordinated, distributed activity; furthermore, heterogeneous network technologies, services and applications coexist and interact. Reliance upon traditional, point-to-point, ad hoc measurements to manage such networks is becoming increasingly tenuous. In particular, correlated, simultaneous 1-way measurements are needed, as is the ability to access measurement information stored throughout the network of interest.
To address these new challenges, this dissertation proposes OverMon, a new paradigm for edge-to-edge network monitoring systems through the application of overlay techniques. Of particular interest, the problem of significant network overheads caused by normal overlay network techniques has been addressed by constructing overlay networks with topology awareness - the network topology information is derived from interior gateway protocol (IGP) traffic, i.e. OSPF traffic, thus eliminating all overlay maintenance network overhead.
Through a prototype that uses overlays to initiate measurement tasks and to retrieve measurement results, systematic evaluation has been conducted to demonstrate the feasibility and functionality of OverMon. The measurement results show that OverMon achieves good performance in scalability, flexibility and extensibility, which are important in addressing the new challenges arising from network system evolution. This work, therefore, contributes an innovative approach of applying overly techniques to solve realistic network monitoring problems, and provides valuable first hand experience in building and evaluating such a distributed system
Mobility-based Routing Overhead Management in Reconfigurable Wireless Ad hoc Networks
Mobility-Based Routing Overhead Management in Reconfigurable Wireless Ad Hoc Networks Routing Overheads are the non-data message packets whose roles are establishment and maintenance of routes for data packets as well as neighbourhood discovery and maintenance. They have to be broadcasted in the network either through flooding or other techniques that can ensure that a path exists before data packets can be sent to various destinations. They can be sent reactively or periodically to neighbours so as to keep nodes updated on their neighbourhoods. While we cannot do without these overhead packets, they occupy much of the limited wireless bandwidth available in wireless networks. In a reconfigurable wireless ad hoc network scenario, these packets have more negative effects, as links need to be confirmed more frequently than in traditional networks mainly because of the unpredictable behaviour of the ad hoc networks. We therefore need suitable algorithms that will manage these overheads so as to allow data packet to have more access to the wireless medium, save node energy for longer life of the network, increased efficiency, and scalability. Various protocols have been suggested in the research area. They mostly address routing overheads for suitability of particular protocols leading to lack of standardisation and inapplicability to other protocol classes. In this dissertation ways of ensuring that the routing overheads are kept low are investigated. The issue is addressed both at node and network levels with a common goal of improving efficiency and performance of ad hoc networks without dedicating ourselves to a particular class of routing protocol. At node level, a method hereby referred to as "link availability forecast", that minimises routing overheads used for maintenance of neighbourhood, is derived. The targeted packets are packets that are broadcasted periodically (e.g. hello messages). The basic idea in this method is collection of mobility parameters from the neighbours and predictions or forecasts of these parameters in future. Using these parameters in simple calculations helps in identifying link availabilities between nodes participating in maintenance of networks backbone. At the network level, various approaches have been suggested. The first approach is the cone flooding method that broadcasts route request messages through a predetermined cone shaped region. This region is determined through computation using last known mobility parameters of the destination. Another approach is what is hereby referred as "destination search reverse zone method". In this method, a node will keep routes to destinations for a long time and use these routes for tracing the destination. The destination will then initiate route search in a reverse manner, whereby the source selects the best route for next delivery. A modification to this method is for the source node to determine the zone of route search and define the boundaries within which the packet should be broadcasted. The later method has been used for simulation purposes. The protocol used for verification of the improvements offered by the schemes was the AODV. The link availability forecast scheme was implemented on the AODV and labelled AODV_LA while the network level implementation was labelled AODV_RO. A combination of the two schemes was labelled AODV_LARO
Discovery and Group Communication for Constrained Internet of Things Devices using the Constrained Application Protocol
The ubiquitous Internet is rapidly spreading to new domains. This expansion of
the Internet is comparable in scale to the spread of the Internet in the ’90s. The
resulting Internet is now commonly referred to as the Internet of Things (IoT) and
is expected to connect about 50 billion devices by the year 2020. This means that
in just five years from the time of writing this PhD the number of interconnected
devices will exceed the number of humans by sevenfold. It is further expected that
the majority of these IoT devices will be resource constrained embedded devices
such as sensors and actuators. Sensors collect information about the physical world
and inject this information into the virtual world. Next processing and reasoning
can occur and decisions can be taken to enact upon the physical world by injecting
feedback to actuators.
The integration of embedded devices into the Internet introduces new challenges,
since many of the existing Internet technologies and protocols were not
designed for this class of constrained devices. These devices are typically optimized
for low cost and power consumption and thus have very limited power,
memory, and processing resources and have long sleep periods. The networks
formed by these embedded devices are also constrained and have different characteristics
than those typical in todays Internet. These constrained networks have
high packet loss, low throughput, frequent topology changes and small useful payload
sizes. They are referred to as LLN. Therefore, it is in most cases unfeasible to
run standard Internet protocols on this class of constrained devices and/or LLNs.
New or adapted protocols that take into consideration the capabilities of the constrained
devices and the characteristics of LLNs, are required.
In the past few years, there were many efforts to enable the extension of the
Internet technologies to constrained devices. Initially, most of these efforts were
focusing on the networking layer. However, the expansion of the Internet in the
90s was not due to introducing new or better networking protocols. It was a result
of introducing the World Wide Web (WWW), which made it easy to integrate services
and applications. One of the essential technologies underpinning the WWW
was the Hypertext Transfer Protocol (HTTP). Today, HTTP has become a key
protocol in the realization of scalable web services building around the Representational
State Transfer (REST) paradigm. The REST architectural style enables
the realization of scalable and well-performing services using uniform and simple
interfaces. The availability of an embedded counterpart of HTTP and the REST
architecture could boost the uptake of the IoT.
Therefore, more recently, work started to allow the integration of constrained
devices in the Internet at the service level. The Internet Engineering Task Force
(IETF) Constrained RESTful Environments (CoRE) working group has realized
the REST architecture in a suitable form for the most constrained nodes and networks.
To that end the Constrained Application Protocol (CoAP) was introduced,
a specialized RESTful web transfer protocol for use with constrained networks and
nodes. CoAP realizes a subset of the REST mechanisms offered by HTTP, but is
optimized for Machine-to-Machine (M2M) applications.
This PhD research builds upon CoAP to enable a better integration of constrained
devices in the IoT and examines proposed CoAP solutions theoretically
and experimentally proposing alternatives when appropriate. The first part of this
PhD proposes a mechanism that facilitates the deployment of sensor networks
and enables the discovery, end-to-end connectivity and service usage of newly
deployed sensor nodes. The proposed approach makes use of CoAP and combines
it with Domain Name System (DNS) in order to enable the use of userfriendly
Fully Qualified Domain Names (FQDNs) for addressing sensor nodes. It
includes the automatic discovery of sensors and sensor gateways and the translation
of HTTP to CoAP, thus making the sensor resources globally discoverable and
accessible from any Internet-connected client using either IPv6 addresses or DNS
names both via HTTP or CoAP. As such, the proposed approach provides a feasible
and flexible solution to achieve hierarchical self-organization with a minimum
of pre-configuration. By doing so we minimize costly human interventions and
eliminate the need for introducing new protocols dedicated for the discovery and
organization of resources. This reduces both cost and the implementation footprint
on the constrained devices.
The second, larger, part of this PhD focuses on using CoAP to realize communication
with groups of resources. In many IoT application domains, sensors
or actuators need to be addressed as groups rather than individually, since individual
resources might not be sufficient or useful. A simple example is that all
lights in a room should go on or off as a result of the user toggling the light switch.
As not all IoT applications may need group communication, the CoRE working
group did not include it in the base CoAP specification. This way the base protocol
is kept as efficient and as simple as possible so it would run on even the most
constrained devices. Group communication and other features that might not be
needed by all devices are standardized in a set of optional separate extensions. We
first examined the proposed CoAP extension for group communication, which utilizes
Internet Protocol version 6 (IPv6) multicasts. We highlight its strengths and
weaknesses and propose our own complementary solution that uses unicast to realize
group communication. Our solution offers capabilities beyond simple group
communication. For example, we provide a validation mechanism that performs
several checks on the group members, to make sure that combining them together
is possible. We also allow the client to request that results of the individual members
are processed before they are sent to the client. For example, the client can
request to obtain only the maximum value of all individual members.
Another important optional extension to CoAP allows clients to continuously
observe resources by registering their interest in receiving notifications from CoAP
servers once there are changes to the values of the observed resources. By using
this publish/subscribe mechanism the client does not need to continuously poll the
resource to find out whether it has changed its value. This typically leads to more
efficient communication patterns that preserve valuable device and LLN resources.
Unfortunately CoAP observe does not work together with the CoAP group communication
extension, since the observe extension assumes unicast communication
while the group communication extension only support multicast communication.
In this PhD we propose to extend our own group communication solution to offer
group observation capabilities. By combining group observation with group
processing features, it becomes possible to notify the client only about certain
changes to the observed group (e.g., the maximum value of all group members has
changed).
Acknowledging that the use of multicast as well as unicast has strengths and
weaknesses we propose to extend our unicast based solution with certain multicast
features. By doing so we try to combine the strengths of both approaches to obtain
a better overall group communication that is flexible and that can be tailored
according to the use case needs.
Together, the proposed mechanisms represent a powerful and comprehensive
solution to the challenging problem of group communication with constrained devices.
We have evaluated the solutions proposed in this PhD extensively and in
a variety of forms. Where possible, we have derived theoretical models and have
conducted numerous simulations to validate them. We have also experimentally
evaluated those solutions and compared them with other proposed solutions using
a small demo box and later on two large scale wireless sensor testbeds and under
different test conditions. The first testbed is located in a large, shielded room,
which allows testing under controlled environments. The second testbed is located
inside an operational office building and thus allows testing under normal operation
conditions. Those tests revealed performance issues and some other problems.
We have provided some solutions and suggestions for tackling those problems.
Apart from the main contributions, two other relevant outcomes of this PhD are
described in the appendices. In the first appendix we review the most important
IETF standardization efforts related to the IoT and show that with the introduction
of CoAP a complete set of standard protocols has become available to cover the
complete networking stack and thus making the step from the IoT into the Web
of Things (WoT). Using only standard protocols makes it possible to integrate
devices from various vendors into one bigWoT accessible to humans and machines
alike.
In the second appendix, we provide an alternative solution for grouping constrained
devices by using virtualization techniques. Our approach focuses on the
objects, both resource-constrained and non-constrained, that need to cooperate
by integrating them into a secured virtual network, named an Internet of Things
Virtual Network or IoT-VN. Inside this IoT-VN full end-to-end communication
can take place through the use of protocols that take the limitations of the most
resource-constrained devices into account. We describe how this concept maps to
several generic use cases and, as such, can constitute a valid alternative approach
for supporting selected applications
Discovery and group communication for constrained Internet of Things devices using the Constrained Application Protocol
The ubiquitous Internet is rapidly spreading to new domains. This expansion of
the Internet is comparable in scale to the spread of the Internet in the ’90s. The
resulting Internet is now commonly referred to as the Internet of Things (IoT) and
is expected to connect about 50 billion devices by the year 2020. This means that
in just five years from the time of writing this PhD the number of interconnected
devices will exceed the number of humans by sevenfold. It is further expected that
the majority of these IoT devices will be resource constrained embedded devices
such as sensors and actuators. Sensors collect information about the physical world
and inject this information into the virtual world. Next processing and reasoning
can occur and decisions can be taken to enact upon the physical world by injecting
feedback to actuators.
The integration of embedded devices into the Internet introduces new challenges,
since many of the existing Internet technologies and protocols were not
designed for this class of constrained devices. These devices are typically optimized
for low cost and power consumption and thus have very limited power,
memory, and processing resources and have long sleep periods. The networks
formed by these embedded devices are also constrained and have different characteristics
than those typical in todays Internet. These constrained networks have
high packet loss, low throughput, frequent topology changes and small useful payload
sizes. They are referred to as LLN. Therefore, it is in most cases unfeasible to
run standard Internet protocols on this class of constrained devices and/or LLNs.
New or adapted protocols that take into consideration the capabilities of the constrained
devices and the characteristics of LLNs, are required.
In the past few years, there were many efforts to enable the extension of the
Internet technologies to constrained devices. Initially, most of these efforts were
focusing on the networking layer. However, the expansion of the Internet in the
90s was not due to introducing new or better networking protocols. It was a result
of introducing the World Wide Web (WWW), which made it easy to integrate services
and applications. One of the essential technologies underpinning the WWW
was the Hypertext Transfer Protocol (HTTP). Today, HTTP has become a key
protocol in the realization of scalable web services building around the Representational
State Transfer (REST) paradigm. The REST architectural style enables
the realization of scalable and well-performing services using uniform and simple
interfaces. The availability of an embedded counterpart of HTTP and the REST
architecture could boost the uptake of the IoT.
Therefore, more recently, work started to allow the integration of constrained
devices in the Internet at the service level. The Internet Engineering Task Force
(IETF) Constrained RESTful Environments (CoRE) working group has realized
the REST architecture in a suitable form for the most constrained nodes and networks.
To that end the Constrained Application Protocol (CoAP) was introduced,
a specialized RESTful web transfer protocol for use with constrained networks and
nodes. CoAP realizes a subset of the REST mechanisms offered by HTTP, but is
optimized for Machine-to-Machine (M2M) applications.
This PhD research builds upon CoAP to enable a better integration of constrained
devices in the IoT and examines proposed CoAP solutions theoretically
and experimentally proposing alternatives when appropriate. The first part of this
PhD proposes a mechanism that facilitates the deployment of sensor networks
and enables the discovery, end-to-end connectivity and service usage of newly
deployed sensor nodes. The proposed approach makes use of CoAP and combines
it with Domain Name System (DNS) in order to enable the use of userfriendly
Fully Qualified Domain Names (FQDNs) for addressing sensor nodes. It
includes the automatic discovery of sensors and sensor gateways and the translation
of HTTP to CoAP, thus making the sensor resources globally discoverable and
accessible from any Internet-connected client using either IPv6 addresses or DNS
names both via HTTP or CoAP. As such, the proposed approach provides a feasible
and flexible solution to achieve hierarchical self-organization with a minimum
of pre-configuration. By doing so we minimize costly human interventions and
eliminate the need for introducing new protocols dedicated for the discovery and
organization of resources. This reduces both cost and the implementation footprint
on the constrained devices.
The second, larger, part of this PhD focuses on using CoAP to realize communication
with groups of resources. In many IoT application domains, sensors
or actuators need to be addressed as groups rather than individually, since individual
resources might not be sufficient or useful. A simple example is that all
lights in a room should go on or off as a result of the user toggling the light switch.
As not all IoT applications may need group communication, the CoRE working
group did not include it in the base CoAP specification. This way the base protocol
is kept as efficient and as simple as possible so it would run on even the most
constrained devices. Group communication and other features that might not be
needed by all devices are standardized in a set of optional separate extensions. We
first examined the proposed CoAP extension for group communication, which utilizes
Internet Protocol version 6 (IPv6) multicasts. We highlight its strengths and
weaknesses and propose our own complementary solution that uses unicast to realize
group communication. Our solution offers capabilities beyond simple group
communication. For example, we provide a validation mechanism that performs
several checks on the group members, to make sure that combining them together
is possible. We also allow the client to request that results of the individual members
are processed before they are sent to the client. For example, the client can
request to obtain only the maximum value of all individual members.
Another important optional extension to CoAP allows clients to continuously
observe resources by registering their interest in receiving notifications from CoAP
servers once there are changes to the values of the observed resources. By using
this publish/subscribe mechanism the client does not need to continuously poll the
resource to find out whether it has changed its value. This typically leads to more
efficient communication patterns that preserve valuable device and LLN resources.
Unfortunately CoAP observe does not work together with the CoAP group communication
extension, since the observe extension assumes unicast communication
while the group communication extension only support multicast communication.
In this PhD we propose to extend our own group communication solution to offer
group observation capabilities. By combining group observation with group
processing features, it becomes possible to notify the client only about certain
changes to the observed group (e.g., the maximum value of all group members has
changed).
Acknowledging that the use of multicast as well as unicast has strengths and
weaknesses we propose to extend our unicast based solution with certain multicast
features. By doing so we try to combine the strengths of both approaches to obtain
a better overall group communication that is flexible and that can be tailored
according to the use case needs.
Together, the proposed mechanisms represent a powerful and comprehensive
solution to the challenging problem of group communication with constrained devices.
We have evaluated the solutions proposed in this PhD extensively and in
a variety of forms. Where possible, we have derived theoretical models and have
conducted numerous simulations to validate them. We have also experimentally
evaluated those solutions and compared them with other proposed solutions using
a small demo box and later on two large scale wireless sensor testbeds and under
different test conditions. The first testbed is located in a large, shielded room,
which allows testing under controlled environments. The second testbed is located
inside an operational office building and thus allows testing under normal operation
conditions. Those tests revealed performance issues and some other problems.
We have provided some solutions and suggestions for tackling those problems.
Apart from the main contributions, two other relevant outcomes of this PhD are
described in the appendices. In the first appendix we review the most important
IETF standardization efforts related to the IoT and show that with the introduction
of CoAP a complete set of standard protocols has become available to cover the
complete networking stack and thus making the step from the IoT into the Web
of Things (WoT). Using only standard protocols makes it possible to integrate
devices from various vendors into one bigWoT accessible to humans and machines
alike.
In the second appendix, we provide an alternative solution for grouping constrained
devices by using virtualization techniques. Our approach focuses on the
objects, both resource-constrained and non-constrained, that need to cooperate
by integrating them into a secured virtual network, named an Internet of Things
Virtual Network or IoT-VN. Inside this IoT-VN full end-to-end communication
can take place through the use of protocols that take the limitations of the most
resource-constrained devices into account. We describe how this concept maps to
several generic use cases and, as such, can constitute a valid alternative approach
for supporting selected applications
Yodel: A Layer 3.5 Name-Based Multicast Network Architecture For The Future Internet
Multicasting refers to the ability of transmitting data to multiple
recipients without data sources needing to provide more than one copy of the
data to the network. The network takes responsibility to route and deliver a
copy of each data to every intended recipient. Multicasting has the potential
to improve the network efficiency and performance (e.g., throughput and
latency) through transferring fewer bits in communicating the same data to
multiple recipients compared with unicast transmissions, reduce the amount of
networking resources needed for communication, lower the network energy
footprint, and alleviate the occurrence of congestion in the network. Over the
past few decades, providing multicast services has been a real challenge for
ISPs, especially to support home users and multi-domain network applications,
leading to the emergence of complex application-level solutions. These
solutions like Content Delivery and Peer-to-Peer networks take advantage of
complex caching, routing, transport, and topology management systems which put
heavy strains on the underlying Internet infrastructures to offer multicasting
services. In reality, the main motivation behind the design of these systems is
rather sharing content than offering efficient multicast services. In this
paper, we propound Yodel, a name-based multicast network architecture that can
provide multi-domain multicast services for current and future Internet
applications. Compared to the wider array of other name-based network
architectures with clean-slate infrastructure requirements, Yodel is designed
to provide multicast services over the current Internet infrastructure. Hence,
Yodel puts forward several design goals that distinguish it from other
name-based network architectures with inherent multicast capabilities. This
paper is prepared to discuss the Yodel architecture, its design goals, and
architectural functions.Comment: Contains animated figure
Axiomatic design and network performance analysis for applications in home-based health care
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1998.Includes bibliographical references (p. 157-162).by Jason Douglas Hintersteiner.M.S
Comunicações veiculares híbridas
Vehicle Communications is a promising research field, with a great potential for
the development of new applications capable of improving road safety, traffic efficiency,
as well as passenger comfort and infotainment. Vehicle communication
technologies can be short-range, such as ETSI ITS-G5 or the 5G PC5 sidelink
channel, or long-range, using the cellular network (LTE or 5G). However, none of
the technologies alone can support the expected variety of applications for a large
number of vehicles, nor all the temporal and spatial requirements of connected
and autonomous vehicles. Thus, it is proposed the collaborative or hybrid use of
short-range communications, with lower latency, and of long-range technologies,
potentially with higher latency, but integrating aggregated data of wider geographic
scope.
In this context, this work presents a hybrid vehicle communications model, capable
of providing connectivity through two Radio Access Technologies (RAT), namely,
ETSI ITS-G5 and LTE, to increase the probability of message delivery and, consequently,
achieving a more robust, efficient and secure vehicle communication
system. The implementation of short-range communication channels is done using
Raw Packet Sockets, while the cellular connection is established using the Advanced
Messaging Queuing Protocol (AMQP) protocol.
The main contribution of this dissertation focuses on the design, implementation
and evaluation of a Hybrid Routing Sublayer, capable of isolating messages that
are formed/decoded from transmission/reception processes. This layer is, therefore,
capable of managing traffic coming/destined to the application layer of intelligent
transport systems (ITS), adapting and passing ITS messages between the highest
layers of the protocol stack and the available radio access technologies.
The Hybrid Routing Sublayer also reduces the financial costs due to the use of
cellular communications and increases the efficiency of the use of the available
electromagnetic spectrum, by introducing a cellular link controller using a Beacon
Detector, which takes informed decisions related to the need to connect to a cellular
network, according to different scenarios.
The experimental results prove that hybrid vehicular communications meet the requirements
of cooperative intelligent transport systems, by taking advantage of
the benefits of both communication technologies. When evaluated independently,
the ITS-G5 technology has obvious advantages in terms of latency over the LTE
technology, while the LTE technology performs better than ITS-G5, in terms of
throughput and reliability.As Comunicações Veiculares são um campo de pesquisa promissor, com um grande
potencial de desenvolvimento de novas aplicações capazes de melhorar a segurança
nas estradas, a eficiência do tráfego, bem com o conforto e entretenimento dos
passageiros. As tecnologias de comunicação veícular podem ser de curto alcance,
como por exemplo ETSI ITS-G5 ou o canal PC5 do 5G, ou de longo alcance, recorrendo
à rede celular (LTE ou 5G). No entanto, nenhuma das tecnologias por
si só, consegue suportar a variedade expectável de aplicações para um número de
veículos elevado nem tampouco todos os requisitos temporais e espaciais dos veículos
conectados e autónomos. Assim, é proposto o uso colaborativo ou híbrido de
comunicações de curto alcance, com latências menores, e de tecnologias de longo
alcance, potencialmente com maiores latências, mas integrando dados agregados
de maior abrangência geográfica.
Neste contexto, este trabalho apresenta um modelo de comunicações veiculares
híbrido, capaz de fornecer conectividade por meio de duas Tecnologias de Acesso
por Rádio (RAT), a saber, ETSI ITS-G5 e LTE, para aumentar a probabilidade de
entrega de mensagens e, consequentemente, alcançar um sistema de comunicação
veicular mais robusto, eficiente e seguro. A implementação de canais de comunicação
de curto alcance é feita usando Raw Packet Sockets, enquanto que a ligação
celular é estabelecida usando o protocolo Advanced Messaging Queuing Protocol
(AMQP).
A contribuição principal desta dissertação foca-se no projeto, implementação e avaliação
de uma sub camada hibrída de encaminhamento, capaz de isolar mensagens
que se formam/descodificam a partir de processos de transmissão/receção. Esta
camadada é, portanto, capaz de gerir o tráfego proveniente/destinado à camada
de aplicação de sistemas inteligentes de transportes (ITS) adaptando e passando
mensagens ITS entre as camadas mais altas da pilha protocolar e as tecnologias
de acesso rádio disponíveis.
A sub camada hibrída de encaminhamento também potencia uma redução dos custos
financeiros devidos ao uso de comunicações celulares e aumenta a eficiência do
uso do espectro electromagnético disponível, ao introduzir um múdulo controlador
da ligação celular, utilizando um Beacon Detector, que toma decisões informadas
relacionadas com a necessidade de uma conexão a uma rede celular, de acordo com
diferentes cenários.
Os resultados experimentais comprovam que as comunicações veículares híbridas
cumprem os requisitos dos sistemas cooperativos de transporte inteligentes, ao
tirarem partido das vantagens de ambas tecnologias de comunicação. Quando
avaliadas de forma independente, constata-se que que a tecnologia ITS-G5 tem
vantagens evidentes em termos de latência sobre a tecnologia LTE, enquanto que
a tecnologia LTE tem melhor desempenho que a LTE, ai nível de débito e fiabilidade.Mestrado em Engenharia Eletrónica e Telecomunicaçõe
Seamless, reliable, video multicast in wireless ad hoc networks
A wireless ad hoc network is a self-organized and dynamically reconfigurable wireless network without central administration and wired infrastructure. Nodes in a wireless ad hoc network can instantly establish a communication structure while each node moves in an arbitrary manner. A wireless ad hoc network is useful for mobile nodes working in a group to accomplish certain tasks. On the other hand, multicast is a very useful and efficient means of supporting group-oriented applications. Multicast is an essential technology for many applications such as video distribution and group video conferencing, data dissemination, disaster relief and battlefield.
Video multicasting over wireless ad hoc networks is bandwidth-efficient compared to multiple unicast sessions. However, video multicasting poses great challenges over wireless ad hoc networks. Video packets are both delay and loss sensitive. In addition, due to nodes mobility, the topology of wireless ad hoc networks is frequently changed. As a result, the established links are continuously broken, causing quality loss and interruption in the received video signal. Other challenges include limited battery life of wireless nodes and lower wireless network capacity compared to wired networks.
Video multicast over wireless ad hoc networks has been an active area in recent years. The main objective of these studies is to improve the quality of the received video by exploiting the error resilience properties of Multiple Description Coding (MDC) along with multiple paths. In other words, MD video is encoded and transmitted over two different paths to each destination node. If only one path is broken, packets corresponding to the other description on the other path can still arrive at the destination node on time.
Layered Coding (LC) and Multiple Description Coding (MDC) have been proposed as video source coding techniques that are robust against inevitable transmission errors. In contrast to MDC, LC encodes a media source into two or more sub-streams, known as layers, one base layer and several enhancement layers. The base layer can be decoded to provide a basic quality of the received video while the enhancement layers are mainly used to refine the quality of the video that is reconstructed from the base layer. If the base layer is corrupted, the enhancement layers become useless, even if they are received correctly. Therefore, the base layer is critically important and is usually highly protected. For MDC, however, these sub-streams are of equal importance in the sense that each sub-stream, also called a description, can be decoded independently to produce a signal of basic quality. When more descriptions are received, the decoder can gradually increase the quality.
One main problem of video multicasting for heterogeneous destinations is the assignment of video descriptions and the construction of multicast tree. However, the assignment of MD video and the construction of multicast tree can greatly affect the user satisfaction (i.e., affect the quality of the received video). In this thesis, we introduce novel approaches to improve the user satisfaction for a set of heterogeneous multicast destinations. The main idea of our approaches is to employ the independent-description property of MDC along with multiple multicast trees. However, many questions are raised: How multiple multicast trees should be constructed? And how MD video should be assigned? Is it better to construct multiple multicast trees first and then assign the video descriptions? Or is it better to assign the video descriptions first and we then construct multiple multicast trees? Should we perform that in a distributed manner or in a centralized one?
To answer these questions, we propose different algorithms to construct multiple multicast trees and to assign MD video. The proposed algorithms are: Serial MDC, Distributed MDC, and Centralized MDC. Serial MDC constructs multiple paths, to each destination, and assigns a different video description to each of them. After that, it constructs multiple multicast trees. Distributed MDC assigns MD video and constructs multiple multicast trees in parallel and in distributed fashion. In Centralized MDC, the assignment of MD video and the construction of multiple multicast trees are performed in a centralized manner. However, Centralized MDC first constructs multiple multicast trees and then assigns different video description to each multicast tree. We evaluate and compare our proposed algorithms Under different network conditions. For example, Network size, and multicast group size. Simulation results demonstrate that, indeed, the way of multicast trees construction and the assignment of MD video can greatly affect the user satisfaction. In addition, simulation results show that MDC can achieve higher user satisfaction compared to LC with a small cost in terms of number of pure forwarders nodes, bandwidth utilization, and aggregate tree delay.
Furthermore, we use our proposed algorithms to develop different multicast protocols for video multicast over wireless ad hoc networks. Specifically, we propose four protocols, namely, Centralized MDMTR (Multiple Disjoint Multicast Trees Routing), Sequential MDMTR, Distributed MDMTR, and Neighbor-aware MDMTR protocols. These protocols take many issues into consideration, rejoining and joining a multicast group, multicast trees maintenance, and mobility of nodes, for example. We evaluate the performance of our proposed protocols and compare them under different network conditions. For example, multicast group size, and mobility of nodes. Simulation results demonstrate that our protocols perform well compared to other protocols in the literature
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
- …