280 research outputs found

    Investigating the validity of IEEE 802.11 MAC modeling hypotheses

    Get PDF
    As WLANs employing IEEE 802.11 have become pervasive, many analytic models for predicting their performance have been developed in recent years. Due to the complicated nature of the 802.11 MAC operation, approximations must be made to enable tractable mathematical models. In this article, through simulation we investigate the veracity of the approximations shared by many models that have been developed starting with the fundamental hypotheses in Bianchipsilas (1998 and 2000) seminal papers. We find that even for small numbers of station these assumptions that hold true for saturated stations (those that always have a packet to send) and for unsaturated stations with small buffers. However, despite their widespread adoption, we find that the commonly adopted assumptions that are used to incorporate station buffers are not appropriate. This raises questions about the predictive power of models based on these hypotheses

    Towards reliable geographic broadcasting in vehicular networks

    Get PDF
    In Vehicular ad hoc Networks (VANETs), safety-related messages are broadcasted amongst cars, helping to improve drivers' awareness of the road situation. VANETs’ reliability are highly affected by channel contention. This thesis first addresses the issue of channel use efficiency in geographical broadcasts (geocasts). Constant connectivity changes inside a VANET make the existing routing algorithms unsuitable. This thesis presents a geocast algorithm that uses a metric to estimate the ratio of useful to useless packet received. Simulations showed that this algorithm is more channel-efficient than the farthest-first strategy. It also exposes a parameter, allowing it to adapt to channel load. Second, this thesis presents a method of estimating channel load for providing feedback to moderate the offered load. A theoretical model showing the relationship between channel load and the idle time between transmissions is presented and used to estimate channel contention. Unsaturated stations on the network were shown to have small but observable effects on this relationship. In simulations, channel estimators based on this model show higher accuracy and faster convergence time than by observing packet collisions. These estimators are also less affected by unsaturated stations than by observing packet collisions. Third, this thesis couples the channel estimator to the geocast algorithm, producing a closed-loop load-reactive system that allows geocasts to adapt to instantaneous channel conditions. Simulations showed that this system is not only shown to be more efficient in channel use and be able to adapt to channel contention, but is also able to self-correct suboptimal retransmission decisions. Finally, this thesis demonstrates that all tested network simulators exhibit unexpected behaviours when simulating broadcasts. This thesis describes in depth the error in ns-3, leading to a set of workarounds that allows results from most versions of ns-3 to be interpreted correctly

    SISTEMI PER LA MOBILITĂ€ DEGLI UTENTI E DEGLI APPLICATIVI IN RETI WIRED E WIRELESS

    Get PDF
    The words mobility and network are found together in many contexts. The issue alone of modeling geographical user mobility in wireless networks has countless applications. Depending on one’s background, the concept is investigated with very different tools and aims. Moreover, the last decade saw also a growing interest in code mobility, i.e. the possibility for soft-ware applications (or parts thereof) to migrate and keeps working in different devices and environ-ments. A notable real-life and successful application is distributed computing, which under certain hypothesis can void the need of expensive supercomputers. The general rationale is splitting a very demanding computing task into a large number of independent sub-problems, each addressable by limited-power machines, weakly connected (typically through the Internet, the quintessence of a wired network). Following this lines of thought, we organized this thesis in two distinct and independent parts: Part I It deals with audio fingerprinting, and a special emphasis is put on the application of broadcast mon-itoring and on the implementation aspects. Although the problem is tackled from many sides, one of the most prominent difficulties is the high computing power required for the task. We thus devised and operated a distributed-computing solution, which is described in detail. Tests were conducted on the computing cluster available at the Department of Engineering of the University of Ferrara. Part II It focuses instead on wireless networks. Even if the approach is quite general, the stress is on WiFi networks. More specifically, we tried to evaluate how mobile-users’ experience can be improved. Two tools are considered. In the first place, we wrote a packet-level simulator and used it to esti-mate the impact of pricing strategies in allocating the bandwidth resource, finding out the need for such solutions. Secondly, we developed a high-level simulator that strongly advises to deepen the topic of user cooperation for the selection of the “best” point of access, when many are available. We also propose one such policy

    Wireless LAN 802.11x in U.S. Educational Institutions: Technology Adoption and Digital Divide Perspective

    Get PDF
    The current study of wireless local area networks (WLAN) adoption in educational institutions is motivated by three reasons. First, most students are exposed to information technology when they are at K-12 schools. Indeed, educational institutions represent the largest segment in the WLAN market in the United States in terms of the number of adopters. Second, WLAN requires a substantial financial investment before it can enable an anytime, anywhere learning environment, and may thereby aggravate the digital divide between rich and poor schools. Third, although WLAN is infrastructure technology, it has different characteristics compared to other infrastructure information technologies; traditional infrastructure information technologies are mostly located such that they are transparent to the users, whereas WLAN is close to end users, so that they directly experience benefits related to mobility and convenience, which eventually impacts organization boundary and business processes. Recognizing the importance of WLAN and its difference from traditional infrastructure information technologies, this dissertation examines how WLAN adoption (i.e., whether or not to adopt WLAN) and deployment (i.e., the extent to which WLAN is used) are influenced by technological, environmental, organizational factors, socio-economic, and policy-related factors. It is based on an online survey of principals of 435 K-12 elementary, middle, and high schools in Missouri, including 190 adopters of WLAN and 245 schools that have not adopted WLAN. The results indicate that perceived benefit is not a significant predictor of WLAN adoption. Unlike previous research, satisfaction with current wired system positively affects WLAN adoption. Some of socio-economic variables also affect adoption of WLAN. Schools near urbanized areas are more likely to adopt WLAN than the schools near rural areas. Furthermore, the government and state subsidy E-rate positively affect WLAN adoption. When examining the determinants of WLAN deployment, perceived benefits of using WLAN significantly affect WLAN usage. Moreover, perceived benefits and barriers strongly affect satisfaction with WLAN, which in turn affects WLAN usage. Satisfaction from using WLAN significantly mediates the effect of various antecedent factors on WLAN usage. Implications of the results for IS researchers, practitioners, marketers, and policy makers are discussed and future avenues of the study are examined

    Improving Dependability of Networks with Penalty and Revocation Mechanisms

    Get PDF
    Both malicious and non-malicious faults can dismantle computer networks. Thus, mitigating faults at various layers is essential in ensuring efficient and fair network resource utilization. In this thesis we take a step in this direction and study several ways to deal with faults by means of penalties and revocation mechanisms in networks that are lacking a centralized coordination point, either because of their scale or design. Compromised nodes can pose a serious threat to infrastructure, end-hosts and services. Such malicious elements can undermine the availability and fairness of networked systems. To deal with such nodes, we design and analyze protocols enabling their removal from the network in a fast and a secure way. We design these protocols for two different environments. In the former setting, we assume that there are multiple, but independent trusted points in the network which coordinate other nodes in the network. In the latter, we assume that all nodes play equal roles in the network and thus need to cooperate to carry out common functionality. We analyze these solutions and discuss possible deployment scenarios. Next we turn our attention to wireless edge networks. In this context, some nodes, without being malicious, can still behave in an unfair manner. To deal with the situation, we propose several self-penalty mechanisms. We implement the proposed protocols employing a commodity hardware and conduct experiments in real-world environments. The analysis of data collected in several measurement rounds revealed improvements in terms of higher fairness and throughput. We corroborate the results with simulations and an analytic model. And finally, we discuss how to measure fairness in dynamic settings, where nodes can have heterogeneous resource demands

    An improved medium access control protocol for real-time applications in WLANs and its firmware development

    Get PDF
    The IEEE 802.11 Wireless Local Area Network (WLAN), commonly known as Wi-Fi, has emerged as a popular internet access technology and researchers are continuously working on improvement of the quality of service (QoS) in WLAN by proposing new and efficient schemes. Voice and video over Internet Protocol (VVoIP) applications are becoming very popular in Wi-Fi enabled portable/handheld devices because of recent technological advancements and lower service costs. Different from normal voice and video streaming, these applications demand symmetric throughput for the upstream and downstream. Existing Wi-Fi standards are optimised for generic internet applications and fail to provide symmetric throughput due to traffic bottleneck at access points. Performance analysis and benchmarking is an integral part of WLAN research, and in the majority of the cases, this is done through computer simulation using popular network simulators such as Network Simulator ff 2 (NS-2) or OPNET. While computer simulation is an excellent approach for saving time and money, results generated from computer simulations do not always match practical observations. This is why, for proper assessment of the merits of a proposed system in WLAN, a trial on a practical hardware platform is highly recommended and is often a requirement. In this thesis work, with a view to address the abovementioned challenges for facilitating VoIP and VVoIP services over Wi-Fi, two key contributions are made: i) formulating a suitable medium access control (MAC) protocol to address symmetric traffic scenario and ii) firmware development of this newly devised MAC protocol for real WLAN hardware. The proposed solution shows signifocant improvements over existing standards by supporting higher number of stations with strict QoS criteria. The proposed hardware platform is available off-the-shelf in the market and is a cost effective way of generating and evaluating performance results on a hardware system

    Energy Efficient Security Framework for Wireless Local Area Networks

    Get PDF
    Wireless networks are susceptible to network attacks due to their inherentvulnerabilities. The radio signal used in wireless transmission canarbitrarily propagate through walls and windows; thus a wireless networkperimeter is not exactly known. This leads them to be more vulnerable toattacks such as eavesdropping, message interception and modifications comparedto wired-line networks. Security services have been used as countermeasures toprevent such attacks, but they are used at the expense of resources that arescarce especially, where wireless devices have a very limited power budget.Hence, there is a need to provide security services that are energy efficient.In this dissertation, we propose an energy efficient security framework. Theframework aims at providing security services that take into account energyconsumption. We suggest three approaches to reduce the energy consumption ofsecurity protocols: replacement of standard security protocol primitives thatconsume high energy while maintaining the same security level, modification ofstandard security protocols appropriately, and a totally new design ofsecurity protocol where energy efficiency is the main focus. From ourobservation and study, we hypothesize that a higher level of energy savings isachievable if security services are provided in an adjustable manner. Wepropose an example tunable security or TuneSec system, which allows areasonably fine-grained security tuning to provide security services at thewireless link level in an adjustable manner.We apply the framework to several standard security protocols in wirelesslocal area networks and also evaluate their energy consumption performance.The first and second methods show improvements of up to 70% and 57% inenergy consumption compared to plain standard security protocols,respectively. The standard protocols can only offer fixed-level securityservices, and the methods applied do not change the security level. The thirdmethod shows further improvement compared to fixed-level security by reducing(about 6% to 40%) the energy consumed. This amount of energy saving can bevaried depending on the configuration and security requirements
    • …
    corecore