15 research outputs found

    Unterbrechungstolerante Fahrzeugkommunikation im öffentlichen Personennahverkehr

    Get PDF
    Communication systems play an important role in the efficient operation of public transport networks. Recently, traditional voice-centric real-time communication is complemented and often replaced by data-centric asynchronous machine-to-machine communication. Disruption tolerant networking in combination with license-exempt high bandwidth technologies have the potential to reduce infrastructure investments and operating costs for such applications, because a continuous end-to-end connectivity is no longer required. In this thesis the feasibility of such a system is investigated and confirmed. First, realistic use-cases are introduced and the requirements to the communication system are analyzed. Then the channel characteristics of several WLAN-based technologies are experimentally evaluated in real public transport scenarios. Since the results are promising, the next step is gaining a deeper understanding of the special mobility properties in public transport networks. Therefore, we analyze existing traces as well as our own newly acquired trace. Our trace features additional operator meta-data that is not available for existing traces, and we report on unexpected properties that have not been quantified before. Then the trace is combined with the experimentally obtained channel parameters in order to analyze the characteristics of inter-vehicle contacts. We present the statistical distribution of situation-specific contact events and the impact of radio range on contact capacity. Then results of all steps above are used to propose a routing scheme that is optimized for public transport networks. In the final simulation-based evaluation we show that this router outperforms previously proposed algorithms.Kommunikationssysteme leisten einen wichtigen Beitrag zum effizienten Betrieb des öffentlichen Personennahverkehrs. Seit einigen Jahren wird dabei der Sprechfunk zunehmend durch asynchronen M2M-Datenfunk ergänzt und in vielen Anwendungsgebieten sogar vollständig ersetzt. Die Kombination aus unterbrechungstoleranten Netzwerken und lizenzfreien Drahtlostechnologien birgt ein erhebliches Potential zur Reduzierung von Infrastrukturinvestitionen und Betriebskosten, da für diese Anwendungen eine dauerhafte Ende-zu-Ende Verbindung nicht mehr erforderlich ist. In dieser Arbeit wird die Machbarkeit eines solchen Systems untersucht und belegt. Zunächst werden dazu Anwendungsfälle vorgestellt und deren Anforderungen an das Kommunikationssystem analysiert. Dann werden die Kanalcharakteristika mehrerer WLAN-Technologien im realen ÖPNV-Umfeld experimentell ermittelt und bewertet. Auf Grundlage der erfolgversprechenden Ergebnisse werden im nächsten Schritt die besonderen Mobilitätseigenschaften von ÖPNV-Netzen untersucht. Zu diesen Zweck analysieren wir existierende und eigene, neu aufgezeichnete Bewegungsdaten von ÖPNV-Fahrzeugen. Unsere Daten enthalten dabei zusätzliche Metadaten der Verkehrsbetriebe, die zuvor nicht verfügbar waren, so dass wir unerwartete Effekte beschreiben und erstmals quantifizieren können. Anschließend werden die Bewegungsdaten mit den zuvor experimentell erfassten Kanaleigenschaften kombiniert, um so die Kommunikationskontakte zwischen den Fahrzeugen genauer zu betrachten. Wir stellen die statistische Verteilung der situationsabhängigen Kontaktereignisse vor, sowie den Einfluss der Funkreichweite auf die Kontaktkapazität. Dann werden die Ergebnisse aller vorhergehenden Schritte verwendet, um ein neues, optimiertes Routingverfahren für ÖPNV-Netze vorzuschlagen. In der simulationsbasierten Evaluation belegen wir, dass dieser Router die Leistung bisher bekannter Verfahren übertrifft

    Distribuição de conteúdos em redes veiculares usando mecanismos de comunicação tolerantes ao atraso

    Get PDF
    Mestrado em Engenharia Eletrónica e TelecomunicaçõesThe last couple of decades have been the stage for the introduction of new telecommunication networks. It is expected that in the future all types of vehicles, such as cars, buses and trucks have the ability to intercommunicate and form a vehicular network. Vehicular networks display particularities when compared to other networks due to their continuous node mobility and their wide geographical dispersion, leading to a permanent network fragmentation. Therefore, the main challenges that this type of network entails relate to the intermittent connectivity and the long and variable delay in information delivery. To address the problems related to the intermittent connectivity, a new concept was introduced – Delay Tolerant Network (DTN). This architecture is built on a Store-Carry-and-Forward (SCF) mechanism in order to assure the delivery of information when there is no end-to-end path defined. Vehicular networks support a multiplicity of services, including the transportation of non-urgent information. Therefore, it is possible to conclude that the use of a DTN for the dissemination of non-urgent information is able to surpass the aforementioned challenges. The work developed focused on the use of DTNs for the dissemination of non-urgent information. This information is originated in the network service provider and should be available on mobile network terminals during a limited period of time. In order to do so, four different strategies were deployed: Random, Least Number of Hops First (LNHF), Local Rarest Bundle First (LRBF) e Local Rarest Generation First (LRGF). All of these strategies have a common goal: to disseminate content into the network in the shortest period of time and minimizing network congestion. This work also contemplates the analysis and implementation of techniques that reduce network congestion. The design, implementation and validation of the proposed strategies was divided into three stages. The first stage focused on creating a Matlab emulator for the fast implementation and strategy validation. This stage resulted in the four strategies that were afterwards implemented in the DTNs software Helix – developed in a partnership between Instituto de Telecomunicac¸˜oes (IT) and Veniam R , which are responsible for the largest operating vehicular network worldwide that is located in Oporto city. The strategies were later evaluated on an emulator that was built for the largescale testing of DTN. Both emulators account for vehicular mobility based on information previously collected from the real platform. Finally, the strategy that presented the best overall performance was tested on a real platform – in a lab environment – for concept and operability demonstration. It is possible to conclude that two of the implemented strategies (LRBF and LRGF) can be deployed in the real network and guarantee a significant delivery rate. The LRBF strategy has the best performance in terms of delivery. However, it needs to add a significant overhead to the network in order to work. In the future, tests of scalability should be conducted in a real environment in order to confirm the emulator results. The real implementation of the strategies should be accompanied by the introduction of new types of services for content distribution.Nas últimas décadas tem-se assistido à introdução de novas redes de telecomunicações. Entre estas destacam-se as redes veiculares constituídas por todo o tipo de veículos com capacidades de intercomunicação. As redes veiculares têm especificidades singulares face a outro tipo de redes devido à constante mobilidade dos nós e à sua elevada dispersão geográfica. Os principais desafios introduzidos por este tipo de redes prendem-se com a conectividade intermitente e o atraso longo e variado na entrega da informação. Por forma a fazer face aos problemas relacionados com a conectividade intermitente, introduziu-se um novo conceito intitulado de Delay Tolerant Network (DTN). Esta arquitetura assenta num mecanismo de StoreCarry-and-Forward (SCF) por forma a garantir a entrega de informação em situações onde não existe um caminho estabelecido fim-a-fim. As redes veiculares suportam uma multiplicidade de serviços, nos quais se inclui o transporte de informação não-urgente. Desta forma, a utilização de uma DTN para a difusão de informação não-urgente permite ultrapassar os desafios identificados anteriormente. O trabalho realizado foca-se na utilização de DTNs para a disseminação de informação não-urgente. Por forma a operacionalizar esta premissa foram implementadas quatro estratégias distintas: Random, Least Number of Hops First (LNHF), Local Rarest Bundle First (LRBF) e Local Rarest Generation First (LRGF). Todas estas estratégias tem um objetivo comum: disseminar um conteúdo na rede no menor tempo possível minimizando ao máximo o congestionamento da rede. Foram também implementadas e estudadas técnicas para minimizar o congestionamento do meio. A metodologia de desenho, implementação e validação das estratégias propostas foi desenvolvida em três fases. A primeira focou-se na criação de um emulador Matlab para a implementação rápida e validação das estratégias. Dessa primeira fase resultaram quatro estratégias que foram posteriormente implementadas no software de DTNs Helix desenvolvido através de uma parceria entre o Instituto de Telecomunicações (IT) e a Veniam R (responsáveis pela maior rede veicular em operação a nível mundial localizada na cidade do Porto). As estratégias foram depois avaliadas num emulador construído para fazer testes de grande escala. Ambos os emuladores introduzem a mobilidade dos veículos com base em informação recolhida previamente da plataforma real. Por fim a estratégia que apresentou o melhor desempenho foi introduzida e testada numa plataforma real para demonstração de conceito e operacionalidade. Conclui-se que duas das estratégias implementadas (LRBF and LRGF) são passíveis de utilização na rede real garantido uma taxa de entrega significativa. A estratégia LRBF apresentou o melhor desempenho em termos de entrega, no entanto, necessita de adicionar um overhead considerável na rede para funcionar. No futuro devem ser realizados testes de escalabilidade em ambiente real por forma a confirmar os resultados obtidos em ambiente de emulação e real em pequena escala. A implementação real das estratégias deve ser acompanhada pela introdução de novos tipos de serviços para distribuição de conteúdos

    Trustworthiness Mechanisms for Long-Distance Networks in Internet of Things

    Get PDF
    Aquesta tesi té com a objectiu aconseguir un intercanvi de dades fiable en un entorn hostil millorant-ne la confiabilitat mitjançant el disseny d'un model complet que tingui en compte les diferents capes de confiabilitat i mitjançant la implementació de les contramesures associades al model. La tesi se centra en el cas d'ús del projecte SHETLAND-NET, amb l'objectiu de desplegar una arquitectura d'Internet de les coses (IoT) híbrida amb comunicacions LoRa i d'ona ionosfèrica d'incidència gairebé vertical (NVIS) per oferir un servei de telemetria per al monitoratge del “permafrost” a l'Antàrtida. Per complir els objectius de la tesi, en primer lloc, es fa una revisió de l'estat de l'art en confiabilitat per proposar una definició i l'abast del terme de confiança. Partint d'aquí, es dissenya un model de confiabilitat de quatre capes, on cada capa es caracteritza pel seu abast, mètrica per a la quantificació de la confiabilitat, contramesures per a la millora de la confiabilitat i les interdependències amb les altres capes. Aquest model permet el mesurament i l'avaluació de la confiabilitat del cas d'ús a l'Antàrtida. Donades les condicions hostils i les limitacions de la tecnologia utilitzada en aquest cas d’ús, es valida el model i s’avalua el servei de telemetria a través de simulacions en Riverbed Modeler. Per obtenir valors anticipats de la confiabilitat esperada, l'arquitectura proposada es modela per avaluar els resultats amb diferents configuracions previ al seu desplegament en proves de camp. L'arquitectura proposada passa per tres principals iteracions de millora de la confiabilitat. A la primera iteració, s'explora l'ús de mecanismes de consens i gestió de la confiança social per aprofitar la redundància de sensors. En la segona iteració, s’avalua l’ús de protocols de transport moderns per al cas d’ús antàrtic. L’última iteració d’aquesta tesi avalua l’ús d’una arquitectura de xarxa tolerant al retard (DTN) utilitzant el Bundle Protocol (BP) per millorar la confiabilitat del sistema. Finalment, es presenta una prova de concepte (PoC) amb maquinari real que es va desplegar a la campanya antàrtica 2021-2022, descrivint les proves de camp funcionals realitzades a l'Antàrtida i Catalunya.Esta tesis tiene como objetivo lograr un intercambio de datos confiable en un entorno hostil mejorando su confiabilidad mediante el diseño de un modelo completo que tenga en cuenta las diferentes capas de confiabilidad y mediante la implementación de las contramedidas asociadas al modelo. La tesis se centra en el caso de uso del proyecto SHETLAND-NET, con el objetivo de desplegar una arquitectura de Internet de las cosas (IoT) híbrida con comunicaciones LoRa y de onda ionosférica de incidencia casi vertical (NVIS) para ofrecer un servicio de telemetría para el monitoreo del “permafrost” en la Antártida. Para cumplir con los objetivos de la tesis, en primer lugar, se realiza una revisión del estado del arte en confiabilidad para proponer una definición y alcance del término confiabilidad. Partiendo de aquí, se diseña un modelo de confiabilidad de cuatro capas, donde cada capa se caracteriza por su alcance, métrica para la cuantificación de la confiabilidad, contramedidas para la mejora de la confiabilidad y las interdependencias con las otras capas. Este modelo permite la medición y evaluación de la confiabilidad del caso de uso en la Antártida. Dadas las condiciones hostiles y las limitaciones de la tecnología utilizada en este caso de uso, se valida el modelo y se evalúa el servicio de telemetría a través de simulaciones en Riverbed Modeler. Para obtener valores anticipados de la confiabilidad esperada, la arquitectura propuesta es modelada para evaluar los resultados con diferentes configuraciones previo a su despliegue en pruebas de campo. La arquitectura propuesta pasa por tres iteraciones principales de mejora de la confiabilidad. En la primera iteración, se explora el uso de mecanismos de consenso y gestión de la confianza social para aprovechar la redundancia de sensores. En la segunda iteración, se evalúa el uso de protocolos de transporte modernos para el caso de uso antártico. La última iteración de esta tesis evalúa el uso de una arquitectura de red tolerante al retardo (DTN) utilizando el Bundle Protocol (BP) para mejorar la confiabilidad del sistema. Finalmente, se presenta una prueba de concepto (PoC) con hardware real que se desplegó en la campaña antártica 2021-2022, describiendo las pruebas de campo funcionales realizadas en la Antártida y Cataluña.This thesis aims at achieving reliable data exchange over a harsh environment by improving its trustworthiness through the design of a complete model that takes into account the different layers of trustworthiness and through the implementation of the model’s associated countermeasures. The thesis focuses on the use case of the SHETLAND-NET project, aiming to deploy a hybrid Internet of Things (IoT) architecture with LoRa and Near Vertical Incidence Skywave (NVIS) communications to offer a telemetry service for permafrost monitoring in Antarctica. To accomplish the thesis objectives, first, a review of the state of the art in trustworthiness is carried out to propose a definition and scope of the trustworthiness term. From these, a four-layer trustworthiness model is designed, with each layer characterized by its scope, metric for trustworthiness accountability, countermeasures for trustworthiness improvement, and the interdependencies with the other layers. This model enables trustworthiness accountability and assessment of the Antarctic use case. Given the harsh conditions and the limitations of the use technology in this use case, the model is validated and the telemetry service is evaluated through simulations in Riverbed Modeler. To obtain anticipated values of the expected trustworthiness, the proposal has been modeled to evaluate the performance with different configurations prior to its deployment in the field. The proposed architecture goes through three major iterations of trustworthiness improvement. In the first iteration, using social trust management and consensus mechanisms is explored to take advantage of sensor redundancy. In the second iteration, the use of modern transport protocols is evaluated for the Antarctic use case. The final iteration of this thesis assesses using a Delay Tolerant Network (DTN) architecture using the Bundle Protocol (BP) to improve the system’s trustworthiness. Finally, a Proof of Concept (PoC) with real hardware that was deployed in the 2021-2022 Antarctic campaign is presented, describing the functional tests performed in Antarctica and Catalonia

    Data availability in challenging networking environments in presence of failures

    Get PDF
    This Doctoral thesis presents research on improving data availability in challenging networking environments where failures frequently occur. The thesis discusses the data retrieval and transfer mechanisms in challenging networks such as the Grid and the delay-tolerant networking (DTN). The Grid concept has gained adaptation as a solution to high-performance computing challenges that are faced in international research collaborations. Challenging networking is a novel research area in communications. The first part of the thesis introduces the challenges of data availability in environment where resources are scarce. The focus is especially on the challenges faced in the Grid and in the challenging networking scenarios. A literature overview is given to explain the most important research findings and the state of the standardization work in the field. The experimental part of the thesis consists of eight scientific publications and explains how they contribute to research in the field. Focus in on explaining how data transfer mechanisms have been improved from the application and networking layer points of views. Experimental methods for the Grid scenarios comprise of running a newly developed storage application on the existing research infrastructure. A network simulator is extended for the experimentation with challenging networking mechanisms in a network formed by mobile users. The simulator enables to investigate network behavior with a large number of nodes, and with conditions that are difficult to re-instantiate. As a result, recommendations are given for data retrieval and transfer design for the Grid and mobile networks. These recommendations can guide both system architects and application developers in their work. In the case of the Grid research, the results give first indications on the applicability of the erasure correcting codes for data storage and retrieval with the existing Grid data storage tools. In the case of the challenging networks, the results show how an application-aware communication approach can be used to improve data retrieval and communications. Recommendations are presented to enable efficient transfer and management of data items that are large compared to available resources

    Message forwarding techniques in Bluetooth enabled opportunistic communication environment

    Get PDF
    These days, most of the mobile phones are smart enough with computer like intelligence and equipped with multiple communication technologies such as Bluetooth, wireless LAN, GPRS and GSM. Different communication medium on single device have unlocked the new horizon of communication means. Modern mobile phones are not only capable of using traditional way of communication via GSM or GPRS; but, also use wireless LANs using access points where available. Among these communication means, Bluetooth technology is very intriguing and unique in nature. Any two devices equipped with Bluetooth technology can communicate directly due to their unique IDs in the world. This is opposite to GSM or Wireless LAN technology; where devices are dependent on infrastructure of service providers and have to pay for their services. Due to continual advancement in the field of mobile technology, mobile ad-hoc network seems to be more realised than ever using Bluetooth. In traditional mobile ad-hoc networks (MANETs), before information sharing, devices have partial or full knowledge of routes to the destinations using ad-hoc routing protocols. This kind of communication can only be realised if nodes follow the certain pattern. However, in reality mobile ad-hoc networks are highly unpredictable, any node can join or leave network at any time, thus making them risky for effective communication. This issue is addressed by introducing new breed of ad-hoc networking, known as opportunistic networks. Opportunistic networking is a concept that is evolved from mobile ad-hoc networking. In opportunistic networks nodes have no prior knowledge of routes to intended destinations. Any node in the network can be used as potential forwarder with the exception of taking information one step closer to intended destination. The forwarding decision is based on the information gathered from the source node or encountering node. The opportunistic forwarding can only be achieved if message forwarding is carried out in store and forward fashion. Although, opportunistic networks are more flexible than traditional MANETs, however, due to little insight of network, it poses distinct challenges such as intermittent connectivity, variable delays, short connection duration and dynamic topology. Addressing these challenges in opportunistic network is the basis for developing new and efficient protocols for information sharing. The aim of this research is to design different routing/forwarding techniques for opportunistic networks to improve the overall message delivery at destinations while keeping the communication cost very low. Some assumptions are considered to improved directivity of message flow towards intended destinations. These assumptions exploit human social relationships analogies, approximate awareness of the location of nodes in the network and use of hybrid communication by combining several routing concept to gain maximum message directivity. Enhancement in message forwarding in opportunistic networks can be achieved by targeting key nodes that show high degree of influence, popularity or knowledge inside the network. Based on this observation, this thesis presents an improved version of Lobby Influence (LI) algorithm called as Enhanced Lobby Influence (ELI). In LI, the forwarding decision is based on two important factors, popularity of node and popularity of node’s neighbour. The forwarding decision of Enhanced Lobby Influence not only depends on the intermediate node selection criteria as defined in Lobby Influence but also based on the knowledge of previously direct message delivery of intended destination. An improvement can be observed if nodes are aware of approximate position of intended destinations by some communication means such as GPS, GSM or WLAN access points. With the knowledge of nodes position in the network, high message directivity can be achieved by using simple concepts of direction vectors. Based on this observation, this research presents another new algorithm named as Location-aware opportunistic content forwarding (LOC). Last but not least, this research presents an orthodox yet unexplored approach for efficient message forwarding in Bluetooth communication environment, named as Hybrid Content Forwarding (HCF). The new approach combines the characteristics of social centrality based forwarding techniques used in opportunistic networks with traditional MANETs protocols used in Bluetooth scatternets. Simulation results show that a significant increase in delivery radio and cost reduction during content forwarding is observed by deploying these proposed algorithms. Also, comparison with existing technique shows the efficiency of using the new schemes

    Hybrid routing in delay tolerant networks

    Get PDF
    This work addresses the integration of today\\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented

    Hybrid Routing in Delay Tolerant Networks

    Get PDF
    This work addresses the integration of today\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented

    Enabling Censorship Tolerant Networking

    Get PDF
    Billions of people in the world live under heavy information censorship. We propose a new class of delay tolerant network (DTN), known as a censorship tolerant network (CTN), to counter the growing practice of Internet-based censorship. CTNs should provide strict guarantees on the privacy of both information shared within the network and the identities of network participants. CTN software needs to be publicly available as open source software and run on personal mobile devices with real-world computational, storage, and energy constraints. We show that these simple assumptions and system constraints have a non-obvious impact on the design and implementation of CTNs, and serve to differentiate our system design from previous work. We design data routing within a CTN using a new paradigm: one where nodes operate selfishly to maximize their own utility, make decisions based only on their own observations, and only communicate with nodes they trust. We introduce the Laissez-faire framework, an incentivized approach to CTN routing. Laissez-faire does not mandate any specific routing protocol, but requires that each node implement tit-for-tat by keeping track of the data exchanged with other trusted nodes. We propose several strategies for valuing and retrieving content within a CTN. We build a prototype BlackBerry implementation and conduct both controlled lab and field trials, and show how each strategy adapts to different network conditions. We further demonstrate that, unlike existing approaches to routing, Laissez-faire prevents free-riding. We build an efficient and reliable data transport protocol on top of the Short Message Service (SMS) to serve a control channel for the CTN. We conduct a series of experiments to characterise SMS behaviour under bursty, unconventional workloads. This study examines how variables such as the transmission order, delay between transmissions, the network interface used, and the time-of-day affect the service. We present the design and implementation of our transport protocol. We show that by adapting to the unique channel conditions of SMS we can reduce message overheads by as much as 50\% and increase data throughput by as much as 545% over the approach used by existing applications. A CTN's dependency on opportunistic communication imposes a significant burden on smartphone energy resources. We conduct a large-scale user study to measure the energy consumption characteristics of 20100 smartphone users. Our dataset is two orders of magnitude larger than any previous work. We use this dataset to build the Energy Emulation Toolkit (EET) that allows developers to evaluate the energy consumption requirements of their applications against real users' energy traces. The EET computes the successful execution rate of energy-intensive applications across all users, specific devices, and specific smartphone user-types. We also consider active adaptation to energy constraints. By classifying smartphone users based on their charging characteristics we demonstrate that energy level can be predicted within 72% accuracy a full day in advance, and through an Energy Management Oracle energy intensive applications, such as CTNs, can adapt their execution to maintain the operation of the host device

    Naming and Address Resolution in Heterogeneous Mobile Ad hoc Networks

    Get PDF
    This doctoral thesis deals with naming and address resolution in heterogeneous networks to be used in disaster scenarios. Such events could damage the communication infrastructure in parts or completely. To reestablish communication, Mobile Ad hoc Networks (MANETs) could be used where central entities have to be eliminated broadly. The main focus of the thesis lies on two things: an addressing scheme that helps to find nodes, even if they frequently change the subnet and the local addressing, by introducing an identifying name layer; and a MANET-adapted substitution of the Domain Name System (DNS) in order to resolve node identities to changing local addresses. We present our solution to provide decentralized name resolution based on different underlying routing protocols embedded into an adaptive routing framework. Furthermore, we show how this system works in cascaded networks and how to extend the basic approach to realize location-aware service discovery.Auch im Buchhandel erhältlich: Naming and Address Resolution in Heterogeneous Mobile Ad hoc Networks / Sebastian Schellenberg Ilmenau : Univ.-Verl. Ilmenau, 2016. - xvi, 177 Seiten ISBN 978-3-86360-129-4 Preis (Druckausgabe): 17,60
    corecore