2,256 research outputs found
Quality-Aware Broadcasting Strategies for Position Estimation in VANETs
The dissemination of vehicle position data all over the network is a
fundamental task in Vehicular Ad Hoc Network (VANET) operations, as
applications often need to know the position of other vehicles over a large
area. In such cases, inter-vehicular communications should be exploited to
satisfy application requirements, although congestion control mechanisms are
required to minimize the packet collision probability. In this work, we face
the issue of achieving accurate vehicle position estimation and prediction in a
VANET scenario. State of the art solutions to the problem try to broadcast the
positioning information periodically, so that vehicles can ensure that the
information their neighbors have about them is never older than the
inter-transmission period. However, the rate of decay of the information is not
deterministic in complex urban scenarios: the movements and maneuvers of
vehicles can often be erratic and unpredictable, making old positioning
information inaccurate or downright misleading. To address this problem, we
propose to use the Quality of Information (QoI) as the decision factor for
broadcasting. We implement a threshold-based strategy to distribute position
information whenever the positioning error passes a reference value, thereby
shifting the objective of the network to limiting the actual positioning error
and guaranteeing quality across the VANET. The threshold-based strategy can
reduce the network load by avoiding the transmission of redundant messages, as
well as improving the overall positioning accuracy by more than 20% in
realistic urban scenarios.Comment: 8 pages, 7 figures, 2 tables, accepted for presentation at European
Wireless 201
A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks
This Article is provided by the Brunel Open Access Publishing Fund - Copyright @ 2011 Springer OpenTransmission control protocol (TCP), which provides reliable end-to-end data delivery, performs well in traditional wired network environments, while in wireless ad hoc networks, it does not perform well. Compared to wired networks, wireless ad hoc networks have some specific characteristics such as node mobility and a shared medium. Owing to these specific characteristics of wireless ad hoc networks, TCP faces particular problems with, for example, route failure, channel contention and high bit error rates. These factors are responsible for the performance degradation of TCP in wireless ad hoc networks. The research community has produced a wide range of proposals to improve the performance of TCP in wireless ad hoc networks. This article presents a survey of these proposals (approaches). A classification of TCP improvement proposals for wireless ad hoc networks is presented, which makes it easy to compare the proposals falling under the same category. Tables which summarize the approaches for quick overview are provided. Possible directions for further improvements in this area are suggested in the conclusions. The aim of the article is to enable the reader to quickly acquire an overview of the state of TCP in wireless ad hoc networks.This study is partly funded by Kohat University of Science & Technology (KUST),
Pakistan, and the Higher Education Commission, Pakistan
Cognition-Based Networks: A New Perspective on Network Optimization Using Learning and Distributed Intelligence
IEEE Access
Volume 3, 2015, Article number 7217798, Pages 1512-1530
Open Access
Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence (Article)
Zorzi, M.a , Zanella, A.a, Testolin, A.b, De Filippo De Grazia, M.b, Zorzi, M.bc
a Department of Information Engineering, University of Padua, Padua, Italy
b Department of General Psychology, University of Padua, Padua, Italy
c IRCCS San Camillo Foundation, Venice-Lido, Italy
View additional affiliations
View references (107)
Abstract
In response to the new challenges in the design and operation of communication networks, and taking inspiration from how living beings deal with complexity and scalability, in this paper we introduce an innovative system concept called COgnition-BAsed NETworkS (COBANETS). The proposed approach develops around the systematic application of advanced machine learning techniques and, in particular, unsupervised deep learning and probabilistic generative models for system-wide learning, modeling, optimization, and data representation. Moreover, in COBANETS, we propose to combine this learning architecture with the emerging network virtualization paradigms, which make it possible to actuate automatic optimization and reconfiguration strategies at the system level, thus fully unleashing the potential of the learning approach. Compared with the past and current research efforts in this area, the technical approach outlined in this paper is deeply interdisciplinary and more comprehensive, calling for the synergic combination of expertise of computer scientists, communications and networking engineers, and cognitive scientists, with the ultimate aim of breaking new ground through a profound rethinking of how the modern understanding of cognition can be used in the management and optimization of telecommunication network
An Analytical Model for Wireless Mesh Networks with Collision-Free TDMA and Finite Queues
Wireless mesh networks are a promising technology for connecting sensors and
actuators with high flexibility and low investment costs. In industrial
applications, however, reliability is essential. Therefore, two time-slotted
medium access methods, DSME and TSCH, were added to the IEEE 802.15.4 standard.
They allow collision-free communication in multi-hop networks and provide
channel hopping for mitigating external interferences. The slot schedule used
in these networks is of high importance for the network performance. This paper
supports the development of efficient schedules by providing an analytical
model for the assessment of such schedules, focused on TSCH. A Markov chain
model for the finite queue on every node is introduced that takes the slot
distribution into account. The models of all nodes are interconnected to
calculate network metrics such as packet delivery ratio, end-to-end delay and
throughput. An evaluation compares the model with a simulation of the Orchestra
schedule. The model is applied to Orchestra as well as to two simple
distributed scheduling algorithms to demonstrate the importance of
traffic-awareness for achieving high throughput.Comment: 17 pages, 14 figure
Uncoordinated access schemes for the IoT: approaches, regulations, and performance
Internet of Things (IoT) devices communicate using a variety of protocols,
differing in many aspects, with the channel access method being one of the most
important. Most of the transmission technologies explicitly designed for IoT
and Machine-to-Machine (M2M) communication use either an ALOHA-based channel
access or some type of Listen Before Talk (LBT) strategy, based on carrier
sensing. In this paper, we provide a comparative overview of the uncoordinated
channel access methods for IoT technologies, namely ALOHA-based and LBT
schemes, in relation with the ETSI and FCC regulatory frameworks. Furthermore,
we provide a performance comparison of these access schemes, both in terms of
successful transmissions and energy efficiency, in a typical IoT deployment.
Results show that LBT is effective in reducing inter-node interference even for
long-range transmissions, though the energy efficiency can be lower than that
provided by ALOHA methods. The adoption of rate-adaptation schemes,
furthermore, lowers the energy consumption while improving the fairness among
nodes at different distances from the receiver. Coexistence issues are also
investigated, showing that in massive deployments LBT is severely affected by
the presence of ALOHA devices in the same area
Hidden Terminal-Aware Contention Resolution with an Optimal Distribution
Achieving low-power operation in wireless sensor networks with high data load or bursty traffic is challenging. The hidden terminal problem is aggravated with increased amounts of data in which traditional backoff-based contention resolution mechanisms fail or induce high latency and energy costs. We analyze and optimize Strawman, a receiver-initiated contention resolution mechanism that copes with hidden terminals. We propose new techniques to boost the performance of Strawman while keeping the resolution overhead small. We finally validate our improved mechanism via experiments
Towards a new generation of transport services adapted to multimedia application
Une connexion d'ordre et de fiabilité partiels (POC, partial order connection) est une connexion de transport autorisée à perdre certains objets mais également à les délivrer dans un ordre éventuellement différent de celui d'émission. L'approche POC établit un lien conceptuel entre les protocoles sans connexion au mieux et les protocoles fiables avec connexion. Le concept de POC est motivé par le fait que dans les réseaux hétérogènes sans connexion tels qu'Internet, les paquets transmis sont susceptibles de se perdre et d'arriver en désordre, entraînant alors une réduction des performances des protocoles usuels. De plus, on montre qu'un protocole associé au transport d'un flux multimédia permet une réduction très sensible de l'utilisation des ressources de communication et de mémorisation ainsi qu'une diminution du temps de transit moyen. Dans cet article, une extension temporelle de POC, nommée TPOC (POC temporisé), est introduite. Elle constitue un cadre conceptuel permettant la prise en compte des exigences de qualité de service des applications multimédias réparties. Une architecture offrant un service TPOC est également introduite et évaluée dans le cadre du transport de vidéo MPEG. Il est ainsi démontré que les connexions POC comblent, non seulement le fossé conceptuel entre les protocoles sans connexion et avec connexion, mais aussi qu'ils surpassent les performances des ces derniers lorsque des données multimédias (telles que la vidéo MPEG) sont transportées
Is Link-Layer Anycast Scheduling Relevant for IEEE802.15.4-TSCH Networks?
International audienceWith the wide adoption of low-power wireless transmissions , industrial networks have started to incorporate wireless devices in their communication infrastructure. Specifically, IEEE802.15.4-TSCH enables slow channel hopping to increase the robustness, and relies on a strict schedule of the transmissions to increase the energy efficiency. Anycast is a link-layer technique to improve the reliability when using lossy links. Several receivers are associated to a single transmission. That way, a transmission is considered erroneous when none of the receivers was able to decode and acknowledge it. Appropriately exploited by the routing layer, we can also increase the fault-tolerance. However, most of the anycast schemes have been evaluated by simulations, for a sake of simplicity. Besides, most evaluation models assume that packet drops are independent events, which may not be the case for packet drops due to e.g. external interference. Here, we use a large dataset obtained through an indoor testbed to assess the gain of using anycast in real conditions. We also propose a strategy to select the set of forwarding nodes: they must increase the reliability by providing the most independent packet losses. We demonstrate using our experimental dataset that anycast improves really the performance, but only when respecting a set of rules to select the next hops in the routing layer
- …