11 research outputs found

    Routing and video streaming in drone networks

    Get PDF
    PhDDrones can be used for several civil applications including search and rescue, coverage, and aerial imaging. Newer applications like construction and delivery of goods are also emerging. Performing tasks as a team of drones is often beneficial but requires coordination through communication. In this thesis, the communication requirements of video streaming drone applications based on existing works are studied. The existing communication technologies are then analyzed to understand if the communication requirements posed by these drone applications can be met by the available technologies. The shortcomings of existing technologies with respect to drone applications are identified and potential requirements for future technologies are suggested. The existing communication and routing protocols including ad-hoc on-demand distance vector (AODV), location-aided routing (LAR), and greedy perimeter stateless routing (GPSR) protocols are studied to identify their limitations in context to the drone networks. An application scenario where a team of drones covers multiple areas of interest is considered, where the drones follow known trajectories and transmit continuous streams of sensed traffic (images or video) to a ground station. A route switching (RS) algorithm is proposed that utilizes both the location and the trajectory information of the drones to schedule and update routes to overcome route discovery and route error overhead. Simulation results show that the RS scheme outperforms LAR and AODV by achieving higher network performance in terms of throughput and delay. Video streaming drone applications such as search and rescue, surveillance, and disaster management, benefit from multicast wireless video streaming to transmit identical data to multiple users. Video multicast streaming using IEEE 802.11 poses challenges of reliability, performance, and fairness under tight delay bounds. Because of the mobility of the video sources and the high data-rate of the videos, the transmission rate should be adapted based on receivers' link conditions. Rate-adaptive video multicast streaming in IEEE 802.11 requires wireless link estimation as well as frequent feedback from multiple receivers. A contribution to this thesis is an application-layer rate-adaptive video multicast streaming framework using an 802.11 ad-hoc network that is applicable when both the sender and the receiver nodes are mobile. The receiver nodes of a multicast group are assigned with roles dynamically based on their link conditions. An application layer video multicast gateway (ALVM-GW) adapts the transmission rate and the video encoding rate based on the received feedback. Role switching between multiple receiver nodes (designated nodes) cater for mobility and rate adaptation addresses the challenges of performance and fairness. The reliability challenge is addressed through re-transmission of lost packets while delays under given bounds are achieved through video encoding rate adaptation. Emulation and experimental results show that the proposed approach outperforms legacy multicast in terms of packet loss and video quality

    Reliable Multicast transport of the video over the WiFi network

    Get PDF
    Le transport multicast est une solution efficace pour envoyer le même contenu à plusieurs récepteurs en même temps. Ce mode est principalement utilisé pour fournir des flux multimédia en temps réel. Cependant, le multicast classique de l IEEE 802.11 n'utilise aucun mécanisme d acquittement. Ainsi, l échec de réception implique la perte définitive du paquet. Cela limite la fiabilité du transport multicast et impact la qualité des applications vidéo. Pour résoudre ce problème, 802.11v et 802.11aa sont définis récemment. Le premier amendement propose Direct Multicast Service (DMS). D'autre part, le 802.11aa introduit GroupCast with Retries (GCR). GCR définit deux nouvelles politiques de retransmission : Block Ack (BACK) et Unsolicited Retry (UR).Dans cette thèse, nous évaluons et comparons les performances de 802.11v/aa. Nos résultats montrent que tous les nouveaux protocoles multicast génèrent un overhead de transmission important. En outre, DMS a une scalabilité très limitée, et GCR-BACK n'est pas approprié pour des grands groupes multicast. D autre part, nous montrons que DMS et GCR-BACK génèrent des latences de transmission importantes lorsque le nombre de récepteurs augmente. Par ailleurs, nous étudions les facteurs de pertes dans les réseaux sans fil. Nous montrons que l'indisponibilité du récepteur peut être la cause principale des pertes importantes et de leur nature en rafales. En particulier, nos résultats montrent que la surcharge du processeur peut provoquer un taux de perte de 100%, et que le pourcentage de livraison peut être limité à 35% lorsque la carte 802.11 est en mode d économie d'énergie.Pour éviter les collisions et améliorer la fiabilité du transport multicast, nous définissons le mécanisme Busy Symbol (BS). Nos résultats montrent que BS évite les collisions et assure un taux de succès de transmission très important. Afin d'améliorer davantage la fiabilité du trafic multicast, nous définissons un nouveau protocole multicast, appelé Block Negative Acknowledgement (BNAK). Ce protocole opère comme suit. L AP envoi un bloc de paquets suivi par un Block NAK Request (BNR). Le BNR permet aux membres de détecter les données manquantes et d envoyer une demande de retransmission, c.à.d. un Block NAK Response (BNAK). Un BNAK est transmis en utilisant la procédure classique d accès au canal afin d'éviter toute collision avec d'autres paquets. En plus, cette demande est acquittée. Sous l'hypothèse que 1) le récepteur est situé dans la zone de couverture du débit de transmission utilisé, 2) les collisions sont évitées et 3) le terminal a la bonne configuration, très peu de demandes de retransmission sont envoyées, et la bande passante est préservée. Nos résultats montrent que BNAK a une très grande scalabilité et génère des délais très limités. En outre, nous définissons un algorithme d'adaptation de débit pour BNAK. Nous montrons que le bon débit de transmission est sélectionné moyennant un overhead très réduit de moins de 1%. En plus, la conception de notre protocole supporte la diffusion scalable de lavvidéo. Cette caractéristique vise à résoudre la problématique de la fluctuation de la bande passante, et à prendre en considération l'hétérogénéité des récepteurs dans un réseau sans fil.The multicast transport is an efficient solution to deliver the same content to many receivers at the same time. This mode is mainly used to deliver real-time video streams. However, the conventional multicast transmissions of IEEE 802.11 do not use any feedback policy. Therefore missing packets are definitely lost. This limits the reliability of the multicast transport and impacts the quality of the video applications. To resolve this issue, the IEEE 802.11v/aa amendments have been defined recently. The former proposes the Direct Multicast Service (DMS). On the other hand, 802.11aa introduces Groupcast with Retries (GCR) service. GCR defines two retry policies: Block Ack (BACK) and Unsolicited Retry (UR).In this thesis we evaluate and compare the performance of 802.11v/aa. Our simulation results show that all the defined policies incur an important overhead. Besides, DMS has a very limited scalability, and GCR-BACK is not appropriate for large multicast groups. We show that both DMS and GCR-BACK incur important transmission latencies when the number of the multicast receivers increases. Furthermore, we investigate the loss factors in wireless networks. We show that the device unavailability may be the principal cause of the important packet losses and their bursty nature. Particularly, our results show that the CPU overload may incur a loss rate of 100%, and that the delivery ratio may be limited to 35% when the device is in the power save mode.To avoid the collisions and to enhance the reliability of the multicast transmissions, we define the Busy Symbol (BS) mechanism. Our results show that BS prevents all the collisions and ensures a very high delivery ratio for the multicast packets. To further enhance the reliability of this traffic, we define the Block Negative Acknowledgement (BNAK) retry policy. Using our protocol, the AP transmits a block of multicast packets followed by a Block NAK Request (BNR). Upon reception of a BNR, a multicast member generates a Block NAK Response (BNAK) only if it missed some packets. A BNAK is transmitted after channel contention in order to avoid any eventual collision with other feedbacks, and is acknowledged. Under the assumption that 1) the receiver is located within the coverage area of the used data rate, 2) the collisions are avoided and 3) the terminal has the required configuration, few feedbacks are generated and the bandwidth is saved. Our results show that BNAK has a very high scalability and incurs very low delays. Furthermore, we define a rate adaptation scheme for BNAK. We show that the appropriate rate is selected on the expense of a very limited overhead of less than 1%. Besides, the conception of our protocol is defined to support the scalable video streaming. This capability intends to resolve the bandwidth fluctuation issue and to consider the device heterogeneity of the group members.BORDEAUX1-Bib.electronique (335229901) / SudocSudocFranceF

    Scalable and rate adaptive wireless multimedia multicast

    Get PDF
    The methods that are described in this work enable highly efficient audio-visual streaming over wireless digital communication systems to an arbitrary number of receivers. In the focus of this thesis is thus point-to-multipoint transmission at constrained end-to-end delay. A fundamental difference as compared to point-to-point connections between exactly two communicating sending and receiving stations is in conveying information about successful or unsuccessful packet reception at the receiver side. The information to be transmitted is available at the sender, whereas the information about successful reception is only available to the receiver. Therefore, feedback about reception from the receiver to the sender is necessary. This information may be used for simple packet repetition in case of error, or adaptation of the bit rate of transmission to the momentary bit rate capacity of the channel, or both. This work focuses on the single transmission (including retransmissions) of data from one source to multiple destinations at the same time. A comparison with multi-receiver sequentially redundant transmission systems (simulcast MIMO) is made. With respect to feedback, this work considers time division multiple access systems, in which a single channel is used for data transmission and feedback. Therefore, the amount of time that can be spent for transmitting feedback is limited. An increase in time used for feedback transmissions from potentially many receivers results in a decrease in residual time which is usable for data transmission. This has direct impact on data throughput and hence, the quality of service. In the literature, an approach to reduce feedback overhead which is based on simultaneous feedback exists. In the scope of this work, simultaneous feedback implies equal carrier frequency, bandwidth and signal shape, in this case orthogonal frequency-division multiplex signals, during the event of the herein termed feedback aggregation in time. For this scheme, a constant amount of time is spent for feedback, independent of the number of receivers giving feedback about reception. Therefore, also data throughput remains independent of the number of receivers. This property of audio-visual digital transmission is taken for granted for statically configured, single purpose systems, such as terrestrial television. In the scope of this work are, however, multi-user and multi-purpose digital communication networks. Wireless LANs are a well-known example and are covered in detail herein. In suchlike systems, it is of great importance to remain independent of the number of receivers, as otherwise the service of ubiquitous digital connectivity is at the risk of being degraded. In this regard, the thesis at hand elaborates at what bit rates audio-visual transmission to multiple receivers may take place in conjunction with feedback aggregation. It is shown that the scheme achieves a multi-user throughput gain when used in conjunction with adaptivity of the bit rate to the channel. An assumption is the use of an ideal overlay packet erasure correcting code in this case. Furthermore, for delay constrained transmission, such as in so-called live television, throughput bit rates are examined. Applications have to be tolerant to a certain level of residual error in case of delay constrained transmission. Improvement of the rate adaptation algorithm is shown to increase throughput while residual error rates are decreased. Finally, with a consumer hardware prototype for digital live-TV re-distribution in the local wireless network, most of the mechanisms as described herein can be demonstrated.Die in vorliegender Arbeit aufgezeigten Methoden der paketbasierten drahtlosen digitalen Kommunikation ermöglichen es, Fernsehinhalte, aber auch audio-visuelle Datenströme im Allgemeinen, bei hoher Effizienz an beliebig große Gruppen von Empfängern zu verteilen. Im Fokus dieser Arbeit steht damit die Punkt- zu Mehrpunktübertragung bei begrenzter Ende-zu-Ende Verzögerung. Ein grundlegender Unterschied zur Punkt-zu-Punkt Verbindung zwischen genau zwei miteinander kommunizierenden Sender- und Empfängerstationen liegt in der Übermittlung der Information über erfolgreichen oder nicht erfolgreichen Paketempfang auf Seite der Empfänger. Da die zu übertragende Information am Sender vorliegt, die Information über den Erfolg der Übertragung jedoch ausschließlich beim jeweiligen Empfänger, muss eine Erfolgsmeldung auf dem Rückweg von Empfänger zu Sender erfolgen. Diese Information wird dann zum Beispiel zur einfachen Paketwiederholung im nicht erfolgreichen Fall genutzt, oder aber um die Übertragungsrate an die Kapazität des Kanals anzupassen, oder beides. Grundsätzlich beschäftigt sich diese Arbeit mit der einmaligen, gleichzeitigen Übertragung von Information (einschließlich Wiederholungen) an mehrere Empfänger, wobei ein Vergleich zu an mehrere Empfänger sequentiell redundant übertragenden Systemen (Simulcast MIMO) angestellt wird. In dieser Arbeit ist die Betrachtung bezüglich eines Rückkanals auf Zeitduplexsysteme beschränkt. In diesen Systemen wird der Kanal für Hin- und Rückweg zeitlich orthogonalisiert. Damit steht für die Übermittlung der Erfolgsmeldung eine beschränkte Zeitdauer zur Verfügung. Je mehr an Kanalzugriffszeit für die Erfolgsmeldungen der potentiell vielen Empfänger verbraucht wird, desto geringer wird die Restzeit, in der dann entsprechend weniger audio-visuelle Nutzdaten übertragbar sind, was sich direkt auf die Dienstqualität auswirkt. Ein in der Literatur weniger ausführlich betrachteter Ansatz ist die gleichzeitige Übertragung von Rückmeldungen mehrerer Teilnehmer auf gleicher Frequenz und bei identischer Bandbreite, sowie unter Nutzung gleichartiger Signale (hier: orthogonale Frequenzmultiplexsignalformung). Das Schema wird in dieser Arbeit daher als zeitliche Aggregation von Rückmeldungen, engl. feedback aggregation, bezeichnet. Dabei wird, unabhängig von der Anzahl der Empfänger, eine konstante Zeitdauer für Rückmeldungen genutzt, womit auch der Datendurchsatz durch zusätzliche Empfänger nicht notwendigerweise sinkt. Diese Eigenschaft ist aus statisch konfigurierten und für einen einzigen Zweck konzipierten Systemen, wie z. B. der terrestrischen Fernsehübertragung, bekannt. In dieser Arbeit werden im Gegensatz dazu jedoch am Beispiel von WLAN Mehrzweck- und Mehrbenutzersysteme betrachtet. Es handelt sich in derartigen Systemen zur digitalen Datenübertragung dabei um einen entscheidenden Vorteil, unabhängig von der Empfängeranzahl zu bleiben, da es sonst unweigerlich zu Einschränkungen in der Güte der angebotenen Dienstleistung der allgegenwärtigen digitalen Vernetzung kommen muss. Vorliegende Arbeit zeigt in diesem Zusammenhang auf, welche Datenraten unter Benutzung von feedback aggregation in der Verteilung an mehrere Empfänger und in verschiedenen Szenarien zu erreichen sind. Hierbei zeigt sich, dass das Schema im Zusammenspiel mit einer Adaption der Datenrate an den Übertragungskanal inhärent einen Datenratengewinn durch Mehrbenutzerempfang zu erzielen vermag, wenn ein überlagerter idealer Paketauslöschungsschutz-Code angenommen wird. Des weiteren wird bei der Übertragung mit zeitlich begrenzter Ausführungsdauer, z. B. dem sogenannten Live-Fernsehen, aufgezeigt, wie sich die erreichbare Datenrate reduziert und welche Restfehlertoleranz an die Übertragung gestellt werden muss. Hierbei wird ebenso aufgezeigt, wie sich durch Verbesserung der Ratenadaption erstere erhöhen und zweitere verringern lässt. An einem auf handelsüblichen Computer-Systemen realisiertem Prototypen zur Live-Fernsehübertragung können die hierin beschriebenen Mechanismen zu großen Teilen gezeigt werden

    Multicast MAC extensions for high rate real-time traffic in wireless LANs

    Get PDF
    Nowadays we are rapidly moving from a mainly textual-based to a multimedia-based Internet, for which the widely deployed IEEE 802.11 wireless LANs can be one of the promising candidates to make them available to users anywhere, anytime, on any device. However, it is still a challenge to support group-oriented real-time multimedia services, such as video-on-demand, video conferencing, distance educations, mobile entertainment services, interactive games, etc., in wireless LANs, as the current protocols do not support multicast, in particular they just send multicast packets in open-loop as broadcast packets, i.e., without any possible acknowledgements or retransmissions. In this thesis, we focus on MAC layer reliable multicast approaches which outperform upper layer ones with both shorter delays and higher efficiencies. Different from polling based approaches, which suffer from long delays, low scalabilities and low efficiencies, we explore a feedback jamming mechanism where negative acknowledgement (NACK) frames are allowed from the non-leader receivers to destroy the acknowledgement (ACK) frame from the single leader receiver and prompts retransmissions from the sender. Based on the feedback jamming scheme, we propose two MAC layer multicast error correction protocols, SEQ driven Leader Based Protocol (SEQ-LBP) and Hybrid Leader Based Protocol (HLBP), the former is an Automatic Repeat reQuest (ARQ) scheme while the later combines both ARQ and the packet level Forward Error Correction (FEC). We evaluate the feedback jamming probabilities and the performances of SEQ-LBP and HLBP based on theoretical analyses, NS-2 simulations and experiments on a real test-bed built with consumer wireless LAN cards. Test results confirm the feasibility of the feedback jamming scheme and the outstanding performances of the proposed protocols SEQ-LBP and HLBP, in particular SEQ-LBP is good for small multicast groups due to its short delay, effectiveness and simplicity while HLBP is better for large multicast groups because of its high efficiency and high scalability with respect to the number of receivers per group.Zurzeit vollzieht sich ein schneller Wechsel vom vorwiegend textbasierten zum multimediabasierten Internet. Die weitverbreiteten IEEE 802.11 Drahtlosnetzwerke sind vielversprechende Kandidaten, um das Internet für Nutzer überall, jederzeit und auf jedem Gerät verfügbar zu machen. Die Unterstützung gruppenorientierter Echtzeit-Dienste in drahtlosen lokalen Netzen ist jedoch immer noch eine Herausforderung. Das liegt daran, dass aktuelle Protokolle keinen Multicast unterstützen. Sie senden Multicast-Pakete vielmehr in einer "Open Loop"-Strategie als Broadcast-Pakete, d. h. ohne jegliche Rückmeldung (feedback) oder Paketwiederholungen. In der vorliegenden Arbeit, anders als in den auf Teilnehmereinzelabfragen (polling) basierenden Ansätzen, die unter langen Verzögerungen, geringer Skalierbarkeit und geringer Effizienz leiden, versuchen wir, Multicast-Feedback bestehend aus positiven (ACK) und negativen Bestätigungen (NACK) auf MAC-Layer im selben Zeitfenster zu bündeln. Die übrigen Empfänger können NACK-Frames senden, um das ACK des Leaders zu zerstören und Paketwiederholungen zu veranlassen. Basierend auf einem Feedback-Jamming Schema schlagen wir zwei MAC-Layer-Protokolle für den Fehlerschutz im Multicast vor: Das SEQ-getriebene Leader Based Protocol (SEQ-LBP) und das Hybrid Leader Based Protocol (HLBP). SEQ-LBP ist eines Automatic Repeat reQuest (ARQ) Schema. HLBP kombiniert ARQ und paketbasierte Forward Error Correction (FEC). Wir evaluieren die Leistungsfähigkeit von ACK/NACK jamming, SEQ-LBP und HLBP durch Analysis, Simulationen in NS-2, sowie Experimenten in einer realen Testumgebung mit handelsüblichen WLAN-Karten. Die Testergebnisse bestätigen die Anwendbarkeit der Feedback-Jamming Schemata und die herausragende Leistungsfähigkeit der vorgestellten Protokolle SEQ-LBP und HLBP. SEQ-LBP ist durch seine kurze Verzögerung, seine Effektivität und seine Einfachheit für kleine Multicast-Gruppen nützlich, während HLBP auf Grund seiner hohen Effizienz und Skalierbarkeit im Bezug auf die Größe der Empfänger eher in großen Multicast-Gruppen anzuwenden ist

    Middleware de comunicações para a internet móvel futura

    Get PDF
    Doutoramento em Informática (MAP-I)A evolução constante em novas tecnologias que providenciam suporte à forma como os nossos dispositivos se ligam, bem como a forma como utilizamos diferentes capacidades e serviços on-line, criou um conjunto sem precedentes de novos desafios que motivam o desenvolvimento de uma recente área de investigação, denominada de Internet Futura. Nesta nova área de investigação, novos aspectos arquiteturais estão ser desenvolvidos, os quais, através da re-estruturação de componentes nucleares subjacentesa que compõem a Internet, progride-a de uma forma capaz de não são fazer face a estes novos desafios, mas também de a preparar para os desafios de amanhã. Aspectos chave pertencendo a este conjunto de desafios são os ambientes de rede heterogéneos compostos por diferentes tipos de redes de acesso, a cada vez maior mudança do tráfego peer-to-peer (P2P) como o tipo de tráfego mais utilizado na Internet, a orquestração de cenários da Internet das Coisas (IoT) que exploram mecanismos de interação Maquinaa-Maquina (M2M), e a utilização de mechanismos centrados na informação (ICN). Esta tese apresenta uma nova arquitetura capaz de simultaneamente fazer face a estes desafios, evoluindo os procedimentos de conectividade e entidades envolvidas, através da adição de uma camada de middleware, que age como um mecanismo de gestão de controlo avançado. Este mecanismo de gestão de controlo aproxima as entidades de alto nível (tais como serviços, aplicações, entidades de gestão de mobilidade, operações de encaminhamento, etc.) com as componentes das camadas de baixo nível (por exemplo, camadas de ligação, sensores e atuadores), permitindo uma otimização conjunta dos procedimentos de ligação subjacentes. Os resultados obtidos não só sublinham a flexibilidade dos mecanismos que compoem a arquitetura, mas também a sua capacidade de providenciar aumentos de performance quando comparados com outras soluÇÕes de funcionamento especÍfico, enquanto permite um maior leque de cenáios e aplicações.The constant evolution in new technologies that support the way our devices are able to connect, as well the way we use available on-line services and capabilities, has created a set of unprecedented new challenges that motivated the development of a recent research trend known as the Future Internet. In this research trend, new architectural aspects are being developed which, through the restructure of underlying core aspects composing the Internet, reshapes it in a way capable of not only facing these new challenges, but also preparing it to tackle tomorrow’s new set of complex issues. Key aspects belonging to this set of challenges are heterogeneous networking environments composed by di↵erent kinds of wireless access networks, the evergrowing change from peer-to-peer (P2P) to video as the most used kind of traffic in the Internet, the orchestration of Internet of Things (IoT) scenarios exploiting Machine-to-Machine (M2M) interactions, and the usage of Information-Centric Networking (ICN). This thesis presents a novel framework able to simultaneous tackle these challenges, empowering connectivity procedures and entities with a middleware acting as an advanced control management mechanism. This control management mechanism brings together both high-level entities (such as application services, mobility management entities, routing operations, etc.) with the lower layer components (e.g., link layers, sensor devices, actuators), allowing for a joint optimization of the underlying connectivity and operational procedures. Results highlight not only the flexibility of the mechanisms composing the framework, but also their ability in providing performance increases when compared with other specific purpose solutions, while allowing a wider range of scenarios and deployment possibilities

    Experimenting with commodity 802.11 hardware: overview and future directions

    Get PDF
    The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-driven research works. These works range from performance analysis to protocol enhancements, including the proposal of novel applications and services. Due to the affordability of the technology, this experimental research is typically based on commercial off-the-shelf (COTS) devices, and, given the rate at which 802.11 releases new standards (which are adopted into new, affordable devices), the field is likely to continue to produce results. In this paper, we review and categorise the most prevalent works carried out with 802.11 COTS devices over the past 15 years, to present a timely snapshot of the areas that have attracted the most attention so far, through a taxonomy that distinguishes between performance studies, enhancements, services, and methodology. In this way, we provide a quick overview of the results achieved by the research community that enables prospective authors to identify potential areas of new research, some of which are discussed after the presentation of the survey.This work has been partly supported by the European Community through the CROWD project (FP7-ICT-318115) and by the Madrid Regional Government through the TIGRE5-CM program (S2013/ICE-2919).Publicad

    Belaidžio ryšio tinklų terpės prieigos valdymo tyrimas

    Get PDF
    Over the years, consumer requirements for Quality of Service (QoS) has been growing exponentially. Recently, the ratification process of newly IEEE 802.11ad amendment to IEEE 802.11 was finished. The IEEE 802.11ad is the newly con-sumer wireless communication approach, which will gain high spot on the 5G evolution. Major players in wireless market, such as Qualcomm already are inte-grating solutions from unlicensed band, like IEEE 802.11ac, IEEE 802.11ad into their architecture of LTE PRO (the next evolutionary step for 5G networking) (Qualcomm 2013; Parker et al. 2015). As the demand is growing both in enter-prise wireless networking and home consumer markets. Consumers started to no-tice the performance degradation due to overcrowded unlicensed bands. The un-licensed bands such as 2.4 GHz, 5 GHz are widely used for up-to-date IEEE 802.11n/ac technologies with upcoming IEEE 802.11ax. However, overusage of the available frequency leads to severe interference issue and consequences in to-tal system performance degradation, currently existing wireless medium access method can not sustain the increasing intereference and thus wireless needs a new methods of wireless medium access. The main focal point of this dissertation is to improve wireless performance in dense wireless networks. In dissertation both the conceptual and multi-band wireless medium access methods are considered both from theoretical point of view and experimental usage. The introduction chapter presents the investigated problem and it’s objects of research as well as importance of dissertation and it’s scientific novelty in the unlicensed wireless field. Chapter 1 revises used literature. Existing and up-to-date state-of-the-art so-lution are reviewed, evaluated and key point advantages and disadvantages are analyzed. Conclusions are drawn at the end of the chapter. Chapter 2 describes theoretical analysis of wireless medium access protocols and the new wireless medium access method. During analysis theoretical simula-tions are performed. Conclusions are drawn at the end of the chapter. Chapter 3 is focused on the experimental components evaluation for multi-band system, which would be in line with theoretical concept investigations. The experimental results, showed that components of multi-band system can gain sig-nificant performance increase when compared to the existing IEEE 802.11n/ac wireless systems. General conclusions are drawn after analysis of measurement results

    Development and evaluation of smartphone-based ITS applications for vehicular networks

    Full text link
    [ES] Una de las áreas de investigación que está recibiendo más atención recientemente es la de vehículos autónomos. Los investigadores están en este momento centrados en el tercer de los cinco niveles de autonomía, los cuales son: asistencia en la conducción, automatización parcial, automatización condicional, alta automatización y automatización completa. A pesar de los rápidos progresos que están habiendo en este campo, la adopción de estas soluciones llevará tiempo no sólo debido a cuestiones legales, sino también por el hecho de que los avances tecnológicos se enfrentan a un lento respaldo por parte de los fabricantes. Además, la baja tasa de renovación de vehículos de carretera, dificulta el despliegue de tecnologías innovadoras, como es el caso de la red vehicular. Ocho años después de la introducción de la norma 802.11p para la comunicación vehicular del Instituto de Ingenieros Eléctricos y Electrónicos (IIEE), los vehículos que se usan a diario todavía carecen de la capacidad de comunicarse entre sí. Este hecho impide el uso de las muchas aplicaciones de seguridad del Sistema de Inteligencia de Transporte (SIT) que aprovecha la red vehicular para el intercambio de datos. La forma obvia de manejar este problema es poner las tecnologías disponibles a la disposición de los usuarios comunes para desarrollar soluciones que se puedan implementar fácilmente y, además, económicas. Por esta razón, trasladamos nuestra atención a los dispositivos inteligentes, especialmente a los teléfonos inteligentes, los cuales han recorrido un largo camino desde la primera introducción de teléfonos móviles a finales del siglo XX. Hoy en día casi todos llevan uno en su bolsillo a donde sea que vayan, permitiéndoles no sólo hacer llamadas, sino también medir y controlar diferentes parámetros con la ayuda de los muchos sensores integrados que están disponibles para estos dispositivos compactos pero potentes. Nuestro objetivo es estudiar los efectos de la integración de los teléfonos inteligentes a la red vehicular para desarrollar aplicaciones de seguridad del SIT. La elección de los teléfonos inteligentes aquí no solo está justificada por su amplia disponibilidad y uso, sino también porque están evolucionando hacia terminales de alto rendimiento con microprocesadores de múltiples núcleos cargados dotados de un grupo suficientemente diverso de sensores. En esta tesis proponemos tres diferentes aplicaciones de seguridad SIT para teléfonos inteligentes, diseñados para aprovechar el entorno de red vehicular: una aplicación de generación de advertencia llamada Messiah que alerta a los conductores de la presencia de vehículos de emergencia en las cercanías; una aplicación de Advertencia de Colisión Frontal (ACF) que advierte a los conductores si no se mantiene la distancia de seguridad mínima entre el vehículo que va delante y el que lo sigue; y, por último, una aplicación que tiene como objetivo ayudar a los conductores con asistencia visual durante el adelantamiento, llamada EYES. Todas estas aplicaciones han sido desarrolladas para la plataforma Android, y dependen de la transmisión de datos entre vehículos. Dado que los vehículos que utilizamos día a día no admiten la posibilidad de comunicarse entre sí, también diseñamos GRCBox, que es una unidad integrada de bajo coste que permite la comunicación del Vehículo a Todo (V2X). A partir de nuestro estudio de aplicaciones para dispositivos móviles diseñados para redes vehiculares, descubrimos que el uso de teléfonos inteligentes proporciona una nueva dirección para la investigación relacionada con SIT y redes vehiculares al permitir la adopción rápida de las soluciones existentes, donde los usuarios pueden descargar y usar las aplicaciones con sólo un clic a un botón. Al mismo tiempo, la portabilidad y compacidad de los dispositivos los hace limitados en términos de velocidad, potencia de procesamiento y precisi[CA] Una de les àrees d'investigació que està rebent més atenció recentment és la de vehicles autònoms. Els investigadores estan en este moment centrats en el tercer dels cinc nivells d'autonomia, els quals són: assistència en la conducció, automatització parcial, automatització condicional, alta automatització i automatització completa. Malgrat els ràpids progressos que s'estan donant en este camp, l'adopció d'estes solucions portarà temps no sols degut a qüestions legals, sinó també pel fet que els avanços tecnològics s'enfronten a un lent recolzament per part dels fabricants. A més a més, la baixa taxa de renovació de vehicles de carretera, dificulta el desplegament de tecnologies innovadores com és el cas de la xarxa vehicular. Huit anys després de la introducció de la norma 802.11p per a la comunicació vehicular de l'Institut d'Enginyers Elèctrics i Electrònics (IEEE), els vehicles que s'utilitzen a diari encara manquen de la capacitat de comunicar-se entre sí. Este fet impedeix l'ús de les moltes aplicacions de seguretat del Sistema d'Intel·ligència de Transport (SIT) que aprofita la xarxa vehicular per a l'intercanvi de dades. La forma òbvia de tractar aquest problema és posar les tecnologies disponibles a la disposició dels usuaris comuns per a desenvolupar solucions que es puguen implementar fàcilment, còmodes d'adoptar i, a més a més, econòmiques. Per aquesta raó, traslladem la nostra atenció als dispositius intel·ligents, especialment als telèfons intel·ligents, els quals han recorregut un llarg camí des de la primera introducció de telèfons mòbils a finals del segle XX. Hui en dia quasi tots porten un en la butxaca on siga que vagen, permetent-los no sols fer cridades, sinó també mesurar i controlar diferents paràmetres amb l'ajuda dels molts sensors integrats que estan disponibles per a estos dispositius compactes però potents. El nostre objectiu és estudiar els efectes de la integració dels telèfons intel·ligents a la xarxa vehicular per a desenvolupar aplicacions de seguretat del SIT. L'elecció dels telèfons intel·ligents ací no està sols justificada per la seua àmplia disponibilitat i ús, sinó també perquè estan evolucionant cap a terminals d'alt rendiment amb microprocessadors de múltiples nuclis dotats amb un grup suficientment divers de sensors. En esta tesi proposem tres diferents aplicacions de seguretat SIT per a telèfons intel·ligents, dissenyats per a aprofitar l'entorn de xarxa vehicular: una aplicació de generació d'advertència anomenada Messiah que alerta els conductors de la presència de vehicles d'emergència en les proximitats; una aplicació Advertència de Col·lisió Frontal (ACF) que adverteix els conductors si no mantenen la distància de seguretat mínima entre el vehicle que va davant i el que el segueix; i, per últim, una aplicació que té com objectiu ajudar els conductors amb assistència visual durant l'avançament, anomenat EYES. Totes aquestes aplicacions han sigut desenvolupades per a la plataforma Android, i depenen de la transmissió de dades entre vehicles. Donat que els vehicles que utilitzem a diari no admeten la possibilitat de comunicar-se entre sí, també dissenyem GRCBox, que és una unitat integrada de baix cost que permet la comunicació de Vechicle a Tot (V2X). A partir del nostre estudi d'aplicacions per a dispositius mòbils dissenyats per a xarxes vehiculars, descobrim que l'ús de telèfons intel·ligents proporciona una nova direcció per a la investigació relacionada amb SIT i xarxes vehiculars al permetre l'adopció ràpida de les solucions existents, on els usuaris poden descarregar i utilitzar les aplicacions amb un sol clic a un botó. Però al mateix temps, la portabilitat i la compacitat dels dispositius els fa limitats en termes de velocitat, potència de processament i precisió del sensor integrat, cosa que afecta al rendiment de les aplicacions.[EN] One of the research areas that is receiving a lot of attention recently is autonomous vehicles. Researchers are currently focused on the third level of autonomy out of the five levels, which are: drive assistance, partial automation, conditional automation, high automation, and full automation. Even though rapid progress is being made in this field, the adoption of these solutions will take time not only due to legal issues, but also due to the fact that technological improvements face slow endorsement by manufacturers. Also, the slow renewal rate of vehicles on road hinders the deployment of novel technologies, as is the case of Vehicular Networks (VNs). Eight years after the introduction of the IEEE 802.11p standard for vehicular communication, vehicles used on a daily basis still lack the capability of communicating with one other. This fact impedes the use of the many ITS safety applications that take advantage of VNs for data exchange. The obvious way to handle this problem is to use the available technologies at the disposal of common users to develop solutions that are easily deployable, effortless to adopt, and moreover, cost effective. For this reason we shift our attention to smart devices, specially smartphones, which have come a long way since the first introduction of mobile phones in the late 20th century. Nowadays, nearly everyone carries one in their pocket anywhere they go, allowing them to not only make calls, but also to measure and monitor different parameters with the help of the many on-board sensors that are available to these compact yet powerful devices. Our objective is to study the effects of integrating smartphones to vehicular networks, to develop ITS safety applications. The choice of smartphones here is not only justified by their wide availability and use, but also because they are evolving towards high performance terminals with multi-core microprocessors packed with a sufficiently diverse group of sensors. In this thesis we propose three different ITS safety applications for smartphones, designed to take advantage of the vehicular network environment: a warning generation application called Messiah that alerts drivers of the presence of emergency vehicles in close proximity; a FCW application which warns drivers if a minimum safe distance is not maintained between the vehicle ahead and the one following it; and lastly an application that aims to aid drivers with visual assistance while overtaking, named EYES. All these applications have been developed for the Android platform, and are dependent on the data transmission among vehicles. Since vehicles we use on a day to day basis still do not accommodate the possibility to communicate with one another, we also designed the GRCBox, which is a low cost on-board unit that supports V2X communication. From our study of applications for mobile devices designed for VNs, we found that the use of smartphones provides a new direction to research related to ITS and VNs by allowing a quick adoption of the existing solutions, where users are able to download and use applications just by one click of a button. But at the same time, the portability and compactness of the devices makes them limited in terms of speed, processing power, and accuracy of the on-board sensor, thus affecting the performance of the applications. In our case, the simpler Messiah application performed very well, while the EYES application that is dependent on GPS data, and the FCW application which required heavy processing and use of the camera due to its dependence on plate recognition, were affected by the hardware limitations of the smartphones.Patra, S. (2019). Development and evaluation of smartphone-based ITS applications for vehicular networks [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/124058TESI
    corecore