718 research outputs found

    Mobile Emulab: A Robotic Wireless and Sensor Network Testbed

    Full text link

    Advanced technologies for productivity-driven lifecycle services and partnerships in a business network

    Get PDF

    Advanced technologies for productivity-driven lifecycle services and partnerships in a business network

    Get PDF

    Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Get PDF
    A mobile ad hoc network (MANET) is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP) model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR), destination-sequenced distance-vector routing (DSDV), and ad hoc n-demand distance vector routing (AODV). The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To conclude, it is possible to develop a range of techniques for modelling scenarios applicable to MANETs, and these simulation models could be utilised for the evaluation of routing protocols

    An Optimized Hidden Node Handling Approach For Improving The Coverage And Network Efficiency In Wireless Multimedia Sensor Networks

    Get PDF
    Wireless Multimedia Sensor Networks (WMSNs) are comprised of sensor nodes that form the momentary network and do not rely on the support of any orthodox centralized infrastructure or administration. Such a given situation mandates that every sensor node gets the support of the other sensor nodes in order to advance the packets to the desired destination node, and specifically to the sink node. Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a challenge due to their limited bandwidth and power resources. The existing WMSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs vary as it depends on the correct location of the sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption and synchronization loss between neighboring nodes. The focus is on hidden node problems in WMSNs and how they can affect the network performance. Hidden nodes occur in the networks when nodes that are invisible to each other communicate with another node that is visible to these nodes at a particular period. Eventually, a collision may occur and the node will be unable to receive any packets. In addition, this study looks at the effectiveness of the optimal orientation for the sensor nodes in the environment. This work introduces an Optimized Hidden Node Handling (OHND) approach. The OHND consists of three phases: hidden node handling, message exchange, and location and view handling. These three phases aim to maximize the multimedia node coverage and improve energy efficiency, hidden node handling capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node– continuous neighbor discovery process to handle the mobility of the nodes. To evaluate the performance of the proposed algorithms, the results are compared with other known approaches. The results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage, achieve power efficiency, reduce the end-to-end delay, and improve the throughput. Finally, this study provides an efficient solution for handling the hidden node problem in case mobility

    Self-organizing Network Optimization via Placement of Additional Nodes

    Get PDF
    Das Hauptforschungsgebiet des Graduiertenkollegs "International Graduate School on Mobile Communication" (GS Mobicom) der Technischen Universität Ilmenau ist die Kommunikation in Katastrophenszenarien. Wegen eines Desasters oder einer Katastrophe können die terrestrischen Elementen der Infrastruktur eines Kommunikationsnetzwerks beschädigt oder komplett zerstört werden. Dennoch spielen verfügbare Kommunikationsnetze eine sehr wichtige Rolle während der Rettungsmaßnahmen, besonders für die Koordinierung der Rettungstruppen und für die Kommunikation zwischen ihren Mitgliedern. Ein solcher Service kann durch ein mobiles Ad-Hoc-Netzwerk (MANET) zur Verfügung gestellt werden. Ein typisches Problem der MANETs ist Netzwerkpartitionierung, welche zur Isolation von verschiedenen Knotengruppen führt. Eine mögliche Lösung dieses Problems ist die Positionierung von zusätzlichen Knoten, welche die Verbindung zwischen den isolierten Partitionen wiederherstellen können. Hauptziele dieser Arbeit sind die Recherche und die Entwicklung von Algorithmen und Methoden zur Positionierung der zusätzlichen Knoten. Der Fokus der Recherche liegt auf Untersuchung der verteilten Algorithmen zur Bestimmung der Positionen für die zusätzlichen Knoten. Die verteilten Algorithmen benutzen nur die Information, welche in einer lokalen Umgebung eines Knotens verfügbar ist, und dadurch entsteht ein selbstorganisierendes System. Jedoch wird das gesamte Netzwerk hier vor allem innerhalb eines ganz speziellen Szenarios - Katastrophenszenario - betrachtet. In einer solchen Situation kann die Information über die Topologie des zu reparierenden Netzwerks im Voraus erfasst werden und soll, natürlich, für die Wiederherstellung mitbenutzt werden. Dank der eventuell verfügbaren zusätzlichen Information können die Positionen für die zusätzlichen Knoten genauer ermittelt werden. Die Arbeit umfasst eine Beschreibung, Implementierungsdetails und eine Evaluierung eines selbstorganisierendes Systems, welche die Netzwerkwiederherstellung in beiden Szenarien ermöglicht.The main research area of the International Graduate School on Mobile Communication (GS Mobicom) at Ilmenau University of Technology is communication in disaster scenarios. Due to a disaster or an accident, the network infrastructure can be damaged or even completely destroyed. However, available communication networks play a vital role during the rescue activities especially for the coordination of the rescue teams and for the communication between their members. Such a communication service can be provided by a Mobile Ad-Hoc Network (MANET). One of the typical problems of a MANET is network partitioning, when separate groups of nodes become isolated from each other. One possible solution for this problem is the placement of additional nodes in order to reconstruct the communication links between isolated network partitions. The primary goal of this work is the research and development of algorithms and methods for the placement of additional nodes. The focus of this research lies on the investigation of distributed algorithms for the placement of additional nodes, which use only the information from the nodes’ local environment and thus form a self-organizing system. However, during the usage specifics of the system in a disaster scenario, global information about the topology of the network to be recovered can be known or collected in advance. In this case, it is of course reasonable to use this information in order to calculate the placement positions more precisely. The work provides the description, the implementation details and the evaluation of a self-organizing system which is able to recover from network partitioning in both situations

    Advanced Wireless LAN

    Get PDF
    The past two decades have witnessed starling advances in wireless LAN technologies that were stimulated by its increasing popularity in the home due to ease of installation, and in commercial complexes offering wireless access to their customers. This book presents some of the latest development status of wireless LAN, covering the topics on physical layer, MAC layer, QoS and systems. It provides an opportunity for both practitioners and researchers to explore the problems that arise in the rapidly developed technologies in wireless LAN

    Impacts of Mobility Models on RPL-Based Mobile IoT Infrastructures: An Evaluative Comparison and Survey

    Get PDF
    With the widespread use of IoT applications and the increasing trend in the number of connected smart devices, the concept of routing has become very challenging. In this regard, the IPv6 Routing Protocol for Low-power and Lossy Networks (PRL) was standardized to be adopted in IoT networks. Nevertheless, while mobile IoT domains have gained significant popularity in recent years, since RPL was fundamentally designed for stationary IoT applications, it could not well adjust with the dynamic fluctuations in mobile applications. While there have been a number of studies on tuning RPL for mobile IoT applications, but still there is a high demand for more efforts to reach a standard version of this protocol for such applications. Accordingly, in this survey, we try to conduct a precise and comprehensive experimental study on the impact of various mobility models on the performance of a mobility-aware RPL to help this process. In this regard, a complete and scrutinized survey of the mobility models has been presented to be able to fairly justify and compare the outcome results. A significant set of evaluations has been conducted via precise IoT simulation tools to monitor and compare the performance of the network and its IoT devices in mobile RPL-based IoT applications under the presence of different mobility models from different perspectives including power consumption, reliability, latency, and control packet overhead. This will pave the way for researchers in both academia and industry to be able to compare the impact of various mobility models on the functionality of RPL, and consequently to design and implement application-specific and even a standard version of this protocol, which is capable of being employed in mobile IoT applications

    Connected Vehicle Technology: User and System Performance Characteristics

    Get PDF
    The emerging connected vehicle (CV) technology plays a promising role in providing more operable and safer transportation environments. Yet, many questions remain unanswered as to how various user and system characteristics of CV-enabled networks can shape the successful implementation of the technology to maximize the return on investment. This research attempts to capture the effect of multiple factors such as traffic density, market penetration, and transmission range on the communication stability and overall network performance by developing a new CONnectivity ROBustness (CONROB) model. The model was tested with data collected from microscopic simulation of a 195 sq-mile traffic network and showed a potential to capture the effect of such factors on the communication stability in CV environments. The information exchanged among CVs can also be used to estimate traffic conditions in real time by invoking the probe vehicle feature of CV technology. Since factors affecting the connectivity robustness also have an impact on the performance of traffic condition estimation models, a direct relationship between connectivity robustness and traffic condition estimation performance was established. Simulation results show that the CONROB model can be used as a tool to predict the accuracy of the estimated traffic conditions (e.g. travel times), as well as the reliability of such estimates, given specific system characteristics. The optimal deployment of road-side units (RSUs) is another important factor that affects the communication stability and the traffic conditions estimates and reliability. Thus, an optimization approach was developed to identify the optimal RSUs locations with the objective function of maximizing the connectivity robustness. Simulation results for the developed approach show that CONROB model can help identify the optimal RSUs locations. This shows the importance of CONROB model as a planning tool for CV environments. For the individual user performance characteristics, a preliminary driving simulator test bed for CV technology was developed and tested on thirty licensed drivers. Forward collision warning messages were delivered to drivers when predefined time-to-collision values take place. The findings show improved reaction times of drivers when receiving the warning messages which lend credence to the safety benefits of the CV technology
    corecore