879 research outputs found
Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User
This paper proposes a cooperation protocol between a secondary user (SU) and
a primary user (PU) which dedicates a free frequency subband for the SU if
cooperation results in energy saving. Time is slotted and users are equipped
with buffers. Under the proposed protocol, the PU releases portion of its
bandwidth for secondary transmission. Moreover, it assigns a portion of the
time slot duration for the SU to relay primary packets and achieve a higher
successful packet reception probability at the primary receiver. We assume that
the PU has three states: idle, forward, and retransmission states. At each of
these states, the SU accesses the channel with adaptive transmission
parameters. The PU cooperates with the SU if and only if the achievable average
number of transmitted primary packets per joule is higher than the number of
transmitted packets per joule when it operates alone. The numerical results
show the beneficial gains of the proposed cooperative cognitive protocol.Comment: Accepted WiOpt 201
Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks
We investigate a cognitive radio network in which a primary user (PU) may
cooperate with a cognitive radio user (i.e., a secondary user (SU)) for
transmissions of its data packets. The PU is assumed to be a buffered node
operating in a time-slotted fashion where the time is partitioned into
equal-length slots. We develop two schemes which involve cooperation between
primary and secondary users. To satisfy certain quality of service (QoS)
requirements, users share time slot duration and channel frequency bandwidth.
Moreover, the SU may leverage the primary feedback message to further increase
both its data rate and satisfy the PU QoS requirements. The proposed
cooperative schemes are designed such that the SU data rate is maximized under
the constraint that the PU average queueing delay is maintained less than the
average queueing delay in case of non-cooperative PU. In addition, the proposed
schemes guarantee the stability of the PU queue and maintain the average energy
emitted by the SU below a certain value. The proposed schemes also provide more
robust and potentially continuous service for SUs compared to the conventional
practice in cognitive networks where SUs transmit in the spectrum holes and
silence sessions of the PUs. We include primary source burstiness, sensing
errors, and feedback decoding errors to the analysis of our proposed
cooperative schemes. The optimization problems are solved offline and require a
simple 2-dimensional grid-based search over the optimization variables.
Numerical results show the beneficial gains of the cooperative schemes in terms
of SU data rate and PU throughput, average PU queueing delay, and average PU
energy savings
Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking
Information-centric networking proposals attract much attention in the
ongoing search for a future communication paradigm of the Internet. Replacing
the host-to-host connectivity by a data-oriented publish/subscribe service
eases content distribution and authentication by concept, while eliminating
threats from unwanted traffic at an end host as are common in today's Internet.
However, current approaches to content routing heavily rely on data-driven
protocol events and thereby introduce a strong coupling of the control to the
data plane in the underlying routing infrastructure. In this paper, threats to
the stability and security of the content distribution system are analyzed in
theory and practical experiments. We derive relations between state resources
and the performance of routers and demonstrate how this coupling can be misused
in practice. We discuss new attack vectors present in its current state of
development, as well as possibilities and limitations to mitigate them.Comment: 15 page
Recommended from our members
Position-based routing and MAC protocols for wireless ad-hoc networks
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.This thesis presents the Forecasting Routing Technique (FORTEL), a routing protocol for Mobile Ad-Hoc Networks (MANETs) based on the nodesâ Location Information. FORTEL stores the nodesâ location information in the Location Table (LT) in order to construct routes between the source and the destination nodes. FORTEL follows the source routing strategy, which has rarely been applied in position-based routing. According to the source routing strategy, the end-to-end route is attached to the packet, therefore, the processing cost, in regards to the intermediate nodes that simply relay the packet according to route, is minimized. FORTELâs key mechanisms include: first, the location update scheme, employed to keep the LT entries up-to-date with the network topology. Besides the mobility variation and the constant rate location update schemes applied, a window location update scheme is presented to increase the LTâs information accuracy. Second, the switching mechanism, between âHelloâ message and location update employed, to reduce the protocolâs routing overhead. Third and most important is the route computation mechanism, which is integrated with a topology forecasting technique to construct up-to-date routes between the communication peers, aiming to achieve high delivery rate and increase the protocol robustness against the nodesâ movement. FORTEL demonstrates higher performance as compared to other MANETâs routing protocols, and it delivers up to 20% more packets than AODV and up to 60 % more than DSR and OLSR, while maintaining low levels of routing overhead and network delay at the same time. The effectiveness of the window update scheme is also discussed, and it proves to increase FORTELâs delivery rate by up to 30% as compared to the other update schemes.
A common and frequently occurring phenomenon, in wireless networks, is the Hidden Terminal problem that significantly impacts the communication performance and the efficiency of the routing and MAC protocols. Beaconless routing approach in MANETs, which delivers data packets without prior knowledge of any sort `of information, suffers from packet duplication caused by the hidden nodes during the contention process. Moreover, the throughput of the IEEE MAC protocol decreases dramatically when the hidden terminal problem occurs. RTS/CTS mechanism fails to eliminate the problem and can further degrade the networkâs performance by introducing additional overhead. To tackle these challenges, this thesis presents two techniques, the Sender Suppression Algorithm and the Location-Aided MAC, where both rely on the nodesâ position to eliminate packet duplication in the beaconless routing and improve the performance of the 802.11 MAC respectively. Both schemes are based on the concept of grouping the nodes into zones and assign different time delay to each one. According to the Sender Suppression Algorithm, the senderâs forwarding area is divided into three zones, therefore, the local timer, set to define the time that the receiver has to wait before responding to the senderâs transmission, is added to the assigned zone delay. Following the first response, the sender interferes and suppresses the receivers with active timer of. On the other hand, the Location-Aided MAC, essentially a hybrid MAC, combines the concepts of time division and carrier sensing. The radio range of the wireless receiver is partitioned into four zones with different zone delays assigned to each zone. Channel access within the zone is purely controlled by CSMA/CA protocol, while it is time-based amongst zones. The effectiveness of the proposed techniques is demonstrated through simulation tests. Location-Aided MAC considerably improves the networkâs throughput compared to CSMA/CA and RTS/CTS. However, remarkable results come when the proposed technique and the RTS/CTS are combined, which achieves up to 20% more throughput as compared to the standalone RTS/CTS. Finally, the thesis presents a novel link lifetime estimation method for greedy forwarding to compute the link duration between two nodes. Based on a newly introduced Stability-Aware Greedy (SAG) scheme, the proposed method incorporates the destination node in the computation process and thus has a significant advantage over the conventional method, which only considers the information of the nodes composing the link
A random access MAC protocol for MPR satellite networks
Dissertação apresentada para obtenção do Grau de Mestre em Engenharia ElectrotĂ©cnica e de Computadores, pela Universidade Nova de Lisboa, Faculdade de CiĂȘncias e TecnologiaRandom access approaches for Low Earth Orbit (LEO) satellite networks are usually incompatible
with the Quality of Service (QoS) requirements of multimedia tra c, especially when hand-held devices must operate with very low power.
Cross-Layered optimization architectures, combined with Multipacket Reception (MPR)schemes are a good choice to enhance the overall performance of a wireless system. Hybrid
Network-assisted Diversity Multiple Access (H-NDMA) protocol, exhibits high energy e ciency, with MPR capability, but its use with satellites is limited by the high round trip time. This protocol was adapted to satellites, in Satellite-NDMA, but it required a pre-reservation mechanism that introduces a signi cant delay.
This dissertation proposes a random access protocol that uses H-NDMA, for Low Earth Orbit (LEO) satellite networks, named Satellite Random-NDMA (SR-NDMA). The protocol addresses the problem inherent to satellite networks (large round trip time and signi cant energy consumption) de ning a hybrid approach with an initial random access plus possible additional scheduled retransmissions. An MPR receiver combines the multiple copies received, gradually reducing the error rate. Analytical performance models are proposed for the throughput, delay, jitter and energy e ciency considering nite queues at the terminals. It is also addressed the energy e ciency optimization, where the system
parameters are calculated to guarantee the QoS requirements.
The proposed system's performance is evaluated for a Single-Carrier with Frequency Domain Equalization (SC-FDE) receiver. Results show that the proposed system is energy e cient and can provide enough QoS to support services such as video telephony
Design and analysis of a beacon-less routing protocol for large volume content dissemination in vehicular ad hoc networks
Largevolumecontentdisseminationispursuedbythegrowingnumberofhighquality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authorsâ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
In this paper we propose two analytically tractable stochastic models of
non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a
static pattern of nodes while the other assumes that the pattern of nodes
varies over time. Both models feature transmitters randomly located in the
Euclidean plane, according to a Poisson point process with the receivers
randomly located at a fixed distance from the emitters. We concentrate on the
so-called outage scenario, where a successful transmission requires a
Signal-to-Interference-and-Noise Ratio (SINR) larger than a given threshold.
With Rayleigh fading and the SINR averaged over the duration of the packet
transmission, both models lead to closed form expressions for the probability
of successful transmission. We show an excellent matching of these results with
simulations. Using our models we compare the performances of non-slotted Aloha
to previously studied slotted Aloha. We observe that when the path loss is not
very strong both models, when appropriately optimized, exhibit similar
performance. For stronger path loss non-slotted Aloha performs worse than
slotted Aloha, however when the path loss exponent is equal to 4 its density of
successfully received packets is still 75% of that in the slotted scheme. This
is still much more than the 50% predicted by the well-known analysis where
simultaneous transmissions are never successful. Moreover, in any path loss
scenario, both schemes exhibit the same energy efficiency.Comment: accepted for IEEE Infocom 201
- âŠ