38 research outputs found

    Available Bandwidth Estimation for Adaptive Video Streaming in Mobile Ad Hoc

    Full text link
    [EN] We propose in this paper an algorithm for available bandwidth estimation in mobile ad hoc networks and its integration into a conventional routing protocol like AODV for improving the rate-adaptive video streaming. We have introduced in our approach a local estimation of the available bandwidth as well as a prediction of the consumed bandwidth. This information allows video application to adjust its transmission rate avoiding network congestion. We conducted a performance evaluation of our solution through simulation experiments using two network scenarios. In the simulation study, transmission of video streams encoded with the H.264/MPEG-4 advanced video coding standard was evaluated. The results reveal performance improvements in terms of packet loss, delay and PSNR.Castellanos, W.; Guerri Cebollada, JC.; Arce Vila, P. (2019). Available Bandwidth Estimation for Adaptive Video Streaming in Mobile Ad Hoc. International Journal of Wireless Information Networks. 26(3):218-229. https://doi.org/10.1007/s10776-019-00431-0S21822926

    A QoS-aware routing protocol with adaptive feedback scheme for video streaming for mobile networks

    Full text link
    One of the major challenges for the transmission of time-sensitive data like video over mobile ad-hoc networks (MANETs) is the deployment of an end-to-end QoS support mechanism. Therefore, several approaches and enhancements have been proposed concerning the routing protocols. In this paper we propose a new QoS routing protocol based on AODV (named AQA-AODV), which creates routes according to application QoS requirements. We have introduced link and path available bandwidth estimation mechanisms and an adaptive scheme that can provide feedback to the source node about the current network state, to allow the application to appropriately adjust the transmission rate. In the same way, we propose a route recovery approach into the AQA-AODV protocol, which provides a mechanism to detect the link failures in a route and re-establish the connections taking into account the conditions of QoS that have been established during the previous route discovery phase. The simulation results reveal performance improvements in terms of packet delay, number of link failures and connection setup latency while we make more efficient use of the available bandwidth than other protocols like AODV and QAODV. In terms of video transmission, the obtained results prove that the combined use of AQA-AODV and the scalable video coding provides an efficient platform for supporting rate-adaptive video streaming.Castellanos Hernández, WE.; Guerri Cebollada, JC.; Arce Vila, P. (2016). A QoS-aware routing protocol with adaptive feedback scheme for video streaming for mobile networks. Computer Communications. 77:10-25. doi:10.1016/j.comcom.2015.08.012S10257

    A cross-layer middleware architecture for time and safety critical applications in MANETs

    Get PDF
    Mobile Ad hoc Networks (MANETs) can be deployed instantaneously and adaptively, making them highly suitable to military, medical and disaster-response scenarios. Using real-time applications for provision of instantaneous and dependable communications, media streaming, and device control in these scenarios is a growing research field. Realising timing requirements in packet delivery is essential to safety-critical real-time applications that are both delay- and loss-sensitive. Safety of these applications is compromised by packet loss, both on the network and by the applications themselves that will drop packets exceeding delay bounds. However, the provision of this required Quality of Service (QoS) must overcome issues relating to the lack of reliable existing infrastructure, conservation of safety-certified functionality. It must also overcome issues relating to the layer-2 dynamics with causal factors including hidden transmitters and fading channels. This thesis proposes that bounded maximum delay and safety-critical application support can be achieved by using cross-layer middleware. Such an approach benefits from the use of established protocols without requiring modifications to safety-certified ones. This research proposes ROAM: a novel, adaptive and scalable cross-layer Real-time Optimising Ad hoc Middleware framework for the provision and maintenance of performance guarantees in self-configuring MANETs. The ROAM framework is designed to be scalable to new optimisers and MANET protocols and requires no modifications of protocol functionality. Four original contributions are proposed: (1) ROAM, a middleware entity abstracts information from the protocol stack using application programming interfaces (APIs) and that implements optimisers to monitor and autonomously tune conditions at protocol layers in response to dynamic network conditions. The cross-layer approach is MANET protocol generic, using minimal imposition on the protocol stack, without protocol modification requirements. (2) A horizontal handoff optimiser that responds to time-varying link quality to ensure optimal and most robust channel usage. (3) A distributed contention reduction optimiser that reduces channel contention and related delay, in response to detection of the presence of a hidden transmitter. (4) A feasibility evaluation of the ROAM architecture to bound maximum delay and jitter in a comprehensive range of ns2-MIRACLE simulation scenarios that demonstrate independence from the key causes of network dynamics: application setting and MANET configuration; including mobility or topology. Experimental results show that ROAM can constrain end-to-end delay, jitter and packet loss, to support real-time applications with critical timing requirements

    Quality of Service (QoS) security in mobile ad hoc networks

    Get PDF
    With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET environment. Without protection from a security mechanism, attacks on QoS signaling system could result in QoS routing malfunction, interference of resource reservation, or even failure of QoS provision. Due to the characteristics of the MANETs, such as rapid topology change and limited communication and computation capacity, the conventional security measures cannot be applied and new security techniques are necessary. However, little research has been done on this topic. In this dissertation, the security issues will be addressed for MANET QoS systems. The major contributions of this research are: (a) design of an authentication mechanism for ad hoc networks; (b) design of a security mechanism to prevent and detect attacks on the QoS signaling system; (c) design of an intrusion detection mechanism for bandwidth reservation to detect QoS attacks and Denial of Service (DoS) attacks. These three mechanisms are evaluated through simulation

    Quality of service on ad-hoc wireless networks

    Get PDF
    Over the last years, Mobile Ad-hoc Networks (MANETs) have captured the attention of the research community. The flexibility and cost savings they provide, due to the fact that no infrastructure is needed to deploy a MANET, is one of the most attractive possibilities of this technology. However, along with the flexibility, lots of problems arise due to the bad quality of transmission media, the scarcity of resources, etc. Since real-time communications will be common in MANETs, there has been an increasing motivation on the introduction of Quality of Service (QoS) in such networks. However, many characteristics of MANETs make QoS provisioning a difficult problem.In order to avoid congestion, a reservation mechanism that works together with a Connection Admission Control (CAC) seems to be a reasonable solution. However, most of the QoS approaches found in literature for MANETs do not use reservations. One reason for that, is the difficulty on determining the available bandwidth at a node. This is needed to decide whether there are enough resources to accommodate a new connection.This thesis proposes a simple, yet effective, method for nodes in a CSMA-based MANET to compute their available bandwidth in a distributed way. Based on this value, a QoS reservation mechanism called BRAWN (Bandwidth Reservation over Ad-hoc Networks) is introduced for multirate MANETs, allowing bandwidth allocation on a per flow basis. By multirate we refer to those networks where wireless nodes are able to dynamically switch among several link rates. This allows nodes to select the highest possible transmission rate for exchanging data, independently for each neighbor.The BRAWN mechanism not only guarantees certain QoS levels, but also naturally distributes the traffic more evenly among network nodes (i.e. load balancing). It works completely on the network layer, so that no modifications on lower layers are required, although some information about the network congestion state could also be taken into account if provided by the MAC (Medium Access Control) layer. The thesis analyzes the applicability of the proposed reservation mechanism over both proactive and reactive routing protocols, and extensions to such protocols are proposed whenever needed in order to improve their performance on multirate networks. On mobile scenarios, BRAWN also achieves high QoS provisioning levels by letting the nodes to periodically refresh QoS reservations. This extension of the protocol for mobile nodes is referred as BRAWN-R (BRAWN with Refreshments).Summarizing, the outstanding features of the reservation mechanism proposed by this thesis are: (i) Multirate, i.e. it allows wireless nodes to choose among different transmission rates, in order to accommodate to different channel conditions. (ii) Targeted to CSMA-based wireless MAC protocols, e.g. 802.11. (iii) Reservation based, allowing the network nodes to pro-actively protect ongoing QoS flows, and applying an effective CAC. (iv) Adaptive to topology changes introduced by the mobility of the nodes, re-routing QoS flows to more efficient paths. (v) Feasible and simple to implement over existing MANET routing protocols (as it is shown by the prototype presented at the end of the study).Postprint (published version

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Routing and Quality of Service in Mobile AdHoc Networks with TORA/INORA

    Get PDF
    Mobile Adhoc NETworks(MANETs) are characterized by bandwidth constrainedlinks, multiple hops and dynamic topologies. Routing and providing qualityof service in these networks is a highly challenging task. In this thesis,we discuss the unicast routing in MANETs with enhancements to the Temporally OrderedRouting Algorithm(TORA) and quality of service at the network layer with INORA. Temporally Ordered Routing Algorithm (TORA) is a highly distributed, scalable routingprotocol for MANETs. We discuss the improvements in the performance of TORA by QueryLocalization. We also discuss the improvements to TORA to remove aspecific traffic instability problem in TORA. We also describe theproactive operation of TORA and show by simulations that it is generally a good idea to have thegateway nodes in a MANET proactively perform route building and route maintenance. We propose INORA, a network layer QoS support mechanism in adhoc networks, which makesuse of the INSIGNIA in-band signaling mechanism and TORA. We present aneffective couplingbetween TORA and INSIGNIA to get routes that are "best-able" to provide QoS requirementsfor a flow. INORA also provides congestion control. We present two schemes called"Coarse feedback scheme" and "Fine feedback scheme" under the INORA frame work. Weshow that under heavily loaded conditions, the INORA schemes perform better than whenthe signaling protocol and the routing protocol operate without feedback.<p

    Improving TCP behaviour to non-invasively share spectrum with safety messages in VANET

    Get PDF
    There is a broad range of technologies available for wireless communications for moving vehicles, such as Worldwide Interoperability for Microwave Access (WiMax), 3G, Dedicated Short Range Communication (DSRC)/ Wireless Access for Vehicular Environment (WAVE) and Mobile Broadband Wireless Access (MBWA). These technologies are needed to support delay-sensitive safety related applications such as collision avoidance and emergency breaking. Among them, the IEEE802.11p standard (aka DSRC/WAVE), a Wi-Fi based medium RF range technology, is considered to be one of the best suited draft architectures for time-sensitive safety applications. In addition to safety applications, however, services of non-safety nature like electronic toll tax collection, infotainment and traffic control are also becoming important these days. To support delay-insensitive infotainment applications, the DSRC protocol suite also provides facilities to use Internet Protocols. The DSRC architecture actually consists of WAVE Short Messaging Protocol (WSMP) specifically formulated for realtime safety applications as well as the conventional transport layer protocols TCP/UDP for non-safety purposes. But the layer four protocol TCP was originally designed for reliable data delivery only over wired networks, and so the performance quality was not guaranteed for the wireless medium, especially in the highly unstable network topology engendered by fast moving vehicles. The vehicular wireless medium is inherently unreliable because of intermittent disconnections caused by moving vehicles, and in addition, it suffers from multi-path and fading phenomena (and a host of others) that greatly degrade the network performance. One of the TCP problems in the context of vehicular wireless network is that it interprets transmission errors as symptomatic of an incipient congestion situation and as a result, reduces the throughput deliberately by frequently invoking slow-start congestion control algorithms. Despite the availability of many congestion control mechanisms to address this problem, the conventional TCP continues to suffer from poor performance when deployed in the Vehicular Ad-hoc Network (VANET) environment. Moreover, the way non-safety applications, when pressed into service, will treat the existing delay-sensitive safety messaging applications and the way these two types of applications interact between them are not (well) understood, and therefore, in order for them to coexist, the implication and repercussion need to be examined closely. This is especially important as IEEE 802.11p standards are not designed keeping in view the issues TCP raises in relation to safety messages. This dissertation addresses the issues arising out of this situation and in particular confronts the congestion challenges thrown up in the context of heterogenous communication in VANET environment by proposing an innovative solution with two optimized congestion control algorithms. Extensive simulation studies conducted by the author shows that both these algorithms have improved TCP performance in terms of metrics like Packet Delivery Fraction (PDF), Packet Loss and End-to-End Delay (E2ED), and at the same time they encourage the non-safety TCP application to behave unobtrusively and cooperatively to a large extent with DSRC’s safety applications. The first algorithm, called vScalable-TCP – a modification of the existing TCPScalable variant – introduces a reliable transport protocol suitable for DSRC. In the proposed approach, whenever packets are discarded excessively due to congestion, the slow-start mechanism is purposely suppressed temporarily to avoid further congestion and packet loss. The crucial idea here is how to adjust and regulate the behaviour of vScalable-TCP in a way that the existing safety message flows are least disturbed. The simulation results confirm that the new vScalable-TCP provides better performance for real-time safety applications than TCP-Reno and other TCP variants considered in this thesis in terms of standard performance metrics. The second algorithm, named vLP-TCP – a modification of the existing TCP-LP variant – is designed to test and demonstrate that the strategy developed for vScalable-TCP is also compatible with another congestion control mechanism and achieves the same purpose. This expectation is borne out well by the simulation results. The same slow-start congestion management strategy has been employed but with only a few amendments. This modified algorithm also improves substantially the performance of basic safety management applications. The present work thus clearly confirms that both vScalable-TCP and vLP-TCP algorithms – the prefix ‘v’ to the names standing for ‘vehicular’ – outperform the existing unadorned TCP-Scalable and TCP-LP algorithms, in terms of standard performance metrics, while at the same time behaving in a friendly manner, by way of sharing bandwidth non-intrusively with DSRC safety applications. This paves the way for the smooth and harmonious coexistence of these two broad, clearly incompatible or complementary categories of applications – viz. time-sensitive safety applications and delay-tolerant infotainment applications – by narrowing down their apparent impedance or behavioural mismatch, when they are coerced to go hand in hand in a DSRC environment

    Network delay control through adaptive queue management

    Get PDF
    Timeliness in delivering packets for delay-sensitive applications is an important QoS (Quality of Service) measure in many systems, notably those that need to provide real-time performance. In such systems, if delay-sensitive traffic is delivered to the destination beyond the deadline, then the packets will be rendered useless and dropped after received at the destination. Bandwidth that is already scarce and shared between network nodes is wasted in relaying these expired packets. This thesis proposes that a deterministic per-hop delay can be achieved by using a dynamic queue threshold concept to bound delay of each node. A deterministic per-hop delay is a key component in guaranteeing a deterministic end-to-end delay. The research aims to develop a generic approach that can constrain network delay of delay-sensitive traffic in a dynamic network. Two adaptive queue management schemes, namely, DTH (Dynamic THreshold) and ADTH (Adaptive DTH) are proposed to realize the claim. Both DTH and ADTH use the dynamic threshold concept to constrain queuing delay so that bounded average queuing delay can be achieved for the former and bounded maximum nodal delay can be achieved for the latter. DTH is an analytical approach, which uses queuing theory with superposition of N MMBP-2 (Markov Modulated Bernoulli Process) arrival processes to obtain a mapping relationship between average queuing delay and an appropriate queuing threshold, for queue management. While ADTH is an measurement-based algorithmic approach that can respond to the time-varying link quality and network dynamics in wireless ad hoc networks to constrain network delay. It manages a queue based on system performance measurements and feedback of error measured against a target delay requirement. Numerical analysis and Matlab simulation have been carried out for DTH for the purposes of validation and performance analysis. While ADTH has been evaluated in NS-2 simulation and implemented in a multi-hop wireless ad hoc network testbed for performance analysis. Results show that DTH and ADTH can constrain network delay based on the specified delay requirements, with higher packet loss as a trade-off
    corecore