83 research outputs found
Coexistence of OFDM and FBMC for Underlay D2D Communication in 5G Networks
Device-to-device (D2D) communication is being heralded as an important part
of the solution to the capacity problem in future networks, and is expected to
be natively supported in 5G. Given the high network complexity and required
signalling overhead associated with achieving synchronization in D2D networks,
it is necessary to study asynchronous D2D communications. In this paper, we
consider a scenario whereby asynchronous D2D communication underlays an OFDMA
macro-cell in the uplink. Motivated by the superior performance of new
waveforms with increased spectral localization in the presence of frequency and
time misalignments, we compare the system-level performance of a set-up for
when D2D pairs use either OFDM or FBMC/OQAM. We first demonstrate that
inter-D2D interference, resulting from misaligned communications, plays a
significant role in clustered D2D topologies. We then demonstrate that the
resource allocation procedure can be simplified when D2D pairs use FBMC/OQAM,
since the high spectral localization of FBMC/OQAM results in negligible
inter-D2D interference. Specifically, we identify that FBMC/OQAM is best suited
to scenarios consisting of small, densely populated D2D clusters located near
the encompassing cell's edge.Comment: 7 pages, 9 figures, Accepted at IEEE Globecom 2016 Workshop
A one hop overlay system for Mobile Ad Hoc Networks
Peer-to-Peer (P2P) overlays were initially proposed for use with wired networks.
However, the very rapid proliferation of wireless communication technology has
prompted a need for adoption of P2P systems in mobile networks too. There are
many common characteristics between P2P overlay networks and Mobile Ad-hoc
Networks (MANET). Self-organization, decentralization, a dynamic nature and
changing topology are the most commonly shared features. Furthermore, when
used together, the two approaches complement each other. P2P overlays provide
data storage/retrieval functionality and MANET provides wireless connectivity
between clients without depending on any pre-existing infrastructure. P2P overlay
networks can be deployed over MANET to address content discovery issues.
However, previous research has shown that deploying P2P systems straight over
MANET does not exhibit satisfactory performance. Bandwidth limitation, limited
resources and node mobility are some of the key constraints.
This thesis proposes a novel approach, OneHopOverlay4MANET, to exploit the
synergies between MANET and P2P overlays through cross-layering. It combines
Distributed Hash Table (DHT) based structured P2P overlays with MANET underlay
routing protocols to achieve one logical hop between any pair of overlay
nodes. OneHopOverlay4MANET constructs a cross-layer channel to permit direct
exchange of routing information between the Application layer, where the overlay
operates, and the MANET underlay layer. Consequently, underlay routing information
can be shared and used by the overlay. Thus, OneHopOverlay4MANET
reduces the typical management traffic when deploying traditional P2P systems
over MANET. Moreover, as a result of building one hop overlay, OneHopOverlay4MANET
can eliminate the mismatching issue between overlay and underlay
and hence resolve key lookups in a short time, enhancing the performance of the
overlay.
v
In this thesis, we present OneHopOverlay4MANET and evaluate its performance
when combined with different underlay routing protocols. OneHopOverlay4MANET
has been combined with two proactive underlays (OLSR and BATMAN)
and with three reactive underlay routing protocols (DSR, AODV and
DYMO). In addition, the performance of the proposed system over OLSR has
been compared to two recent structured P2P over MANET systems (MA-SP2P
and E-SP2P) that adopted OLSR as the routing protocol. The results show that
better performance can be achieved using OneHopOverlay4MANET
Service-Driven Networking
This thesis presents our research on service-driven networking, which is a general design framework for service quality assurance and integrated network and service management in
large scale multi-domain networks. The philosophy is to facilitate bi-party open participation among the users and the
providers of network services in order to bring about better service customization and quality assurance, without sacrificing the autonomy and objectives of the individual
entities. Three primary research topics are documented: service composition and adaptation, self-stabilization in uncoordinated environment, and service quality modeling. The work involves
theoretical analysis, algorithm design, and simulations as evaluation methodology
Interference-aware multi-hop path selection for device-to-device communications in a cellular interference environment
Device-to-Device (D2D) communications is widely seen as an efficient network capacity scaling technology. The co-existence of D2D with conventional cellular (CC) transmissions causes unwanted interference. Existing techniques have focused on improving the throughput of D2D communications by optimising the radio resource management and power allocation. However, very little is understood about the impact of the route selection of the users and how optimal routing can reduce interference and improve the overall network capacity. In fact, traditional wisdom indicates that minimising the number of hops or the total path distance is preferable. Yet, when interference is considered, we show that this is not the case. In this paper, we show that by understanding the location of the user, an interference-aware routing algorithm can be devised. We propose an adaptive Interference-Aware-Routing (IAR) algorithm, that on average achieves a 30% increase in hop distance, but can improve the overall network capacity by 50% whilst only incurring a minor 2% degradation to the CC capacity. The analysis framework and the results open up new avenues of research in location-dependent optimization in wireless systems, which is particularly important for increasingly dense and semantic-aware deployments
On Detection of Current and Next-Generation Botnets.
Botnets are one of the most serious security threats to the Internet and its end users. A botnet consists of compromised computers that are remotely coordinated by a botmaster under a
Command and Control (C&C) infrastructure. Driven by financial incentives, botmasters leverage botnets to conduct various cybercrimes such as spamming, phishing, identity theft and
Distributed-Denial-of-Service (DDoS) attacks. There are three main challenges facing botnet detection. First, code obfuscation is widely employed by current botnets, so signature-based detection is insufficient. Second, the C&C
infrastructure of botnets has evolved rapidly. Any detection solution targeting one botnet instance can hardly keep up with this change. Third, the proliferation of powerful smartphones presents a new platform for future botnets. Defense
techniques designed for existing botnets may be outsmarted when botnets invade smartphones.
Recognizing these challenges, this dissertation proposes behavior-based botnet detection solutions at three different levels---the end host, the edge network and the Internet infrastructure---from a small scale to a large scale, and investigates the next-generation botnet targeting smartphones.
It (1) addresses the problem of botnet seeding by devising a per-process containment scheme for end-host systems; (2) proposes a hybrid botnet detection framework for edge networks
utilizing combined host- and network-level information; (3) explores the structural properties of botnet topologies and
measures network components' capabilities of large-scale botnet detection at the Internet infrastructure level; and (4)
presents a proof-of-concept mobile botnet employing SMS messages as the C&C and P2P as the topology to facilitate future research on countermeasures against next-generation
botnets.
The dissertation makes three primary contributions. First, the detection solutions proposed utilize intrinsic and fundamental
behavior of botnets and are immune to malware obfuscation and traffic encryption. Second, the solutions are general enough to identify different types of botnets, not a specific botnet
instance. They can also be extended to counter next-generation botnet threats. Third, the detection solutions function at
multiple levels to meet various detection needs. They each take a different perspective but are highly complementary to each other, forming an integrated botnet detection framework.Ph.D.Computer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/91382/1/gracez_1.pd
Effizientes Routing in strukturierten P2P Overlays
Als Fundament für neuartige Netzwerkanwendungen sind strukturierte P2P Overlays attraktiv. In diesen Strukturen folgen Datenpakete logischen Verbindungen zwischen den Netzwerkteilnehmern, die jedoch meist komplexen Wegen durch das zugrunde liegende Netzwerk entsprechen. Die in dieser Arbeit vorgestellten Konzepte verringern die daraus resultierenden hohen Routing-Latenzen im Overlay. Schwerpunkt dabei ist ein Verfahren zur Vergabe von auf Netzwerk-Koordinaten basierenden Teilnehmerkennungen
Effizientes Routing in strukturierten P2P Overlays
Als Fundament für neuartige Netzwerkanwendungen sind strukturierte P2P Overlays attraktiv. In diesen Strukturen folgen Datenpakete logischen Verbindungen zwischen den Netzwerkteilnehmern, die jedoch meist komplexen Wegen durch das zugrunde liegende Netzwerk entsprechen. Die in dieser Arbeit vorgestellten Konzepte verringern die daraus resultierenden hohen Routing-Latenzen im Overlay. Schwerpunkt dabei ist ein Verfahren zur Vergabe von auf Netzwerk-Koordinaten basierenden Teilnehmerkennungen
Hybrid routing in delay tolerant networks
This work addresses the integration of today\\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented
Hybrid Routing in Delay Tolerant Networks
This work addresses the integration of today\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented
- …