83 research outputs found

    Coexistence of OFDM and FBMC for Underlay D2D Communication in 5G Networks

    Full text link
    Device-to-device (D2D) communication is being heralded as an important part of the solution to the capacity problem in future networks, and is expected to be natively supported in 5G. Given the high network complexity and required signalling overhead associated with achieving synchronization in D2D networks, it is necessary to study asynchronous D2D communications. In this paper, we consider a scenario whereby asynchronous D2D communication underlays an OFDMA macro-cell in the uplink. Motivated by the superior performance of new waveforms with increased spectral localization in the presence of frequency and time misalignments, we compare the system-level performance of a set-up for when D2D pairs use either OFDM or FBMC/OQAM. We first demonstrate that inter-D2D interference, resulting from misaligned communications, plays a significant role in clustered D2D topologies. We then demonstrate that the resource allocation procedure can be simplified when D2D pairs use FBMC/OQAM, since the high spectral localization of FBMC/OQAM results in negligible inter-D2D interference. Specifically, we identify that FBMC/OQAM is best suited to scenarios consisting of small, densely populated D2D clusters located near the encompassing cell's edge.Comment: 7 pages, 9 figures, Accepted at IEEE Globecom 2016 Workshop

    A one hop overlay system for Mobile Ad Hoc Networks

    Get PDF
    Peer-to-Peer (P2P) overlays were initially proposed for use with wired networks. However, the very rapid proliferation of wireless communication technology has prompted a need for adoption of P2P systems in mobile networks too. There are many common characteristics between P2P overlay networks and Mobile Ad-hoc Networks (MANET). Self-organization, decentralization, a dynamic nature and changing topology are the most commonly shared features. Furthermore, when used together, the two approaches complement each other. P2P overlays provide data storage/retrieval functionality and MANET provides wireless connectivity between clients without depending on any pre-existing infrastructure. P2P overlay networks can be deployed over MANET to address content discovery issues. However, previous research has shown that deploying P2P systems straight over MANET does not exhibit satisfactory performance. Bandwidth limitation, limited resources and node mobility are some of the key constraints. This thesis proposes a novel approach, OneHopOverlay4MANET, to exploit the synergies between MANET and P2P overlays through cross-layering. It combines Distributed Hash Table (DHT) based structured P2P overlays with MANET underlay routing protocols to achieve one logical hop between any pair of overlay nodes. OneHopOverlay4MANET constructs a cross-layer channel to permit direct exchange of routing information between the Application layer, where the overlay operates, and the MANET underlay layer. Consequently, underlay routing information can be shared and used by the overlay. Thus, OneHopOverlay4MANET reduces the typical management traffic when deploying traditional P2P systems over MANET. Moreover, as a result of building one hop overlay, OneHopOverlay4MANET can eliminate the mismatching issue between overlay and underlay and hence resolve key lookups in a short time, enhancing the performance of the overlay. v In this thesis, we present OneHopOverlay4MANET and evaluate its performance when combined with different underlay routing protocols. OneHopOverlay4MANET has been combined with two proactive underlays (OLSR and BATMAN) and with three reactive underlay routing protocols (DSR, AODV and DYMO). In addition, the performance of the proposed system over OLSR has been compared to two recent structured P2P over MANET systems (MA-SP2P and E-SP2P) that adopted OLSR as the routing protocol. The results show that better performance can be achieved using OneHopOverlay4MANET

    Service-Driven Networking

    Get PDF
    This thesis presents our research on service-driven networking, which is a general design framework for service quality assurance and integrated network and service management in large scale multi-domain networks. The philosophy is to facilitate bi-party open participation among the users and the providers of network services in order to bring about better service customization and quality assurance, without sacrificing the autonomy and objectives of the individual entities. Three primary research topics are documented: service composition and adaptation, self-stabilization in uncoordinated environment, and service quality modeling. The work involves theoretical analysis, algorithm design, and simulations as evaluation methodology

    Interference-aware multi-hop path selection for device-to-device communications in a cellular interference environment

    Get PDF
    Device-to-Device (D2D) communications is widely seen as an efficient network capacity scaling technology. The co-existence of D2D with conventional cellular (CC) transmissions causes unwanted interference. Existing techniques have focused on improving the throughput of D2D communications by optimising the radio resource management and power allocation. However, very little is understood about the impact of the route selection of the users and how optimal routing can reduce interference and improve the overall network capacity. In fact, traditional wisdom indicates that minimising the number of hops or the total path distance is preferable. Yet, when interference is considered, we show that this is not the case. In this paper, we show that by understanding the location of the user, an interference-aware routing algorithm can be devised. We propose an adaptive Interference-Aware-Routing (IAR) algorithm, that on average achieves a 30% increase in hop distance, but can improve the overall network capacity by 50% whilst only incurring a minor 2% degradation to the CC capacity. The analysis framework and the results open up new avenues of research in location-dependent optimization in wireless systems, which is particularly important for increasingly dense and semantic-aware deployments

    On Detection of Current and Next-Generation Botnets.

    Full text link
    Botnets are one of the most serious security threats to the Internet and its end users. A botnet consists of compromised computers that are remotely coordinated by a botmaster under a Command and Control (C&C) infrastructure. Driven by financial incentives, botmasters leverage botnets to conduct various cybercrimes such as spamming, phishing, identity theft and Distributed-Denial-of-Service (DDoS) attacks. There are three main challenges facing botnet detection. First, code obfuscation is widely employed by current botnets, so signature-based detection is insufficient. Second, the C&C infrastructure of botnets has evolved rapidly. Any detection solution targeting one botnet instance can hardly keep up with this change. Third, the proliferation of powerful smartphones presents a new platform for future botnets. Defense techniques designed for existing botnets may be outsmarted when botnets invade smartphones. Recognizing these challenges, this dissertation proposes behavior-based botnet detection solutions at three different levels---the end host, the edge network and the Internet infrastructure---from a small scale to a large scale, and investigates the next-generation botnet targeting smartphones. It (1) addresses the problem of botnet seeding by devising a per-process containment scheme for end-host systems; (2) proposes a hybrid botnet detection framework for edge networks utilizing combined host- and network-level information; (3) explores the structural properties of botnet topologies and measures network components' capabilities of large-scale botnet detection at the Internet infrastructure level; and (4) presents a proof-of-concept mobile botnet employing SMS messages as the C&C and P2P as the topology to facilitate future research on countermeasures against next-generation botnets. The dissertation makes three primary contributions. First, the detection solutions proposed utilize intrinsic and fundamental behavior of botnets and are immune to malware obfuscation and traffic encryption. Second, the solutions are general enough to identify different types of botnets, not a specific botnet instance. They can also be extended to counter next-generation botnet threats. Third, the detection solutions function at multiple levels to meet various detection needs. They each take a different perspective but are highly complementary to each other, forming an integrated botnet detection framework.Ph.D.Computer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/91382/1/gracez_1.pd

    Effizientes Routing in strukturierten P2P Overlays

    Get PDF
    Als Fundament für neuartige Netzwerkanwendungen sind strukturierte P2P Overlays attraktiv. In diesen Strukturen folgen Datenpakete logischen Verbindungen zwischen den Netzwerkteilnehmern, die jedoch meist komplexen Wegen durch das zugrunde liegende Netzwerk entsprechen. Die in dieser Arbeit vorgestellten Konzepte verringern die daraus resultierenden hohen Routing-Latenzen im Overlay. Schwerpunkt dabei ist ein Verfahren zur Vergabe von auf Netzwerk-Koordinaten basierenden Teilnehmerkennungen

    Effizientes Routing in strukturierten P2P Overlays

    Get PDF
    Als Fundament für neuartige Netzwerkanwendungen sind strukturierte P2P Overlays attraktiv. In diesen Strukturen folgen Datenpakete logischen Verbindungen zwischen den Netzwerkteilnehmern, die jedoch meist komplexen Wegen durch das zugrunde liegende Netzwerk entsprechen. Die in dieser Arbeit vorgestellten Konzepte verringern die daraus resultierenden hohen Routing-Latenzen im Overlay. Schwerpunkt dabei ist ein Verfahren zur Vergabe von auf Netzwerk-Koordinaten basierenden Teilnehmerkennungen

    Hybrid routing in delay tolerant networks

    Get PDF
    This work addresses the integration of today\\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented

    Hybrid Routing in Delay Tolerant Networks

    Get PDF
    This work addresses the integration of today\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented
    corecore