264 research outputs found

    Multichannel Cross-Layer Routing for Sensor Networks

    Get PDF
    Wireless Sensor Networks are ad-hoc networks that consist of sensor nodes that typically use low-power radios to connect to the Internet. The channels used by the low-power radio often suffer from interference from the other devices sharing the same frequency. By using multichannel communication in wireless networks, the effects of interference can be mitigated to enable the network to operate reliably. This thesis investigates an energy efficient multichannel protocol in Wireless Sensor Networks. It presents a new decentralised multichannel tree-building protocol with a centralised controller for ad-hoc sensor networks. The proposed protocol alleviates the effect of interference, which results in improved network efficiency, stability, and link reliability. The protocol detects the channels that suffer interference in real-time and switches the sensor nodes from those channels. It takes into account all available channels and aims to use the spectrum efficiently by transmitting on several channels. In addition to the use of multiple channels, the protocol reconstructs the topology based on the sensor nodes’ residual energy, which can prolong the network lifetime. The sensor nodes’ energy consumption is reduced because of the multichannel protocol. By using the lifetime energy spanning tree algorithm proposed in this thesis, energy consumption can be further improved by balancing the energy load in the network. This solution enables sensor nodes with less residual energy to remain functional in the network. The benefits of the proposed protocol are described in an extensive performance evaluation of different scenarios in this thesis

    Air Force Institute of Technology Research Report 2020

    Get PDF
    This Research Report presents the FY20 research statistics and contributions of the Graduate School of Engineering and Management (EN) at AFIT. AFIT research interests and faculty expertise cover a broad spectrum of technical areas related to USAF needs, as reflected by the range of topics addressed in the faculty and student publications listed in this report. In most cases, the research work reported herein is directly sponsored by one or more USAF or DOD agencies. AFIT welcomes the opportunity to conduct research on additional topics of interest to the USAF, DOD, and other federal organizations when adequate manpower and financial resources are available and/or provided by a sponsor. In addition, AFIT provides research collaboration and technology transfer benefits to the public through Cooperative Research and Development Agreements (CRADAs). Interested individuals may discuss ideas for new research collaborations, potential CRADAs, or research proposals with individual faculty using the contact information in this document

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    MobiVPN: Towards a Reliable and Efficient Mobile VPN

    Get PDF
    abstract: A Virtual Private Network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. Most existing VPN solutions are intended for wired networks with reliable connections. In a mobile environment, network connections are less reliable and devices experience intermittent network disconnections due to either switching from one network to another or experiencing a gap in coverage during roaming. These disruptive events affects traditional VPN performance, resulting in possible termination of applications, data loss, and reduced productivity. Mobile VPNs bridge the gap between what users and applications expect from a wired network and the realities of mobile computing. In this dissertation, MobiVPN, which was built by modifying the widely-used OpenVPN so that the requirements of a mobile VPN were met, was designed and developed. The aim in MobiVPN was for it to be a reliable and efficient VPN for mobile environments. In order to achieve these objectives, MobiVPN introduces the following features: 1) Fast and lightweight VPN session resumption, where MobiVPN is able decrease the time it takes to resume a VPN tunnel after a mobility event by an average of 97.19\% compared to that of OpenVPN. 2) Persistence of TCP sessions of the tunneled applications allowing them to survive VPN tunnel disruptions due to a gap in network coverage no matter how long the coverage gap is. MobiVPN also has mechanisms to suspend and resume TCP flows during and after a network disconnection with a packet buffering option to maintain the TCP sending rate. MobiVPN was able to provide fast resumption of TCP flows after reconnection with improved TCP performance when multiple disconnections occur with an average of 30.08\% increase in throughput in the experiments where buffering was used, and an average of 20.93\% of increased throughput for flows that were not buffered. 3) A fine-grained, flow-based adaptive compression which allows MobiVPN to treat each tunneled flow independently so that compression can be turned on for compressible flows, and turned off for incompressible ones. The experiments showed that the flow-based adaptive compression outperformed OpenVPN's compression options in terms of effective throughput, data reduction, and lesser compression operations.Dissertation/ThesisDoctoral Dissertation Computer Science 201

    A smart home environment to support safety and risk monitoring for the elderly living independently

    Get PDF
    The elderly prefer to live independently despite vulnerability to age-related challenges. Constant monitoring is required in cases where the elderly are living alone. The home environment can be a dangerous environment for the elderly living independently due to adverse events that can occur at any time. The potential risks for the elderly living independently can be categorised as injury in the home, home environmental risks and inactivity due to unconsciousness. The main research objective was to develop a Smart Home Environment (SHE) that can support risk and safety monitoring for the elderly living independently. An unobtrusive and low cost SHE solution that uses a Raspberry Pi 3 model B, a Microsoft Kinect Sensor and an Aeotec 4-in-1 Multisensor was implemented. The Aeotec Multisensor was used to measure temperature, motion, lighting, and humidity in the home. Data from the multisensor was collected using OpenHAB as the Smart Home Operating System. The information was processed using the Raspberry Pi 3 and push notifications were sent when risk situations were detected. An experimental evaluation was conducted to determine the accuracy with which the prototype SHE detected abnormal events. Evaluation scripts were each evaluated five times. The results show that the prototype has an average accuracy, sensitivity and specificity of 94%, 96.92% and 88.93% respectively. The sensitivity shows that the chance of the prototype missing a risk situation is 3.08%, and the specificity shows that the chance of incorrectly classifying a non-risk situation is 11.07%. The prototype does not require any interaction on the part of the elderly. Relatives and caregivers can remotely monitor the elderly person living independently via the mobile application or a web portal. The total cost of the equipment used was below R3000

    A self-healing framework for WSNs : detection and recovery of faulty sensor nodes and unreliable wireless links

    Get PDF
    Proponemos un marco conceptual para acoplar técnicas de auto-organización y técnicas de autocuración. A este marco se le llama de auto-curación y es capaz de hacer frente a enlaces inalámbricos inestables y nodos defectuosos. Dividimos el marco en dos componentes principales: la auto-organización y auto-curación. En el componente de auto-organización, nosotros construimos una topología de árbol que determine las rutas hacia el sumidero. En el componente de auto-curación, la topología del árbol se adapta a ambos tipos de fallas siguiendo tres pasos: recopilación de información, detección de fallas, y la recuperación de fallos. En el paso de recopilación de información, los nodos determinan el estado actual de la red mediante la recopilación de información de la capa MAC. En el paso de detección de fallas, los nodos analizan la información recopilada y detectan nodos/enlaces defectuosos. En el paso de recuperación de fallos, los nodos recuperan la topología del árbol mediante la sustitución de componentes defectuosos con redundantes (es decir, componentes de respaldo). Este marco permite una red con resiliencia que se recupera sin agotar los recursos de la red.We propose a conceptual framework for putting together self-organizing and self-healing techniques. This framework is called the self-healing framework and it is capable of coping with unstable wireless links and faulty nodes. We divide the framework into two major components: selforganization and self-healing. In the self-organization component, we build a tree topology that determines routing paths towards the sink. In the self-healing component, the tree topology copes with both types of failures by following three steps: information collection, fault detection, and fault recovery. In the information collection step, the nodes determine the current status of the network by gathering information from the MAC layer. In the fault detection step, the nodes analyze the collected information and detect faulty nodes/links. In the fault recovery step, the nodes recover the tree topology by replacing the faulty components with redundant ones (i.e., backup components). This framework allows a resilient network that recovers itself without depleting the network resources.Doctor en IngenieríaDoctorad

    Information technology and military performance

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 519-544).Militaries have long been eager to adopt the latest technology (IT) in a quest to improve knowledge of and control over the battlefield. At the same time, uncertainty and confusion have remained prominent in actual experience of war. IT usage sometimes improves knowledge, but it sometimes contributes to tactical blunders and misplaced hubris. As militaries invest intensively in IT, they also tend to develop larger headquarters staffs, depend more heavily on planning and intelligence, and employ a larger percentage of personnel in knowledge work rather than physical combat. Both optimists and pessimists about the so-called "revolution in military affairs" have tended to overlook the ways in which IT is profoundly and ambiguously embedded in everyday organizational life. Technocrats embrace IT to "lift the fog of war," but IT often becomes a source of breakdowns, misperception, and politicization. To describe the conditions under which IT usage improves or degrades organizational performance, this dissertation develops the notion of information friction, an aggregate measure of the intensity of organizational struggle to coordinate IT with the operational environment. It articulates hypotheses about how the structure of the external battlefield, internal bureaucratic politics, and patterns of human-computer interaction can either exacerbate or relieve friction, which thus degrades or improves performance. Technological determinism alone cannot account for the increasing complexity and variable performances of information phenomena. Information friction theory is empirically grounded in a participant-observation study of U.S. special operations in Iraq from 2007 to 2008. To test the external validity of insights gained through fieldwork in Iraq, an historical study of the 1940 Battle of Britain examines IT usage in a totally different structural, organizational, and technological context.(cont.) These paired cases show that high information friction, and thus degraded performance, can arise with sophisticated IT, while lower friction and impressive performance can occur with far less sophisticated networks. The social context, not just the quality of technology, makes all the difference. Many shorter examples from recent military history are included to illustrate concepts. This project should be of broad interest to students of organizational knowledge, IT, and military effectiveness.by Jon Randall Lindsay.Ph.D
    • …
    corecore