3,381 research outputs found
Systematic network coding with overlap for IoT scenarios
The presence of IoT in current networking scenarios is more relevant every day. IoT covers a wide range of applications, ranging from wearable devices to vehicular communications. With the consolidation of Industry 4.0, IIoT (Industrial IoT) environments are becoming more common. Communications in these scenarios are mostly wireless, and due to the lossy nature of wireless communications, the loss of information becomes an intrinsic problem. However, loss recovery schemes increase the delay that characterizes any communication. On the other hand, both reliability (robustness) and low delay are crucial requirements for some applications in IIoT. An interesting strategy to improve both of them is the use of Network Coding techniques, which have shown promising results, in terms of increasing reliability and performance. This work focuses on a possible new coding approach, based on systematic network coding scheme with overlapping generations. We perform a thorough analysis of its behavior. Based on the results, we draw out a number of conclusions for practical implementations in wireless networks, focusing our interest in IIoT environments.The authors are grateful for the funding of the Industrial Doctorates Program from the University of Cantabria (Call 2018). This work has been partially supported by the Basque Government through the Elkartek program under the DIGITAL project (Grant agreement no. KK-2019/00095), as well as by
the Spanish Government (MINECO, MCIU, AEI, FEDER) by means of the projects ADVICE: Dynamic provisioning of connectivity in high density 5G wireless scenarios (TEC2015-71329-C2-1-R) and FIERCE: Future Internet Enabled Resilient Cities (RTI2018-093475-A-100)
Robust QUIC: integrating practical coding in a low latency transport protocol
We introduce rQUIC, an integration of the QUIC protocol and a coding module. rQUIC has been designed to feature different coding/decoding schemes and is implemented in go language. We conducted an extensive measurement campaign to provide a thorough characterization of the proposed solution. We compared the performance of rQUIC with that of the original QUIC protocol for different underlying network conditions as well as different traffic patterns. Our results show that rQUIC not only yields a relevant performance gain (shorter delays), especially when network conditions worsen, but also ensures a more predictable behavior. For bulk transfer (long flows), the delay reduction almost reached 70% when the frame error rate was 5%, while under similar conditions, the gain for short flows (web navigation) was approximately 55%. In the case of video streaming, the QoE gain (p1203 metric) was, approximately, 50%.This work was supported in part by the Basque Government through the Elkartek Program under the Hodei-x Project under Agreement KK-2021/00049; in part by the Spanish Government through the Ministerio de EconomÃa y Competitividad, Fondo Europeo de Desarrollo Regional (FEDER) through the Future Internet Enabled Resilient smart CitiEs (FIERCE) under Grant RTI2018-093475-AI00; and in part by the Industrial Doctorates Program of the University of Cantabria under Grant Call 2019
Filtered OFDM systems, algorithms and performance analysis for 5G and beyond
Filtered orthogonal frequency division multiplexing (F-OFDM) system is a promising waveform for 5G and beyond to enable multi-service system and spectrum efficient network slicing. However, the performance for F-OFDM systems has not been systematically analyzed in literature. In this paper, we first establish a mathematical model for F-OFDM system and derive the conditions to achieve the interference-free one-tap channel equalization. In the practical cases (e.g., insufficient guard interval, asynchronous transmission, etc.), the analytical expressions for inter-symbol-interference (ISI), inter-carrier-interference (ICI) and adjacent-carrier-interference (ACI) are derived, where the last term is considered as one of the key factors for asynchronous transmissions. Based on the framework, an optimal power compensation matrix is derived to make all of the subcarriers having the same ergodic performance. Another key contribution of the paper is that we propose a multi-rate F-OFDM system to enable low complexity low cost communication scenarios such as narrow band Internet of Things (IoT), at the cost of generating inter-subband-interference (ISubBI). Low computational complexity algorithms are proposed to cancel the ISubBI. The result shows that the derived analytical expressions match the simulation results, and the proposed ISubBI cancelation algorithms can significantly save the original F-OFDM complexity (up to 100 times) without significant performance los
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
In the era when the market segment of Internet of Things (IoT) tops the chart
in various business reports, it is apparently envisioned that the field of
medicine expects to gain a large benefit from the explosion of wearables and
internet-connected sensors that surround us to acquire and communicate
unprecedented data on symptoms, medication, food intake, and daily-life
activities impacting one's health and wellness. However, IoT-driven healthcare
would have to overcome many barriers, such as: 1) There is an increasing demand
for data storage on cloud servers where the analysis of the medical big data
becomes increasingly complex, 2) The data, when communicated, are vulnerable to
security and privacy issues, 3) The communication of the continuously collected
data is not only costly but also energy hungry, 4) Operating and maintaining
the sensors directly from the cloud servers are non-trial tasks. This book
chapter defined Fog Computing in the context of medical IoT. Conceptually, Fog
Computing is a service-oriented intermediate layer in IoT, providing the
interfaces between the sensors and cloud servers for facilitating connectivity,
data transfer, and queryable local database. The centerpiece of Fog computing
is a low-power, intelligent, wireless, embedded computing node that carries out
signal conditioning and data analytics on raw data collected from wearables or
other medical sensors and offers efficient means to serve telehealth
interventions. We implemented and tested an fog computing system using the
Intel Edison and Raspberry Pi that allows acquisition, computing, storage and
communication of the various medical data such as pathological speech data of
individuals with speech disorders, Phonocardiogram (PCG) signal for heart rate
estimation, and Electrocardiogram (ECG)-based Q, R, S detection.Comment: 29 pages, 30 figures, 5 tables. Keywords: Big Data, Body Area
Network, Body Sensor Network, Edge Computing, Fog Computing, Medical
Cyberphysical Systems, Medical Internet-of-Things, Telecare, Tele-treatment,
Wearable Devices, Chapter in Handbook of Large-Scale Distributed Computing in
Smart Healthcare (2017), Springe
Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art
Context: The demand for protection and security of physical spaces and urban
areas increased with the escalation of terroristic attacks in recent years. We
envision with the proposed cyber-physical systems and spaces, a city that would
indeed become a smarter urbanistic object, proactively providing alerts and
being protective against any threat. Objectives: This survey intend to provide
a systematic multivocal literature survey comprised of an updated,
comprehensive and timely overview of state of the art in counter-terrorism
cyber-physical systems, hence aimed at the protection of cyber-physical spaces.
Hence, provide guidelines to law enforcement agencies and practitioners
providing a description of technologies and best practices for the protection
of public spaces. Methods: We analyzed 112 papers collected from different
online sources, both from the academic field and from websites and blogs
ranging from 2004 till mid-2022. Results: a) There is no one single
bullet-proof solution available for the protection of public spaces. b) From
our analysis we found three major active fields for the protection of public
spaces: Information Technologies, Architectural approaches, Organizational
field. c) While the academic suggest best practices and methodologies for the
protection of urban areas, the market did not provide any type of
implementation of such suggested approaches, which shows a lack of
fertilization between academia and industry. Conclusion: The overall analysis
has led us to state that there is no one single solution available, conversely,
multiple methods and techniques can be put in place to guarantee safety and
security in public spaces. The techniques range from architectural design to
rethink the design of public spaces keeping security into account in
continuity, to emerging technologies such as AI and predictive surveillance
Counter-terrorism in cyber–physical spaces:Best practices and technologies from the state of the art
Context: The demand for protection and security of physical spaces and urban areas increased with the escalation of terroristic attacks in recent years. We envision with the proposed cyber–physical systems and spaces, a city that would indeed become a smarter urbanistic object, proactively providing alerts and being protective against any threat. Objectives: This survey intend to provide a systematic multivocal literature survey comprised of an updated, comprehensive and timely overview of state of the art in counter-terrorism cyber–physical systems, hence aimed at the protection of cyber–physical spaces. Hence, provide guidelines to law enforcement agencies and practitioners providing a description of technologies and best practices for the protection of public spaces. Methods: We analyzed 112 papers collected from different online sources, both from the academic field and from websites and blogs ranging from 2004 till mid-2022. Results: (a) There is no one single bullet-proof solution available for the protection of public spaces. (b) From our analysis we found three major active fields for the protection of public spaces: Information Technologies, Architectural approaches, Organizational field. (c) While the academic suggest best practices and methodologies for the protection of urban areas, the market did not provide any type of implementation of such suggested approaches, which shows a lack of fertilization between academia and industry. Conclusion: The overall analysis has led us to state that there is no one single solution available, conversely, multiple methods and techniques can be put in place to guarantee safety and security in public spaces. The techniques range from architectural design to rethink the design of public spaces keeping security into account in continuity, to emerging technologies such as AI and predictive surveillance.</p
Engineering Blockchain Based Software Systems: Foundations, Survey, and Future Directions
Many scientific and practical areas have shown increasing interest in reaping
the benefits of blockchain technology to empower software systems. However, the
unique characteristics and requirements associated with Blockchain Based
Software (BBS) systems raise new challenges across the development lifecycle
that entail an extensive improvement of conventional software engineering. This
article presents a systematic literature review of the state-of-the-art in BBS
engineering research from a software engineering perspective. We characterize
BBS engineering from the theoretical foundations, processes, models, and roles
and discuss a rich repertoire of key development activities, principles,
challenges, and techniques. The focus and depth of this survey not only gives
software engineering practitioners and researchers a consolidated body of
knowledge about current BBS development but also underpins a starting point for
further research in this field
Zero-padding Network Coding and Compressed Sensing for Optimized Packets Transmission
Ubiquitous Internet of Things (IoT) is destined to connect everybody and everything on a never-before-seen scale. Such networks, however, have to tackle the inherent issues created by the presence of very heterogeneous data transmissions over the same shared network. This very diverse communication, in turn, produces network packets of various sizes ranging from very small sensory readings to comparatively humongous video frames. Such a massive amount of data itself, as in the case of sensory networks, is also continuously captured at varying rates and contributes to increasing the load on the network itself, which could hinder transmission efficiency. However, they also open up possibilities to exploit various correlations in the transmitted data due to their sheer number. Reductions based on this also enable the networks to keep up with the new wave of big data-driven communications by simply investing in the promotion of select techniques that efficiently utilize the resources of the communication systems. One of the solutions to tackle the erroneous transmission of data employs linear coding techniques, which are ill-equipped to handle the processing of packets with differing sizes. Random Linear Network Coding (RLNC), for instance, generates unreasonable amounts of padding overhead to compensate for the different message lengths, thereby suppressing the pervasive benefits of the coding itself. We propose a set of approaches that overcome such issues, while also reducing the decoding delays at the same time. Specifically, we introduce and elaborate on the concept of macro-symbols and the design of different coding schemes. Due to the heterogeneity of the packet sizes, our progressive shortening scheme is the first RLNC-based approach that generates and recodes unequal-sized coded packets. Another of our solutions is deterministic shifting that reduces the overall number of transmitted packets. Moreover, the RaSOR scheme employs coding using XORing operations on shifted packets, without the need for coding coefficients, thus favoring linear encoding and decoding complexities.
Another facet of IoT applications can be found in sensory data known to be highly correlated, where compressed sensing is a potential approach to reduce the overall transmissions. In such scenarios, network coding can also help. Our proposed joint compressed sensing and real network coding design fully exploit the correlations in cluster-based wireless sensor networks, such as the ones advocated by Industry 4.0. This design focused on performing one-step decoding to reduce the computational complexities and delays of the reconstruction process at the receiver and investigates the effectiveness of combined compressed sensing and network coding
- …