209 research outputs found

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements

    Qualité de service dans des environnements réseaux mobiles, contraints et hétérogènes

    Get PDF
    Les télécommunications sans fil ont connu ces dernières années un immense succès à tel point que le spectre des fréquences est désormais surchargé et nécessite la disponibilité de nouvelles ressources. Pour répondre à ce besoin, des techniques de réutilisation dynamique du spectre ont alors vu le jour sous la dénomination de radio cognitive. Elles consistent à partager de manière opportuniste et efficace certaines fréquences ayant été initialement allouées à d'autres systèmes. Cette thèse se place dans le contexte de réseaux sans fil tactiques hétérogènes comportant des segments de radios cognitives. La difficulté provient alors de la garantie de qualité de service de bout en bout : respect du débit négocié, du délai et de la gigue. Nous nous sommes tout d'abord intéressés au contrôle d'admission dans ce type de réseaux en proposant une méthode de calcul de bande passante résiduelle de bout en bout s'appuyant sur un algorithme de complexité polynomiale et pouvant être implanté de manière distribuée. Nous nous sommes ensuite concentrés sur le routage en proposant une nouvelle métrique tenant compte des particularités de ce type de réseaux. Enfin, nous nous focalisons sur la thématique du routage à contraintes multiples en étudiant et implantant en environnement réel des algorithmes d'approximation proposés dans la littérature. ABSTRACT : The unprecedented success of wireless telecommunication systems has resulted in the wireless spectrum becoming a scarce resource. Cognitive Radio systems have been proposed as the enabling technology allowing unlicensed equipments to opportunistically access the licensed spectrum when not in use by the licensed users. The focus of this thesis is on heterogeneous tactical networks deploying cognitive radios in parts or in their entirety. Such networks can be organized in multiple sub-networks, each characterized by a specific topology, medium access scheme and spectrum access policy. As a result, providing end-to-end Quality of Service guarantees in terms of bandwidth, delay and jitter, emerges as a key challenge. We first address the admission control in multi-hop cognitive radio networks and propose a polynomial time algorithm that can be implemented in a distributed fashion for estimating the end-to-end bandwidth. Then, we focus on routing and propose a new metric that takes into account the specifics of such networks. Finally, as quality of service requirements can be expressed using multiple metrics, we turn our attention to multi-constrained routing and implement on a real testbed low complexity approximation algorithms

    Evolution of High Throughput Satellite Systems: Vision, Requirements, and Key Technologies

    Full text link
    High throughput satellites (HTS), with their digital payload technology, are expected to play a key role as enablers of the upcoming 6G networks. HTS are mainly designed to provide higher data rates and capacities. Fueled by technological advancements including beamforming, advanced modulation techniques, reconfigurable phased array technologies, and electronically steerable antennas, HTS have emerged as a fundamental component for future network generation. This paper offers a comprehensive state-of-the-art of HTS systems, with a focus on standardization, patents, channel multiple access techniques, routing, load balancing, and the role of software-defined networking (SDN). In addition, we provide a vision for next-satellite systems that we named as extremely-HTS (EHTS) toward autonomous satellites supported by the main requirements and key technologies expected for these systems. The EHTS system will be designed such that it maximizes spectrum reuse and data rates, and flexibly steers the capacity to satisfy user demand. We introduce a novel architecture for future regenerative payloads while summarizing the challenges imposed by this architecture

    5G and beyond networks

    Get PDF
    This chapter investigates the Network Layer aspects that will characterize the merger of the cellular paradigm and the IoT architectures, in the context of the evolution towards 5G-and-beyond, including some promising emerging services as Unmanned Aerial Vehicles or Base Stations, and V2X communications

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Ordonnancement décentralisé au niveau de la couche MAC pour les réseaux maillés radio cognitive

    Get PDF
    Le réseau maillé sans fil radio cognitive (CWMN) est un type de réseau prometteur qui combine les avantages des réseaux maillés sans fil (WMN) avec l’augmentation de la capacité du réseau grâce à l'utilisation de canaux disponibles découverts grâce à la technologie radio cognitive. Le CWMN nécessite une couche de contrôle d'accès au support (MAC) adapté à ce nouvel environnement. En effet, la couche MAC a pour objectif d’ordonnancer la transmission des trames de données dans un environnement dynamique dans lequel les canaux disponibles varient dans l'espace et le temps. L’ordonnancement dans un CWMN est plus difficile que dans un réseau multicanaux IEEE 802.11 car dans un CWMN, chaque noeud peut avoir un ensemble de canaux disponibles différents de leurs voisins tandis que dans un réseau multicanaux IEEE 802.11, tous les noeuds partagent le même ensemble de canaux disponibles. Dans le cadre de cette maîtrise, on améliore l’ordonnancement au niveau de la couche MAC des réseaux maillés radio cognitive. On propose un algorithme d'ordonnancement de paquets efficace dans une architecture distribuée dans CWMN. La solution utilise l’algorithme de coloration des sommets à deux distances, au niveau des noeuds qui augmente la vitesse de traitement de l'algorithme d’ordonnancement et réduit la quantité de données de contrôle échangées. Les résultats des simulations montrent que l'algorithme proposé améliore le passage à l’échelle, augmente la vitesse d’ordonnancement des liens et réduit la quantité de données de contrôle échangées par rapport à un algorithme existant

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms
    • …
    corecore