53 research outputs found
Telecommunications Networks
This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing
Mobile Ad Hoc Networks
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms
Emerging Communications for Wireless Sensor Networks
Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide
Safety Applications and Measurement Tools for Connected Vehicles
L'abstract è presente nell'allegato / the abstract is in the attachmen
Peer-to-peer update dissemination in browser-based networked virtual environments.
PhD ThesisNetworked Virtual Environments (NVEs) have always imposed strict requirements on
architectures for update dissemination (UD). Clients must maintain views that are as
synchronous and consistent as possible in order to achieve a level of user experience that
is tolerable for the user.
In recent times, the web browser has become a viable platform on which to deploy
these NVEs. Doing so adds another layer of challenges however. There is a distinct need
for systems that adapt to these constraints and exploit the characteristics of this new
context to achieve reliably high consistency between users for a range of use cases.
A promising approach is to carry forward the rich body of past research in peer-to-peer
(P2P) networks and apply this to the problem of UD in NVEs under the constraints of a
web browser. Making NVEs scalable through P2P networks is not a new concept, however
previous work has always been either too specific to a certain kind of NVE, or made
performance trade-offs that especially cannot work in a browser context. Furthermore,
in previous work on P2P NVEs, UD has always taken the backseat compared to object
management and distributed neighbour selection. The evaluation of these UD systems
have as a result been one-dimensional and overly simplifying.
In this work, we begin by surveying past UD solutions and evaluation methodologies.
We then capture NVE, browser, and network constraints, aided by the analysis of a rich
dataset of NVE network traces that we have collected, and draw out key observations
and challenges to develop the requirements for a feasible UD system. From there, we
illustrate the design and implementation of our P2P UD system for NVEs in great detail,
augmenting our system with novel architectural insights from the Software-Defined
Networking (SDN) space. Finally, we evaluate our system under a range of workloads,
test environments, and performance metrics to demonstrate that we have overcome these
challenges, as well as compare our method to other existing methods, which we have also
implemented and tested.
We hope that our contributions in research and resources (such as our taxonomies,
NVE analysis, UD system, browser library, workload datasets, and a benchmarking framework)
bring more structure as well as research and development opportunities to a relatively
niche sub-field
Project BeARCAT : Baselining, Automation and Response for CAV Testbed Cyber Security : Connected Vehicle & Infrastructure Security Assessment
Connected, software-based systems are a driver in advancing the technology of transportation systems. Advanced automated and autonomous vehicles, together with electrification, will help reduce congestion, accidents and emissions. Meanwhile, vehicle manufacturers see advanced technology as enhancing their products in a competitive market. However, as many decades of using home and enterprise computer systems have shown, connectivity allows a system to become a target for criminal intentions. Cyber-based threats to any system are a problem; in transportation, there is the added safety implication of dealing with moving vehicles and the passengers within
Applying named data networking in mobile ad hoc networks
This thesis presents the Name-based Mobile Ad-hoc Network (nMANET) approach
to content distribution that ensure and enables responsible research on applying
named data networking protocol in mobile ad-hoc networks. The test framework
of the nMANET approach allows reproducibility of experiments and validation of
expected results based on analysis of experimental data. The area of application for
nMANETs is the distribution of humanitarian information in emergency scenarios.
Named-Data Networking (NDN) and ad-hoc mobile communication allow exchange
of emergency information in situations where central services such as cellular towers
and electric systems are disrupted.
The implemented prototype enables researchers to reproduce experiments on
content distribution that consider constraints on mobile resources, such as the
remaining power of mobile devices and available network bandwidth. The nMANET
framework validates a set of experiments by measuring network traffic and energy
consumption from both real mobile devices and those in a simulated environment.
Additionally, this thesis presents results from experiments in which the nMANET
forwarding strategies and traditional wireless services, such as hotpost, are analysed
and compared. This experimental data represents the evidence that supports and
validates the methodology presented in this thesis.
The design and implementation of an nMANET prototype, the Java NDN Forwarder
Daemon (JNFD) is presented as a testing framework, which follows the principles
of continuous integration, continuous testing and continuous deployment. This
testing framework is used to validate JNFD and IP-based technologies, such as
HTTP in a MANET using the OLSR routing protocol, as well as traditional wireless
infrastructure mode wireless.
The set of experiments executed, in a small network of Android smart-phones
connected in ad-hoc mode and in a virtual ad-hoc network simulator show the
advantages of reproducibility using nMANET features. JNFD is open source, all
experiments are scripted, they are repeatable and scalable. Additionally, JNFD
utilises real GPS traces to simulate mobility of nodes during experiments. This
thesis provides experimental evidence to show that nMANET allows reproducibility
and validation of a wide range of future experiments applying NDN on MANETs
Self-Organization and Resilience for Networked Systems:Design Principles and Open Research Issues
Networked systems form the backbone of modern society, underpinning critical infrastructures such as electricity, water, transport and commerce, and other essential services (e.g., information, entertainment, and social networks). It is almost inconceivable to contemplate a future without even more dependence on them. Indeed, any unavailability of such critical systems is--even for short periods--a rather bleak prospect. However, due to their increasing size and complexity, they also require some means of autonomic formation and self-organization. This paper identifies the design principles and open research issues in the twin fields of self-organization and resilience for networked systems. In combination, they offer the prospect of combating threats and allowing essential services that run on networked systems to continue operating satisfactorily. This will be achieved, on the one hand, through the (self-)adaptation of networked systems and, on the other hand, through structural and operational resilience techniques to ensure that they can detect, defend against, and ultimately withstand challenges
A survey on Bluetooth multi-hop networks
Bluetooth was firstly announced in 1998. Originally designed as cable replacement connecting devices in a point-to-point fashion its high penetration arouses interest in its ad-hoc networking potential. This ad-hoc networking potential of Bluetooth is advertised for years - but until recently no actual products were available and less than a handful of real Bluetooth multi-hop network deployments were reported. The turnaround was triggered by the release of the Bluetooth Low Energy Mesh Profile which is unquestionable a great achievement but not well suited for all use cases of multi-hop networks. This paper surveys the tremendous work done on Bluetooth multi-hop networks during the last 20 years. All aspects are discussed with demands for a real world Bluetooth multi-hop operation in mind. Relationships and side effects of different topics for a real world implementation are explained. This unique focus distinguishes this survey from existing ones. Furthermore, to the best of the authors’ knowledge this is the first survey consolidating the work on Bluetooth multi-hop networks for classic Bluetooth technology as well as for Bluetooth Low Energy. Another individual characteristic of this survey is a synopsis of real world Bluetooth multi-hop network deployment efforts. In fact, there are only four reports of a successful establishment of a Bluetooth multi-hop network with more than 30 nodes and only one of them was integrated in a real world application - namely a photovoltaic power plant. © 2019 The Author
- …