56 research outputs found

    Hybrid routing in delay tolerant networks

    Get PDF
    This work addresses the integration of today\\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented

    Hybrid Routing in Delay Tolerant Networks

    Get PDF
    This work addresses the integration of today\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented

    Conception d’un support de communication opportuniste pour les services pervasifs

    Get PDF
    The vision of pervasive computing of building interactive smart spaces in the physical environment is gradually heading from the research domain to reality. Computing capacity is moving beyond personal computers to many day-to-day devices, and these devices become, thanks to multiple interfaces, capable of communicating directly with one another or of connecting to the Internet.In this thesis, we are interested in a kind of pervasive computing environment that forms what we call an Intermittently Connected Hybrid Network (ICHN). An ICHN is a network composed of two parts: a fixed and a mobile part. The fixed part is formed of some fixed infostations (potentially connected together with some fixed infrastructure, typically the Internet). The mobile part, on the other hand, is formed of smartphones carried by nomadic people. While the fixed part is mainly stable, the mobile part is considered challenging and form what is called an Opportunistic Network. Indeed, relying on short-range communication means coupled with the free movements of people and radio interferences lead to frequent disconnections. To perform a network-wide communication, the "store, carry and forward" approach is usually applied. With this approach, a message can be stored temporarily on a device, in order to be forwarded later when circumstances permit. Any device can opportunistically be used as an intermediate relay to facilitate the propagation of a message from one part of the network to another. In this context, the provisioning of pervasive services is particularly challenging, and requires revisiting important components of the provisioning process, such as performing pervasive service discovery and invocation with the presence of connectivity disruptions and absence of both end-to-end paths and access continuity due to user mobility. This thesis addresses the problems of providing network-wide service provisioning in ICHNs and proposes solutions for pervasive service discovery, invocation and access continuity. Concerning service discovery challenge, we propose TAO-DIS, a service discovery protocol that performs an automatic and fast service discovery mechanism. TAO-DIS takes into account the hybrid nature of an ICHN and that the majority of services are provided by infostations. It permits mobile users to discover all the services in the surrounding environment in order to identify and choose the most convenient ones. To allow users to interact with the discovered services, we introduce TAO-INV. TAO-INV is a service invocation protocol specifically designed for ICHNs. It relies on a set of heuristics and mechanisms that ensures performing efficient routing of messages (both service requests and responses) between fixed infostations and mobile clients while preserving both low values of overhead and round trip delays. Since some infostations in the network might be connected, we propose a soft handover mechanism that modifies the invocation process in order to reduce service delivery delays. This handover mechanism takes into consideration the opportunistic nature of the mobile part of the ICHN. We have performed various experiments to evaluate our solutions and compare them with other protocols designed for ad hoc and opportunistic networks. The obtained results tend to prove that our solutions outperform these protocols, namely thanks to the optimizations we have developed for ICHNs. In our opinion, building specialized protocols that benefit from techniques specifically designed for ICHNs is an approach that should be pursued, in complement with research works on general-purpose communication protocolsLa vision de l'informatique ubiquitaire permettant de construire des espaces intelligents interactifs dans l'environnement physique passe, peu Ă  peu, du domaine de la recherche Ă  la rĂ©alitĂ©. La capacitĂ© de calcul ne se limite plus Ă  l'ordinateur personnel mais s'intĂšgre dans de multiples appareils du quotidien, et ces appareils deviennent, grĂące Ă  plusieurs interfaces, capables de communiquer directement les uns avec les autres ou bien de se connecter Ă  Internet.Dans cette thĂšse, nous nous sommes intĂ©ressĂ©s Ă  un type d'environnement cible de l'informatique ubiquitaire qui forme ce que nous appelons un rĂ©seau hybride Ă  connexions intermittentes (ICHN). Un ICHN est un rĂ©seau composĂ© de deux parties : une partie fixe et une partie mobile. La partie fixe est constituĂ©e de plusieurs infostations fixes (potentiellement reliĂ©es entre elles avec une infrastructure fixe, typiquement l'Internet). La partie mobile, quant Ă  elle, est constituĂ©e de smartphones portĂ©s par des personnes nomades. Tandis que la partie fixe est principalement stable, la partie mobile pose un certain nombre de dĂ©fis propres aux rĂ©seaux opportunistes. En effet, l'utilisation de moyens de communication Ă  courte portĂ©e couplĂ©e Ă  des dĂ©placements de personnes non contraints et Ă  des interfĂ©rences radio induit des dĂ©connexions frĂ©quentes. Le concept du "store, carry and forward" est alors habituellement appliquĂ© pour permettre la communication sur l'ensemble du rĂ©seau. Avec cette approche, un message peut ĂȘtre stockĂ© temporairement sur un appareil avant d'ĂȘtre transfĂ©rĂ© plus tard quand les circonstances sont plus favorables. Ainsi, n'importe quel appareil devient un relai de transmission opportuniste qui permet de faciliter la propagation d'un message dans le rĂ©seau. Dans ce contexte, la fourniture de services est particuliĂšrement problĂ©matique, et exige de revisiter les composants principaux du processus de fourniture, tels que la dĂ©couverte et l'invocation de service, en prĂ©sence de ruptures de connectivitĂ© et en l'absence de chemins de bout en bout. Cette thĂšse aborde les problĂšmes de fourniture de service sur l'ensemble d'un ICHN et propose des solutions pour la dĂ©couverte de services, l'invocation et la continuitĂ© d'accĂšs. En ce qui concerne le dĂ©fi de la dĂ©couverte de services, nous proposons TAO-DIS, un protocole qui met en Ɠuvre un mĂ©canisme automatique et rapide de dĂ©couverte de services. TAO-DIS tient compte de la nature hybride d'un ICHN et du fait que la majoritĂ© des services sont fournis par des infostations. Il permet aux utilisateurs mobiles de dĂ©couvrir tous les services dans l'environnement afin d'identifier et de choisir les plus intĂ©ressants. Pour permettre aux utilisateurs d'interagir avec les services dĂ©couverts, nous introduisons TAO-INV. TAO-INV est un protocole d'invocation de service spĂ©cialement conçu pour les ICHN. Il se fonde sur un ensemble d'heuristiques et de mĂ©canismes qui assurent un acheminement efficace des messages (des requĂȘtes et des rĂ©ponses de services) entre les infostations fixes et les clients mobiles tout en conservant un surcoĂ»t et des temps de rĂ©ponses rĂ©duits. Puisque certaines infostations dans le rĂ©seau peuvent ĂȘtre reliĂ©es entre elles, nous proposons un mĂ©canisme de continuitĂ© d'accĂšs (handover) qui modifie le processus d'invocation pour rĂ©duire les dĂ©lais de dĂ©livrance. Dans sa dĂ©finition, il est tenu compte de la nature opportuniste de la partie mobile de l'ICHN. Nous avons menĂ© diverses expĂ©rimentations pour Ă©valuer nos solutions et les comparer Ă  d'autres protocoles conçus pour des rĂ©seaux ad hoc et des rĂ©seaux opportunistes. Les rĂ©sultats obtenus tendent Ă  montrer que nos solutions surpassent ces autres protocoles, notamment grĂące aux optimisations que nous avons dĂ©veloppĂ©es pour les ICHN. À notre avis, construire des protocoles spĂ©cialisĂ©s qui tirent parti des techniques spĂ©cifiquement conçues pour les ICHN est une approche Ă  poursuivre en complĂ©ment des recherches sur des protocoles de communication polyvalent

    Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms

    Get PDF
    The conception of turbo codes by Berrou et al. has created a renewed interest in modern graph-based codes. Several encouraging results that have come to light since then have fortified the role these codes shall play as potential solutions for present and future communication problems. This work focuses on both practical and theoretical aspects of graph-based codes. The thesis can be broadly categorized into three parts. The first part of the thesis focuses on the design of practical graph-based codes of short lengths. While both low-density parity-check codes and rateless codes have been shown to be asymptotically optimal under the message-passing (MP) decoder, the performance of short-length codes from these families under MP decoding is starkly sub-optimal. This work first addresses the structural characterization of stopping sets to understand this sub-optimality. Using this characterization, a novel improved decoder that offers several orders of magnitude improvement in bit-error rates is introduced. Next, a novel scheme for the design of a good rate-compatible family of punctured codes is proposed. The second part of the thesis aims at establishing these codes as a good tool to develop reliable, energy-efficient and low-latency data dissemination schemes in networks. The problems of broadcasting in wireless multihop networks and that of unicast in delay-tolerant networks are investigated. In both cases, rateless coding is seen to offer an elegant means of achieving the goals of the chosen communication protocols. It was noticed that the ratelessness and the randomness in encoding process make this scheme specifically suited to such network applications. The final part of the thesis investigates an application of a specific class of codes called network codes to finite-buffer wired networks. This part of the work aims at establishing a framework for the theoretical study and understanding of finite-buffer networks. The proposed Markov chain-based method extends existing results to develop an iterative Markov chain-based technique for general acyclic wired networks. The framework not only estimates the capacity of such networks, but also provides a means to monitor network traffic and packet drop rates on various links of the network.Ph.D.Committee Chair: Fekri, Faramarz; Committee Member: Li, Ye; Committee Member: McLaughlin, Steven; Committee Member: Sivakumar, Raghupathy; Committee Member: Tetali, Prasa

    Proceedings of the Third Edition of the Annual Conference on Wireless On-demand Network Systems and Services (WONS 2006)

    Get PDF
    Ce fichier regroupe en un seul documents l'ensemble des articles accéptés pour la conférences WONS2006/http://citi.insa-lyon.fr/wons2006/index.htmlThis year, 56 papers were submitted. From the Open Call submissions we accepted 16 papers as full papers (up to 12 pages) and 8 papers as short papers (up to 6 pages). All the accepted papers will be presented orally in the Workshop sessions. More precisely, the selected papers have been organized in 7 session: Channel access and scheduling, Energy-aware Protocols, QoS in Mobile Ad-Hoc networks, Multihop Performance Issues, Wireless Internet, Applications and finally Security Issues. The papers (and authors) come from all parts of the world, confirming the international stature of this Workshop. The majority of the contributions are from Europe (France, Germany, Greece, Italy, Netherlands, Norway, Switzerland, UK). However, a significant number is from Australia, Brazil, Canada, Iran, Korea and USA. The proceedings also include two invited papers. We take this opportunity to thank all the authors who submitted their papers to WONS 2006. You helped make this event again a success

    NASA Capability Roadmaps Executive Summary

    Get PDF
    This document is the result of eight months of hard work and dedication from NASA, industry, other government agencies, and academic experts from across the nation. It provides a summary of the capabilities necessary to execute the Vision for Space Exploration and the key architecture decisions that drive the direction for those capabilities. This report is being provided to the Exploration Systems Architecture Study (ESAS) team for consideration in development of an architecture approach and investment strategy to support NASA future mission, programs and budget requests. In addition, it will be an excellent reference for NASA's strategic planning. A more detailed set of roadmaps at the technology and sub-capability levels are available on CD. These detailed products include key driving assumptions, capability maturation assessments, and technology and capability development roadmaps

    A study of space station needs, attributes, and architectural options, volume 2, technical. Book 2: Mission implementation concepts

    Get PDF
    Space station systems characteristics and architecture are described. A manned space station operational analysis is performed to determine crew size, crew task complexity and time tables, and crew equipment to support the definition of systems and subsystems concepts. This analysis is used to select and evaluate the architectural options for development

    Design Development Test and Evaluation (DDT and E) Considerations for Safe and Reliable Human Rated Spacecraft Systems

    Get PDF
    A team directed by the NASA Engineering and Safety Center (NESC) collected methodologies for how best to develop safe and reliable human rated systems and how to identify the drivers that provide the basis for assessing safety and reliability. The team also identified techniques, methodologies, and best practices to assure that NASA can develop safe and reliable human rated systems. The results are drawn from a wide variety of resources, from experts involved with the space program since its inception to the best-practices espoused in contemporary engineering doctrine. This report focuses on safety and reliability considerations and does not duplicate or update any existing references. Neither does it intend to replace existing standards and policy

    Science-based restoration monitoring of coastal habitats, Volume Two: Tools for monitoring coastal habitats

    Get PDF
    Healthy coastal habitats are not only important ecologically; they also support healthy coastal communities and improve the quality of people’s lives. Despite their many benefits and values, coastal habitats have been systematically modified, degraded, and destroyed throughout the United States and its protectorates beginning with European colonization in the 1600’s (Dahl 1990). As a result, many coastal habitats around the United States are in desperate need of restoration. The monitoring of restoration projects, the focus of this document, is necessary to ensure that restoration efforts are successful, to further the science, and to increase the efficiency of future restoration efforts
    • 

    corecore