938 research outputs found

    Improving latency in Crankshaft - An energy-aware MAC protocol for Wireless Sensor Networks

    Get PDF
    Due to the dramatic growth in the use of Wireless Sensor Network (WSN) applications - ranging from environment and habitat monitoring to tracking and surveillance, network research in WSN protocols has been very active in the last decade. With battery-powered sensors operating in unattended environments, energy conservation becomes the key technique for improving WSN lifetimes. WSN Medium Access Control (MAC) protocols address energy awareness and reduced duty cycles since the radio is the component that consumes most of the energy. This thesis investigates the performance of two recently published energy-aware MAC protocols, Crankshaft and SCP-MAC. Crankshaft has been shown to be one of the best protocols in terms of energy consumption in dense WSNs while SCP-MAC has a dedicated low duty cycle and low average latencies. The focus of this investigation is to discover techniques for reducing the latency of Crankshaft. Using OMNeT++, an open source and component-based simulation framework, this study investigates possible modifications to Crankshaft to improve its latency. The potential improvements considered include modifications to Crankshaft’s retransmission contention scheme (Sift), adjustments to its inherent settings, and investigating the impact of ACKs. Since OMNeT++ readily provided only a variant of SCP-MAC identified as SCP-MAC*, the simulations results presented involve comparing variants of both protocols (Crankshaft and SCP-MAC*). The performance of these protocols is also analyzed using distinct sensor node communication patterns. It was determined that Crankshaft’s latency depends on its ACK/Retransmission settings. Specifically, Crankshaft has the best latency with No ACKs, without much loss in energy consumption. But the latency can also be improved when ACKs are enabled by reducing the number of retries. Furthermore, the latency and delivery ratio are also directly governed by the WSN traffic pattern and the congestion in the network, as there was a noticeable improvement for both parameters in one-hop traffic, compared to multi-hop convergecast traffic to the sink. Finally, it was observed that Crankshaft’s broadcast performance in flooding traffic can be improved by increasing the number of broadcast slots used, though this is detrimental to its performance in unicast traffic

    Power saving MAC protocols in wireless sensor networks: a survey

    Get PDF
    In a wireless sensor network, energy is almost always the greatest limitation. Energy sources are restricted in many of the environments where nodes are deployed, limiting them to the use of batteries for power. Therefore, conserving energy is supremely important, however, such a task poses many challenges to hardware and protocol design. One of the greatest problems faced is reducing the energy consumption of the communications systems, which represents a substantial amount of the total consumption. This paper surveys the most recent schemes designed to reduce the communications module energy consumption with a focus on novel MAC protocols for ad-hoc wireless sensor networks. It initially describes the many challenges involved, then it analyses each protocol individually. Finally, the presented protocols are compared and the issues that remain open are raised for further research.info:eu-repo/semantics/publishedVersio

    Power saving MAC protocols in wireless sensor networks: a survey

    Get PDF
    In a wireless sensor network, energy is almost always the greatest limitation. Energy sources are restricted in many of the environments where nodes are deployed, limiting them to the use of batteries for power. Therefore, conserving energy is supremely important, however, such a task poses many challenges to hardware and protocol design. One of the greatest problems faced is reducing the energy consumption of the communications systems, which represents a substantial amount of the total consumption. This paper surveys the most recent schemes designed to reduce the communications module energy consumption with a focus on novel MAC protocols for ad-hoc wireless sensor networks. It initially describes the many challenges involved, then it analyses each protocol individually. Finally, the presented protocols are compared and the issues that remain open are raised for further research

    Modeling, Analysis and Impact of a Long Transitory Phase in Random Access Protocols

    Get PDF
    In random access protocols, the service rate depends on the number of stations with a packet buffered for transmission. We demonstrate via numerical analysis that this state-dependent rate along with the consideration of Poisson traffic and infinite (or large enough to be considered infinite) buffer size may cause a high-throughput and extremely long (in the order of hours) transitory phase when traffic arrivals are right above the stability limit. We also perform an experimental evaluation to provide further insight into the characterisation of this transitory phase of the network by analysing statistical properties of its duration. The identification of the presence as well as the characterisation of this behaviour is crucial to avoid misprediction, which has a significant potential impact on network performance and optimisation. Furthermore, we discuss practical implications of this finding and propose a distributed and low-complexity mechanism to keep the network operating in the high-throughput phase.Comment: 13 pages, 10 figures, Submitted to IEEE/ACM Transactions on Networkin

    An Empirical Study of Speculative Concurrency in Ethereum Smart Contracts

    Get PDF
    We use historical data to estimate the potential benefit of speculative techniques for executing Ethereum smart contracts in parallel. We replay transaction traces of sampled blocks from the Ethereum blockchain over time, using a simple speculative execution engine. In this engine, miners attempt to execute all transactions in a block in parallel, rolling back those that cause data conflicts. Aborted transactions are then executed sequentially. Validators execute the same schedule as miners. We find that our speculative technique yields estimated speed-ups starting at about 8-fold in 2016, declining to about 2-fold at the end of 2017, where speed-up is measured using either gas costs or instruction counts. We also observe that a small set of contracts are responsible for many data conflicts resulting from speculative concurrent execution

    User behavior impact on IPTV platform performance

    Get PDF
    Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2010As plataformas de IPTV têm sido introduzidas pelos prestadores de serviços de rede e de telecomunicações como forma de competir com os operadores de cabo e satélite, impulsionando a receita por utilizador e simultaneamente reduzindo, na medida do possível, os custos associados à exploração de infra-estrutura legada. Através da análise de métricas de desempenho relativas ao funcionamento interno de um sistema complexo procuramos revelar padrões e ocorrências isoladas que possam indicar a existência de problemas de desempenho. Usando esta informação, analisámos também as características da actividade dos utilizadores. A hipótese subjacente é que deve ser possível correlacionar o desempenho de um sistema ou sub-sistema tendo por base o comportamento dos utilizadores, mesmo que estes não interajam directamente com o referido sub-sistema. Adicionalmente, esta correlação deve seguir regras que possam ser usadas, por exemplo, para redefinir a arquitectura do sistema ou detectar anomalias proactivamente. Neste projecto analisámos métricas de desempenho dos Servidores de Distribuição e dos Servidores de VOD. De seguida estudámos os Registos de Actividade das STB de forma a caracterizar as acções dos utilizadores que têm maior influência no desempenho da plataforma de IPTV. Demonstrámos que estas análises em domínios distintos (utilizadores/STB e servidores internos) pode convergir e possibilitar a activação de alarmes quando a probabilidade de ocorrência de problemas de desempenho é elevada.IPTV platforms are being introduced by many network operators in order to compete with cable and satellite operators, increasing the average revenue per user, while taking advantage and reducing as much as possible the losses associated with legacy infra-structure. By analyzing performance metrics regarding the inner works of complex systems we aimed at unveiling patterns and identifying outlier occurrences that indicate actual or potential problems. Using such information we analyzed user activity information seeking to match the identified outlier patterns with characteristic user activity. The broader underlying hypothesis is that it is possible to correlate a system, or system’s performance problem based on the behavior of the end users even if they do not interact with it. Furthermore, we assume that this correlation follow rules which could thereafter be used for architecture redesign and proactive anomaly detection. In this project, we examined performance metrics of the Distribution Servers and VOD Servers. We then used STB activity logs to characterize the user actions with greater influence on the IPTV platform. We showed that these analyzes of multiple domains (user/STB and internal servers) can be merged enabling to raise alerts whenever there is high probability of occurring efficiency problems in the system

    Chip-off Success Rate Analysis Comparing Temperature and Chip Type

    Get PDF
    Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists between the removal temperatures of flash memory chips successfully and unsuccessfully read by using a t-test, F-test and an analysis of variance (ANOVA). The results from the statistical evaluation showed no statistical difference between the groups of memory chips successfully and unsuccessfully read, as well as, between older and newer types of Ball Grid Array (BGA) memory chips
    • …
    corecore