12 research outputs found

    A Decentralized Session Management Framework for Heterogeneous Ad-Hoc and Fixed Networks

    Get PDF
    Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.The invention of the phone has radically changed the way people communicate, as it allowed persons to get in contact instantly no matter of their location. However, phone communication has been confined for decades to a fixed location, be it one's own house or a phone boot. The widespread affirmation of cellular technologies has had for fixed telephony a similar impact that the invention of the phone has had on communications years before. With mobile phones, people are enabled to talk with each other anytime and anywhere. Internet has also revolutionized the way people communicate. E-mails have soon become one of the Internet killer applications. Later on, instant messaging, popularly known as chatting, has gained huge consensus among net surfers. Only recently, the use of the Internet for voice communication is becoming mainstream, and the so called Voice over IP (VoIP) applications (Skype is probably the most famous for the masses) are becoming common use. Despite its popularity, Internet still suffers from the inherent limitations that affected early telephony: it is fixed. The usage of Internet on the move still does not constitute the easiest and most satisfactory user experience, due to capabilities and limitations of the access technology, terminals, services and applications. Efforts for mobilizing the Internet are ongoing both in the industrial and in the academic worlds, but several bricks are needed to build the wall of mobile Internet. This dissertation provides one of these bricks, describing a solution that allows the deployment of multimedia applications (chat, VoIP, gaming) in mobile environments. In other words, this dissertation gives solutions for facilitating ubiquitous Internet-based communication, anytime and anywhere. The vision that we want to become true is that Internet must become mobile in the same way as fixed telephony has become mobile thanks to the cellular technology. More than this, we do not want that users are limited by the presence of an infrastructure to communicate with each other. In order to achieve this, we present solutions to deploy Internet-based services and applications in environments where no support from servers is available. In other words, we enable direct device-to-device, user-to-user Internet communication. Our contribution is mainly focused on the steps needed to establish the communication, the so called session establishment or signaling phase. We have validated our signaling framework by building a chat application that utilizes its features and works in server-less environments. The custom server-less solution does not prohibit to connect at the same time with the Internet, so that one can engage in a chess game using direct communication with a person in the proximity while having a chat in progress with a friend using standard Internet services. The challenge that we had to face is that Internet services and applications are usually built implying support from a centralized server. In order to deploy direct user-to-user Internet services, while maintaining interoperability with mainstream services, we had to enhance native Internet services to work without infrastructure support, without sacrificing interoperability with standard Internet applications. To conclude, we have placed our brick on the still yet to be completed wall of mobile Internet. Our hope is that one day, thanks also to this brick, everybody will be able to enjoy Internet-based applications as easily as now it is possible to use mobile telephony services

    Smart PIN: performance and cost-oriented context-aware personal information network

    Get PDF
    The next generation of networks will involve interconnection of heterogeneous individual networks such as WPAN, WLAN, WMAN and Cellular network, adopting the IP as common infrastructural protocol and providing virtually always-connected network. Furthermore, there are many devices which enable easy acquisition and storage of information as pictures, movies, emails, etc. Therefore, the information overload and divergent content’s characteristics make it difficult for users to handle their data in manual way. Consequently, there is a need for personalised automatic services which would enable data exchange across heterogeneous network and devices. To support these personalised services, user centric approaches for data delivery across the heterogeneous network are also required. In this context, this thesis proposes Smart PIN - a novel performance and cost-oriented context-aware Personal Information Network. Smart PIN's architecture is detailed including its network, service and management components. Within the service component, two novel schemes for efficient delivery of context and content data are proposed: Multimedia Data Replication Scheme (MDRS) and Quality-oriented Algorithm for Multiple-source Multimedia Delivery (QAMMD). MDRS supports efficient data accessibility among distributed devices using data replication which is based on a utility function and a minimum data set. QAMMD employs a buffer underflow avoidance scheme for streaming, which achieves high multimedia quality without content adaptation to network conditions. Simulation models for MDRS and QAMMD were built which are based on various heterogeneous network scenarios. Additionally a multiple-source streaming based on QAMMS was implemented as a prototype and tested in an emulated network environment. Comparative tests show that MDRS and QAMMD perform significantly better than other approaches

    one6G white paper, 6G technology overview:Second Edition, November 2022

    Get PDF
    6G is supposed to address the demands for consumption of mobile networking services in 2030 and beyond. These are characterized by a variety of diverse, often conflicting requirements, from technical ones such as extremely high data rates, unprecedented scale of communicating devices, high coverage, low communicating latency, flexibility of extension, etc., to non-technical ones such as enabling sustainable growth of the society as a whole, e.g., through energy efficiency of deployed networks. On the one hand, 6G is expected to fulfil all these individual requirements, extending thus the limits set by the previous generations of mobile networks (e.g., ten times lower latencies, or hundred times higher data rates than in 5G). On the other hand, 6G should also enable use cases characterized by combinations of these requirements never seen before, e.g., both extremely high data rates and extremely low communication latency). In this white paper, we give an overview of the key enabling technologies that constitute the pillars for the evolution towards 6G. They include: terahertz frequencies (Section 1), 6G radio access (Section 2), next generation MIMO (Section 3), integrated sensing and communication (Section 4), distributed and federated artificial intelligence (Section 5), intelligent user plane (Section 6) and flexible programmable infrastructures (Section 7). For each enabling technology, we first give the background on how and why the technology is relevant to 6G, backed up by a number of relevant use cases. After that, we describe the technology in detail, outline the key problems and difficulties, and give a comprehensive overview of the state of the art in that technology. 6G is, however, not limited to these seven technologies. They merely present our current understanding of the technological environment in which 6G is being born. Future versions of this white paper may include other relevant technologies too, as well as discuss how these technologies can be glued together in a coherent system

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Third-Party Handshake Protocol for Efficient Peer Discovery and Route Optimization in IEEE 802.15.3 WPANs

    No full text
    Abstract Designed for high data rate wireless personal area networks, the IEEE 802.15.3 medium access control (MAC) protocol fits well with emerging technologies like ultra-wideband. Peer discovery is essential in 802.15.3 piconets in which devices (DEVs) exchange MAC frames in a peer-to-peer manner. If two peer DEVs are unreachable, the standard peer discovery method will fail after unproductive backoff retransmissions, and a costly network layer routing is required. For DEVs uniformly distributed over the maximum coverage area of a piconet, such failures occur in up to 41.3 % of intra-piconet peer discoveries. In this paper, we propose a novel third-party handshake protocol (3PHP) that provides more reliable and prompt peer discovery than the standard method. Especially, between directly unreachable DEVs within the same piconet, 3PHP replaces network layer routing by an efficient MAC layer forwarding that utilizes the available self-learning rate information to establish optimal routes. The mean peer discovery time for 3PHP is 100 2s lower than the standard method between directly reachable DEVs. More significantly, between directly unreachable DEVs within the same piconet, 3PHP has a much lower failure probability, and is up to 10 times faster than the standard method in establishing a peer-to-peer connection as the latter fails and network layer routing is invoked. Paper accepted for publication in ACM/Kluwers MONET. Thi
    corecore