13,032 research outputs found
Modeling the Internet of Things: a simulation perspective
This paper deals with the problem of properly simulating the Internet of
Things (IoT). Simulating an IoT allows evaluating strategies that can be
employed to deploy smart services over different kinds of territories. However,
the heterogeneity of scenarios seriously complicates this task. This imposes
the use of sophisticated modeling and simulation techniques. We discuss novel
approaches for the provision of scalable simulation scenarios, that enable the
real-time execution of massively populated IoT environments. Attention is given
to novel hybrid and multi-level simulation techniques that, when combined with
agent-based, adaptive Parallel and Distributed Simulation (PADS) approaches,
can provide means to perform highly detailed simulations on demand. To support
this claim, we detail a use case concerned with the simulation of vehicular
transportation systems.Comment: Proceedings of the IEEE 2017 International Conference on High
Performance Computing and Simulation (HPCS 2017
Cooperative Symbol-Based Signaling for Networks with Multiple Relays
Wireless channels suffer from severe inherent impairments and hence
reliable and high data rate wireless transmission is particularly challenging to
achieve. Fortunately, using multiple antennae improves performance in wireless
transmission by providing space diversity, spatial multiplexing, and power gains.
However, in wireless ad-hoc networks multiple antennae may not be acceptable
due to limitations in size, cost, and hardware complexity. As a result, cooperative
relaying strategies have attracted considerable attention because of their abilities
to take advantage of multi-antenna by using multiple single-antenna relays.
This study is to explore cooperative signaling for different relay networks,
such as multi-hop relay networks formed by multiple single-antenna relays and
multi-stage relay networks formed by multiple relaying stages with each stage
holding several single-antenna relays. The main contribution of this study is the
development of a new relaying scheme for networks using symbol-level
modulation, such as binary phase shift keying (BPSK) and quadrature phase shift
keying (QPSK). We also analyze effects of this newly developed scheme when it
is used with space-time coding in a multi-stage relay network. Simulation results
demonstrate that the new scheme outperforms previously proposed schemes:
amplify-and-forward (AF) scheme and decode-and-forward (DF) scheme
On the Dynamics of Human Proximity for Data Diffusion in Ad-Hoc Networks
We report on a data-driven investigation aimed at understanding the dynamics
of message spreading in a real-world dynamical network of human proximity. We
use data collected by means of a proximity-sensing network of wearable sensors
that we deployed at three different social gatherings, simultaneously involving
several hundred individuals. We simulate a message spreading process over the
recorded proximity network, focusing on both the topological and the temporal
properties. We show that by using an appropriate technique to deal with the
temporal heterogeneity of proximity events, a universal statistical pattern
emerges for the delivery times of messages, robust across all the data sets.
Our results are useful to set constraints for generic processes of data
dissemination, as well as to validate established models of human mobility and
proximity that are frequently used to simulate realistic behaviors.Comment: A. Panisson et al., On the dynamics of human proximity for data
diffusion in ad-hoc networks, Ad Hoc Netw. (2011
Node Density Estimation in VANETs Using Received Signal Power
Accurately estimating node density in Vehicular Ad hoc Networks, VANETs, is a challenging and crucial task. Various approaches exist, yet none takes advantage of physical layer parameters in a distributed fashion. This paper describes a framework that allows individual nodes to estimate the node density of their surrounding network independent of beacon messages and other infrastructure-based information. The proposal relies on three factors: 1) a discrete event simulator to estimate the average number of nodes transmitting simultaneously; 2) a realistic channel model for VANETs environment; and 3) a node density estimation technique. This work provides every vehicle on the road with two equations indicating the relation between 1) received signal strength versus simultaneously transmitting nodes, and 2) simultaneously transmitting nodes versus node density. Access to these equations enables individual nodes to estimate their real-time surrounding node density. The system is designed to work for the most complicated scenarios where nodes have no information about the topology of the network and, accordingly, the results indicate that the system is reasonably reliable and accurate. The outcome of this work has various applications and can be used for any protocol that is affected by node density
MAC Centered Cooperation - Synergistic Design of Network Coding, Multi-Packet Reception, and Improved Fairness to Increase Network Throughput
We design a cross-layer approach to aid in develop- ing a cooperative
solution using multi-packet reception (MPR), network coding (NC), and medium
access (MAC). We construct a model for the behavior of the IEEE 802.11 MAC
protocol and apply it to key small canonical topology components and their
larger counterparts. The results obtained from this model match the available
experimental results with fidelity. Using this model, we show that fairness
allocation by the IEEE 802.11 MAC can significantly impede performance; hence,
we devise a new MAC that not only substantially improves throughput, but
provides fairness to flows of information rather than to nodes. We show that
cooperation between NC, MPR, and our new MAC achieves super-additive gains of
up to 6.3 times that of routing with the standard IEEE 802.11 MAC. Furthermore,
we extend the model to analyze our MAC's asymptotic and throughput behaviors as
the number of nodes increases or the MPR capability is limited to only a single
node. Finally, we show that although network performance is reduced under
substantial asymmetry or limited implementation of MPR to a central node, there
are some important practical cases, even under these conditions, where MPR, NC,
and their combination provide significant gains
Network emulation focusing on QoS-Oriented satellite communication
This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication
Opportunistic Relaying in Wireless Networks
Relay networks having source-to-destination pairs and half-duplex
relays, all operating in the same frequency band in the presence of block
fading, are analyzed. This setup has attracted significant attention and
several relaying protocols have been reported in the literature. However, most
of the proposed solutions require either centrally coordinated scheduling or
detailed channel state information (CSI) at the transmitter side. Here, an
opportunistic relaying scheme is proposed, which alleviates these limitations.
The scheme entails a two-hop communication protocol, in which sources
communicate with destinations only through half-duplex relays. The key idea is
to schedule at each hop only a subset of nodes that can benefit from
\emph{multiuser diversity}. To select the source and destination nodes for each
hop, it requires only CSI at receivers (relays for the first hop, and
destination nodes for the second hop) and an integer-value CSI feedback to the
transmitters. For the case when is large and is fixed, it is shown that
the proposed scheme achieves a system throughput of bits/s/Hz. In
contrast, the information-theoretic upper bound of bits/s/Hz
is achievable only with more demanding CSI assumptions and cooperation between
the relays. Furthermore, it is shown that, under the condition that the product
of block duration and system bandwidth scales faster than , the
achievable throughput of the proposed scheme scales as .
Notably, this is proven to be the optimal throughput scaling even if
centralized scheduling is allowed, thus proving the optimality of the proposed
scheme in the scaling law sense.Comment: 17 pages, 8 figures, To appear in IEEE Transactions on Information
Theor
Formal analysis techniques for gossiping protocols
We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner. We present properties of interest for gossiping protocols and discuss how various formal evaluation techniques can be employed to predict them
- …