48 research outputs found

    The effect of group mobility on the efficacy of routing in next generation mobile networks

    Get PDF
    © 2016 IEEE.A key challenge in next generation mobile networks is ensuring effective routing that efficiently adapts to the special characteristics of the various mobility schemes. The purpose of this paper is to study and illustrate how group mobility affects the network performance of a wireless ad hoc network depending on the type of movement, in a space with or without obstacles. In the scope of this paper, we created a simulator of a MANET that uses AODV routing protocol, while the entities of the network move according to the chosen group mobility model. Despite the fact that the routing protocol supports mobility in general, the results greatly vary depending on the specific mobility scenario. The strong connection between mobility properties and network performance is revealed

    Connectivity and coverage in machine-type communications

    Get PDF
    Machine-type communication (MTC) provides a potential playground for deploying machine-to-machine (M2M), IP-enabled 'things' and wireless sensor networks (WSNs) that support modern, added-value services and applications. 4G/5G technology can facilitate the connectivity and the coverage of the MTC entities and elements by providing M2M-enabled gateways and base stations for carrying traffic streams to/from the backbone network. For example, the latest releases of long-term evolution (LTE) such as LTE-Advanced (LTE-A) are being transformed to support the migration of M2M devices. MTC-oriented technical definitions and requirements are defined to support the emerging M2M proliferation. ETSI describes three types of MTC access methods, namely a) the direct access, b) the gateway access and c) the coordinator access. This work is focused on studying coverage aspects when a gateway access takes place. A deployment planar field is considered where a number of M2M devices are randomly deployed, e.g., a hospital where body sensor networks form a M2M infrastructure. An analytical framework is devised that computes the average number of connected M2M devices when a M2C gateway is randomly placed for supporting connectivity access to the M2M devices. The introduced analytical framework is verified by simulation and numerical results

    Connectivity and coverage in machine-type communications

    Get PDF
    Machine-type communication (MTC) provides a potential playground for deploying machine-to-machine (M2M), IP-enabled 'things' and wireless sensor networks (WSNs) that support modern, added-value services and applications. 4G/5G technology can facilitate the connectivity and the coverage of the MTC entities and elements by providing M2M-enabled gateways and base stations for carrying traffic streams to/from the backbone network. For example, the latest releases of long-term evolution (LTE) such as LTE-Advanced (LTE-A) are being transformed to support the migration of M2M devices. MTC-oriented technical definitions and requirements are defined to support the emerging M2M proliferation. ETSI describes three types of MTC access methods, namely a) the direct access, b) the gateway access and c) the coordinator access. This work is focused on studying coverage aspects when a gateway access takes place. A deployment planar field is considered where a number of M2M devices are randomly deployed, e.g., a hospital where body sensor networks form a M2M infrastructure. An analytical framework is devised that computes the average number of connected M2M devices when a M2C gateway is randomly placed for supporting connectivity access to the M2M devices. The introduced analytical framework is verified by simulation and numerical results

    Multi-Stage Resource Allocation in Hybrid 25G-EPON and LTE-Advanced Pro FiWi Networks for 5G Systems

    Get PDF
    The 5G vision is not restricted solely to the wireless domain and its challenging requirements cannot be fulfilled with- out the efficient integration of cutting-edge technologies in all portions of the telecommunications infrastructure. The promoted architectures for next generation telecommunications systems involve high capacity network domains, which operate flexibly and seamlessly to offer full Quality of Experience to all types of subscribers. The proliferation of highly demanding multimedia services and the advanced features of modern communication devices necessitate the development of end-to-end schemes which can efficiently distribute large amount of network resources anywhere and whenever needed. The paper introduces a new resource allocation scheme for cutting-edge Fiber-Wireless networks is introduced that can be applied in the fronthaul portion of 5G-enabled architectures. The adopted technologies are the forthcoming 25G-EPON for the optical domain and the 5G-ready LTE-Advanced Pro for the wireless domain. The proposed scheme performs allocation decisions based on the outcome of an adjustable multi- stage optimization problem. The optimization factors are directly related to the major considerations in bandwidth distribution, namely priority-based traffic differentiation, power awareness, and fairness provision. The conducted evaluations prove that this approach is able to ensure high efficiency in network operations

    Detection of Physical Adversarial Attacks on Traffic Signs for Autonomous Vehicles

    Get PDF
    Current vision-based detection models within Autonomous Vehicles, can be susceptible to changes within the physical environment, which cause unexpected issues. Physical attacks on traffic signs could be malicious or naturally occurring, causing incorrect identification of the traffic sign which can drastically alter the behaviour of the autonomous vehicle. We propose two novel deep learning architectures which can be used as detection and mitigation strategy for environmental attacks. The first is an autoencoder which detects anomalies within a given traffic sign, and the second is a reconstruction model which generates a clean traffic sign without any anomalies. As the anomaly detection model has been trained on normal images, any abnormalities will provide a high reconstruction error value, indicating an abnormal traffic sign. The reconstruction model is a Generative Adversarial Network (GAN) and consists of two networks; a generator and a discriminator. These map the input traffic sign image into a meta representation as the output. By using anomaly detection and reconstruction models as mitigation strategies, we show that the performance of the other models in pipelines such as traffic sign recognition models can be significantly improved. In order to evaluate our models, several types of attack circumstances were designed and on average, the anomaly detection model achieved 0.84 accuracy with a 0.82 F1-score in real datasets whereas the reconstruction model improved performance of traffic sign recognition model from average F1-score 0.41 to 0.641

    Predicting Multimedia Traffic in Wireless Networks: A Performance Evaluation of Cognitive Techniques

    Get PDF
    Traffic engineering in networking is defined as the process that incorporates sophisticated methods in order to ensure optimization and high network performance. One of the most constructive tools employed by the traffic engineering concept is the traffic prediction. Having in mind the heterogeneous traffic patterns originated by various modern services and network platforms, the need of a robust, cognitive, and error-free prediction technique becomes even more pressing. This work focuses on the prediction concept as an autonomous, functional, and efficient process, where multiple cutting-edge methods are presented, modeled, and thoroughly assessed. To this purpose, real traffic traces have been captured, including multiple multimedia traffic flows, so as to comparatively assess widely used methods in terms of accuracy

    Exploring the intra-frame energy conservation capabilities of the horizontal simple packing algorithm in IEEE 802.16e networks: an analytical approach

    Get PDF
    The power saving capabilities of the mobile devices in broadband wireless networks constitute a challenging research topic that has attracted the attention of researchers recently, while it needs to be addressed at multiple layers. This work provides a novel analysis of the intra-frame energy conservation potentials of the IEEE 802.16e network. Specifically, the power saving capabilities of the worldwide interoperability for microwave access downlink sub-frame are thoroughly studied, employing the well-known simple packing algorithm as the mapping technique of the data requests. The accurate mathematical model, cross-validated via simulation, reveals the significant ability to conserve energy in this intra-frame fashion under different scenarios. To the best of our knowledge, this is the first work providing intra-frame power-saving potentials of IEEE 802.16 networks. Additionally, this is the first study following an analytic approach

    The impact of mobility patterns on the efficiency of data forwarding in MANETs

    Get PDF
    One of the most challenging requirements in cutting-edge Mobile Ad hoc Networks is the need for adaptive and efficient routing. Networks capable of adapting their behavior based on current conditions are often characterized as self-organizing networks, which are lately considered very promising for future applications. This work examines the impact of the different mobility properties on the performance of self-organizing networks. For that purpose, a simulator was developed to model different mobility patterns and study the way they affect the effectiveness of the well-known AODV routing protocol. Particularly, this paper focuses on the effect of the different mobility schemes on network topology and consequently to the overall network performance. The results reveal the tight correlations between node mobility characteristics and network metrics

    Predicting Multimedia Traffic in Wireless Networks: A Performance Evaluation of Cognitive Techniques

    Get PDF
    Traffic engineering in networking is defined as the process that incorporates sophisticated methods in order to ensure optimization and high network performance. One of the most constructive tools employed by the traffic engineering concept is the traffic prediction. Having in mind the heterogeneous traffic patterns originated by various modern services and network platforms, the need of a robust, cognitive, and error-free prediction technique becomes even more pressing. This work focuses on the prediction concept as an autonomous, functional, and efficient process, where multiple cutting-edge methods are presented, modeled, and thoroughly assessed. To this purpose, real traffic traces have been captured, including multiple multimedia traffic flows, so as to comparatively assess widely used methods in terms of accuracy

    On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping

    Get PDF
    Worldwide Interoperability for Microwave Access (WiMAX) is generally considered as a competitive candidate networking technology for the realization of the 4G vision. Among the key factors towards its successful and widespread deployment are the effective support of mobility and the provision of mechanisms for enabling service access at a high quality level in an efficient and cost-effective manner. Nonetheless, this effort should take into account and adequately address strict and severe energy limitations that the mobile devices are currently facing. Power saving constitutes an issue of vital importance, as mobile terminals continue to incorporate more and more functionalities and energy-hungry features in order to support the ever increasing user requirements and demands. The standard employs variations of power saving classes in a frame-to-frame basis, while recent power saving mechanisms proposed in related research literature limit their activity in whole frames, neglecting, thus, the intra-frame power saving capabilities. In this work, the intra-frame energy conservation potentials of the mobile WiMAX network are studied and a novel analytical approach is provided, focusing on the downlink direction where the bandwidth allocation involves idle intervals and dynamic inactivity periods. Specifically, we endeavour to accurately analyse the potential energy conservation capabilities in an intra-frame point of view, applying the well-known simple packing algorithm to distribute the available bandwidth to the various subscribers. Our analytical findings are thoroughly cross-validated via simulation, providing clear insights into the intra-frame energy reduction capabilities
    corecore