142 research outputs found

    Congestion Control in Vehicular Ad Hoc Networks

    Get PDF
    The equipment of vehicles with wireless communication devices in order to improve road safety is a major component of a future intelligent transportation system. The success and availability of IEEE 802.11-based products make this technology the main competitor for the Medium Access Control (MAC) layer used in vehicle-to-vehicle communication. The IEEE 802.11p amendment has been specially designed in this special context of wireless access in vehicular environments. However, as all the other approaches based on Carrier Sense Multiple Access (CSMA), this protocol presents scalability problems, which leads to poor performance in high density scenarios, quite frequent in the case of a vehicular ad hoc network (VANET). This thesis studies the congestion control problem in the context of safety vehicular communications, with a special focus on the back-off mechanism and the carrier sense function. First of all, a number of important characteristics presented by the safety messages are discovered and understood by the means of an analytical framework. Second, the lessons learned from the analytical study are put into practice with the design of two adaptive mechanisms (one for the contention window and the other one for the carrier sense threshold) that take into account the local vehicular density. These mechanisms remain simple, but highly efficient, while also being straightforward to integrate in IEEE 802.11 devices. Finally, by taking into account the most important properties of a safety VANET, a new CSMA-based MAC protocol is proposed. This new access method, named Safety Range CSMA (SR-CSMA), relies on the idea that collisions can not be avoided in a high density network. However, by increasing the number of simultaneous transmissions between geographically distant nodes, SR-CSMA manages to better protect the immediate neighborhood, the most important area for safety applications

    ContrĂ´le de Congestion dans les RĂ©seaux VĂ©hiculaires

    Get PDF
    Cette thèse analyse la possibilité d'utiliser des communications sans fil inter-véhiculaires pour améliorer la sécurité routière. Les performances du nouveau réseau ainsi créé (réseau ad-hoc véhiculaire) sont étudiées analytiquement et par des simulations dans un environnement réaliste. La thèse se concentre surtout sur des scénarios avec une forte densité de véhicules. Dans ce cas, l'accès au support devient un problème essentiel, en principal pour les applications de sécurité routière qui nécessitent une qualité de service élevée pour fonctionner dans un tel contexte. Ce travail montre que la version actuelle du standard IEEE 802.11, proposé comme méthode d'accès dans les réseaux véhiculaires, ne peut pas résoudre ce problème de passage à l'échelle pour supporter correctement les applications de sécurité routière. Plusieurs améliorations possibles sont analysées, liées à l'utilisation optimale de certains paramètres du protocole comme la taille de la fenêtre de contention ou bien le seuil de détection de la porteuse. Des nouveaux mécanismes adaptatifs visant ces paramètres sont proposés et les améliorations ainsi obtenues sont non-négligeables. Finalement, une nouvelle méthode d'accès est définie, en tenant compte des caractéristiques des applications de sécurité routière. Toujours basée sur des techniques CSMA, cette technique donne des résultats largement supérieurs à la version standard actuelle. ABSTRACT : The equipment of vehicles with wireless communication devices in order to improve road safety is a major component of a future intelligent transportation system. The success and availability of IEEE 802.11-based products make this technology the main competitor for the Medium Access Control (MAC) layer used in vehicle-to-vehicle communication. The IEEE 802.11p amendment has been specially designed in this special context of wireless access in vehicular environments. However, as all the other approaches based on Carrier Sense Multiple Access (CSMA), this protocol presents scalability problems, which leads to poor performance in high density scenarios, quite frequent in the case of a vehicular ad hoc network (VANET). This thesis studies the congestion control problem in the context of safety vehicular communications, with a special focus on the back-off mechanism and the carrier sense function. First of all, a number of important characteristics presented by the safety messages are discovered and understood by the means of an analytical framework. Second, the lessons learned from the analytical study are put into practice with the design of two adaptive mechanisms (one for the contention window and the other one for the carrier sense threshold) that take into account the local vehicular density. These mechanisms remain simple, but highly efficient, while also being straightforward to integrate in IEEE 802.11 devices. Finally, by taking into account the most important properties of a safety VANET, a new CSMA-based MAC protocol is proposed. This new access method, named Safety Range CSMA (SR-CSMA), relies on the idea that collisions can not be avoided in a high density network. However, by increasing the number of simultaneous transmissions between geographically distant nodes, SR-CSMA manages to better protect the immediate neighborhood, the most important area for safety applications

    LTE User Association for Self-Deployable Networks in Disaster Management Scenarios

    Get PDF
    International audienceIn a disaster scenario, both victims and first respon-ders need an access to a communication network for applications with different quality of service requirements (e.g. short delay, high throughput). As LTE compatible devices are very common nowadays, LTE shows a lot of advantages to be used as a disaster management network. However, its already deployed infrastructure may be damaged or unusable following the said disaster. In this scenario, self-deployable networks shine as they are quickly deployable and can cover areas inaccessible to humans. In this paper, we present self-deployable networks and show what the 3GPP LTE standard provides to them. We focus on the legacy best-SINR based mobile association between user equipment and base stations. Then, we show that such association is agnostic of the quality of service requirements and therefore not suitable to support efficiently the dedicated applications used in disaster management. We then propose several points of improvement in this association scheme that take specific disaster management constraints into account

    Performance Evaluation of Channel Access Methods for Dedicated IoT Networks

    Get PDF
    International audienceNetworking technologies dedicated for the Internet of Things are different from the classical mobile networks in terms of architecture and applications. This new type of network is facing several challenges to satisfy specific user requirements. Sharing the communication medium between (hundreds of)thousands of connected nodes and one base station is one of these main requirements, hence the necessity to imagine new solutions, or to adapt existing ones, for medium access control. In this paper, we start by comparing two classical medium access control protocols, CSMA/CA and Aloha, in the context of Internet of Things dedicated networks. We continue by evaluating a specific adaptation of Aloha, already used in low-power wide areanetworks, where no acknowledgement messages are transmitted in the network. Finally, we apply the same concept to CSMA/CA, showing that this can bring a number of benefits. The results we obtain after a thorough simulation study show that the choice of the best protocol depends on many parameters (number of connected objects, traffic arrival rate, allowed retransmissionnumber), as well as on the metric of interest (e.g. packet reception probability or energy consumption)

    CCA Threshold Impact on the MAC Layer Performance in IoT Networks

    Get PDF
    International audienceWhile current medium access control solutions in low-power wide area networks are generally based on Aloha, recent studies demonstrated the interest of adding carrier sense mechanisms to the picture. In this paper, we investigate the impact of the carrier sense threshold parameter in this particular context. We show that its impact on the average behavior of the network is limited, but this changes when looking at the individual node performance. Our simulation results demonstrate an important heterogeneity among nodes, both in terms of packet success probability and of energy consumption. Moreover, the performance of the nodes is strongly correlated with the percentage of contending nodes that they can sense. By simply using two different carrier sense thresholds in the network, we achieve an increased fairness among nodes

    GLOVE: towards privacy-preserving publishing of record-level-truthful mobile phone trajectories

    Get PDF
    Datasets of mobile phone trajectories collected by network operators offer an unprecedented opportunity to discover new knowledge from the activity of large populations of millions. However, publishing such trajectories also raises significant privacy concerns, as they contain personal data in the form of individual movement patterns. Privacy risks induce network operators to enforce restrictive confidential agreements in the rare occasions when they grant access to collected trajectories, whereas a less involved circulation of these data would fuel research and enable reproducibility in many disciplines. In this work, we contribute a building block toward the design of privacy-preserving datasets of mobile phone trajectories that are truthful at the record level. We present GLOVE, an algorithm that implements k-anonymity, hence solving the crucial unicity problem that affects this type of data while ensuring that the anonymized trajectories correspond to real-life users. GLOVE builds on original insights about the root causes behind the undesirable unicity of mobile phone trajectories, and leverages generalization and suppression to remove them. Proof-of-concept validations with large-scale real-world datasets demonstrate that the approach adopted by GLOVE allows preserving a substantial level of accuracy in the data, higher than that granted by previous methodologies.This work was supported by the AtracciĂłn de Talento Investigador program of the Comunidad de Madrid under Grant No. 2019-T1/TIC-16037 NetSense

    Towards Energy Efficiency in RAN Network Slicing

    Full text link
    Network slicing is one of the major catalysts to turn future telecommunication networks into versatile service platforms. Along with its benefits, network slicing is introducing new challenges in the development of sustainable network operations. In fact, guaranteeing slices requirements comes at the cost of additional energy consumption, in comparison to non-sliced networks. Yet, one of the main goals of operators is to offer the diverse 5G and beyond services, while ensuring energy efficiency. To this end, we study the problem of slice activation/deactivation, with the objective of minimizing energy consumption and maximizing the users quality of service (QoS). To solve the problem, we rely on two Multi-Armed Bandit (MAB) agents to derive decisions at individual base stations. Our evaluations are conducted using a real-world traffic dataset collected over an operational network in a medium size French city. Numerical results reveal that our proposed solutions provide approximately 11-14\% energy efficiency improvement compared to a configuration where all the slice instances are active, while maintaining the same level of QoS. Moreover, our work explicitly shows the impact of prioritizing the energy over QoS, and vice versa

    Safety Information Dissemination in Vehicular Networks using Facilities Layer Mechanisms

    Get PDF
    International audienceVehicle ad-hoc networks are considered as an essential building block of future intelligent transportation systems. One of the major roles of vehicular communication is the dissemination of information on the road in order to increase the awareness of the drivers and improve road safety. The facilities layer is a recently standardized component in the vehicular communication architecture, with an important role to play in the process of information dissemination. In this paper, we propose facilities layer-based mechanisms for information propagation and we show they outperform classical network layer solutions. We also demonstrate that previous studies that do not consider the cohabitation of different types of safety messages on the vehicular control channel highly under-estimate the dissemination delay, which can lead to unrealistic assumptions in the design of safety applications

    LTE User Association for Self-Deployable Networks in Disaster Management Scenarios

    Get PDF
    International audienceIn a disaster scenario, both victims and first respon-ders need an access to a communication network for applications with different quality of service requirements (e.g. short delay, high throughput). As LTE compatible devices are very common nowadays, LTE shows a lot of advantages to be used as a disaster management network. However, its already deployed infrastructure may be damaged or unusable following the said disaster. In this scenario, self-deployable networks shine as they are quickly deployable and can cover areas inaccessible to humans. In this paper, we present self-deployable networks and show what the 3GPP LTE standard provides to them. We focus on the legacy best-SINR based mobile association between user equipment and base stations. Then, we show that such association is agnostic of the quality of service requirements and therefore not suitable to support efficiently the dedicated applications used in disaster management. We then propose several points of improvement in this association scheme that take specific disaster management constraints into account

    Joint Spatial and Temporal Classification of Mobile Traffic Demands

    Get PDF
    International audienceMobile traffic data collected by network operators is a rich source of information about human habits, and its analysis provides insights relevant to many fields, including urbanism, transportation, sociology and networking. In this paper, we present an original approach to infer both spatial and temporal structures hidden in the mobile demand, via a first-time tailoring of Exploratory Factor Analysis (EFA) techniques to the context of mobile traffic datasets. Casting our approach to the time or space dimensions of such datasets allows solving different problems in mobile traffic analysis, i.e., network activity profiling and land use detection, respectively. Tests with real-world mobile traffic datasets show that, in both its variants above, the proposed approach (i) yields results whose quality matches or exceeds that of state-of-the-art solutions, and (ii) provides additional joint spatiotemporal knowledge that is critical to result interpretation
    • …
    corecore