Cristiano B. Cardoso, D. Guidoni, B. Y. L. Kimura, L. Villas
Localization and synchronization are fundamental services in Wireless Sensor Networks (WSNs). Many WSN applications often need to know the sensor position and the global time to report a given event detection with a specific location and time. However, such services are performed after the sensors deployment in the sensed field. In this case, setting up each sensor manually becomes an impractical activity, requiring some system that automatically locates and synchronizes the sensor nodes. For this purpose, we developed a joint solution to 3D localization and clock synchronization problems using a hybrid approach, which combines mobile and recursive localization. In our work, an unmanned aerial vehicle (UAV) equipped with a GPS is used to fly over the sensor field and broadcast its geographical position and timestamp. Using the messages received from the UAV, the sensor nodes are able to estimate their geographic positions and synchronize their clocks. When a node is located in time and space, it transmits its own position and timestamp to the neighbor nodes. The neighbors use the received information to locate themselves so that this iterative process is propagated throughout the network. Simulations results showed that the proposed solution presents low clock synchronization and positioning errors. In our solution, the cost of the network is also reduced because only one GPS receiver is used for the entire sensor field.
{"title":"A Hybrid Solution for 3D Location and Time Synchronization in WSN","authors":"Cristiano B. Cardoso, D. Guidoni, B. Y. L. Kimura, L. Villas","doi":"10.1145/3132062.3132071","DOIUrl":"https://doi.org/10.1145/3132062.3132071","url":null,"abstract":"Localization and synchronization are fundamental services in Wireless Sensor Networks (WSNs). Many WSN applications often need to know the sensor position and the global time to report a given event detection with a specific location and time. However, such services are performed after the sensors deployment in the sensed field. In this case, setting up each sensor manually becomes an impractical activity, requiring some system that automatically locates and synchronizes the sensor nodes. For this purpose, we developed a joint solution to 3D localization and clock synchronization problems using a hybrid approach, which combines mobile and recursive localization. In our work, an unmanned aerial vehicle (UAV) equipped with a GPS is used to fly over the sensor field and broadcast its geographical position and timestamp. Using the messages received from the UAV, the sensor nodes are able to estimate their geographic positions and synchronize their clocks. When a node is located in time and space, it transmits its own position and timestamp to the neighbor nodes. The neighbors use the received information to locate themselves so that this iterative process is propagated throughout the network. Simulations results showed that the proposed solution presents low clock synchronization and positioning errors. In our solution, the cost of the network is also reduced because only one GPS receiver is used for the entire sensor field.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Software-Defined Wireless Network (SDWN) has been considered as a feasible solution in order to make a fast deployment of new solutions and services; however, there is a performance degradation problem when SDWN is designed with the current IP address scheme requiring an extra operation cost to maintain a location management system. In order to improve mobility management in a SDWN, we realize the centralized LISP (Locator/ID Separation Protocol) management system with the following features: 1) the LISP/OpenFlow centralized control entity and 2) interoperability with standard LISP systems. It is named LISP-SDWN and it is a double separation solution based on Control/Data decomposition and Locator/ID separation. The operation cost might decrease because ID of the Mobile Node (MN) does not change during handover across heterogeneous Radio Access Networks (RANs) in a SDWN. The major contributions of our research are that there will be no modification requirement of the LISP functions during LISP deployment in a SDWN and there will be a capability for inter-networking with external LISP sites operated by other service providers. Performance evaluation of LISP-SDWN is carried out with LISP, LISP Controller, MIPv6 and HMIPv6. Result shows that the proposed LISP-SDWN is a feasible and practical solution for a SDWN provider.
{"title":"Design of the Central LISP Management System for the Software-Defined Wireless Network (SDWN)","authors":"Eunil Seo, V. Zalyubovskiy, Tai-Myung Chung","doi":"10.1145/3132062.3132063","DOIUrl":"https://doi.org/10.1145/3132062.3132063","url":null,"abstract":"The Software-Defined Wireless Network (SDWN) has been considered as a feasible solution in order to make a fast deployment of new solutions and services; however, there is a performance degradation problem when SDWN is designed with the current IP address scheme requiring an extra operation cost to maintain a location management system. In order to improve mobility management in a SDWN, we realize the centralized LISP (Locator/ID Separation Protocol) management system with the following features: 1) the LISP/OpenFlow centralized control entity and 2) interoperability with standard LISP systems. It is named LISP-SDWN and it is a double separation solution based on Control/Data decomposition and Locator/ID separation. The operation cost might decrease because ID of the Mobile Node (MN) does not change during handover across heterogeneous Radio Access Networks (RANs) in a SDWN. The major contributions of our research are that there will be no modification requirement of the LISP functions during LISP deployment in a SDWN and there will be a capability for inter-networking with external LISP sites operated by other service providers. Performance evaluation of LISP-SDWN is carried out with LISP, LISP Controller, MIPv6 and HMIPv6. Result shows that the proposed LISP-SDWN is a feasible and practical solution for a SDWN provider.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132935694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Saha, Abhishek Kannan, Geunhyung Lee, Nishant Ravichandran, Parag Kamalakar Medhe, Naved Merchant, Dimitrios Koutsonikolas
This paper explores the potential benefits and pitfalls of Multipath TCP (MPTCP) in smartphones via an extensive experimental study over real Android applications. We consider different types of applications - upload vs. download intensive, network intensive vs. interactive - and a variety of network conditions, and we study the impact of MPTCP on performance, energy consumption, and CPU utilization. Our results reveal that the benefits of MPTCP in smartphone apps are lower than expected in theory; in several cases, MPTCP in fact can hurt both performance and energy consumption. Our findings can provide insights to smartphone designers and mobile app developers towards improving user experience and extending smartphone battery life.
{"title":"Multipath TCP in Smartphones: Impact on Performance, Energy, and CPU Utilization","authors":"S. K. Saha, Abhishek Kannan, Geunhyung Lee, Nishant Ravichandran, Parag Kamalakar Medhe, Naved Merchant, Dimitrios Koutsonikolas","doi":"10.1145/3132062.3132066","DOIUrl":"https://doi.org/10.1145/3132062.3132066","url":null,"abstract":"This paper explores the potential benefits and pitfalls of Multipath TCP (MPTCP) in smartphones via an extensive experimental study over real Android applications. We consider different types of applications - upload vs. download intensive, network intensive vs. interactive - and a variety of network conditions, and we study the impact of MPTCP on performance, energy consumption, and CPU utilization. Our results reveal that the benefits of MPTCP in smartphone apps are lower than expected in theory; in several cases, MPTCP in fact can hurt both performance and energy consumption. Our findings can provide insights to smartphone designers and mobile app developers towards improving user experience and extending smartphone battery life.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121110395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Weidling, Nicole Todtenberg, T. Basmer, Mario Schölzel, M. Maaser, Matthias Taubert
This paper presents setup and results of a long-term outdoor range experiment carried out in a real environment. The objective was to explore long-range wireless communication in sub-GHz license-free radio bands, i.e., 169, 433, and 868 MHz under more realistic conditions. Not only transmission range, but also packet loss and received signal strength were evaluated. A large set of radio configurations was used to study the impact of transmission power, bit rate, and packet size. Also, the relationship between packet loss and received signal strength was investigated. A model could be developed that can help determine the expected packet loss rates as a function of the radio configurations and measured RSSI values.
{"title":"Outdoor Range Measurements in Sub-GHz License-free Radio Bands under Realistic Conditions","authors":"S. Weidling, Nicole Todtenberg, T. Basmer, Mario Schölzel, M. Maaser, Matthias Taubert","doi":"10.1145/3132062.3132080","DOIUrl":"https://doi.org/10.1145/3132062.3132080","url":null,"abstract":"This paper presents setup and results of a long-term outdoor range experiment carried out in a real environment. The objective was to explore long-range wireless communication in sub-GHz license-free radio bands, i.e., 169, 433, and 868 MHz under more realistic conditions. Not only transmission range, but also packet loss and received signal strength were evaluated. A large set of radio configurations was used to study the impact of transmission power, bit rate, and packet size. Also, the relationship between packet loss and received signal strength was investigated. A model could be developed that can help determine the expected packet loss rates as a function of the radio configurations and measured RSSI values.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134118457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youssef Lahrouni, Caroly Pereira, B. A. Bensaber, Ismaïl Biskri
VANET network is a new technology on which future intelligent transport systems are based; its purpose is to develop the vehicular environment and make it more comfortable. In addition, it provides more safety for drivers and cars on the road. Therefore, we have to make this technology as secured as possible against many threats. As VANET is a subclass of MANET, it has inherited many security problems but with a different architecture and DOS attacks are one of them. In this paper, we have focused on DOS attacks that prevent users to receive the right information at the right moment. We have analyzed DOS attacks behavior and effects on the network using different mathematical models in order to find an efficient solution.
{"title":"Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET","authors":"Youssef Lahrouni, Caroly Pereira, B. A. Bensaber, Ismaïl Biskri","doi":"10.1145/3132062.3132065","DOIUrl":"https://doi.org/10.1145/3132062.3132065","url":null,"abstract":"VANET network is a new technology on which future intelligent transport systems are based; its purpose is to develop the vehicular environment and make it more comfortable. In addition, it provides more safety for drivers and cars on the road. Therefore, we have to make this technology as secured as possible against many threats. As VANET is a subclass of MANET, it has inherited many security problems but with a different architecture and DOS attacks are one of them. In this paper, we have focused on DOS attacks that prevent users to receive the right information at the right moment. We have analyzed DOS attacks behavior and effects on the network using different mathematical models in order to find an efficient solution.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A beacon in Vehicular Ad Hoc Network (VANET) is a periodic message that contains status information of a vehicle such as id, velocity, location and other information that is needed by routing protocols and safety as well as non-safety applications. Generating beacons at high rate is desirable as it can potentially increase the freshness of the exchanged information (neighborhood awareness). However, this causes network congestion and high resources consumption. On the other hand, generating few beacons saves bandwidth and reduces congestion, but leads to outdated information. Thus, adaptive schemes that adjust the beacon transmission rates based on different situations are required. In this paper, we propose a high awareness adaptive beaconing (HAAB) scheme that is based on fuzzy logic. This scheme uses signal to interference-noise ratio (SINR), number of neighboring nodes and mobility factors as inputs to a fuzzy logic system. The scheme employs the fuzzy logic system to determine the congestion rank and uses it to adapt the beacon transmission frequency. Simulations using NS-3 have been conducted to investigate the effectiveness of our proposed protocol. HAAB is shown to have the highest neighborhood awareness compared to other protocols in both highway and urban environments.
{"title":"High Awareness Adaptive Beaconing Based on Fuzzy Logic in VANET","authors":"Mohammed Alhameed, I. Mahgoub","doi":"10.1145/3132062.3132082","DOIUrl":"https://doi.org/10.1145/3132062.3132082","url":null,"abstract":"A beacon in Vehicular Ad Hoc Network (VANET) is a periodic message that contains status information of a vehicle such as id, velocity, location and other information that is needed by routing protocols and safety as well as non-safety applications. Generating beacons at high rate is desirable as it can potentially increase the freshness of the exchanged information (neighborhood awareness). However, this causes network congestion and high resources consumption. On the other hand, generating few beacons saves bandwidth and reduces congestion, but leads to outdated information. Thus, adaptive schemes that adjust the beacon transmission rates based on different situations are required. In this paper, we propose a high awareness adaptive beaconing (HAAB) scheme that is based on fuzzy logic. This scheme uses signal to interference-noise ratio (SINR), number of neighboring nodes and mobility factors as inputs to a fuzzy logic system. The scheme employs the fuzzy logic system to determine the congestion rank and uses it to adapt the beacon transmission frequency. Simulations using NS-3 have been conducted to investigate the effectiveness of our proposed protocol. HAAB is shown to have the highest neighborhood awareness compared to other protocols in both highway and urban environments.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The state of a meeting room (or of a classroom) provides important context to the level of interest (or participation level) in a meeting. For example, in one uninteresting meeting only one presenter presents text-filled slides, while other attendees are either checking their emails or even napping. In contrast, during a very interesting talk, all attendees are excited by the presentation and are involved in the discussions with frequent hand clapping. Thus, automatically detecting the state of a meeting room (or of a classroom) is an important and interesting problem. In this paper, we make the observation that the aforementioned group behaviors will have different motion signatures, as captured by a present Wi-Fi signal. Consequently, in this paper, we present a meeting room state detection approach leveraging environmental Wi-Fi signature. The Wi-Fi signal is provided by the existing access point (AP) in the meeting room and it is captured by one any Wi-Fi enabled device. The existing infrastructure provides all the information needed and no extra devices are needed. In our solution, different features are extracted from the raw Wi-Fi Received Signal Strength Indicator (RSSI) signal and four popular machine learning algorithms (e.g. support vector machine (SVM), decision tree, nearest neighbor and naive Bayes networks) are evaluated for detecting the state of a meeting room. Our approach is evaluated for two scenarios: classroom state detection and meeting room state detection. The experimental results show an accuracy of our proposed solution of 90.7% and 94.1% for classroom state detection and meeting/lab room state detection, respectively.
{"title":"Meeting Room State Detection using Environmental Wi-Fi Signature","authors":"Jian Wu, S. Behera, R. Stoleru","doi":"10.1145/3132062.3132070","DOIUrl":"https://doi.org/10.1145/3132062.3132070","url":null,"abstract":"The state of a meeting room (or of a classroom) provides important context to the level of interest (or participation level) in a meeting. For example, in one uninteresting meeting only one presenter presents text-filled slides, while other attendees are either checking their emails or even napping. In contrast, during a very interesting talk, all attendees are excited by the presentation and are involved in the discussions with frequent hand clapping. Thus, automatically detecting the state of a meeting room (or of a classroom) is an important and interesting problem. In this paper, we make the observation that the aforementioned group behaviors will have different motion signatures, as captured by a present Wi-Fi signal. Consequently, in this paper, we present a meeting room state detection approach leveraging environmental Wi-Fi signature. The Wi-Fi signal is provided by the existing access point (AP) in the meeting room and it is captured by one any Wi-Fi enabled device. The existing infrastructure provides all the information needed and no extra devices are needed. In our solution, different features are extracted from the raw Wi-Fi Received Signal Strength Indicator (RSSI) signal and four popular machine learning algorithms (e.g. support vector machine (SVM), decision tree, nearest neighbor and naive Bayes networks) are evaluated for detecting the state of a meeting room. Our approach is evaluated for two scenarios: classroom state detection and meeting room state detection. The experimental results show an accuracy of our proposed solution of 90.7% and 94.1% for classroom state detection and meeting/lab room state detection, respectively.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134607411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The next generation of mobile network communication systems will require from Internet Service Providers (ISP) the deployment of innovative and sophisticated Quality of Service (QoS) strategies to improve users perceived Quality of Experience (QoE). Many of the currently available QoS strategies are based on the Policy-based Network Management (PBNM) approach, commonly deployed in ISPs, which manages network resources according to users Service Level Agreement (SLA) To achieve efficiency, flexibility and scalability, the Software-Defined Mobile Networking (SDMN) paradigm enables a framework for deploying new resource management strategies such as the class-based over-provisioning model. However, especially in the mobile multimedia application scenario, the admission control operation may become ineffective when dealing with congestion situations since current streaming services do not provide an efficient way to control its transmission rate. This limitation is mainly caused by the rate adaptation engine which depends on user-side implementations, leading to unfair resource sharing. Traditional rate adjustment mechanisms also may impact on less capable mobile devices due to processing overheads, such as smartphones and IoT-enabled (Internet of Things) devices. In this scope, this work proposes the Dynamic Bit Rate Streaming Service over SDMN (DBR3S), an SDMN-based framework which enables PBNM resource management and a rate adaptation model based on network availability measurements carried out by an optimized control plane and enforced on the multimedia server through a cooperation system. The assessments demonstrate the feasibility of the DBR3S system, improving substantially the mobile users QoE over traditional streaming services.
{"title":"An Innovative Dynamic Bit Rate Streaming Approach to Improve Mobile User Multimedia Quality of Experience","authors":"C. Santos, Felipe S. Dantas Silva, A. Neto","doi":"10.1145/3132062.3132072","DOIUrl":"https://doi.org/10.1145/3132062.3132072","url":null,"abstract":"The next generation of mobile network communication systems will require from Internet Service Providers (ISP) the deployment of innovative and sophisticated Quality of Service (QoS) strategies to improve users perceived Quality of Experience (QoE). Many of the currently available QoS strategies are based on the Policy-based Network Management (PBNM) approach, commonly deployed in ISPs, which manages network resources according to users Service Level Agreement (SLA) To achieve efficiency, flexibility and scalability, the Software-Defined Mobile Networking (SDMN) paradigm enables a framework for deploying new resource management strategies such as the class-based over-provisioning model. However, especially in the mobile multimedia application scenario, the admission control operation may become ineffective when dealing with congestion situations since current streaming services do not provide an efficient way to control its transmission rate. This limitation is mainly caused by the rate adaptation engine which depends on user-side implementations, leading to unfair resource sharing. Traditional rate adjustment mechanisms also may impact on less capable mobile devices due to processing overheads, such as smartphones and IoT-enabled (Internet of Things) devices. In this scope, this work proposes the Dynamic Bit Rate Streaming Service over SDMN (DBR3S), an SDMN-based framework which enables PBNM resource management and a rate adaptation model based on network availability measurements carried out by an optimized control plane and enforced on the multimedia server through a cooperation system. The assessments demonstrate the feasibility of the DBR3S system, improving substantially the mobile users QoE over traditional streaming services.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Urquiza-Aguiar, M. Aguilar-Igartua, Carolina Tripp Barba, Xavier Calderón-Hinojosa
This paper presents the 2-hops Geographical Anycast Routing (2hGAR) protocol to enable anycast communication between vehicles and infrastructure. 2hGAR forwards packets to reach any member of the infrastructure by using information of the best neighbors located 2-hops away from the current node. Additionally, 2hGAR can work with any hop-by-hop geographical routing protocol and Tabu-search metaheuristic. Simulation results show that 2hGAR with Multi Metric Map-aware (MMMR) scoring procedure outperforms to a classical greedy-DTN and Geographical Heuristic Routing (GHR) protocols in percentage of packet losses and/or packet delay, depending on the vehicle density.
{"title":"2hGAR: 2-Hops Geographical Anycast Routing Protocol for Vehicle-to-Infrastructure Communications","authors":"L. Urquiza-Aguiar, M. Aguilar-Igartua, Carolina Tripp Barba, Xavier Calderón-Hinojosa","doi":"10.1145/3132062.3132076","DOIUrl":"https://doi.org/10.1145/3132062.3132076","url":null,"abstract":"This paper presents the 2-hops Geographical Anycast Routing (2hGAR) protocol to enable anycast communication between vehicles and infrastructure. 2hGAR forwards packets to reach any member of the infrastructure by using information of the best neighbors located 2-hops away from the current node. Additionally, 2hGAR can work with any hop-by-hop geographical routing protocol and Tabu-search metaheuristic. Simulation results show that 2hGAR with Multi Metric Map-aware (MMMR) scoring procedure outperforms to a classical greedy-DTN and Geographical Heuristic Routing (GHR) protocols in percentage of packet losses and/or packet delay, depending on the vehicle density.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130591563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laudin Molina, Alberto Blanc, N. Montavont, L. Simić
Every day large numbers of users connect to IEEE 802.11 networks in order to access the Internet and all sorts of services. However, due to their unplanned and unregulated nature, and the lack of admission control and Quality of Service Guarantees, these wireless networks can experience traffic demand that exceeds the network capacity. In this case, if a device tries to send more traffic, or if a new device joins the network, the aggregate throughput does not necessarily increase. In this paper we show that it is possible for IEEE 802.11 stations to detect a saturated channel by passively monitoring the beacon frames. Access points (AP) send beacon frames periodically and encode them using the strongest modulation and coding scheme, so that even stations far away from the sending APs can decode them correctly. When sending beacons, APs sense the channel first and, if it is busy, delay sending the frame, resulting in unevenly spaced beacon frames, whenever other transmitters are active. We present several experiments, under varying traffic loads, and analyze the distribution of the beacon jitter, whose variance increases as the offered load increases. We show that it is possible to determine, with an acceptable error rate, whether a channel is saturated by comparing the distribution of the beacon jitter with a reference distribution corresponding to a saturated channel.
{"title":"Identifying Channel Saturation in Wi-Fi Networks via Passive Monitoring of IEEE 802.11 Beacon Jitter","authors":"Laudin Molina, Alberto Blanc, N. Montavont, L. Simić","doi":"10.1145/3132062.3132069","DOIUrl":"https://doi.org/10.1145/3132062.3132069","url":null,"abstract":"Every day large numbers of users connect to IEEE 802.11 networks in order to access the Internet and all sorts of services. However, due to their unplanned and unregulated nature, and the lack of admission control and Quality of Service Guarantees, these wireless networks can experience traffic demand that exceeds the network capacity. In this case, if a device tries to send more traffic, or if a new device joins the network, the aggregate throughput does not necessarily increase. In this paper we show that it is possible for IEEE 802.11 stations to detect a saturated channel by passively monitoring the beacon frames. Access points (AP) send beacon frames periodically and encode them using the strongest modulation and coding scheme, so that even stations far away from the sending APs can decode them correctly. When sending beacons, APs sense the channel first and, if it is busy, delay sending the frame, resulting in unevenly spaced beacon frames, whenever other transmitters are active. We present several experiments, under varying traffic loads, and analyze the distribution of the beacon jitter, whose variance increases as the offered load increases. We show that it is possible to determine, with an acceptable error rate, whether a channel is saturated by comparing the distribution of the beacon jitter with a reference distribution corresponding to a saturated channel.","PeriodicalId":157857,"journal":{"name":"Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}