Search results for "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"
showing 10 items of 449 documents
Learning From Errors: Detecting Cross-Technology Interference in WiFi Networks
2018
In this paper, we show that inter-technology interference can be recognized using commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, and payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad FCS, invalid headers, etc.) and propose two methods to recognize the source of in…
Enabling Retransmissions for Achieving Reliable Multicast Communications in WSNs
2016
To ensure end-to-end reliable multicast or broadcast transmissions in IEEE 802.15.4 based wireless sensor networks WSNs) is a challenging task since no retransmission and acknowledgment mechanisms are defined in such WSNs. In this paper, we propose three retransmission enabled multicast transmission schemes in order to achieve reliable packet transmissions in such networks. Different from the legacy CSMA/CA principle, these schemes allow a sending or forwarding node to retransmit a packet if necessary and enable implicit or/and explicit acknowledgment for multicast services. Simulations are performed in order to assess the performance of these schemes in terms of number of retransmissions, …
Priority-oriented multicast transmission schemes for heterogeneous traffic in WSNs
2016
To ensure quality of service (QoS) for heterogeneous traffic in IEEE 802.15.4 based wireless sensor networks (WSNs) is a challenging task since no traffic prioritization mechanism is defined in such WSNs. In this paper, we propose two priority-oriented multicast transmission schemes to provide QoS for heterogeneous traffic in WSNs. Contrary to the legacy CSMA/CA and FIFO principles, these schemes differentiate self-generated or received traffic and give priority to delay-sensitive traffic with respect to channel access and packet scheduling. Simulations are performed in order to assess the performance of these schemes in terms of end-to-end delay, energy consumption, packet delivery ratio, …
Evaluation and improvement of collective flooding in WSNs with various link correlations
2015
One of the main challenges confronted by wireless sensor networks (WSNs) is to reduce energy consumption of nodes for the purpose of network lifetime extension. In the literature, many backbone based protocols such as connected dominating set (CDS) and broadcast or multicast based protocols are employed in order to improve network performance in terms of metrics like energy consumption, number of transmissions and dissemination delay. In this paper, we evaluate the performance of a recently proposed transmission protocol known as collective flooding (CF), which is based on link correlation, under various link correlation conditions. Through simulations and analyses we demonstrate that altho…
Multicast TV over WLAN in a University Campus Network
2009
One of the multimedia services offered by the campus network of the Polytechnic University of Valencia is TV over IP. This service works well in the devices connected directly to the wired network but we have detected some problems when the receivers access to the campus network through wireless IEEE 802.11, especially when devices roam across the Campus. In this paper we propose and evaluate a server-based solution to minimize the packet loss and reduce the lack of service when the mobile devices roam from an Access Point to another Access Point in the wireless network. This solution uses a location system to modify the behaviour of standard multicasting protocols in order to get a near-se…
Quality of Service Multicasting over Differentiated Services Networks
2003
This paper proposes a solution to support real-time multicast traffic with Quality of Service (QoS) constraints over Differentiated Services (DiffServ) IP networks. Our solution allows multicast users to dynamically join and leave the multicast tree. Moreover, it allows a multicast user which has negotiated a best-effort session to upgrade to a QoS-enabled session. Our solution is backward compatible with the Protocol Independent Multicast (PIM) scheme. It combines two ideas. First, resource availability along a new QoS path is verified via a probe-based approach. Second, QoS is maintained by marking replicated packets with a special DSCP value, before forwarding them on the QoS path.
Multicast polling and efficient voip connections in ieee 802.16 networks
2007
IEEE 802.16 standard defines the wireless broadband access network technology called WiMAX which introduces several interesting advantages including its the support for quality of service (QoS) at the MAC layer. Its several features, such as multicast polling support the base station (BS) to provide the QoS guarantees for subscriber stations (SSs). The specification, however, does not define very exactly how this optional multicast polling technique should be used. We propose a way to use this feature on the base stations and also suggest an addition to the specification, to serve several different delay requirements. To test the proposed solution and the performance of the multicast pollin…
Multicast delivery of file download services in 3G mobile networks with MBMS
2008
This article investigates the efficient transmission of file download services to several users simultaneously in 3G mobile networks with HSDPA (High-Speed Downlink Packet Access) and MBMS (Multimedia Broadcast Multicast Services). HSDPA supports high speed point-to-point (p-t-p) transmissions (up to several Mb/s), whereas with MBMS the same content can be transmitted with a point-to-multipoint (p-t-m) connection to multiple users in a unidirectional fashion. Multicast delivery can be implemented through only p-t-p transmissions with HSDPA, a single p-t-m transmission with MBMS, or using both jointly in a hybrid approach by employing HSDPA for error repair of the MBMS p-t-m transmission. We…
Clustering-Based Algorithm for Connectivity Maintenance in Vehicular Ad-Hoc Networks
2014
International audience; Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) …
A secret sharing scheme for anonymous DNS queries
2013
Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…