Networking and Internet Architecture (cs.NI)

  • PDF
    The Robot Operating System (ROS) is rapidly becoming the de facto framework for building robotics systems, thanks to its flexibility and the large acceptance that it has received in the robotics community. With the growth of its popularity, it has started to be used in multi-robot systems as well. However, the TCP connections that the platform relies on for connecting the so-called ROS nodes, presents several issues in terms of limited-bandwidth, delays and jitter, when used in wireless ad-hoc networks. In this paper, we present a thorough analysis of the problem and propose a new ROS node called Pound to improve the wireless communication performance. Pound allows the use of multiple ROS cores and introduces a priority scheme favoring more important flows over less important ones, thus reducing delay and jitter over single-hop and multihop networks. We compare Pound to the state-of-the-art solutions and show that it performs equally well, or better in all the test cases, including a control-over-network example.
  • PDF
    Many use cases of unmanned aerial vehicles (UAVs) require beyond visual line-of-sight (LOS) communications. Mobile networks offer wide area, high speed, and secure wireless connectivity, which can enhance control and safety of UAV operations and enable beyond visual LOS use cases. In this article, we share some of our experience in Long-Term Evolution (LTE) connectivity for low altitude small UAVs. We first identify the typical airborne connectivity requirements and characteristics, highlight the different propagation conditions for UAVs and mobiles on the ground with measurement and ray tracing results, and present simulation results to shed light on the feasibility of providing LTE connectivity for UAVs. We also present several ideas on potential enhancements for improving LTE connectivity performance and identify fruitful avenues for future research.
  • PDF
    Network coding based peer-to-peer streaming represents an effective solution to aggregate user capacities and to increase system throughput in live multimedia streaming. Nonetheless, such systems are vulnerable to pollution attacks where a handful of malicious peers can disrupt the communication by transmitting just a few bogus packets which are then recombined and relayed by unaware honest nodes, further spreading the pollution over the network. Whereas previous research focused on malicious nodes identification schemes and pollution-resilient coding, in this paper we show pollution countermeasures which make a standard network coding scheme resilient to pollution attacks. Thanks to a simple yet effective analytical model of a reference node collecting packets by malicious and honest neighbors, we demonstrate that i) packets received earlier are less likely to be polluted and ii) short generations increase the likelihood to recover a clean generation. Therefore, we propose a recombination scheme where nodes draw packets to be recombined according to their age in the input queue, paired with a decoding scheme able to detect the reception of polluted packets early in the decoding process and short generations. The effectiveness of our approach is experimentally evaluated in a real system we developed and deployed on hundreds to thousands peers. Experimental evidence shows that, thanks to our simple countermeasures, the effect of a pollution attack is almost canceled and the video quality experienced by the peers is comparable to pre-attack levels.
  • PDF
    5G wireless networks aim to achieve seamless mobile broadband services, machine to machine and ultra-reliable low latency communications. These goals require massive improvements in terms of capacity, reliability, latency reduction, and scalability. Besides software defined networks and network function virtualization, self organizing networks (SON) is another enabling technology which makes 5G feasible. Automatic neighbor relations (ANR) is a prominent component of SON which has direct impact on reliability, scalability, and capacity of the wireless networks. When the current state of standardization and implementation of ANR functionality is considered, it is seen that a new approach is needed for ANR to comply with 5G requirements. Thus, in this paper a comprehensive hybrid ANR (H-ANR) architecture which leads to the management of relations utilizing an extensive set of universal performance criteria, configuration metrics, and measurements is proposed. The H-ANR functionality ranks the neighbors not based on instantaneous information but on historic values of the performance criteria and other metrics. The attributes of distributed ANR (D-ANR) module is also managed by H-ANR to prevent the repetitive addition of unwanted neighbors via D-ANR or X2 interface. Performance of the proposed H-ANR functionality is also compared with the case when only D-ANR is available on a Long Term Evolution Advanced network.
  • PDF
    The human body has a very effective Immune system used to protect the body from dangerous foreign pathogens. This paper aims at studying the immunology and understanding how it works, it also shaded light on the usage of the immunology principles in the computer network security. It also suggested a new network security model which detects attacks that invades the LANs. This study based on human immune system (IS). This model help protecting the datalink layer by suggesting solution to detect the foreign frames in computer network traffic. In this model, the frame format is changed in a way that prevents the sender from sending his MAC address, and he send a unique identifier (ID) instead. Moreover, a special network switch will replace the sender ID with the corresponding MAC address and forward the packets to their right destination.
  • PDF
    In Future Internet it is possible to change elements of congestion control in order to eliminate jitter and batch loss caused by the current control mechanisms based on packet loss events. We investigate the fundamental problem of adjusting sending rates to achieve optimal utilization of highly variable bandwidth of a network path using accurate packet rate information. This is done by continuously controlling the sending rate with a function of the measured packet rate at the receiver. We propose the relative loss of packet rate between the sender and the receiver (Relative Rate Reduction, RRR) as a new accurate and continuous measure of congestion of a network path, replacing the erratically fluctuating packet loss. We demonstrate that with choosing various RRR based feedback functions the optimum is reached with adjustable congestion level. The proposed method guarantees fair bandwidth sharing of competitive flows. Finally, we present testbed experiments to demonstrate the performance of the algorithm.
  • PDF
    With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally multi-layer with the cloud and cellular networks coexisting with the underlaid device-to-device (D2D) communications. The connectivity of IoTs plays an important role in information dissemination for mission-critical and civilian applications. However, IoT communication networks are vulnerable to cyber attacks including the denial-of-service (DoS) and jamming attacks, resulting in link removals in IoT network. Therefore, it is important to maintain the connectivity of IoT networks and make them secure and resistant to malicious attacks. In this work, we present a heterogeneous IoT network design problem in which a network designer can add links to provide additional communication paths between two nodes or secure links against failures by investing resources. We characterize the optimal strategy of the secure network design problem by first providing a lower bound on the number of links a secure network requires for a given budget of protected links, and then developing a method to construct networks that satisfy the heterogeneous network design specifications. Case studies on the Internet of Battlefield Things (IoBT) are used to corroborate our results.
  • PDF
    In this paper, we propose novel channel-hoppingbased distributed rendezvous algorithm based on grid-basedquorum techniques. The proposed algorithm increases the probability of rendezvous (RDV) within a single cycle by allowing CR nodes to meet more often according to intersection property of quorum systems (QSs). Our proposed algorithm is called Adaptive quorum-based channel-hopping distributed coordination scheme for cognitive radio networks. The main idea of our algorithm is to dynamically adjust the selected QS by CR users according to the varying traffic loads in the CRN. The proposed algorithm decreases the average time to rendezvous (TTR) and increase the probability of RDV. We evaluate the performance of our algorithm through simulations. The performance of our algorithm is compared with two different schemes. The results show that our algorithm can reduce TTR, increase the RDV, and decrease the energy consumption per successful RDV.
  • PDF
    Device-free localization plays an important role in many ubiquitous applications. Among the different technologies proposed, Wi-Fi based technology using commercial devices has attracted much attention due to its low cost, ease of deployment, and high potential for accurate localization. Existing solutions use either fingerprints that require labor-intensive radio-map survey and updates, or models constructed from empirical studies with dense deployment of Wi-Fi transceivers. In this work, we explore the Fresnel Zone Theory in physics and propose a generic Fresnel Penetration Model (FPM), which reveals the linear relationship between specific Fresnel zones and multicarrier Fresnel phase difference, along with the Fresnel phase offset caused by static multipath environments. We validate FPM in both outdoor and complex indoor environments. Furthermore, we design a multicarrier FPM based device-free localization system (MFDL), which overcomes a number of practical challenges, particularly the Fresnel phase difference estimation and phase offset calibration in multipath-rich indoor environments. Extensive experimental results show that compared with the state-of-the-art work (LiFS), our MFDL system achieves better localization accuracy with much fewer number of Wi-Fi transceivers. Specifically, using only three transceivers, the median localization error of MFDL is as low as 45$cm$ in an outdoor environment of 36$m^2$, and 55$cm$ in indoor settings of 25$m^2$. Increasing the number of transceivers to four allows us to achieve 75$cm$ median localization error in a 72$m^2$ indoor area, compared with the 1.1$m$ median localization error achieved by LiFS using 11 transceivers in a 70$m^2$ area.

Recent comments

Aram Harrow Mar 19 2013 02:59 UTC

The original quantum Pagerank paper used adiabatic evolution, and this one uses the Szegedy walk. I wonder how the methods compare.

Another thing I'd like someone to figure out at some point is whether these can be done using resources scaling like poly log(# vertices) for power law graphs. T

...(continued)