Routage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil

Size: px
Start display at page:

Download "Routage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil"

Transcription

1 Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par M. Luigi Iannone pour obtenir le grade de Docteur de l Université Pierre et Marie Curie Routage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil Soutenance prévue le 3 Avril 2006 devant le jury composé de Andrzej DUDA Rapporteur Prof. à l INPG-ENSIMAG de Grenoble Catherine ROSENBERG Rapporteur Prof. à l Université de Waterloo Isabelle GUERIN-LASSOUS Examinateur Chargé de Recherche INRIA Luigi RIZZO Examinateur Prof. à l Université de Pisa Bertil FOLLIOT Examinateur Prof. à l Université Pierre et Marie Curie Serge FDIDA Directeur Prof. à l Université Pierre et Marie Curie

2

3 Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par M. Luigi Iannone pour obtenir le grade de Docteur de l Université Pierre et Marie Curie Routage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil Soutenance prévue le 3 Avril 2006 devant le jury composé de Andrzej DUDA Rapporteur Prof. à l INPG-ENSIMAG de Grenoble Catherine ROSENBERG Rapporteur Prof. à l Université de Waterloo Isabelle GUERIN-LASSOUS Examinateur Chargé de Recherche INRIA Luigi RIZZO Examinateur Prof. à l Université de Pisa Bertil FOLLIOT Examinateur Prof. à l Université Pierre et Marie Curie Serge FDIDA Directeur Prof. à l Université Pierre et Marie Curie Numéro bibliothèque:

4

5 Doctor of Science Thesis Pierre and Marie Curie University (Paris VI) Specialization Computer Science presented by M. Luigi Iannone Submitted in partial satisfaction of the requirements for the degree of Doctor of Science of the Pierre and Marie Curie University Cross-Layer Routing and Mobility Management in Wireless Mesh Networks Commitee in charge: Andrzej DUDA Reviewer Prof. at INPG-ENSIMAG of Grenoble Catherine ROSENBERG Reviewer Prof. at University of Waterloo Isabelle GUERIN-LASSOUS Examinator INRIA Research Officer Luigi RIZZO Examinator Prof. at University of Pisa Bertil FOLLIOT Examinator Prof. at Pierre and Marie Curie University Serge FDIDA Advisor Prof. at Pierre and Marie Curie University

6

7 À ma précieuse famille. The man who follows the crowd will usually get no further than the crowd. The man who walks alone is likely to find himself in places no one has ever been. (Alan Ashley-Pitt)

8

9 Remerciements Ces années de thèse passée au sein du LIP6 représentent une expérience inoubliable. La période passé ici en France ne m a pas seulement apporté un diplôme de Docteur de l Université Paris VI, elle m a aussi permis de grandir tant au niveau humain que professionnel. Il est difficile de trouver les mots pour remercier toutes les personnes qui j ai rencontré dans cette période. Il est aussi impossible de faire une liste exhaustive, car elle serait trop longe et il y aura toujours quelqu un qui j oublier. Je tiens à remercier Andrzej DUDA et Catherine ROSENBERG pour avoir consacré un peu de leur précieux temps à rapporter ce travail. Je tiens à exprimer ma gratitude à Luigi RIZZO, Isabelle GUERIN-LASSOUS et Bertil FOLLIOT pour avoir accepté de faire partie de mon jury en leur qualité d examinateurs. Un remerciement particulier a Serge FDIDA qui m a donne la possibilité de faire une thèse en m accueillant au LIP6, qui a dirigé mes travaux et qui m a toujours soutenu. Je voudrais remercier Marcelo DIAS DE AMORIM pour les conseilles et l aide qui m a donné tout au long de ma thèse, à partir de la période où on a partagé le bureau. Mes remerciements vont aussi à Konstantin KABASSANOV qui m a permis de réaliser toute la partie pratique de mon travail. Finalement, j aimerais exprimer ma gratitude toute particulière à Ramin KHALILI avec qui j ai passé beaucoup de soirée a discuter de recherche et de vie durant notre promenades sur les quai de la seine. Mes derniers remerciements vont à toutes les personnes que j ai rencontré pendant toute la période de ma thèse et que m ont permis de apprendre toujours quelque chose de nouveau et qui m ont aussi aidé. Merci à tous, de tout mon cœur.

10

11 Résumé La révolution sans fil déclenchée par le succès de la norme IEEE a poussé la communauté de recherche dans la conception, l analyse, le développement, et le déploiement de nouvelles solutions sans fil. En particulier, les Réseaux Maillés Sans fil (Wireless Mesh Networks - WMN), dont l architecture à deux niveaux est basée sur les Routeur Sans fil Maillés (Wireless Mesh Routers - WMR), ont capturé l intérêt de la recherche universitaire et de l industrie, en raison de leur capacité à satisfaire à la fois les exigences des Fournisseurs d Accès à Internet (FAI) sans fil et les utilisateurs. En dépit de la grande quantité de recherche effectuée dans ce contexte, plusieurs problèmes restent encore à résoudre. Les points suivants sont devenus cruciaux : (i) l utilisation traditionnelle du plus court chemin en termes de nombre de sauts n est pas représentative de la qualité des liens sans fil, ce qui entraîne une réduction du débit ; (ii) il manque une solution définitive capable de gérer de façon efficace la mobilité des utilisateurs ; (iii) la conception des WMRs est encore incomplète, les réalisations existantes étant basées sur des solutions expérimentales, souvent propriétaires. Dans cette thèse, nous abordons les points mentionnés ci-dessus et proposons une solution efficace pour les réseaux sans fil, basée sur les propriétés réelles des liens sans fil. Nos contributions sont les suivantes. D abord, nous concevons et formalisons MRS (Mesh Routing Strategy), une stratégie de routage cross-layer. MRS ne dépend d aucune spécificité de la couche MAC et se base sur des heuristiques simples et capables d optimiser la puissance de transmission et de calcul des chemins. En second lieu, nous concevons et implémentons MeshDV, une solution de routage adaptée aux WMNs, qui inclut MRS et peut également gérer efficacement la mobilité des utilisateurs. MeshDV combine le calcul proactif des chemins entre les routeurs et une mise en place réactive des communications entre les clients. Troisièmement, nous mettons au point MeshDVbox, un WMR basé sur IPv6 et construit en utilisant des composants disponibles sur le marché public. Des MeshDVbox ont été déployés dans notre laboratoire pour réaliser une plateforme de tests expérimentale. Cette thèse adresse des aspects théoriques, à travers la formalisation de MRS, mais aussi des aspects pratiques, à travers le développement de MeshDV. Le travail d évaluation s étend de la simulation de MRS à l implémentation de MeshDV (qui intègre MRS) et au déploiement d une plateforme de test en utilisant MeshDVbox. Mots-clés : Réseaux sans-fil multi-sauts, réseaux maillés sans fil, protocoles de routage, conception cross-layer, contrôle de puissance, capacité de transfert, gestion de la mobilité. i

12

13 Abstract The wireless revolution triggered by the success of IEEE standard has pushed the research community to address the design, analysis, development, and deployment of new wireless solutions. In particular, Wireless Mesh Networks (WMN), a two-tier architecture based on Wireless Mesh Routers (WMR), has captured the interest from both academia and industry, because of their ability to accommodate both Wireless ISPs and user requirements. Despite the large amount of research developed in this area, several issues still need to be solved. The following points have become a main concern: (i) the traditional use of the hop-count metric does not capture the very nature of wireless links, resulting in poor transport capacity of wireless systems; (ii) the lack of a definitive solution able to effectively manage mobile users; (iii) the design of WMR is still weak, with custom implementations often based on proprietary solutions. In this thesis we tackle the abovementioned issues and design an efficient solution for multi-hop wireless networks that uses the real properties of wireless links. We provide the following contributions. First, we design and formalize Mesh Routing Strategy (MRS), a cross-layer routing approach. MRS does not depend on any specificity of the MAC layer and relies on simple heuristics able to optimize transmission power and route selection, resulting in important increase of the transport capacity of the mesh backbone. Second, we design and implement MeshDV, a routing framework adapted to WMNs, which includes MRS and is also able to easily manage user mobility. MeshDV combines proactive route computation for routers and on-demand path setup for clients. Proactive route computation is achieved by MRS, while on-demand path setup is performed by new mechanisms that take benefit from the two-tier architecture of WMNs. Third, we develop MeshDVbox, a custom IPv6 based Wireless Mesh Router built using off-the-shelf components and deployed in our laboratory to realize a WMN test-bed. The tests performed on the test-bed demonstrate good results, for both throughput and latency in mobility management. This thesis addresses both theoretic aspects, in the formalization of MRS, as long as practical issues, in the development of MeshDV. The evaluation work ranges from simulation of MRS to real implementation of MeshDV (which integrates MRS) and to the deployment of a real test-bed using MeshDVbox. Key Words: Wireless multi-hop networks, wireless mesh networks, routing protocols, cross-layer design, power control, throughput capacity, mobility management. iii

14

15 Table of contents 1 Introduction Wireless Mesh Networks The challenge of Routing in Wireless Multi-hop Networks Contribution of the thesis Outline Routing and Mobility in Wireless Multi-hop Networks The problem of finding good paths The problem of managing mobility Shortest-Path (Hop-count) routing approaches Destination Sequenced Distance Vector Routing Protocol Ad Hoc On-Demand Distance Vector Routing Protocol Dynamic Source Routing Protocol Optimized Link State Routing Protocol Mesh Routing Protocols Standardization Activities Cross-Layer based approaches Routing and mobility Conclusion MeshDV Architecture and Mobility Management MeshDV Architecture MeshDV communication setup/holding Communication setup Holding a communication MeshDV implementation architecture Enhanced DV Module Client Manager Module NDP-Proxy Module Forwarder Module v

16 vi Table of contents 3.4 MeshDV Analysis MeshDV Hardware platform and implementation issues MeshDV Performance Conclusion Cross-Layer Routing to improve capacity Capacity Law and Cross-Layer Approach Capacity Law and Cross-Layer Approach Capacity Law and Physical Layer Modeling Routing Metrics Transmission Rate Metric Interference Metric Packet Error Rate Metric Proof of NP-completeness Routing Strategy Local Power Optimization Strategy Path Cost and Route Computation Conclusion Performance Analysis of Mesh Routing Strategy The Capacity Index NS-2 enhancement Simulation Setup Simulation Results Conclusion Conclusion and Further Research Conclusion MRS MeshDV MeshDVbox Further Research Appendix - Thesis French Version 101 A La Problématique 105 A.1 Les réseaux maillés sans fil A.2 Le Routage dans les réseaux multi sauts sans fil A.3 Protocoles de routage pour les réseaux maillés sans fil A.4 La gestion de la mobilité B Contributions de cette thèse 111 B.1 L architecture de MeshDV B.2 Le WMR MeshDVbox B.3 Performance de MeshDV

17 Table of contents vii B.4 Mesh Routing Strategy B.4.1 Les Métriques de Routage B.4.2 Stratégie de routage B.5 Performance de MRS B.5.1 Résultats des simulations C Conclusion 127 C.1 Conclusion C.2 Perspectives References 131 List of Acronyms 143 List of Figures 147

18

19 Chapter1 Introduction Last years have witnessed a still increasing interest in wireless networking by the research community, but also industries and Wireless Internet Service Providers (ISP). Initially triggered by the unexpected success of the Institute of Electrical and Electronics Engineers (IEEE) standard [1], this wireless revolution is supported by the proliferation of wireless computing and communication devices, driving a deep change in our information society, causing modifications in the way networks and applications should be designed. Compared to the wired Internet, which is facing its middle age, wireless networking is relatively young. The great amount of research done insofar has already leaded to new architectures and protocols paradigms. Born as a natural extension of the wired Internet, by deploying Wireless Local Area Networks (WLAN) based on wired Access Points (AP), ever since wireless networking has evolved toward new architectures. The concept of ad hoc networking, which has introduced the idea of multi-hop routing in mobile wireless networks, has been the first step through more sophisticated and large scale approaches like Sensors Networks and, more generally, Self-Organizing Networks

20 2 (SON). Aiming to offer seamless connectivity, Wireless Mesh Networks (WMN) have gained more and more interest from both academic and industry, as a mean to speed-up the deployment of large scale networks, reducing costs while guaranteeing a minimum level of service. Recently, all this amount of innovation has pushed the research community to think about wireless networking in a more general way, leading to the very young idea of Autonomic Communication, a new paradigm for next generation networks. The above cited advancements in networking, with mobile devices becoming cheaper and cheaper, and the explosion of Internet users made the ubiquitous computing ([2], [3]) reality. The wireless technology fits well the requirements to be the last mile interconnecting technology, in order to build stub networks in a fast, cheap, and simple way, offering broadband seamless connectivity. In this context, however, not all of the actual wireless architectures are suitable for this purpose. In particular, ad hoc networks are not able to give a minimum level of service guarantee, since each user, while part of the routing/forwarding infrastructure, behaves independently, leading to issues like network merge and split. Thus, they cannot guarantee the very basic need of each user: connectivity. At the same time, since the network is completely composed of users equipment, Wireless Internet Service Providers (ISP) do not have any control on the network. Users and operators have different viewpoints, needs, and priorities. In particular users are usually interested in: Ubiquitous Connectivity. Users demand seamless connectivity, whenever they want, wherever they move. No strange setups. The average user usually has no interest to a service that requires performing more than few steps, with strange or complicate setups, to obtain relative benefits. Furthermore, the average user is used buying a service, not paying to be part of a service (e.g. ad hoc). Control their resources. Users are selfish; they do not share resources so easily. Finding good incentives to motivate user to collaborate is still an open issue. Average user may agree in collaborating with neighbors or other user she/he knows, but has hesitation on sharing his resources with strangers (e.g. freeriders in file sharing applications). The open question remains: Why should I (user) forward packets on behalf of others?

21 Chapter 1. Introduction 3 No third part software. Like the previous point, users prefer to have the feeling that they have the total control of their equipments (laptop/pc/communication devices). They prefer not having to install software like connection managers, which may contain tracking features collecting information about each connected user. Quality of Service (QoS). For the average user, beside the ubiquitous connectivity, QoS means broadband. Independently from the particular use of the network, which may range from web surfing to heavy file transfers, the only quality usually perceived is the downloading time. On the other hand, Wireless ISPs are interested in: Offering Broadband Connectivity. This is the basic service operators can sell. Ease and low cost deployment. Using wireless links to build a stub network in order to offer connectivity, thus avoiding heavy and expansive cable deployment. Control of the network. If traffic goes only through proprietary devices, operators can control the network, perform traffic engineering, and guarantee a certain QoS. This would be hardly possible if they rely on users devices to form the basic infrastructure. Capacity. The concept of capacity in the context of wireless multi-hop networks goes over the concept of bandwidth of single links. Since wireless links are not independent one from another, the key parameter becomes the total amount of traffic the network is able to relay. The consequences of a higher capacity of the network for the operator are two-fold. More capacity means to have a more cost/effective solution. At the same time, more capacity means the possibility of managing the traffic of an increased number of users, thus increasing the benefits. In order to accommodate, sometimes contrasting, requirements of both users and Wireless ISPs, simple flat architecture like ad hoc is not sufficient. This is the reason why there is an increasing interest for WMNs, whose architecture is two-tier and seems able to satisfy the requirements of both parties.

22 Wireless Mesh Networks 1.1 Wireless Mesh Networks Wireless Mesh Networks are an emerging two-tier architecture based on multi-hop transmission, with two fundamental objectives: (a) to offer connectivity to end-users; (b) to form a self-organized wireless backbone. These two characteristics make WMNs different from ad hoc and other infrastructure-based networks. In a WMN, nodes can be distinguished in Wireless Mesh Routers (WMR) and mesh clients. 1 Wireless Mesh Routers interconnect and self-organize themselves in order to form a meshed wireless backbone. This backbone can be a self-standing network, simply offering inter-user connectivity. Otherwise, if connection is available through one or more WMRs acting as gateways, it might be considered as a local wireless extension of the Internet. Each WMR covers a region where it offers connectivity by acting as an AP, thus building a WLAN sub-network offering access to any allowed client. End-user terminals associate to a WMR without the need to run any routing feature or particular software module, and communicate by means of the WMRs backbone. Figure 1.1 shows an example of this type of mesh network. The two-tier architecture of WMNs differentiates them from ad hoc networks. The latter is a flat architecture where each node is an end-user terminal enhanced with routing features in order to forward traffic on behalf of others. Each node in ad hoc networks can move freely in the environment. Thus, routing has to face this mobility issue by assuming that the topology is highly dynamic, links are fragile, and no dedicated infrastructure components are present. In this context, a winning approach is the on-demand path setup coupled with high reactive approaches to maintain up to date information and path breakage recovery. Routing in wireless mesh networks is only performed between WMRs, i.e. the wireless backbone. In a WMN, end-users still move freely in the environment although WMRs are fixed. In this context, proactive path setup may be a rewarding choice, since the backbone has a low level dynamics. On a large time-scale, however, WMRs can still be added (e.g., to increase capacity) or reduced (e.g., in case of failure). Communication between end-users is provided by the WMR managing the region where they are located. Thus, in the case of WMNs, mobility has no impact on building paths between WMRs, but the issue becomes to locate which client is associated to which 1 For simplicity of presentation, in the remaining of this thesis mesh clients will be called merely clients, and we will use the terms clients and users as synonyms. Furthermore, the terms WMN, wireless mesh networks, and mesh network will be all used as synonyms.

23 Chapter 1. Introduction 5 Mesh Backbone Subnetwork Client Access Subnetwork Wireless Mesh Router Figure 1.1: An example of Wireless Mesh Network. WMR and to correctly setup and maintain a communication between users associated to different WMRs. Solutions like Mobile IP [4] or Host Identity Protocol (HIP) [5] can be used to manage end-users migrating from one WMR s region to another. Nevertheless, as we will see in the next chapter, they are not appropriate to WMNs. An alternative approach is to let the routing protocol include mechanisms to manage the mobility of users. Wireless Mesh Networks fit well all requirements of both users and Wireless ISPs, mentioned in the previous section. As long as users move in an area covered by good radio signal, they have seamless connectivity, with good QoS (compatible with the radio standard used) without the need of complicate setups. Indeed, WMNs offer to users common WLAN access, which is a sufficiently consolidated technology that is correctly supported by any Operating System (OS), and connection is correctly managed without the necessity to install third party connection manager software modules. Resources of the user are controlled by herself/himself, who can decide at which level she/he wishes to share them. From an ISP s viewpoint there is the possibility to sell connectivity. As an owner of the mesh backbone, an ISP may reduce costs related to its deployment. At the same

24 Wireless Mesh Networks time, it can manage the network the way it prefers, update it without bothering users (e.g., to deploy a new solution to increase the capacity of the backbone). Furthermore, since usually WMRs have at least two wireless interfaces, one or more for the mesh backbone and one or more for the client access, it plays a key role for technology integration (e.g. Wireless Fidelity (WiFi) [6], WiMAX [7], ZigBee [8]). D. Beyer well describes the benefits provided by mesh networks ([9]), namely: easy and fast network deployment, low cost of installation and maintenance, flexibility, scalability in both size and density. Yet if promising, the mesh technology has still open issues that need to be solved. Akyildiz et al. give a complete overview of WMNs [10], with an analysis of the challenges and the open issues of this kind of networks. These open issues range from the physical layer, where high-speed physical techniques are under study, up to the application layer, in order to make the existing Internet applications to work under the architecture of WMNs. At Medium Access Control (MAC) level research is focusing on improving existing protocols, but also in finding new ones with an improved synchronization in order to exploit the multi-hop nature of communications [11]. While the Internet Protocol (IP) is accepted as a standard protocol at network layer, several other protocols present at this level need to be improved. Routing protocols that have enhanced metrics able to better model the wireless link cost are an active research field. Broadcast is explored in order to avoid the excessive retransmission of the same message in the medium. Address auto-configuration still suffer of the lack of a general solution. Mobility, which has important consequences in the correct behavior of all protocols, is under heavy research. Transport layer and related protocols have showed poor and unpredicted behavior in the wireless environment, since hypothesis valid in the wired Internet do not hold anymore in the wireless context. Besides the above issues, WMNs throughput capacity, i.e. the global traffic the network is able to relay, is among the key factors affecting the scalability, in terms of users able to effectively take advantage of the network. Increasing the effective throughput capacity, pushing it toward the theoretical bound, would let WMNs become

25 Chapter 1. Introduction 7 even more a cost-effective solution for wireless ISPs. Moreover, the capacity of WMNs is affected by many factors such as the architecture, network topology, traffic pattern, WMRs density, transmission power level, and mobility. A clear understanding of the relationship between network capacity and the above factors provides a guideline for protocol development, architecture design, deployment and operation in the network. Traditionally, different protocol layers are required to be transparent from each other. This makes the protocol development and implementation a simple and scalable process. However, the methodology of layered protocol design does not necessarily lead to the optimum solution. The physical channel in a wireless environment is variable in terms of capacity, bit error rate, signal propagation, and interference. Despite the great advances achieved in last years, there is no way to guarantee fixed capacity, zero packet loss rate, or reliable connectivity as expected by higher layers. Therefore, higher layer protocols will be inevitably affected by the unreliable physical channel. Thus, in order to improve protocol efficiency, cross-layer design becomes indispensable. Cross-layer design can significantly improve network performance. However, certain issues must be considered when carrying out cross-layer protocol design. Cross-layer design presents some risks due to: Loss of protocol layer abstraction. Incompatibility with existing protocols. Unforeseen impact on the future design of the network. Difficulty in maintenance and management. Thus, certain guidelines, like the following ones, need to be respected: Well define all dependencies between different parts of the protocol stack to avoid unpredicted behaviors. Avoiding to introduce several control loops on the same parameter at different levels of the protocol stack, risking to introduce instability. Have a structured implementation, avoiding to introduce fragmented functionalities resulting in a spaghetti-like code difficult to maintain. More details can be found in the work of Kawadia et al. [12].

26 The challenge of Routing in Wireless Multi-hop Networks To overcome all the above deficiencies, this thesis focuses on a cross-layer approach in the design of routing protocols targeting both the increase of the transport capacity of the mesh backbone, as well as an efficient users mobility management. We show that well designed metrics may drastically increase the capacity of the mesh backbone. Moreover, we show that a well design modular routing architecture, leveraging on the two-tier of WMNs, can efficiently manage users mobility. 1.2 The challenge of Routing in Wireless Multi-hop Networks Protocols and algorithms paradigms thought as consolidated solutions in the context of the wired world, have showed heavy and unpredictable limits in the context of the young wireless world. Classical routing approaches are not sufficient anymore in the wireless context, since the definition of good path has now a different and more complex meaning. Furthermore, mobility management needs smarter solutions than the simple Mobile IP proposition, since in the multi-hop context, even the addressing do not follow anymore the hierarchy of the Internet. This lack of hierarchy and sub-networking in the addressing space of wireless networks has led to the concept of multi-hop forwarding. In the wired Internet, routing intrinsically means to change sub-network, i.e. interface, and the hierarchical architecture allows to aggregate paths. In multi-hop communications, this is not true anymore, since the ingoing and outgoing interfaces are often the same, and no route aggregation is possible. What changes in each transmission is the intended next hop at the data link level. In a certain way, this means to get back to the very early and basic definition of routing. In this context, the first attempts of multi-hop routing protocols have failed. They were an adaptation of existing approaches for the wired environment, which have proved not to be well performing in the wireless context. Since route aggregation is no longer possible, the average routing table sizes per number of nodes is increased, leading to a more complex management, overhead in update transmissions, and lower performance due to the increased computational cost. The above mentioned issues are only partially responsible for the poor behavior of traditional routing approaches. A major reason consists in the inaptness of the hopcount shortest-path metric usually used in the wired Internet. In the wired Internet

27 Chapter 1. Introduction 9 there are three main routing protocols: Routing Information Protocol (RIP) ([13]), Open Shortest Path First (OSPF) ([14]), and Border Gateway Protocol (BGP) ([15], [16]). RIP is the simplest protocol and it uses the hop-count metric. OSPF and BGP use instead an integer link cost that is set when the demon is configured, in order to perform traffic engineering by operators. This integer cost is totally unrelated from the quality of the link, remaining basically very close to the hop-count concept. This approach cannot be used in mobile wireless networks, due to the continuous changes in the topology. For this reason, the hop-count metric of RIP has been widely adopted, however, this metric do not capture the very nature of wireless links. Today s devices may offer several different transmission rates at physical layer. The selection of the more appropriate depends on the distance of the next-hop, on the interferences on the link, and on the previously experienced losses. Packet losses and achievable throughput on each link may vary heavily in time and space. Even if all radio devices use the same technology, which is a basic requirement for any communication, each link may experience a very different behavior. This factor is totally ignored by routing protocols using the hop-count shortest path metric. The result is that traditional routing set up very poorly behaving paths. Thus, research has moved to new approaches since the wireless environment present some peculiarities that cannot be overcome by traditional (layered) paradigms. In the quest of finding routing metrics able to correctly model the wireless link behavior, a myriad of routing protocols propositions have been published. Most of them are based on cross-layer approaches including power control features, but often relying on strict theoretical assumption. Although several works, including the present thesis demonstrate that routing joint with power control and with well designed metrics may drastically improve capacity of multi-hop networks, differently from our proposition, other cross-layer solutions have seldom achieved real implementation. This is partially due to: (i) lacks in current technology, which is not able to support some advanced features; (ii) the complexity in implementing a cross-layer solution into today s protocol stacks present in current OSs; (iii) the unrealistic assumption of proposed solutions. Another issue that arises in wireless multi-hop networks is mobility. Nevertheless, it is only perceived at routing level as a path fragility and network topology discovery issue and never really integrated with the routing algorithm. We argue that, in the context of mesh networks, approaches that take full advantage of the two-tier architecture may lead the routing protocol to effectively manage user mobility.

28 Contribution of the thesis The above discussion lead to recognize the following points as the key requirements in the design of routing solutions for wireless multi-hop networks: Give to the routing layer the awareness of the underlying issues, by means of metrics that well model the physical layer. Define the objective of route optimization when performing cross-layer optimization. Accommodate on-demand and proactive mechanisms in order to have low path setup delays without exploding routing tables sizes or introducing excessive overhead. Avoid unrealistic or theoretic assumptions that do not match reality and limit the implementation of the proposed solution. Integrate mobility in the routing, not just considering only its consequences (i.e. route fragility). 1.3 Contribution of the thesis WMNs are a promising technology that is already being commercialized ([17], [18], [19]). Nevertheless, existing WMRs are based either on adaptation of protocols designed for the wired Internet or on the adaptation of solution originally designed for ad hoc networks. Moreover, WMRs all use the Internet Protocol Version 4 (IPv4) as a network layer protocol and only few are using Internet Protocol Version 6 (IPv6), the new standard network layer protocol. We believe that in order to have good, robust, and well performing protocols, they have to be designed taking full advantage of the two tier architecture of WMNs and the enhanced mechanisms of IPv6. The common practice to integrate existing blocks, usually designed for IPv4, leads to non optimal solutions that under-exploit both the network architecture and the enhanced features of IPv6. Real wireless multi-hop networks still perform poorly when compared to the theoretical upper bound they can achieve, despite the fact that their capacity has been thoroughly analyzed and formalized [20]. On the one hand, this gap can be partially justified by the fact that some theoretical hypothesis do not hold in reality. On the other hand, much can still be done to increase actual performance of multi-hop networks. In particular, we argue that cross-layer routing based on power control and on

29 Chapter 1. Introduction 11 well designed metrics can drastically increase the throughput capacity experienced by real WMNs. This thesis starts investigating the main issues of routing and mobility in wireless multi-hop networks. In particular, by analyzing the routing problem, we show the limits of traditional hop-count shortest-path approaches in wireless environments. We show the main reasons of this failure and the deep impact that routing has on the experienced transport capacity of real networks. We survey cross-layer approaches proposed in the literature to overcome these issues, aiming to increase the transport capacity. These solutions are usually based on a specific Medium Access Control (MAC) layer or rely on tight theoretic hypothesis that do not hold in reality. The result is a proliferation of interesting solutions that, however, can hardly be implemented. In this thesis, we do not propose any solution that relies on specific MAC protocol or on hypothesis that limits its application in a real test-bed. We also survey the way mobility impacts performance and the way it is usually managed at the routing layer. Even if mobility management and routing in WMNs are difficult problems and are usually solved separately, we claim that an integrated approach can lead to better solutions with higher performance. In this context, the contributions of this thesis are three-fold: MeshDV ([21], [22]) a simple routing framework adapted to WMNs that is also able to easily manage user mobility; MeshDVbox ([22], [23]) a custom mesh router realization based on offthe-shelf components; Mesh Routing Strategy (MRS) ([24], [25], [26], [27]) a general MAC-independent cross-layer routing approach that increases the transport capacity of the mesh backbone. While the first two contributions are complementary specific solution for WMNs, Mesh Routing Strategy (MRS) is quite general and may be applied to any multi-hop wireless network. In more details: MeshDV: MeshDV is a routing protocol framework expressly designed for Wireless Mesh Networks, able to effectively manage clients mobility. MeshDV is composed of a fully modular architecture that eases its development. It combines proactive route computation for routers and on-demand path setup for clients. In particular, proactive route computation is performed using a Distance Vector (DV) approach, which sets up meshed paths between each WMR present on the mesh backbone. Since the WMRs are fixed, a proactive DV approach fits well in order to reduce overhead introduced by network wide broadcasts, which are particularly

30 Contribution of the thesis expensive in wireless environments in terms of medium resources. Path setup between clients is obtained in an on-demand fashion through new mechanisms that take advantage of the particular characteristics of mesh networks. Furthermore, these mechanisms fully leverage on existing standard IPv6 mechanisms, allowing MeshDV to gracefully integrate them and use them in the most appropriate manner for WMNs. This design choice greatly eases the management of clients mobility. Indeed, client-to-client path setup signaling also takes in charge their mobility, advertising when necessary clients wandering from a WMR to another. Another advantage is that it scales well. It also behaves correctly in small scale WMNs, where all services are placed outside the mesh and reachable through one or more gateways. MeshDV, however, does not rely on the presence of gateways, and works well also in standalone WMNs. In large scale WMNs, where services are spread into the network on servers associated to WMRs, MeshDV adapts automatically. Indeed, it is a totally distributed approach that does not make any assumption on the traffic pattern. MeshDVbox: MeshDVbox routers are the physical platform on which MeshDV has been implemented and tested. These custom WMRs have a simple architecture based on commercial components and open source code. Inside MeshDVbox, only the IPv6 protocol stack is enabled, in order to avoid the common practice of developing complete IPv4 solutions with only some IPv6 features. In these approaches, indeed, not all issues solved in the IPv4 case are then tackled in IPv6, often some key enhanced services are implemented only for IPv4, making the IPv6 version of the proposal not able to work without IPv4. On our mesh router, two interfaces are present: one working as an access point for client connections, using IEEE b [28] technology; the other working in ad hoc mode forming the mesh backbone with the others WMRs peer interfaces, using IEEE a [29]. In this way, we have the nice property that the mesh backbone sub-network and the client access sub-network are physically independent. This contribution, like the MeshDV prototype, is part of the RNRT-Infradio Project [30] whose main objective, among others, is to deploy a WMN test bed on the University Campus of Jussieu in Paris (University of Pierre et Marie Curie Paris VI). MRS: MRS is the final results on the research we performed in cross-layer routing. We first formalized cross-layer routing as a power optimization problem [27],

31 Chapter 1. Introduction 13 Interference Interference Power = Growing Tx Power PER Ideal Optimum PER Power Figure 1.2: Relation between Interference and Packet Error Rate when transmission power is changed. concluding that this leads to an NP-Complete problem. We proposed a simple heuristic, able to find good transmission power level trade-offs, high throughput paths, reduced interference, and increased reliability. The main task of the proposed heuristic is to optimize, through power control, the communication toward each neighbor, in terms of rate, interference, and Packet Error Rate (PER). In particular, interference is estimated by using an innovative approach based on what we called Interference Trend Index Estimator, an index able to forecast the interference generated on each transmission of a packet. Figure 1.2 shows the relation between Interference, PER and transmission power. Concerning the interference, we observe that the more (less) power used, the higher (lower) the interference (cf. top left side of figure 1.2). Concerning the PER, we observe that the more (less) power used, the lower (higher) the PER (cf. bottom left side of figure 1.2). Composing this two functions, operation indicated by the symbol in figure 1.2, leads to find the relation between interference and PER when the transmission power is changed (cf. right side of figure 1.2). MRS searches the optimal trade-off on the Interference-PER curve of each local hop, by setting an optimal transmission power level that minimizes the distance from the ideal optimum. The ideal optimum is the origin of the axis, where a transmission does not

32 Outline produce interference and there are no packet losses. When a packet is sent, the transmission power is dynamically adapted, since different next-hops may have different optimal power levels. Thus, by a distance vector approach, our routing solution selects optimal paths to reach any other WMR of the network. Even if MRS is designed using lower layer parameters, it does not rely on any particular MAC approach; it uses general parameters of any wireless communication device. We thoroughly analyze our proposal by simulations and provide a comparison to other wireless multi-hop routing protocols. While demonstrating the impact and the importance of choosing good paths in wireless multi-hop networks, in order to increase the overall performance, MRS shows itself able to offer drastically improved throughput capacity while reducing the costs in terms of transmission power. MRS fits well in the modular architecture of MeshDV, improving its performance. The work described in this thesis, has both a theoretic aspect, in particular on the formalization of MRS, but also a practical one, in the design and implementation work of MeshDV and MeshDVbox. The work done in studying the theoretical laws of wireless multi-hop networks, in particular the transport capacity scaling law, helped in finding appropriate routing metrics for the MRS proposition, therefore increasing the throughput capacity. The implementation work performed in the framework of the RNRT-Infradio Project has enabled us to deeply look in real devices, test-bed issues, and users mobility problems. The realization of MeshDV and the MeshDVbox is the final result of this work. 1.4 Outline The remainder of this thesis contains five chapters. In chapter 2, a deeper insight is given on the routing problem in wireless multi-hop networks and the mobility management issue. Chapter 3 proposes a general routing framework able to effectively increase the mesh backbone capacity while managing user mobility, presenting also the main results for the mobility management part. In chapter 4, there is the detailed proposal of cross-layer routing which is thoroughly evaluated in chapter 5. The last chapter concludes this thesis, resuming the main results and contributions and proposing future works and research directions.

33 Chapter2 Routing and Mobility in Wireless Multi-hop Networks Routing (and forwarding) in such a complex and dynamic context like wireless multi-hop networks, exhibits different and still unsolved technical challenges. Differently from the wired Internet, wireless networks have specific limitations, properties, and issues, such as limited bandwidth, dynamic topology, link interference, link range limitations, and inherent broadcast nature. Moreover, the common practice of using a flat addressing structure in wireless multi-hop networks does not allow route aggregation like in the hierarchical wired Internet, introducing several drawbacks. 1 The impossibility of performing route aggregation leads to an increase in routing table size and also in the number and the size of routing messages. The result is a greater overhead in terms of computation, memory usage, and bandwidth. Link quality assessment becomes a key feature of well performing routing protocols, 1 The use of a flat addressing structure in wireless multi-hop networks is not an intrinsic property of these networks, but the way addresses are usually assigned to each node in real deployments.

34 The problem of finding good paths in order to overcome numbers of issues rose by the wireless environment and the mobility nature of wireless equipments. In architectures like ad hoc, routing is performed on each terminal that joins the network, which may also follow a high mobility behavior. In a WMN, routing is performed only on WMRs, which can only join or leave the network, building a full set of meshed paths between each pairs of WMRs. The mobility issue here consists of users moving in the area covered by WMRs. Even if ad hoc and WMRs are different, they have similar issues in both routing and mobility management. Moreover, literature present numbers of examples of solution for WMRs derived from previous works in ad hoc. For this reason, in this chapter we present milestones works for both WMNs and ad hoc without making any particular differentiation. However, before focusing on this issue, hereafter we detail the two major concerns to be considered when routing in the wireless multi-hop context: the selection of good paths and user mobility management. 2.1 The problem of finding good paths Routing in multi-hop wireless networks using the traditional Hop-Count Shortest-Path metric is not a sufficient condition to construct good paths, as showed by De Couto et al. [31]. By good paths, we mean paths that are able to effectively transport data with reasonable delay, throughput, and reliability. By means of experimental results from real test-beds, De Couto et al. show that usually there are multiple minimum hop-count paths, many of which have poor throughput. The main reason of this is the fact that the wireless link has a variable behavior characteristic which is not captured by the hop-count metric. For example, radio links between nodes may have loss rates low enough that the routing protocol is willing to use them, but high enough that much of the capacity is consumed by retransmissions. This condition, affected also by the unstable behavior of the wireless channel, has unpredictable bottom-up side effects through the whole protocol stack. The above issue is emphasized by traditional route discovery mechanisms, which are not able to discover the characteristics of the wireless links, especially the multi-rate capabilities of modern radio devices. The usual approach consists in HELLO packets broadcasted on the wireless medium. Broadcast packets are always sent at the lowest transmission rate, since for them there is no Acknowledgement (ACK) and it allows to reach the largest number of neighbors. Indeed, different transmission range have

35 11 Mbps Chapter 2. Routing and Mobility in Wireless Multi-hop Networks 17 Source Source N2 Destination N1 N3 5.5 Mbps 2 Mbps 1 Mbps Figure 2.1: The gray-zone phenomenon in the case of IEEE b wireless cards. different transmission rate: the higher the transmission rate, the smaller the transmission range. Lundgren et al. [32] have demonstrated that this approach has a severe drawback that they call gray-zones. A node in a gray-zone can be sensed by broadcast HELLO packets, but it cannot relay traffic at rates higher than the rate of the broadcast. Figure 2.1 shows an example of this phenomenon in the case of Institute of Electrical and Electronics Engineers (IEEE) b wireless cards. If node N1 wishes to communicate to node N3 the usual approach is to do it directly, since N1 and N3 sense each other through broadcast sent at 1 Mbps. The result is that data exchange will never use a transmission rate higher than 1 Mbps. If instead of direct communication, multi-hop through N2 would be used, data could be sent using two transmissions at 11 Mbps, which means roughly an end-to-end rate of 5.5 Mbps, five times greater than the previous approach. Routing protocols selecting shortest hop-count paths have the natural attitude of using long hops, i.e. relay positioned in a gray-zone. Furthermore, the higher is the density of the network, the more likely hop-count routing protocols choose next-hops in a gray-zone, as we will show in chapter 5, resulting in a strong reduction in throughput performance. The fact that the average transmission rate lowers when density increases has also severe effects in the overall transport capacity of the entire network, as we will show later. Gray-zones is not the only phenomenon that can reduce the transport capacity of the network, in particular in the case of IEEE technology. Indeed, Heusse et al. [33]

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

The Future of Network Marketing Research

The Future of Network Marketing Research ONELAB and experimentally driven research. Leandros Tassiulas http://www.inf.uth.gr/~leandros University of Thessaly Volos, Greece Outline Onelab: facilitating experimentally driven research in Europe

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Wireless Mesh Networks: WMN Overview, WMN Architecture

Wireless Mesh Networks: WMN Overview, WMN Architecture 2011 International Conference on Communication Engineering and Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Singapore Wireless Mesh Networks: WMN Overview, WMN Architecture Mojtaba Seyedzadegan,

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Heterogeneous PLC-RF networking for LLNs

Heterogeneous PLC-RF networking for LLNs Heterogeneous PLC-RF networking for LLNs Cedric Chauvenet, Bernard Tourancheau To cite this version: Cedric Chauvenet, Bernard Tourancheau. Heterogeneous PLC-RF networking for LLNs. CFIP 2011 - Colloque

More information

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Youssef Khouaja, Emmanuel Coelho-Alves, Philippe Bertin Le présent document contient des informations qui sont la propriété de

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

DOMINO Broadband Bonding Network

DOMINO Broadband Bonding Network 2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Sun Management Center Change Manager 1.0.1 Release Notes

Sun Management Center Change Manager 1.0.1 Release Notes Sun Management Center Change Manager 1.0.1 Release Notes Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0891 10 May 2003 Copyright 2003 Sun Microsystems, Inc. 4150

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Introduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr

Introduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr Quel est l objectif? 1 La France n est pas le seul pays impliqué 2 Une démarche obligatoire 3 Une organisation plus efficace 4 Le contexte 5 Risque d erreur INTERVENANTS : - Architecte - Économiste - Contrôleur

More information

Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways

Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg

Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg Agenda Le Business Case pour le Cloud Computing Qu est ce que le Cloud

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Enhanced Mobility Management in Wireless Mesh Networks

Enhanced Mobility Management in Wireless Mesh Networks Enhanced Mobility Management in Wireless Mesh Networks M. Bezahaf 1, L. Iannone 2, and S. Fdida 1 1 Université Pierre et Marie Curie - Laboratoire LIP6/CNRS 2 Université Catholique de Louvain - IP Networking

More information

IP Routing Configuring Static Routes

IP Routing Configuring Static Routes 11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Bluetooth Low Energy

Bluetooth Low Energy Bluetooth Low Energy Responsable de l épreuve : L. Toutain Tous documents autorisés. Répondez uniquement sur la copie en annexe. Lisez bien tout le document avant de commencer à répondre 1 Bluetooth Low

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

Parallel Discrepancy-based Search

Parallel Discrepancy-based Search Parallel Discrepancy-based Search T. Moisan, J. Gaudreault, C.-G. Quimper Université Laval, FORAC research consortium February 21 th 2014 T. Moisan, J. Gaudreault, C.-G. Quimper Parallel Discrepancy-based

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Lesson 5-3: Border Gateway Protocol

Lesson 5-3: Border Gateway Protocol Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Sun StorEdge A5000 Installation Guide

Sun StorEdge A5000 Installation Guide Sun StorEdge A5000 Installation Guide for Windows NT Server 4.0 Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303-4900 USA 650 960-1300 Fax 650 969-9131 Part No. 805-7273-11 October 1998,

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Figure 2 Control and data planes WMR NODE ARCHITECTURE

Figure 2 Control and data planes WMR NODE ARCHITECTURE Controller selection in a Wireless Mesh SDN under network partitioning and merging scenarios Stefano Salsano, Giuseppe Siracusano, Andrea Detti, Claudio Pisa, Pier Luigi Ventre, Nicola Blefari-Melazzi

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA

Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA VÉRIFICATION DES ENTENTES DE SEMAINE DE TRAVAIL COMPRIMÉE

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Measuring Policing Complexity: A Research Based Agenda

Measuring Policing Complexity: A Research Based Agenda ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing

More information

Solaris Bandwidth Manager

Solaris Bandwidth Manager Solaris Bandwidth Manager By Evert Hoogendoorn - Enterprise Engineering Sun BluePrints Online - June 1999 http://www.sun.com/blueprints Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Survey on Conference Services provided by the United Nations Office at Geneva

Survey on Conference Services provided by the United Nations Office at Geneva Survey on Conference Services provided by the United Nations Office at Geneva Trade and Development Board, fifty-eighth session Geneva, 12-23 September 2011 Contents Survey contents Evaluation criteria

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel.

#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel. D A N T E I N P R I N T #10 Technical Options for a European High-Speed Backbone Michael Behringer This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in

More information

Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network

Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network A thesis report submitted for partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,

More information

Il est repris ci-dessous sans aucune complétude - quelques éléments de cet article, dont il est fait des citations (texte entre guillemets).

Il est repris ci-dessous sans aucune complétude - quelques éléments de cet article, dont il est fait des citations (texte entre guillemets). Modélisation déclarative et sémantique, ontologies, assemblage et intégration de modèles, génération de code Declarative and semantic modelling, ontologies, model linking and integration, code generation

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Optimizing Solaris Resources Through Load Balancing

Optimizing Solaris Resources Through Load Balancing Optimizing Solaris Resources Through Load Balancing By Tom Bialaski - Enterprise Engineering Sun BluePrints Online - June 1999 http://www.sun.com/blueprints Sun Microsystems, Inc. 901 San Antonio Road

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Covert Channels inside DNS

Covert Channels inside DNS Covert Channels inside DNS Lucas Nussbaum Lucas Nussbaum Covert Channels inside DNS 1 / 23 Introduction On many networks, to access the Internet: you have to pay (airports, train stations, hotels) or you

More information

COLLABORATIVE LCA. Rachel Arnould and Thomas Albisser. Hop-Cube, France

COLLABORATIVE LCA. Rachel Arnould and Thomas Albisser. Hop-Cube, France COLLABORATIVE LCA Rachel Arnould and Thomas Albisser Hop-Cube, France Abstract Ecolabels, standards, environmental labeling: product category rules supporting the desire for transparency on products environmental

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo. gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper MONITORING SERVICE DELIVERY IN AN MPLS ENVIRONMENT A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee highbandwidth capacity

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions White Paper Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions Executive Summary User expectations for network availability and tolerance for

More information

Performance Modeling of TCP/IP in a Wide-Area Network

Performance Modeling of TCP/IP in a Wide-Area Network INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Performance Modeling of TCP/IP in a Wide-Area Network Eitan Altman, Jean Bolot, Philippe Nain, Driss Elouadghiri, Mohammed Erramdani, Patrick

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar

Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Rutgers University 2014 Fall IAB December 12 th, 2014 Need for Inter-network Cooperation Interaction between managed wireless

More information