Refine
Departments, institutes and facilities
Document Type
- Conference Object (48)
- Article (6)
- Doctoral Thesis (1)
- Report (1)
Year of publication
Language
- English (56) (remove)
Keywords
- WiLD (3)
- 802.11 (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- LoRa (2)
- Long-Distance WiFi (2)
- OpenFlow (2)
- WiFi (2)
- Customization (1)
- Directional Antenna (1)
UTRAN Internet Access
(1999)
This paper presents the current stage of an IP-based architecture for heterogeneous environments, covering UMTS-like W-CDMA wireless access technology, wireless and wired LANs, that is being developed under the aegis of the IST Moby Dick project. This architecture treats all transmission capabilities as basic physical and data-link layers, and attempts to replace all higher-level tasks by IP-based strategies.
The Information Footprint
(1995)
The combination of Software-Defined Networking (SDN) and Wireless Mesh Network (WMN) is challenging due to the different natures of both concepts. SDN describes networks with homogeneous, static and centralized controlled topologies. In contrast, a WMN is characterized by a dynamic and distributed network control, and adds new challenges with respect to time-critical operation. However, SDN and WMN are both associated with decreasing the operational costs for communication networks which is especially beneficial for internet provisioning in rural areas. This work surveys the current status for Software-Defined Wireless Mesh Networking. Besides a general overview in the domain of wireless SDN, this work focuses especially on different identified aspects: representing and controlling wireless interfaces, control-plane connection and topology discovery, modulation and coding, routing and load-balancing and client handling. A complete overview of surveyed solutions, open issues and new research directions is provided with regard to each aspect.
This paper describes the security mechanisms of several wireless building automation technologies, namely ZigBee, EnOcean, ZWave, KNX, FS20, and Home-Matic. It is shown that none of the technologies provides the necessary measure ofsecurity that should be expected in building automation systems. One of the conclusions drawn is that software embedded in systems that are build for a lifetime of twenty years or more needs to be updatable.
Reliable multicast transport services for content delivery in heterogeneous mobile environment
(2007)
For efficient deployment of new reliable multicast applications in heterogeneous mobile Internet environments, appropriate retransmission strategies are proposed. The focus is the minimization of the protocol overhead for reliable transport taking into account behaviour in mobile networks (oss and handover behaviour) and application requirements (such as carousel file transfer, one-to-many download and media streaming combined with recording). The proposed techniques are designed as building blocks for localized multicast error control supported by access routers. Considering IETF RMT standardization work, the discussed retransmission approaches can be used for flexible configuration of tree-based reliable multicast protocols in converged wired and wireless Internet environment. The implementation developed for the European project DAIDALOS [1] is based on Linux IPv6 environment. Simulations in ns2 focusing on the benefits of the proposed multicast retransmission schemes for particular application scenarios are presented.
Real-World Performance of current Mesh Protocols in a small-scale Dual-Radio Multi-Link Environment
(2017)
Two key questions motivated the work in this paper: What is the impact of different usage schemes for multiple channels in a dual-radio Wireless Mesh Network (WMN), and what is the impact of some popular WMN routing protocols on its performance. These two questions were evaluated in a small and simple real-world scenario. A major concern was reproducibility of the results. We show that it is beneficial to use both radios on different frequencies in a fully meshed environment with four routers. The routing protocols Babel, B.A.T.M.A.N. V, BMX7 and OLSRv2 recognize a saturated channel and prefer the other one. We show that in our scenario all of the protocols perform equally well since the protocol overhead is comparably low not influencing the overall performance of the network.
Quantifying the spectrum occupancy in an outdoor 5 GHz WiFi network with directional antennas
(2018)
WiFi-based Long Distance networks are seen as a promising alternative for bringing broadband connectivity to rural areas. A key factor for the profitability of these networks is using license free bands. This work quantifies the current spectrum occupancy in our testbed, which covers rural and urban areas alike. The data mining is conducted on the same WiFi card and in parallel with an operational network. The presented evaluations reveal tendencies for various aspects: occupancy compared to population density, occupancy fluctuations, (joint)-vacant channels, the mean channel vacant duration, different approaches to model/forecast occupancy, and correlations among related interfaces.
Quantifying Interference in WiLD Networks using Topography Data and Realistic Antenna Patterns
(2019)
Avoiding possible interference is a key aspect to maximize the performance in Wi-Fi based Long Distance networks. In this paper we quantify self-induced interference based on data derived from our testbed and match the findings against simulations. By enhancing current simulation models with two key elements we significantly reduce the deviation between testbed and simulation: the usage of detailed antenna patterns compared to the cone model and propagation modeling enhanced by license-free topography data. Based on the gathered data we discuss several possible optimization approaches such as physical separation of local radios, tuning the sensitivity of the transmitter and using centralized compared to distributed channel assignment algorithms. While our testbed is based on 5 GHz Wi-Fi, we briefly discuss the possible impact of our results to other frequency bands.