Refine
Departments, institutes and facilities
Document Type
- Conference Object (50)
- Article (7)
- Part of a Book (1)
- Doctoral Thesis (1)
- Patent (1)
- Report (1)
Year of publication
Keywords
- WiLD (3)
- 802.11 (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- Internet (2)
- LoRa (2)
- Long-Distance WiFi (2)
- OpenFlow (2)
- WiFi (2)
- Customization (1)
Influence of priorities on the performance of a fast packet switch in the case of bursty traffic
(1992)
Three emerging technologies are combined in a setup that has been installed and tested at GMD - the German National Research Center for Information Technology: 1. Multimedia Telecooperation Applications; 2. ATM-based high-speed networks; 3. Satellite links. The results are promising: After some initial problems, the complete scenario is up and running, allowing the interconnection of local high-speed infrastructures in rural areas to a core network via satellite. This paper describes the R&D background and state- of-the-art that led us to this approach. It then describes the communication infrastructure and the application infra- structure of the setup, the problems we had and the solu- tions we found. Finally, our experiences are summarized, and an outlook is made for future implementations.
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative approach for Internet in rural areas. The main hardware components of these networks are commercial off-the-shelf WiFi radios and directional antennas. During our experiences with real-world WiLD networks, we encountered that interference among long-distance links is a major issue even with high gain directional antennas. In this work, we are providing an in-depth analysis of these interference effects by conducting simulations in ns-3. To closely match the real-world interference effects, we implemented a module to load radiation pattern of commonly used antennas. We analyze two different interference scenarios typically present as a part of larger networks. The results show that side-lobes of directional antennas significantly influence the throughput of long-distance WiFi links depending on the orientation. This work emphasizes that the usage of simple directional antenna models needs to be considered carefully.
The MoMoSat service will enable mobile end-users to view, manage, annotate, and communicate mapbased information in the field. The handled information exists of a huge volume of raster (satellite or aerial images) and vector data (i.e. street networks, cadastral maps or points of interest), as well as text-specific geo-referenced textual notes (the so-called 'GeoNotes') and real-time voice.
Multipoint data-communications is among the hot topics of communication research and development. A lot of studies and ideas have been presented, the vast majority focusing on a homogenous environment in terms of physical network, communication protocol stacks, coding schemes and/or service qualities. First straight-forward implementations –Steve Deering‘s IP multipoint on the MBone being the most popular one– already give an idea of the capabilities of a multipoint environment.
News on demand
(1996)
More and more low-power wide-area networks (LPWANs) are being deployed and planning the gateway locations plays a significant role for the network range, performance and profitability. We choose LoRa as one LPWAN technology and evaluated the accuracy of the Received Signal Strength Indication (RSSI) of different chipsets in a laboratory environment. The results show the chipsets report significantly different RSSI. To estimate the range of a LPWAN beforehand, path loss models have been proposed. Compared to previous work, we evaluated the Longley-Rice Irregular Terrain Model which makes use of real-world elevation data to predict the path loss. To verify the results of that prediction, an extensive measurements campaign in a semi-urban area in Germany has been conducted. The results show that terrain data can increase the prediction accuracy.
Policy based resource management for QoS aware applications in heterogeneous network environments
(2007)
Dynamic configuration and adaptation of resources for QoS-aware applications in heterogeneous access network environment (UMTS, WIMAX, WLAN DVB-T, DVB-H) using automated tools is a challenge today. The focus of this paper is a toolkit for intelligent management of resource allocation in heterogeneous network infrastructures based on policies of different actors (network operator, service providers and users). Policy based management of resources for QoS-aware applications (Video-on-Demand, Mobile TV) dependent on network capabilities, context learning and preferences of the policy actors is proposed, which enhances the current state-of-the-art and IETF standardisation. The policy management toolkit includes components for policy specification, adaptation and enforcement, which are interacting using policy repository. The design allows the automated resource adaptation for QoS based applications based on context information and hierarchical dependencies of policy actors. A learning component is integrated in order to discover the context considering measurement and monitoring data. The policy management tookit is discussed, emphasising on ontology driven policy repository design, context learning and flexible scenario-oriented management interfaces for policy specifications.
Providing Mobile Phone Access in Rural Areas via Heterogeneous Meshed Wireless Back-Haul Networks
(2011)
Quantifying Interference in WiLD Networks using Topography Data and Realistic Antenna Patterns
(2019)
Avoiding possible interference is a key aspect to maximize the performance in Wi-Fi based Long Distance networks. In this paper we quantify self-induced interference based on data derived from our testbed and match the findings against simulations. By enhancing current simulation models with two key elements we significantly reduce the deviation between testbed and simulation: the usage of detailed antenna patterns compared to the cone model and propagation modeling enhanced by license-free topography data. Based on the gathered data we discuss several possible optimization approaches such as physical separation of local radios, tuning the sensitivity of the transmitter and using centralized compared to distributed channel assignment algorithms. While our testbed is based on 5 GHz Wi-Fi, we briefly discuss the possible impact of our results to other frequency bands.
Quantifying the spectrum occupancy in an outdoor 5 GHz WiFi network with directional antennas
(2018)
WiFi-based Long Distance networks are seen as a promising alternative for bringing broadband connectivity to rural areas. A key factor for the profitability of these networks is using license free bands. This work quantifies the current spectrum occupancy in our testbed, which covers rural and urban areas alike. The data mining is conducted on the same WiFi card and in parallel with an operational network. The presented evaluations reveal tendencies for various aspects: occupancy compared to population density, occupancy fluctuations, (joint)-vacant channels, the mean channel vacant duration, different approaches to model/forecast occupancy, and correlations among related interfaces.
Real-World Performance of current Mesh Protocols in a small-scale Dual-Radio Multi-Link Environment
(2017)
Two key questions motivated the work in this paper: What is the impact of different usage schemes for multiple channels in a dual-radio Wireless Mesh Network (WMN), and what is the impact of some popular WMN routing protocols on its performance. These two questions were evaluated in a small and simple real-world scenario. A major concern was reproducibility of the results. We show that it is beneficial to use both radios on different frequencies in a fully meshed environment with four routers. The routing protocols Babel, B.A.T.M.A.N. V, BMX7 and OLSRv2 recognize a saturated channel and prefer the other one. We show that in our scenario all of the protocols perform equally well since the protocol overhead is comparably low not influencing the overall performance of the network.
Reliable multicast transport services for content delivery in heterogeneous mobile environment
(2007)
For efficient deployment of new reliable multicast applications in heterogeneous mobile Internet environments, appropriate retransmission strategies are proposed. The focus is the minimization of the protocol overhead for reliable transport taking into account behaviour in mobile networks (oss and handover behaviour) and application requirements (such as carousel file transfer, one-to-many download and media streaming combined with recording). The proposed techniques are designed as building blocks for localized multicast error control supported by access routers. Considering IETF RMT standardization work, the discussed retransmission approaches can be used for flexible configuration of tree-based reliable multicast protocols in converged wired and wireless Internet environment. The implementation developed for the European project DAIDALOS [1] is based on Linux IPv6 environment. Simulations in ns2 focusing on the benefits of the proposed multicast retransmission schemes for particular application scenarios are presented.
This paper describes the security mechanisms of several wireless building automation technologies, namely ZigBee, EnOcean, ZWave, KNX, FS20, and Home-Matic. It is shown that none of the technologies provides the necessary measure ofsecurity that should be expected in building automation systems. One of the conclusions drawn is that software embedded in systems that are build for a lifetime of twenty years or more needs to be updatable.
Zukünftige Netze sollen in der Lage sein, eine Vielzahl verschiedener Dienste zu unterstützen. Dabei wird angenommen, dass sie oft keine statische Netzwerkstruktur haben und sich daher selbsttätig konfigurieren und automatisch an wechselnde Anforderungen sowie Netzwerksituationen und -änderungen anpassen sollen. Es ist wünschenswert, dass die benötigte Dienstqualität (QoS), im Besonderen für zeitkritische Anwendungen wie VoIP, automatisch gewährleistet werden kann. Das Netz soll zukünftigen Anforderungen gerecht werden, auch wenn diese zum Zeitpunkt der Erstellung noch nicht relevant oder bekannt sind. In diesem Dokument wird ein möglicher Ansatz des noch jungen Forschungsprojekts Self-NET für die Erfüllung der genannten Anforderungen skizziert und zur Diskussion gestellt.
Verschiedene intelligente Heimautomatisierungsgeräte wie Lampen, Schlösser und Thermostate verbreiten sich rasant im privaten Umfeld. Ein typisches Kommunikationsprotokoll für diese Geräteklasse ist Bluetooth Low Energy (BLE). In dieser Arbeit wird eine strukturierte Sicherheitsanalyse für BLE vorgestellt. Die beschriebene Vorgehensweise kategorisiert bekannte Angriffsvektoren und beschreibt einen möglichen Aufbau für eine Analyse. Im Zuge dieser Arbeit wurden einige sicherheitsrelevante Probleme aufgedeckt, die es Angreifern ermöglichen die Geräte vollständig zu übernehmen. Es zeigte sich, dass im Standard vorgesehene Sicherheitsfunktionen wie Verschlüsselung und Integritätsprüfungen häufig gar nicht oder fehlerhaft implementiert sind.