2018
Clausen, Thomas; Cordero, Juan-Antonio; Yi, Jiazi; Igarashi, Yuichi
Use 'em or Lose 'em: On Unidirectional Links in Reactive Routing Protocols Journal Article
In: Ad Hoc Networks, vol. 73, pp. 51 - 64, 2018, ISSN: 1570-8705.
Abstract | Links | BibTeX | Tags:
@article{CLAUSEN201851,
title = {Use 'em or Lose 'em: On Unidirectional Links in Reactive Routing Protocols},
author = {Thomas Clausen and Juan-Antonio Cordero and Jiazi Yi and Yuichi Igarashi},
url = {http://www.sciencedirect.com/science/article/pii/S1570870518300325},
doi = {https://doi.org/10.1016/j.adhoc.2018.02.004},
issn = {1570-8705},
year = {2018},
date = {2018-01-01},
journal = {Ad Hoc Networks},
volume = {73},
pages = {51 - 64},
abstract = {In reactive unicast routing protocols, Route Discovery aims to include only bidirectional links in discovered routing paths. This is typically accomplished by having routers maintain a “blacklist” of links recently confirmed (through Route Reply processing) to be unidirectional – which is then used for excluding subsequent Route Discovery control messages received over these links from being processed and forwarded. This paper first presents an analytical model, which allows to study the impact of unidirectional links being present in a network, on the performance of reactive routing protocols. Next, this paper identifies that despite the use of a “blacklist”, the Route Discovery process may result in discovery of false forward routes, i.e.,routes containing unidirectional links – and proposes a counter-measure denoted Forward Bidirectionality Check. This paper further proposes a Loop Exploration mechanism, allowing to properly include unidirectional links in a discovered routing topology – with the goal of providing bidirectional connectivity even in absence of bidirectional paths in the network. Finally, each of these proposed mechanisms are subjected to extensive network simulations in static scenarios. When the fraction of unidirectional links is moderate (15–50%), simulations find Forward Bidirectionality Check to significantly increase the probability that bidirectional routing paths can be discovered by a reactive routing protocol, while incurring only an insignificant additional overhead. Further, in networks with a significant fraction of unidirectional links ( ≥ 50%), simulations reveal that Loop Exploration preserves the ability of a reactive routing protocol to establish bidirectional communication (possibly through non-bidirectional paths), but at the expense of a substantial additional overhead.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2017
Yi, Jiazi; Parrein, Benoit
Multipath Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
RFC 8218, 2017.
Abstract | Links | BibTeX | Tags: ad hoc, multipath, olsr, olsrv2, rfc, standard
@misc{rfc8218,
title = {Multipath Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Jiazi Yi and Benoit Parrein},
url = {https://rfc-editor.org/rfc/rfc8218.txt},
doi = {10.17487/RFC8218},
year = {2017},
date = {2017-08-25},
number = {8218},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document specifies a multipath extension for the Optimized Link State Routing Protocol version 2 (OLSRv2) to discover multiple disjoint paths for Mobile Ad Hoc Networks (MANETs). Considering the characteristics of MANETs, especially the dynamic network topology, using multiple paths can increase aggregated throughput and improve the reliability by avoiding single route failures. The interoperability with OLSRv2 is retained.},
howpublished = {RFC 8218},
keywords = {ad hoc, multipath, olsr, olsrv2, rfc, standard},
pubstate = {published},
tppubtype = {misc}
}
Clausen, Thomas H.; Herberg, Ulrich; Yi, Jiazi
Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
RFC 8116, 2017.
Abstract | Links | BibTeX | Tags: olsr, olsrv2, rfc, standard
@misc{rfc8116,
title = {Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Thomas H. Clausen and Ulrich Herberg and Jiazi Yi},
url = {https://rfc-editor.org/rfc/rfc8116.txt},
doi = {10.17487/rfc8116},
year = {2017},
date = {2017-01-01},
number = {8116},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document analyzes common security threats to the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It also analyzes which of these security vulnerabilities can be mitigated when using the mandatory-to-implement security mechanisms for OLSRv2 and how the vulnerabilities are mitigated.},
howpublished = {RFC 8116},
keywords = {olsr, olsrv2, rfc, standard},
pubstate = {published},
tppubtype = {misc}
}
Clausen, Thomas; Yi, Jiazi; Herberg, Ulrich
Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation (LOADng): Protocol, Extension, and Applicability Journal Article
In: Computer Networks, vol. 126, pp. 125-140, 2017, ISSN: 1389-1286.
Abstract | Links | BibTeX | Tags: lln, loadng, reactive protocol
@article{Clausen2017,
title = {Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation (LOADng): Protocol, Extension, and Applicability},
author = {Thomas Clausen and Jiazi Yi and Ulrich Herberg},
url = {http://www.sciencedirect.com/science/article/pii/S1389128617302694
http://jiaziyi.com/wp-content/uploads/2017/07/1-s2.0-S1389128617302694-main-2.pdf},
doi = {http://dx.doi.org/10.1016/j.comnet.2017.06.025},
issn = {1389-1286},
year = {2017},
date = {2017-01-01},
journal = {Computer Networks},
volume = {126},
pages = {125-140},
abstract = {This paper studies the routing protocol “Lightweight On-demand Ad hoc Distance-vector Routing Protocol – Next Generation (LOADng)”, designed to enable efficient, scalable and secure routing in low power and lossy networks. As a reactive protocol, it does not maintain a routing table for all destinations in the network, but initiates a route discovery to a destination only when there is data to be sent to that destination to reduce routing overhead and memory consumption. Designed with a modular approach, LOADng can be extended with additional components for adapting the protocol to different topologies, traffic, and data-link layer characteristics. This paper studies several such additional components for extending LOADng: support for smart route requests and expanding ring search, an extension permitting maintaining collection trees, a fast rerouting extension. All those extensions are examined from the aspects of specification, interoperability with other mechanisms, security vulnerabilities, performance and applicability. A general framework is also proposed to secure the routing protocol.},
keywords = {lln, loadng, reactive protocol},
pubstate = {published},
tppubtype = {article}
}
2016
Augustin, Aloÿs; Yi, Jiazi; Clausen, Thomas; Townsley, William Mark
A Study of LoRa: Long Range and Low Power Networks for the Internet of Things Journal Article
In: Sensors, vol. 16, no. 9, pp. 1466, 2016, ISSN: 1424-8220.
Abstract | Links | BibTeX | Tags: LoRa, LPWAN, Sensor Networks
@article{s16091466,
title = {A Study of LoRa: Long Range and Low Power Networks for the Internet of Things},
author = {Aloÿs Augustin and Jiazi Yi and Thomas Clausen and William Mark Townsley },
url = {http://jiaziyi.com/wp-content/uploads/2016/09/sensors-16-01466.pdf
http://www.mdpi.com/1424-8220/16/9/1466},
doi = {10.3390/s16091466},
issn = {1424-8220},
year = {2016},
date = {2016-09-09},
journal = {Sensors},
volume = {16},
number = {9},
pages = {1466},
abstract = {LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed.},
keywords = {LoRa, LPWAN, Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Yi, Jiazi; Parrein, Benoit
Multi-path Extension for the Optimized Link State Routing Protocol version 2 (OLSRv2) Miscellaneous
IETF Internet Draft, 2016.
Links | BibTeX | Tags: ietf-id, multipath, olsr, olsrv2
@misc{yi_olsrv2-multipath-2016,
title = {Multi-path Extension for the Optimized Link State Routing Protocol version 2 (OLSRv2)},
author = {Jiazi Yi and Benoit Parrein},
url = {https://tools.ietf.org/html/draft-ietf-manet-olsrv2-multipath-11},
year = {2016},
date = {2016-07-25},
urldate = {2015-11-20},
howpublished = {IETF Internet Draft},
keywords = {ietf-id, multipath, olsr, olsrv2},
pubstate = {published},
tppubtype = {misc}
}
Clausen, Thomas; de Verdiere, Axel Colin; Yi, Jiazi; Igarashi, Yuichi; Lys, Thierry; Lavenu, Cedric; Herberg, Ulrich; Satoh, Hiroki; Niktash, Afshin; Dean, Justin
2016.
Links | BibTeX | Tags: ietf-id, lln, loadng, sogrid, standard
@misc{yi_loadng,
title = {ITU G.9903 Narrow-band orthogonal frequency division multiplexing power line communication transceivers for G3-PLC networks: Amendment 1 -- The Lightweight On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng)},
author = {Thomas Clausen and Axel Colin de Verdiere and Jiazi Yi and Yuichi Igarashi and Thierry Lys and Cedric Lavenu and Ulrich Herberg and Hiroki Satoh and Afshin Niktash and Justin Dean},
url = {https://tools.ietf.org/html/draft-clausen-lln-loadng-15},
year = {2016},
date = {2016-07-04},
urldate = {2015-11-20},
keywords = {ietf-id, lln, loadng, sogrid, standard},
pubstate = {published},
tppubtype = {misc}
}
Jin, Kaiwen; Pfister, Pierre; Yi, Jiazi
Distributed Node Consensus Protocol: Analysis, Evaluation and Performance Proceedings Article
In: Proceedings of the IEEE International Conference on Communications (ICC) 2016, 2016.
Abstract | Links | BibTeX | Tags: Chaire Cisco, dncp, homenet
@inproceedings{Jin2016,
title = {Distributed Node Consensus Protocol: Analysis, Evaluation and Performance},
author = {Kaiwen Jin and Pierre Pfister and Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Distributed-Node-Consensus-Protocol-Analysis-Evaluation-and-Performance.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7510939},
doi = {10.1109/ICC.2016.7510939},
year = {2016},
date = {2016-05-23},
booktitle = {Proceedings of the IEEE International Conference on Communications (ICC) 2016},
abstract = {Abstract—This paper analyzes and evaluates the Distributed Node Consensus Protocol (DNCP), a state synchronization mech- anism developed by the IETF Homenet working group. DNCP enables network function automation for home networks, which are growing in size and complexity. The basic mechanisms of DNCP are studied in this paper, including the state abstraction, synchronization process and keep-alive mechanism. The over- head is analyzed in single-link topology type. To evaluate the performance of DNCP in more complex scenarios, a reference implementation of DNCP is integrated into ns3 simulator. The convergence time and transmission overhead in various topology types are measured. Based on the obtained results, the correctness of DNCP is verified, and the behavior of DNCP can be concluded.},
keywords = {Chaire Cisco, dncp, homenet},
pubstate = {published},
tppubtype = {inproceedings}
}
Herberg, Ulrich; Clausen, Thomas; Yi, Jiazi
Security Threats for the Optimized Link State Routing Protocol version 2 (OLSRv2) Miscellaneous
2016.
Links | BibTeX | Tags: ietf-id, olsr, olsrv2, security
@misc{herberg_security_olsrv2,
title = {Security Threats for the Optimized Link State Routing Protocol version 2 (OLSRv2)},
author = {Ulrich Herberg and Thomas Clausen and Jiazi Yi},
url = {https://tools.ietf.org/html/draft-ietf-manet-olsrv2-sec-threats-02},
year = {2016},
date = {2016-05-09},
urldate = {2015-11-20},
keywords = {ietf-id, olsr, olsrv2, security},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Clausen, Thomas H.; Herberg, Ulrich
Security Threats to Simplified Multicast Forwarding (SMF) Miscellaneous
RFC 7985, 2016.
Abstract | Links | BibTeX | Tags: ad hoc, rfc, security, SMF, standard
@misc{rfc7985,
title = {Security Threats to Simplified Multicast Forwarding (SMF)},
author = {Jiazi Yi and Thomas H. Clausen and Ulrich Herberg},
url = {https://rfc-editor.org/rfc/rfc7985.txt},
doi = {10.17487/rfc7985},
year = {2016},
date = {2016-01-01},
number = {7985},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document analyzes security threats to Simplified Multicast Forwarding (SMF), including vulnerabilities of duplicate packet detection and relay set selection mechanisms. This document is not intended to propose solutions to the threats described.},
howpublished = {RFC 7985},
keywords = {ad hoc, rfc, security, SMF, standard},
pubstate = {published},
tppubtype = {misc}
}
2015
Yi, Jiazi; Clausen, Thomas
Source-Destination Routing for Optimised Link State Routing Protocol Proceedings Article
In: Vehicular Technology Conference (VTC Fall), 2015 IEEE 82nd, pp. 1-5, 2015.
Abstract | Links | BibTeX | Tags: olsr, olsrv2, source-destination routing
@inproceedings{yi-olsrv2-src-dest-2015,
title = {Source-Destination Routing for Optimised Link State Routing Protocol},
author = {Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Source-Destination-Routing-for-Optimised-Link-State-Routing-Protocol.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7391147},
doi = {10.1109/VTCFall.2015.7391147},
year = {2015},
date = {2015-09-01},
booktitle = {Vehicular Technology Conference (VTC Fall), 2015 IEEE 82nd},
pages = {1-5},
abstract = {Typical routing protocols maintain, in their RIB (Routing Information Base) entries permitting destination-based forwarding: for a given data packet, the choice of next hop is a function of the destination address only. However, in deployments where a given network is multi-homed, and where ingress filtering is commonly applied, a routing protocol is required to be able to provide routes so as to forward a data packet (i) to the destination address of the data packet, while (ii) routing through the gateway for which the source address of the data packet is topologically correct. This is called source-destination routing. This paper presents an extension to the Optimized Link State Routing Protocol version 2 (OLSRv2), providing support for such source-destination routing. In a multi- homed network, this OLSRv2 extension provides routes for data packets based also on the source prefix announced by the gateways. The extension is interoperable with unextended OLSRv2. The performance of this extension is quantified by way of simulation studies.
},
keywords = {olsr, olsrv2, source-destination routing},
pubstate = {published},
tppubtype = {inproceedings}
}
Jin, Kaiwen; Pfister, Pierre; Yi, Jiazi
Experience and Evaluation of the Distributed Node Consensus Protocol Miscellaneous
2015.
Links | BibTeX | Tags: dncp, homenet, ietf-id
@misc{jin_experience_2015,
title = {Experience and Evaluation of the Distributed Node Consensus Protocol},
author = {Kaiwen Jin and Pierre Pfister and Jiazi Yi},
url = {https://tools.ietf.org/html/draft-jin-homenet-dncp-experience-00},
year = {2015},
date = {2015-07-06},
urldate = {2015-11-20},
keywords = {dncp, homenet, ietf-id},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Fuertes, Juan; Clausen, Thomas
Jitter Consideration for Reactive Protocols in Mobile Ad Hoc Networks (MANETs) Miscellaneous
2015.
Links | BibTeX | Tags: ietf-id, jitter, loadng, reactive protocol
@misc{yi_jitter,
title = {Jitter Consideration for Reactive Protocols in Mobile Ad Hoc Networks (MANETs)},
author = {Jiazi Yi and Juan Fuertes and Thomas Clausen},
url = {https://tools.ietf.org/html/draft-yi-manet-reactive-jitter-04},
year = {2015},
date = {2015-01-09},
urldate = {2015-11-20},
keywords = {ietf-id, jitter, loadng, reactive protocol},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Clausen, Thomas; Herberg, Ulrich
Depth First Forwarding for Unreliable Networks: Extensions and Applications Journal Article
In: Internet of Things Journal, IEEE, vol. 2, no. 3, pp. 199–209, 2015.
Abstract | Links | BibTeX | Tags: dff, lln, loadng, olsr, olsrv2
@article{yi_dff_2015,
title = {Depth First Forwarding for Unreliable Networks: Extensions and Applications},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Depth-First-Forwarding-for-Unreliable-Networks-Extensions-and-Applications.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7054435},
doi = {10.1109/JIOT.2015.2409892},
year = {2015},
date = {2015-01-01},
urldate = {2015-11-20},
journal = {Internet of Things Journal, IEEE},
volume = {2},
number = {3},
pages = {199--209},
abstract = {This paper introduces extensions and applications of depth-first forwarding (DFF)-a data forwarding mechanism for use in unreliable networks such as sensor networks and Mobile Ad hoc NETworks with limited computational power and storage, low-capacity channels, device mobility, etc. Routing protocols for these networks try to balance conflicting requirements of being reactive to topology and channel variation while also being frugal in resource requirements-but when the underlying topology changes, routing protocols require time to re converge, during which data delivery failure may occur. DFF was developed to alleviate this situation: it reacts rapidly to local data delivery failures and attempts to successfully deliver data while giving a routing protocol time to recover from such a failure. An extension of DFF, denoted as DFF++, is proposed in this paper, in order to optimize the performance of DFF by way of introducing a more efficient search ordering. This paper also studies the applicability of DFF to three major routing protocols for the Internet of Things (IoT), including the Lightweight On-demand Ad hoc Distance-vector Routing Protocol-Next Generation (LOADng), the optimized link state routing protocol version 2 (OLSRv2), and the IPv6 routing protocol for low-power and lossy networks (RPL), and presents the performance of these protocols, with and without DFF, in lossy and unreliable networks.
},
keywords = {dff, lln, loadng, olsr, olsrv2},
pubstate = {published},
tppubtype = {article}
}
2014
Clausen, Thomas; de Verdiere Verdiere, Axel Colin; Yi, Jiazi; Herberg, Ulrich; Igarashi, Yuichi
Observations of RPL: IPv6 Routing Protocol for Low power and Lossy Networks Miscellaneous
IETF Internet Draft, 2014.
Links | BibTeX | Tags: ietf-id, lln, rpl
@misc{herberg_observations_????,
title = {Observations of RPL: IPv6 Routing Protocol for Low power and Lossy Networks},
author = {Thomas Clausen and Axel Colin de Verdiere Verdiere and Jiazi Yi and Ulrich Herberg and Yuichi Igarashi},
url = {https://tools.ietf.org/html/draft-clausen-lln-rpl-experiences-09},
year = {2014},
date = {2014-10-27},
urldate = {2015-11-20},
howpublished = {IETF Internet Draft},
keywords = {ietf-id, lln, rpl},
pubstate = {published},
tppubtype = {misc}
}
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas
An adaptive jitter mechanism for reactive route discovery in sensor networks Journal Article
In: Sensors, vol. 14, no. 8, pp. 14440–14471, 2014.
Abstract | Links | BibTeX | Tags: jitter, lln, sogrid
@article{cordero_adaptive_2014,
title = {An adaptive jitter mechanism for reactive route discovery in sensor networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/An-Adaptive-Jitter-Mechanism-for-Reactive-Route-Discovery-in-Sensor-Networks.pdf
http://www.mdpi.com/1424-8220/14/8/14440/htm},
year = {2014},
date = {2014-08-08},
urldate = {2015-11-20},
journal = {Sensors},
volume = {14},
number = {8},
pages = {14440--14471},
abstract = {This paper analyses the impact of jitter when applied to route discovery in reactive (on-demand) routing protocols. In multi-hop non-synchronized wireless networks, jitter—a small, random variation in the timing of message emission—is commonly employed, as a means to avoid collisions of simultaneous transmissions by adjacent routers over the same channel. In a reactive routing protocol for sensor and ad hoc networks, jitter is recommended during the route discovery process, specifically, during the network-wide flooding of route request messages, in order to avoid collisions. Commonly, a simple uniform jitter is recommended. Alas, this is not without drawbacks: when applying uniform jitter to the route discovery process, an effect called delay inversion is observed. This paper, first, studies and quantifies this delay inversion effect. Second, this paper proposes an adaptive jitter mechanism, designed to alleviate the delay inversion effect and thereby to reduce the route discovery overhead and (ultimately) allow the routing protocol to find more optimal paths, as compared to uniform jitter. This paper presents both analytical and simulation studies, showing that the proposed adaptive jitter can effectively decrease the cost of route discovery and increase the path quality.},
keywords = {jitter, lln, sogrid},
pubstate = {published},
tppubtype = {article}
}
Yi, Jiazi; Clausen, Thomas
Collection Tree Protocol for Lightweight On-demand Ad hoc Distance- vector Routing - Next Generation (LOADng-CT) Miscellaneous
2014.
Links | BibTeX | Tags: ietf-id, lln, loadng, sogrid
@misc{clausen_collection_tree,
title = {Collection Tree Protocol for Lightweight On-demand Ad hoc Distance- vector Routing - Next Generation (LOADng-CT)},
author = {Jiazi Yi and Thomas Clausen},
url = {https://tools.ietf.org/html/draft-yi-loadngct-02},
year = {2014},
date = {2014-07-04},
urldate = {2015-11-20},
keywords = {ietf-id, lln, loadng, sogrid},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Clausen, Thomas
Smart Route Request for Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation Miscellaneous
2014.
Links | BibTeX | Tags: ietf-id, lln, loadng, sogrid
@misc{yi_smartrreq_2014,
title = {Smart Route Request for Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation},
author = {Jiazi Yi and Thomas Clausen},
url = {https://tools.ietf.org/html/draft-yi-loadngsmartrreq-02},
year = {2014},
date = {2014-07-04},
urldate = {2015-11-20},
keywords = {ietf-id, lln, loadng, sogrid},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Herberg, Ulrich; Clausen, Thomas
Security Threats for the Neighborhood Discovery Protocol (NHDP) Miscellaneous
RFC 7186, 2014.
Abstract | Links | BibTeX | Tags: nhdp, rfc, security, standard
@misc{rfc7186,
title = {Security Threats for the Neighborhood Discovery Protocol (NHDP)},
author = {Jiazi Yi and Ulrich Herberg and Thomas Clausen },
url = {https://rfc-editor.org/rfc/rfc7186.txt},
doi = {10.17487/rfc7186},
year = {2014},
date = {2014-04-04},
number = {7186},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document analyzes common security threats of the Neighborhood Discovery Protocol (NHDP) and describes their potential impacts on Mobile Ad Hoc Network (MANET) routing protocols using NHDP. This document is not intended to propose solutions to the threats described.},
howpublished = {RFC 7186},
keywords = {nhdp, rfc, security, standard},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Clausen, Thomas
Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks Journal Article
In: International Journal of Distributed Sensor Networks, vol. 2014, pp. e352421, 2014, ISSN: 1550-1329.
Abstract | Links | BibTeX | Tags: collection tree, loadng, sogrid
@article{yi_collection_2014,
title = {Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks},
author = {Jiazi Yi and Thomas Clausen},
url = {http://www.hindawi.com/journals/ijdsn/2014/352421/abs/
http://jiaziyi.com/wp-content/uploads/2016/08/Collection-Tree-Extension-of-Reactive-Routing-Protocol-for-Low-Power-and-Lossy-Networks.pdf},
doi = {10.1155/2014/352421},
issn = {1550-1329},
year = {2014},
date = {2014-03-25},
urldate = {2015-11-20},
journal = {International Journal of Distributed Sensor Networks},
volume = {2014},
pages = {e352421},
abstract = {This paper proposes an extension to reactive routing protocol, for efficient construction of a collection tree for data acquisition in sensor networks. The Lightweight On-Demand Ad hoc Distance Vector Routing Protocol-Next Generation (LOADng) is a reactive distance vector protocol which is intended for use in mobile ad hoc networks and low-power and lossy networks to build paths between source-destination pairs. In 2013, ITU-T has ratified the recommendation G.9903 Amendment 1, which includes LOADng in a specific normative annex for routing protocol in smart grids. The extension uses the mechanisms from LOADng, imposes minimal overhead and complexity, and enables a deployment to efficiently support “sensor-to-root” traffic, avoiding complications of unidirectional links in the collection tree. The protocol complexity, security, and interoperability are examined in detail. The simulation results show that the extension can effectively improve the efficiency of data acquisition in the network., This paper proposes an extension to reactive routing protocol, for efficient construction of a collection tree for data acquisition in sensor networks. The Lightweight On-Demand Ad hoc Distance Vector Routing Protocol-Next Generation (LOADng) is a reactive distance vector protocol which is intended for use in mobile ad hoc networks and low-power and lossy networks to build paths between source-destination pairs. In 2013, ITU-T has ratified the recommendation G.9903 Amendment 1, which includes LOADng in a specific normative annex for routing protocol in smart grids. The extension uses the mechanisms from LOADng, imposes minimal overhead and complexity, and enables a deployment to efficiently support “sensor-to-root” traffic, avoiding complications of unidirectional links in the collection tree. The protocol complexity, security, and interoperability are examined in detail. The simulation results show that the extension can effectively improve the efficiency of data acquisition in the network.},
keywords = {collection tree, loadng, sogrid},
pubstate = {published},
tppubtype = {article}
}
Yi, Jiazi; Clausen, Thomas; Herberg, Ulrich
Depth First Forwarding for Low Power and Lossy Networks: Application and Extension Proceedings Article
In: Proceedings of IEEE World Forum on Internet of Things WF-IoT 2014, 2014.
Abstract | Links | BibTeX | Tags: Constrained Networks, Cross-Layer Design, dff, lln, loadng, Sensor Networks, sogrid
@inproceedings{LIX-NET-conference-153,
title = {Depth First Forwarding for Low Power and Lossy Networks: Application and Extension},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Depth-First-Forwarding-for-Low-Power-and-Lossy-Networks-Application-and-Extension.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6803211},
doi = {10.1109/WF-IoT.2014.6803211},
year = {2014},
date = {2014-03-01},
publisher = {Proceedings of IEEE World Forum on Internet of Things WF-IoT 2014},
abstract = {Data delivery across a multi-hop low-power and lossy networks (LLNs) is a challenging task: devices participating in such a network have strictly limited computational power and storage, and the communication channels are of low capacity, time-varying and with high loss rates. Consequently, routing protocols finding paths through such a network must be frugal in their control traffic and state requirements, as well as in algorithmic complexity – and even once paths have been found, these may be usable only intermittently, or for a very short time due to changes on the channel. Routing protocols exist for such networks, balancing reactivity to topology and channel variation with frugality in resource requirements. Complementary compo- nent to routing protocols for such LLNs exist, intended not to manage global topology, but to react rapidly to local data delivery failures and (attempt to) successfully deliver data while giving a routing protocol time to recover globally from such a failure. Specifically, this paper studies the “Depth-First Forwarding (DFF) in Unreliable Networks” protocol, standardised within the IETF in June 2013. Moreover, this paper proposes optimisations to that protocol, denoted DFF++, for improved performance and reactivity whilst remaining fully interoperable with DFF as standardised, and incurring neither additional data sets nor protocol signals to be generated.},
keywords = {Constrained Networks, Cross-Layer Design, dff, lln, loadng, Sensor Networks, sogrid},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Yi, Jiazi
Path Accumulation Extensions for the LOADng Routing Protocol in Sensor Networks Proceedings Article
In: Hsu, RobertC. -H.; Wang, Shangguang (Ed.): Internet of Vehicles – Technologies and Services, pp. 150-159, Springer International Publishing, 2014, ISBN: 978-3-319-11166-7.
Abstract | Links | BibTeX | Tags: lln, loadng, Sensor Networks
@inproceedings{Clausen2014,
title = {Path Accumulation Extensions for the LOADng Routing Protocol in Sensor Networks},
author = {Thomas Clausen and Jiazi Yi},
editor = {RobertC.-H. Hsu and Shangguang Wang},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Path-Accumulation-Extensions-for-the-LOADng-Routing-Protocol-in-Sensor-Networks.pdf
http://link.springer.com/chapter/10.1007%2F978-3-319-11167-4_15},
doi = {10.1007/978-3-319-11167-4_15},
isbn = {978-3-319-11166-7},
year = {2014},
date = {2014-01-01},
booktitle = {Internet of Vehicles – Technologies and Services},
volume = {8662},
pages = {150-159},
publisher = {Springer International Publishing},
series = {Lecture Notes in Computer Science},
abstract = {The “Light-weight On-demand Ad-hoc Distance-vector Routing Protocol – Next Generation” (LOADng) is a simple, yet efficient and flexible routing protocol, specifically designed for use in lossy networks with constrained devices. A reactive protocol, LOADng – as a basic mode of operation – offers discovery and maintenance of hop-by-hop routes and imposes a state in intermediate routers proportional to the number of traffic paths served by that intermediate router. This paper offers an extension to LOADng, denoted LOADng-PA (Path Accumulation). LOADng-PA is designed with the motivation of requiring even less state in each intermediate router, and with that state being independent on the number of concurrent traffic flows carried. Another motivation the design of LOADng-PA is one of monitoring and managing networks: providing more detailed topological visibility of traffic paths through the network, for either traffic or network engineering purposes.},
keywords = {lln, loadng, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
2013
Clausen, Thomas; Yi, Jiazi; Bas, Antonin; Herberg, Ulrich
A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol Proceedings Article
In: ASON 2013 Sixth International Workshop on Autonomous Self-Organizing Networks, 2013.
Abstract | Links | BibTeX | Tags: Constrained Networks, Cross-Layer Design, dff, lln, loadng, Sensor Networks, sogrid
@inproceedings{Clausen2013,
title = {A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol},
author = {Thomas Clausen and Jiazi Yi and Antonin Bas and Ulrich Herberg},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/A-Depth-First-Forwarding-DFF-Extension-for-the-LOADng-Routing-Protocol.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6726934},
doi = {10.1109/CANDAR.2013.72},
year = {2013},
date = {2013-12-01},
publisher = {ASON 2013 Sixth International Workshop on Autonomous Self-Organizing Networks},
abstract = {This paper explores the cooperation between the new standards for “Low Power and Lossy Networks” (LLNs): IETF RFC 6971, denoted “Depth-First Forwarding in Unreliable Networks” (DFF) and the ITU-T standardised routing protocol “LOADng” (Lightweight On-demand ad hoc Distance-vector Routing - next generation). DFF is a data-forwarding mechanism for increasing reliability of data delivery in networks with dynamic topology and lossy links, using a mechanism similar to a “depth-first search” for the destination of a packet. LOADng is a reactive on-demand routing protocol used in LLNs. The purpose of this study is to evaluate the benefit of using DFF conjointly with a routing protocol. To this end, the paper compares the performance of LOADng and LOADng+DFF using Ns2 simulations, showing a 20% end-to-end data delivery ratio increase at expense of expected longer path lengths.},
keywords = {Constrained Networks, Cross-Layer Design, dff, lln, loadng, Sensor Networks, sogrid},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; Igarashi, Yuichi
Evaluation of Routing Protocol for Low Power and Lossy Networks: LOADng and RPL Proceedings Article
In: 2013 IEEE Conference on Wireless Sensors, 2013.
Abstract | Links | BibTeX | Tags: Constrained Networks, lln, loadng, Performance Evaluation, rpl, Sensor Networks, sogrid
@inproceedings{Clausen2013a,
title = {Evaluation of Routing Protocol for Low Power and Lossy Networks: LOADng and RPL},
author = {Jiazi Yi and Thomas Clausen and Yuichi Igarashi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Evaluation-of-Routing-Protocol-for-Low-Power-and-Lossy-Networks-LOADng-and-RPL.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6728773},
doi = {10.1109/ICWISE.2013.6728773},
year = {2013},
date = {2013-12-01},
publisher = {2013 IEEE Conference on Wireless Sensors},
abstract = {Routing protocol is a critical component of Low- power and Lossy Networks for Smart Grid. The protocols are used for data forwarding, which includes data acquisition, information dissemination, etc. This paper evaluates two main routing protocols used for Low-power and Lossy Networks: RPL and LOADng, to understand their strengths and limitations. Observations are provided based on analysis of specification and experimental experience, regarding the protocol’s routing overhead, traffic pattern, resource requirement, fragmentation, etc. Simulations are further launched to study the performance in different traffic patterns, which include sensor-to-sensor traffic, sensor-to-root traffic and root-to-sensor bidirectional traffic. By evaluating those protocols, the readers could have better under- standing of the protocol applicability, and choose the appropriate protocol for desired applications.},
keywords = {Constrained Networks, lln, loadng, Performance Evaluation, rpl, Sensor Networks, sogrid},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; de Verdiere, Axel Colin; Yi, Jiazi
Performance analysis of Trickle as a flooding mechanism Proceedings Article
In: IEEE 15th International Conference on Communication Technology, 2013.
Abstract | Links | BibTeX | Tags: Constrained Networks, lln, Performance Evaluation, rpl, Sensor Networks, Trickle
@inproceedings{Clausen2013b,
title = {Performance analysis of Trickle as a flooding mechanism},
author = {Thomas Clausen and Axel Colin de Verdiere and Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Performance-analysis-of-Trickle-as-a-flooding-mechanism.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6820439},
doi = {10.1109/ICCT.2013.6820439},
year = {2013},
date = {2013-11-01},
publisher = {IEEE 15th International Conference on Communication Technology},
abstract = {“The Trickle Algorithm” is conceived as an adaptive mechanism for allowing efficient and reliable information sharing among nodes, communicating across a lossy and shared medium. Its basic principle is, for each node, to monitor transmissions from its neighbours, compare what it receives with its cur- rent state, and schedule future transmissions accordingly: if an inconsistency of information is detected, or if few or no neighbours have transmitted consistent information “recently”, the next transmission is scheduled “soon” – and, in case consistent information from a sufficient number of neighbours is received, the next transmission is scheduled to be “later”. Developed originally as a means of distributing firmware updates among sensor devices, this algorithm has found use also for distribution of routing information in the routing protocol RPL, standardised within the IETF for maintaining a routing topology for low-power and lossy networks (LLNs). Its use is also proposed in a protocol for multicast in LLNs, denoted “Multicast Forwarding Using Trickle”. This paper studies the performance of the Trickle algorithm, as it is used in that multicast protocol.},
keywords = {Constrained Networks, lln, Performance Evaluation, rpl, Sensor Networks, Trickle},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Cordero, Juan Antonio; Clausen, Thomas
Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks Proceedings Article
In: The 16th International Conference on Network-Based Information Systems (NBiS-2013), 2013.
Abstract | Links | BibTeX | Tags: Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks, sogrid
@inproceedings{Clausen2013g,
title = {Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Juan Antonio Cordero and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Jitter-Considerations-in-On-Demand-Route-Discovery-for-Mobile-Ad-Hoc-Networks.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6685393},
doi = {10.1109/NBiS.2013.28},
year = {2013},
date = {2013-09-01},
publisher = {The 16th International Conference on Network-Based Information Systems (NBiS-2013)},
abstract = {Jittering (a small, random variation in timing of control message emission) is widely used in protocols for wireless communication, in order to avoid simultaneous packet transmis- sions over the same channel by adjacent nodes in the network. Used for both regularly scheduled packets, for event-triggered packets, and for scheduled resets in the network, jittering is a particularly important mechanism when a network event may cause multiple adjacent nodes to react concurrently. Introduced in the proactive MANET routing protocol OLSR, the “LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation” (LOADng), a derivative of AODV, is specified so as to also use jitter for flooding Route Request (RREQ) messages during route discovery. This use of jitter in RREQ flooding is, however, not without drawbacks, which are identified and addressed in this paper within the framework of a more general study of jitter mechanisms used for route discovery in reactive routing protocols. The paper studies the behavior of route discovery when using “naive” jitter (simply, delaying RREQ retransmission by a small uniformly distributed random delay), in order to identify and analyze the problems hereof, mostly related to route sub-optimality and excessive control traffic overhead. A Window Jitter mechanism is then proposed to address these issues – with the performance hereof, when compared to “naive” jitter being evaluated by way of modeling, theoretical analysis and experiments. The paper shows that the use of Window Jitter improves indeed the efficiency of route discovery in AODV and overcome the drawbacks identified for “naive” jitter.},
keywords = {Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks, sogrid},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas; Baccelli, Emmanuel
Enabling Multihop Communication in Spontaneous Wireless Networks Book Chapter
In: Haddadi, Hamed; Bonaventure, Olivier (Ed.): Recent Advances in Networking, Chapter 9, pp. 413-457, ACM SIGCOMM, 2013.
Links | BibTeX | Tags: Ad-Hoc, lln, loadng, MANET, MPR, olsr, OSPF
@inbook{Cordero2013,
title = {Enabling Multihop Communication in Spontaneous Wireless Networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen and Emmanuel Baccelli},
editor = {Hamed Haddadi and Olivier Bonaventure},
url = {http://sigcomm.org/education/ebook/SIGCOMMeBook2013v1_chapter9.pdf},
year = {2013},
date = {2013-08-01},
booktitle = {Recent Advances in Networking},
pages = {413-457},
publisher = {ACM SIGCOMM},
chapter = {9},
keywords = {Ad-Hoc, lln, loadng, MANET, MPR, olsr, OSPF},
pubstate = {published},
tppubtype = {inbook}
}
Clausen, Thomas; Camacho, Alberto; Yi, Jiazi; de Verdiere, Axel Colin; Igarashi, Yuichi; Satoh, Hiroki; Morii, Yoko; Herber, Ulrich; Lavenu, Cedric
Interoperability Report for the Lightweight On-demand Ad hoc Distance- vector Routing Protocol - Next Generation (LOADng) Miscellaneous
2013.
Links | BibTeX | Tags: ietf-id, loadng, sogrid
@misc{yi_interoperability_2014,
title = {Interoperability Report for the Lightweight On-demand Ad hoc Distance- vector Routing Protocol - Next Generation (LOADng)},
author = {Thomas Clausen and Alberto Camacho and Jiazi Yi and Axel Colin de Verdiere and Yuichi Igarashi and Hiroki Satoh and Yoko Morii and Ulrich Herber and Cedric Lavenu },
url = {https://tools.ietf.org/html/draft-lavenu-lln-loadng-interoperability-report-04},
year = {2013},
date = {2013-06-14},
urldate = {2015-11-20},
keywords = {ietf-id, loadng, sogrid},
pubstate = {published},
tppubtype = {misc}
}
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas
Optimization of jitter configuration for reactive route discovery in wireless mesh networks Proceedings Article
In: 2013 11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), , IEEE , 2013, ISBN: 978-1-61284-824-2.
Abstract | Links | BibTeX | Tags: Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks
@inproceedings{Clausen2013c,
title = {Optimization of jitter configuration for reactive route discovery in wireless mesh networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Optimization-of-jitter-configuration-for-reactive-route-discovery-in-wireless-mesh-networks.pdf
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6576467},
isbn = {978-1-61284-824-2},
year = {2013},
date = {2013-05-01},
booktitle = {2013 11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), },
publisher = {IEEE },
abstract = {Jitter is a small, random variation of timing before message emission that is widely used in non-synchronized wireless communication. It is employed to avoid collisions caused by simultaneous transmissions by adjacent nodes over the same channel. In reactive (on-demand) routing protocols, such as AODV and LOADng, it is recommended to use jitter during the flooding of Route Request messages. This paper analyzes the cost of jitter mechanisms in route discovery of on-demand routing protocols, and examines the drawbacks of the standard and commonly used uniformly distributed jitter. The main studied drawback is denominated delay inversion effect. Two variations on the jitter mechanism --window jitter and adaptive jitter-- are proposed to address this effect, which take the presence and the quality of traversed links into consideration to determine the per-hop forwarding delay. These variations allow to effectively reduce the routing overhead, and increase the quality of the computed paths with respect to the standard uniform jitter mechanism. Simulations are also performed to compare the performance of different jitter settings in various network scenarios.},
keywords = {Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
Yi, Jiazi
Cross Layer Interaction in NS2 Technical Report
Ecole Polytechnique, France 2012.
Abstract | Links | BibTeX | Tags: crosslayer, ns2
@techreport{yi-ns2-crosslayer-2012,
title = {Cross Layer Interaction in NS2},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/cross_layer_info_ns2.pdf},
year = {2012},
date = {2012-11-18},
institution = {Ecole Polytechnique, France},
abstract = {This document introduces how to obtain cross layer information in NS2 (layer 2 packet drop, queue length, etc.), with can be used for upper layer routing protocol. The routing protocol can be in NS2 native C++ or AgentJ Java code.},
keywords = {crosslayer, ns2},
pubstate = {published},
tppubtype = {techreport}
}
Yi, Jiazi; Clausen, Thomas; Bas, Antonin
Smart Route Request for On-demand Route Discovery in Constrained Environments Proceedings Article
In: 2012 IEEE International Conference on Wireless Information Technology and Systems, 2012.
Abstract | Links | BibTeX | Tags: Constrained Networks, lln, loadng, Sensor Networks
@inproceedings{Clause2012f,
title = {Smart Route Request for On-demand Route Discovery in Constrained Environments},
author = {Jiazi Yi and Thomas Clausen and Antonin Bas},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Smart-Route-Request-for-on-demand-route-discovery-in-constrained-environments.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6417755},
doi = {10.1109/ICWITS.2012.6417755},
year = {2012},
date = {2012-11-01},
publisher = {2012 IEEE International Conference on Wireless Information Technology and Systems},
abstract = {A derivative of AODV , denoted LOADng, is proposed for use in very constrained environment, sacrificing a number of features from AODV for the benefit of smaller control messages and simpler processing logic. Among these sacrifices is intermediate route replies. This paper presents an alternative to intermediate router replies, denoted Smart Route Request, which provides an optimization similar to that attainable by intermediate route requests, but without imposing additional processing complexity or additional signaling. A performance study is presented, showing that the use of Smart Route Requests can effectively reduce the control traffic overhead from Route Requests, while retaining the simplicity of LOADng. LOADng with Smart Route Requests effectively reduces control traffic overhead and on-link traffic collisions, and this especially for multipoint-to-point traffic.},
keywords = {Constrained Networks, lln, loadng, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Bas, Antonin; Yi, Jiazi; Clausen, Thomas
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Proceedings Article
In: The 1st International Workshop on Smart Technologies for Energy, Information and Communication, 2012.
Abstract | Links | BibTeX | Tags: Constrained Networks, lln, loadng, Sensor Networks
@inproceedings{Bas2012,
title = {Expanding Ring Search for Route Discovery in LOADng Routing Protocol},
author = {Antonin Bas and Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Expanding-Ring-Search-for-Route-Discovery-in-LOADng-Routing-Protocol.pdf},
year = {2012},
date = {2012-10-01},
publisher = {The 1st International Workshop on Smart Technologies for Energy, Information and Communication},
abstract = {LOADng is an on-demand routing protocol, derived from AODV, simplified for use in lossy, low-power and constrained environments, where the ability for devices to communicate is a commodity to their primary function, and where therefore not only the communications channel offers limited capacity, but also the resources available to the device’s communica- tions subsystem are limted. LOADng simplifies AODV in a number of ways, notably the route discovery process by removing intermediate/gratuitous Route Replies – sacrificing that functionality in order to attain smaller control messages and less router state and processing. Alas, this comes at an expense: in some situations, LOADng produces increased control traffic overhead (as com- pared to AODV), and more control messages transmissions means tapping into the device’s limited resources. This paper presents a simple mechanism by which to integrate Expanding Ring flooding into LOADng. The mechanism is described, and the result of simulation studies are presented, showing that both in scenarios with “point-to-point” (any-to-any) traffic and in scenarios with “multipoint-to-point” (all traffic sent to the same destination, as in a data acquisition sensor network) traffic, considerable savings in control traffic overhead can be achieved – without loss in data delivery ratios.},
keywords = {Constrained Networks, lln, loadng, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; de Verdiere, Axel Colin
Efficient Data Acquisition in Sensor Networks:Introducing (the) LOADng Collection Tree Protocol Proceedings Article
In: IEEE WiCom 2012, The 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing., 2012.
Abstract | Links | BibTeX | Tags: Constrained Networks, lln, loadng, Sensor Networks
@inproceedings{Clausen2012,
title = {Efficient Data Acquisition in Sensor Networks:Introducing (the) LOADng Collection Tree Protocol},
author = {Jiazi Yi and Thomas Clausen and Axel Colin de Verdiere},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Efficient-Data-Acquisition-in-Sensor-Networks-Introducing-the-LOADng-Collection-Tree-Protocol.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6478508},
doi = {10.1109/WiCOM.2012.6478508},
year = {2012},
date = {2012-09-01},
publisher = {IEEE WiCom 2012, The 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing.},
abstract = {This paper proposes an extension to the “LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation” (LOADng), for efficient construction of a collection tree for data acquisition in sensor networks. The extension uses the mechanisms from LOADng, imposes minimal overhead and complexity, and enables a deployment to efficiently support both “point-to-point” and “multipoint-to-point” traffic, avoiding complications of uni-directional links in the collection tree. This paper further compares the performance of proposed pro-tocol extension to that of basic LOADng and to the protocol RPL (“IPv6 Routing Protocol for Low power and Lossy Networks”).},
keywords = {Constrained Networks, lln, loadng, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Yi, Jiazi; de Verdiere, Axel Colin
LOADng: Towards AODV Version 2 Proceedings Article
In: 2012 IEEE 76th Vehicular Technology Conference, 2012.
Abstract | Links | BibTeX | Tags: Constrained Networks, lln, loadng, Sensor Networks
@inproceedings{Clausen2012b,
title = {LOADng: Towards AODV Version 2},
author = {Thomas Clausen and Jiazi Yi and Axel Colin de Verdiere},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/LOADng-Towards-AODV-Version-2.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6399334},
doi = {10.1109/VTCFall.2012.6399334},
year = {2012},
date = {2012-09-01},
publisher = {2012 IEEE 76th Vehicular Technology Conference},
abstract = {The Ad hoc On-demand Distance-Vector routing protocol (AODV) was published in 2003 by the IETF, as ex- perimental RFC 3561. This routing protocol was one of four routing protocols, developed by the IETF for use in mobile ad hoc networks (MANETs) – with the other being DSR, TBRPF and OLSR. As operational experiences with these protocols accumulated, the IETF set forth on standardization of OLSRv2, a successor to OLSR, and DYMO – with DYMO being the intended successor to DSR and AODV. Alas, while there was traction for and standardization of OLSRv2, interest in, development, standardization, and use of DYMO in MANETs slowly withered. AODV did, however, attract interest for routing in Low-power Lossy Networks (LLNs) due to its limited state requirements. Since 2005, several proposals for simplifying and adapting AODV specifically for LLNs emerged, in 2011 and 2012 with the use of one such adaptation of AODV in the G3-PLC standard for power line communications in smart grids, and with efforts within the IETF emerging towards a single LOADng specification, as next version of AODV. This paper presents this development – from AODV, as specified in RFC3561 – to LOADng. While the basic operation remains unchanged, LOADng presents simplifications, and additional features and flexibilities are introduced. This paper studies the impact of these changes “from AODV to LOADng”, and observes that LOADng unites simplification, flexibility and performance improvements.},
keywords = {Constrained Networks, lln, loadng, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas
Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks Proceedings Article
In: The 15th International Conference on Network-Based Information Systems (NBiS-2012), 2012.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, security, SMF, SMF Security
@inproceedings{Yi2012,
title = {Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Vulnerability-Analysis-of-Relay-Set-Selection-Algorithms-for-the-Simplified-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6354835},
doi = {10.1109/NBiS.2012.48},
year = {2012},
date = {2012-09-01},
publisher = {The 15th International Conference on Network-Based Information Systems (NBiS-2012)},
abstract = {After more than a decade of research and stan-dardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in “the real world” also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This paper studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.},
keywords = {Ad-Hoc, MANET, MESH, security, SMF, SMF Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Radu, Dan; Avram, Camelia; Aştilean, Adina; Parrein, Benoît; Yi, Jiazi
Acoustic noise pollution monitoring in an urban environment using a VANET network Proceedings Article
In: 2012 IEEE International Conference on Automation Quality and Testing Robotics (AQTR), pp. 244-248, IEEE, Cluj-Napoca, 2012, ISBN: 978-1-4673-0701-7.
Abstract | Links | BibTeX | Tags: MANET, multipath, olsrv2, svc, vanet
@inproceedings{yi-vanet-2011,
title = {Acoustic noise pollution monitoring in an urban environment using a VANET network},
author = {Dan Radu and Camelia Avram and Adina Aştilean and Benoît Parrein and Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Acoustic-noise-pollution-monitoring-in-an-urban-environment-using-a-VANET-network.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6237711
},
doi = {10.1109/AQTR.2012.6237711},
isbn = {978-1-4673-0701-7},
year = {2012},
date = {2012-05-24},
booktitle = {2012 IEEE International Conference on Automation Quality and Testing Robotics (AQTR)},
pages = {244-248},
publisher = {IEEE},
address = {Cluj-Napoca},
abstract = {The main objective of this work is the development of a Vehicle Ad Hoc NETwork (VANET) to collect data from GPS equipped mobile phones used as noise detectors. In this system, sensor nodes perioadically transmit acoustic noise levels to neighboring cars, data packets being shared and temporary stored by participating VANET nodes and ultimately forwarded to a collector node connected to the Internet, providing public real-time data. A routing technique called MP-OLSR that takes into account the spatially separation between the multiple paths is used, for better transmission reliability and congestion avoidance as well as for control message overhead minimization.},
keywords = {MANET, multipath, olsrv2, svc, vanet},
pubstate = {published},
tppubtype = {inproceedings}
}
Radu, Dan; Yi, Jiazi; Parrein, Benoit
QoE enhancement for H.264/SVC video transmission in MANET using MP-OLSR protocol Proceedings Article
In: ISIVC 2012, the 6th International Symposium on signal, Image, Video and Communications, pp. 1-4, Valenciennes, France, 2012.
Abstract | Links | BibTeX | Tags: multipath, olsr, QoE, svc, video
@inproceedings{radu:hal-00716057,
title = {QoE enhancement for H.264/SVC video transmission in MANET using MP-OLSR protocol},
author = {Dan Radu and Jiazi Yi and Benoit Parrein},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/QoE-enhancement-for-H.264SVC-video-transmission-in-MANET-using-MP-OLSR-protocol-.pdf
https://hal.archives-ouvertes.fr/hal-00716057},
year = {2012},
date = {2012-01-01},
booktitle = {ISIVC 2012, the 6th International Symposium on signal, Image, Video and Communications},
pages = {1-4},
address = {Valenciennes, France},
abstract = {This paper addresses the problem of enhancing video service quality for Mobile Ad Hoc Networks (MANET) scenarios. We offer Multipath Optimized Link State (MP-OLSR) routing protocol for H.264/SVC bitstream forwarding in the MANET network. Besides the usage of a suitable routing protocol, the video quality can be further enhanced by using the scalable encoding feature of Scalable Video Coding (SVC) combined with Unequal Error Protection (UEP). SVC is an extension of the H.264/AVC video compression standard used for high-quality video bitstreams encoding, providing spatial, temporal and quality scalability. To evaluate video quality, the Video Quality Metric (VQM) is used. We chose 5 different video contents for our simulations characterized by various temporal and spatial complexities. These video references are taken from the Video Quality Expert Group (VQEG). The results show that multipath routing combined with UEP can effectively improve the quality of video communication over MANET in terms of VQM and successful video decoding.},
keywords = {multipath, olsr, QoE, svc, video},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
Yi, Jiazi
Multipath routing protocol for mobile ad hoc networks PhD Thesis
University of Nantes, 2011.
Abstract | Links | BibTeX | Tags: Ad-Hoc, multipath, olsr, thesis
@phdthesis{yi-thesis-mpolsr-2011,
title = {Multipath routing protocol for mobile ad hoc networks},
author = {Jiazi Yi},
url = {https://hal.archives-ouvertes.fr/tel-01162392/file/MP-OLSR_thesis.pdf},
year = {2011},
date = {2011-11-19},
address = {Nantes, France},
school = {University of Nantes},
abstract = { Ad hoc networks consist of a collection of wireless mobile nodes which dynamically exchange data without reliance on any fixed based station or a wired backbone network. They are by definition self-organized. The frequent topological changes make multi-hops routing a crucial issue for these networks. In this PhD thesis, we propose a multipath routing protocol named Multipath Optimized Link State Routing (MP-OLSR). It is a multipath extension of OLSR, and can be regarded as a hybrid routing scheme because it combines the proactive nature of topology sensing and reactive nature of multipath computation. The auxiliary functions as route recovery and loop detection are introduced to improve the performance of the network. The usage of queue length metric for link quality criteria is studied and the compatibility between single path and multipath routing is discussed to facilitate the deployment of the protocol. The simulations based on NS2 and Qualnet softwares are performed in different scenarios. A testbed is also set up in the campus of Polytech’Nantes. The results from the simulator and testbed reveal that MP-OLSR is particularly suitable for mobile, large and dense networks with heavy network load thanks to its ability to distribute the traffic into different paths and effective auxiliary functions. The H.264/SVC video service is applied to ad hoc networks with MP-OLSR. By exploiting the scalable characteristic of H.264/SVC, we propose to use Priority Forward Error Correction coding based on Finite Radon Transform (FRT) to improve the received video quality. An evaluation framework called SVCEval is built to simulate the SVC video transmission over different kinds of networks in Qualnet. This second study highlights the interest of multiple path routing to improve quality of experience over self-organized networks.},
keywords = {Ad-Hoc, multipath, olsr, thesis},
pubstate = {published},
tppubtype = {phdthesis}
}
Herberg, Ulrich; Cole, Robert; Yi, Jiazi
Performance analysis of SNMP in OLSRv2-routed MANETs Proceedings Article
In: IEEE 7th International Conference on Network and Service Management, IEEE, 2011, ISSN: 2165-9605.
Links | BibTeX | Tags: MANET, olsrv2, snmp
@inproceedings{yi-snmp-olsrv2-2011,
title = {Performance analysis of SNMP in OLSRv2-routed MANETs},
author = {Ulrich Herberg and Robert Cole and Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Performance-analysis-of-SNMP-in-OLSRv2-routed-MANETs.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6103976},
issn = {2165-9605},
year = {2011},
date = {2011-10-24},
booktitle = {IEEE 7th International Conference on Network and Service Management},
publisher = {IEEE},
keywords = {MANET, olsrv2, snmp},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Parrein, Benoit; Radu, Dan
Multipath routing protocol for manet: Application to H.264/SVC video content delivery Proceedings Article
In: Wireless Personal Multimedia Communications (WPMC), 2011 14th International Symposium on, 2011, ISBN: 1347-6890.
Abstract | Links | BibTeX | Tags: MANET, multipath, olsr, svc
@inproceedings{yi-svc-2011,
title = {Multipath routing protocol for manet: Application to H.264/SVC video content delivery},
author = {Jiazi Yi and Benoit Parrein and Dan Radu},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/MP-OLSR-SVC_WPMC2011_v0.1.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6081479},
isbn = {1347-6890},
year = {2011},
date = {2011-10-03},
booktitle = {Wireless Personal Multimedia Communications (WPMC), 2011 14th International Symposium on},
abstract = {Multi-Path OLSR is an extension of the single path routing protocol OLSR. The QoS has been demonstrated in simulation and testbed. In this paper, we attempt to confirm those results at the application layer specially for critical applications as video services over wireless networks. The standard H264/SVC is chosen for its enormous potential in video delivery in lossy networks. Still vulnerable to packet losses, we combine the scalable source coding to an Unequal Error Protection (UEP) scheme in order to improve a simple Quality of Experience (QoE) measurements i.e PSNR. In a new simulation framework called SVCEval, the combination of path diversity and scalable protection insures a significant 2 dB gain in QoE for sensitive contents and mobile scenarios in comparison with just MP-OLSR. Within the same context, single path strategy delivers non acceptable video services as soon as nodes are mobile.
},
keywords = {MANET, multipath, olsr, svc},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; Herberg, Ulrich
Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks Proceedings Article
In: IEEE CPSCom 2011, 2011, (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260).
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, security, SMF, SMF Security
@inproceedings{Yi2011c,
title = {Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6142260
http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-CPScom-Vulnerability-Analysis-of-the-Simple-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/iThings/CPSCom.2011.63},
year = {2011},
date = {2011-10-01},
publisher = {IEEE CPSCom 2011},
abstract = {If deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside of purely experimental settings, protocols operating such MANETs must be able to preserve network integrity, even when faced with careless or malicious participants. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol(s), managing the connectivity. Understanding how these routing protocols can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. One routing protocol for MANETs, developed by the Internet Engineering Task Force (IETF) as a multicast routing protocol for efficient data dissemination, is denoted "Simplified Multicast Forwarding'' (SMF). This protocol is analyzed, and its vulnerabilities described, in this paper. SMF consists of two independent components: (i) duplicate packet detection and (ii) relay set selection, each of which presents its own set of vulnerabilities that an attacker may exploit to compromise network integrity. This paper explores vulnerabilities in each of these, with the aim of identifying attack vectors and thus enabling development of countermeasures.},
note = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260},
keywords = {Ad-Hoc, MANET, MESH, security, SMF, SMF Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Adnane, Asmaa; David, Sylvain; Benoit, Parrein
Multipath optimized link state routing for mobile ad hoc networks Journal Article
In: Ad Hoc Networks, vol. 9, no. 1, pp. 28–47, 2011, ISSN: 15708705.
Abstract | Links | BibTeX | Tags: multipath, olsr, olsrv2
@article{yi_multipath_2011,
title = {Multipath optimized link state routing for mobile ad hoc networks},
author = {Jiazi Yi and Asmaa Adnane and Sylvain David and Parrein Benoit},
url = {http://linkinghub.elsevier.com/retrieve/pii/S1570870510000533
http://jiaziyi.com/wp-content/uploads/2016/08/MP-OLSR_offprint.pdf},
doi = {10.1016/j.adhoc.2010.04.007},
issn = {15708705},
year = {2011},
date = {2011-01-01},
urldate = {2015-11-20},
journal = {Ad Hoc Networks},
volume = {9},
number = {1},
pages = {28--47},
abstract = {Multipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to applications.
Our protocol, called MultiPath OLSR (MP-OLSR), is a multipath routing protocol based on OLSR [1]. The Multipath Dijkstra Algorithm is proposed to obtain multiple paths. The algorithm gains great flexibility and extensibility by employing different link metrics and cost functions. In addition, route recovery and loop detection are implemented in MP-OLSR in order to improve quality of service regarding OLSR. The backward compatibility with OLSR based on IP source routing is also studied. Simulation based on Qualnet simulator is performed in different scenarios. A testbed is also set up to validate the protocol in real world. The results reveal that MP-OLSR is suitable for mobile, large and dense networks with large traffic, and could satisfy critical multimedia applications with high on time constraints.},
keywords = {multipath, olsr, olsrv2},
pubstate = {published},
tppubtype = {article}
}
Our protocol, called MultiPath OLSR (MP-OLSR), is a multipath routing protocol based on OLSR [1]. The Multipath Dijkstra Algorithm is proposed to obtain multiple paths. The algorithm gains great flexibility and extensibility by employing different link metrics and cost functions. In addition, route recovery and loop detection are implemented in MP-OLSR in order to improve quality of service regarding OLSR. The backward compatibility with OLSR based on IP source routing is also studied. Simulation based on Qualnet simulator is performed in different scenarios. A testbed is also set up to validate the protocol in real world. The results reveal that MP-OLSR is suitable for mobile, large and dense networks with large traffic, and could satisfy critical multimedia applications with high on time constraints.
2009
Yi, Jiazi; David, Sylvain; Adnane, Hassiba Asmaa; Parrein, Benoit; Lecourtier, Xavier
Multipath OLSR: Simulation and Testbed Proceedings Article
In: 5th OLSR Interop/Workshop, Vienna, Austria, 2009.
Abstract | Links | BibTeX | Tags: multipath, olsr, testbed
@inproceedings{yi:hal-00424891,
title = {Multipath OLSR: Simulation and Testbed},
author = {Jiazi Yi and Sylvain David and Hassiba Asmaa Adnane and Benoit Parrein and Xavier Lecourtier},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Multipath-OLSR-Simulation-and-Testbed.pdf
https://hal.archives-ouvertes.fr/hal-00424891},
year = {2009},
date = {2009-10-01},
booktitle = {5th OLSR Interop/Workshop},
address = {Vienna, Austria},
abstract = { MP-OLSR is a multipath routing protocol based on OLSR (Optimized Link State Routing). The multipath routing protocol is expected to provide more stable routes for the network. In this paper, several topics about MP-OLSR are discussed. We begin with introducing the functionalities of MP-OLSR, which includes topology sensing, routing computation, route recovery and loop detection. Then a testbed is implemented to verify the availability of MP-OLSR. Given OLSR one of the most populated proactive protocols for ad hoc networks, the compatibility between MP-OLSR and OLSR is also discussed. The results based on simulator and our testbed show that MP-OLSR could offer more stable data transmission over the unstable wireless interface. And it could cooperate well with the established OLSR protocol.},
keywords = {multipath, olsr, testbed},
pubstate = {published},
tppubtype = {inproceedings}
}
Parrein, Benoit; Yi, Jiazi
SEREADMO : protocole de routage sécurisé pour réseaux ad hoc mobiles Proceedings Article
In: Colloque Francophone sur l'Ing'enierie des Protocoles 2009, pp. 0, Strasbourg, France, 2009.
Links | BibTeX | Tags: multipath, olsr, sereadmo
@inproceedings{parrein:hal-00434308,
title = {SEREADMO : protocole de routage sécurisé pour réseaux ad hoc mobiles},
author = {Benoit Parrein and Jiazi Yi},
url = {https://hal.archives-ouvertes.fr/hal-00434308},
year = {2009},
date = {2009-01-01},
booktitle = {Colloque Francophone sur l'Ing'enierie des Protocoles 2009},
pages = {0},
address = {Strasbourg, France},
keywords = {multipath, olsr, sereadmo},
pubstate = {published},
tppubtype = {inproceedings}
}
2008
Yi, Jiazi
A research on the IFQ of MPOLSR in NS2 Technical Report
Polytech'Nantes 2008.
Abstract | Links | BibTeX | Tags: multipath, olsr, queue, simulation
@techreport{yi-ifq-2008,
title = {A research on the IFQ of MPOLSR in NS2},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/A_research_on_the_IFQ_of_MPOLSR_in_NS2.pdf},
year = {2008},
date = {2008-08-26},
institution = {Polytech'Nantes},
abstract = {This research is focused on the length of the interface queue (IFQ) of the MPOLSR protocol. The length of the IFQ in each node of the ad hoc network have big influence in the performance of the networks, both the data delivery ratio and the end-to-end delay. The full of the queue will result in packets loss and the congestion of the queue will cause longer delay. This work examined the behavior of the IFQ in the nodes and compared the performance in different protocols and configurations to give some clues about the IFQ in the future research.},
keywords = {multipath, olsr, queue, simulation},
pubstate = {published},
tppubtype = {techreport}
}
Yi, Jiazi
A Survey on the security of MANETs Technical Report
Polytech'Nantes Nantes, France, 2008.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, security, survey
@techreport{yi-manet-security-2008,
title = {A Survey on the security of MANETs},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/20080330_A_Survey_on_the_security_of_MANETs.pdf},
year = {2008},
date = {2008-03-30},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {ad hoc networks. The purpose of this note is to give a quick review on the security related problems in MANETs, and to answer the question “at the moment, what do we have to deal with the security”. We first introduce the basic concepts of network security, and then come to the security changes and requirements. The key management and secure routing schemes are presented in section 3 and section 4. },
keywords = {Ad-Hoc, MANET, security, survey},
pubstate = {published},
tppubtype = {techreport}
}
Yi, Jiazi; Cizeron, Eddy; Hamma, Salima; Parrein, Benoit
Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks Proceedings Article
In: 2008 IEEE Wireless Communications and Networking Conference, pp. 2235 - 2240, IEEE, Las Vegas, NV, 2008, ISSN: 1525-3511.
Abstract | Links | BibTeX | Tags: MANET, multipath, olsr
@inproceedings{yi-mpolsr-2008,
title = {Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Eddy Cizeron and Salima Hamma and Benoit Parrein},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4489426
http://jiaziyi.com/wp-content/uploads/2016/08/IEEE-Simulation-and-Performance-Analysis-of-MP-OLSR-for-Mobile-Ad-hoc-Networks.pdf},
doi = {10.1109/WCNC.2008.395},
issn = {1525-3511},
year = {2008},
date = {2008-03-11},
booktitle = {2008 IEEE Wireless Communications and Networking Conference},
volume = {2235 - 2240},
pages = {2235 - 2240},
publisher = {IEEE},
address = {Las Vegas, NV},
abstract = {Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data without reliance on a fixed base station or a wired backbone network, which makes routing a crucial issue for the design of a ad hoc networks. In this paper we discussed a hybrid multipath routing protocol named MP-OLSR. It is based on the link state algorithm and employs periodic exchange of messages to maintain topology information of the networks. In the mean time, it updates the routing table in an on-demand scheme and forwards the packets in multiple paths which have been determined at the source. If a link failure is detected, the algorithm recovers the route automatically. Concerning the instability of the wireless networks, the redundancy coding is used to improve the delivery ratio. The simulation in NS2 shows that the new protocol can effectively improve the performance of the networks.
},
keywords = {MANET, multipath, olsr},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi
A Survey on the Applications of MANET Technical Report
Polytech'Nantes Nantes, France, 2008.
Abstract | Links | BibTeX | Tags: Ad-Hoc, application, MANET
@techreport{yi-manet-survey-2008,
title = {A Survey on the Applications of MANET},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/20080229_A_Survey_on_the_Applications_of_MANET.pdf},
year = {2008},
date = {2008-02-01},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {This report examined the applications of MANET nowadays. The report not only reviews the pure general-purpose MANET, but also other specified MANETs: mesh networks, opportunistic networks, vehicular ad hoc networks and wireless networks. We can see that, although pure general-purpose MANET does not yet exist in the real world, the multihop ad hoc networking paradigm was successfully applied in several classes of networks that are penetrating the mass market.},
keywords = {Ad-Hoc, application, MANET},
pubstate = {published},
tppubtype = {techreport}
}
yi, Jiazi; Cizeron, Eddy; Hamma, Salima; Parrein, Benoit; Lesage, Pascal
Implementation of Multipath and Multiple Description Coding in OLSR Proceedings Article
In: 4th OLSR Interop/Work Shop, pp. 19-25, Ottawa, Canada, 2008.
Abstract | Links | BibTeX | Tags: MDC, multipath, olsr
@inproceedings{yi:hal-00364751,
title = {Implementation of Multipath and Multiple Description Coding in OLSR},
author = {Jiazi yi and Eddy Cizeron and Salima Hamma and Benoit Parrein and Pascal Lesage},
url = {https://hal.archives-ouvertes.fr/hal-00364751
http://jiaziyi.com/wp-content/uploads/2016/08/Implementation_of_Multipath_and_Multiple_Description_Coding_in_OLSR.pdf},
year = {2008},
date = {2008-01-01},
booktitle = {4th OLSR Interop/Work Shop},
pages = {19-25},
address = {Ottawa, Canada},
abstract = {In this paper we discussed the application and the implementation of multipath routing and multiple description coding (MDC) extension of OLSR, called MP-OLSR. It is based on the link state algorithm and employs periodic exchange of messages to maintain topology information of the networks. In the mean time, it updates the routing table in an on-demand scheme and forwards the packets in multiple paths which have been determined at the source. If a link failure is detected, the algorithm recovers the route automatically. Concerning the instability of the wireless networks, the multiple description coding is used to improve reliability of the network transmission, and several methods are proposed to allocate the redundancy in different paths. The simulation in NS2 shows that the new protocol can effectively improve the performance of the networks. The implementation of MP-OLSR is also proposed in the end.},
keywords = {MDC, multipath, olsr},
pubstate = {published},
tppubtype = {inproceedings}
}
2007
Yi, Jiazi
Summary of Routing Protocols in Mobile ad hoc Networks Technical Report
Polytech'Nantes Nantes, France, 2007.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, routing, survey
@techreport{yi-manet-routing-survey-2007,
title = {Summary of Routing Protocols in Mobile ad hoc Networks},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Summary_of_Routing_Protocol_in_Mobile_Ad_Hoc_Networks_distribution.pdf},
year = {2007},
date = {2007-02-11},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {This was a survey of MANETs finished at the beginning of my master project. },
keywords = {Ad-Hoc, MANET, routing, survey},
pubstate = {published},
tppubtype = {techreport}
}