scispace - formally typeset
Search or ask a question
Author

Thomas Kunz

Bio: Thomas Kunz is an academic researcher from Carleton University. The author has contributed to research in topics: Wireless ad hoc network & Mobile ad hoc network. The author has an hindex of 34, co-authored 294 publications receiving 4490 citations. Previous affiliations of Thomas Kunz include Darmstadt University of Applied Sciences & University of Waterloo.


Papers
More filters
Journal ArticleDOI
TL;DR: Experimental results indicate that no performance improvements can be obtained over the scheduler versions using a one-dimensional workload descriptor, and the best single workload descriptor is the number of tasks in the run queue.
Abstract: A task scheduler based on the concept of a stochastic learning automation, implemented on a network of Unix workstations, is described. Creating an artificial, executable workload, a number of experiments were conducted to determine the effect of different workload descriptions. These workload descriptions characterize the load at one host and determine whether a newly created task is to be executed locally or remotely. Six one-dimensional workload descriptors are examined. Two workload descriptions that are more complex are also considered. It is shown that the best single workload descriptor is the number of tasks in the run queue. The use of the worst workload descriptor, the 1-min load average, resulted in an increase of the mean response time of over 32%, compared to the best descriptor. The two best workload descriptors, the number of tasks in the run queue and the system call rate, are combined to measure a host's load. Experimental results indicate that no performance improvements over the scheduler versions using a one-dimensional workload descriptor can be obtained. >

260 citations

Journal ArticleDOI
31 May 2011-Sensors
TL;DR: A survey on the current state-of-the-art in Wireless Sensor Network (WSN) Operating Systems (OSs) to point out strengths and weaknesses of contemporary OSs for WSNs, keeping in mind the requirements of emerging WSN applications.
Abstract: This paper presents a survey on the current state-of-the-art in Wireless Sensor Network (WSN) Operating Systems (OSs). In recent years, WSNs have received tremendous attention in the research community, with applications in battlefields, industrial process monitoring, home automation, and environmental monitoring, to name but a few. A WSN is a highly dynamic network because nodes die due to severe environmental conditions and battery power depletion. Furthermore, a WSN is composed of miniaturized motes equipped with scarce resources e.g., limited memory and computational abilities. WSNs invariably operate in an unattended mode and in many scenarios it is impossible to replace sensor motes after deployment, therefore a fundamental objective is to optimize the sensor motes’ life time. These characteristics of WSNs impose additional challenges on OS design for WSN, and consequently, OS design for WSN deviates from traditional OS design. The purpose of this survey is to highlight major concerns pertaining to OS design in WSNs and to point out strengths and weaknesses of contemporary OSs for WSNs, keeping in mind the requirements of emerging WSN applications. The state-of-the-art in operating systems for WSNs has been examined in terms of the OS Architecture, Programming Model, Scheduling, Memory Management and Protection, Communication Protocols, Resource Sharing, Support for Real-Time Applications, and additional features. These features are surveyed for both real-time and non-real-time WSN operating systems.

218 citations

Proceedings ArticleDOI
06 Jan 2003
TL;DR: Heuristics that allow OLSR to find the maximum bandwidth path are developed, and it is proved that for the ad-hoc network model, two of the heuristics are indeed optimal (i.e., guarantee that the highest-bandwidth path between any two nodes is found).
Abstract: In an ad-hoc network, all communication is done over wireless media, without the help of wired base stations. While many routing protocols have been developed to find and maintain routes based on a best-effort service model, quality-of-service (QoS) routing in an ad-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. In this paper, we discuss how to support QoS routing in OLSR (optimized link state routing protocol, one of the routing protocols under study by the IETF MANET Working Group). We develop heuristics that allow OLSR to find the maximum bandwidth path, show through simulation that these heuristics do improve OLSR in the static network case, and finally, we prove that for our ad-hoc network model, two of the heuristics are indeed optimal (i.e., guarantee that the highest-bandwidth path between any two nodes is found).

216 citations

Journal ArticleDOI
TL;DR: A near-optimal algorithm, named Energy Cost Optimization via Trade (ECO-Trade), is proposed, which coordinates P2P energy trading among the smart homes with a Demand Side Management (DSM) system and shows that cost savings do not always increase linearly with an increase in the renewables and storage penetration rate.

192 citations

Proceedings ArticleDOI
11 Apr 2016
TL;DR: Although DDS results in higher bandwidth usage than MQTT, its superior performance with regard to data latency and reliability makes it an attractive choice for medical IoT applications and beyond.
Abstract: One of the challenges faced by today's Internet of Things (IoT) is to efficiently support machine-to-machine communication, given that the remote sensors and the gateway devices are connected through low bandwidth, unreliable, or intermittent wireless communication links. In this paper, we quantitatively compare the performance of IoT protocols, namely MQTT (Message Queuing Telemetry Transport), CoAP (Constrained Application Protocol), DDS (Data Distribution Service) and a custom UDP-based protocol in a medical setting. The performance of the protocols was evaluated using a network emulator, allowing us to emulate a low bandwidth, high system latency, and high packet loss wireless access network. This paper reports the observed performance of the protocols and arrives at the conclusion that although DDS results in higher bandwidth usage than MQTT, its superior performance with regard to data latency and reliability makes it an attractive choice for medical IoT applications and beyond.

143 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.

5,626 citations

Journal ArticleDOI
TL;DR: This paper surveys the work done toward all of the outstanding issues, relating to this new class of networks, so as to spur further research in these areas.
Abstract: Unmanned aerial vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful in applications, where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently and economically as compared to single UAV systems. However, there are many issues to be resolved before effective use of UAVs can be made to provide stable and reliable context-specific networks. Much of the work carried out in the areas of mobile ad hoc networks (MANETs), and vehicular ad hoc networks (VANETs) does not address the unique characteristics of the UAV networks. UAV networks may vary from slow dynamic to dynamic and have intermittent links and fluid topology. While it is believed that ad hoc mesh network would be most suitable for UAV networks yet the architecture of multi-UAV networks has been an understudied area. Software defined networking (SDN) could facilitate flexible deployment and management of new services and help reduce cost, increase security and availability in networks. Routing demands of UAV networks go beyond the needs of MANETS and VANETS. Protocols are required that would adapt to high mobility, dynamic topology, intermittent links, power constraints, and changing link quality. UAVs may fail and the network may get partitioned making delay and disruption tolerance an important design consideration. Limited life of the node and dynamicity of the network lead to the requirement of seamless handovers, where researchers are looking at the work done in the areas of MANETs and VANETs, but the jury is still out. As energy supply on UAVs is limited, protocols in various layers should contribute toward greening of the network. This paper surveys the work done toward all of these outstanding issues, relating to this new class of networks, so as to spur further research in these areas.

1,636 citations

Patent
14 Sep 2010
TL;DR: An improved human user computer interface system, wherein a user characteristic or set of characteristics, such as demographic profile or societal role, is employed to define a scope or domain of operation, is proposed in this article, where user privacy and anonymity is maintained by physical and algorithmic controls over access to the personal profiles, and releasing only aggregate data without personally identifying information or of small groups.
Abstract: An improved human user computer interface system, wherein a user characteristic or set of characteristics, such as demographic profile or societal “role”, is employed to define a scope or domain of operation. The operation itself may be a database search, to interactively define a taxonomic context for the operation, a business negotiation, or other activity. After retrieval of results, a scoring or ranking may be applied according to user define criteria, which are, for example, commensurate with the relevance to the context, but may be, for example, by date, source, or other secondary criteria. A user profile is preferably stored in a computer accessible form, and may be used to provide a history of use, persistent customization, collaborative filtering and demographic information for the user. Advantageously, user privacy and anonymity is maintained by physical and algorithmic controls over access to the personal profiles, and releasing only aggregate data without personally identifying information or of small groups.

1,465 citations

Journal ArticleDOI
TL;DR: This work shows that the uncoded optimum file assignment is NP-hard, and develops a greedy strategy that is provably within a factor 2 of the optimum, and provides an efficient algorithm achieving a provably better approximation ratio of 1-1/d d, where d is the maximum number of helpers a user can be connected to.
Abstract: Video on-demand streaming from Internet-based servers is becoming one of the most important services offered by wireless networks today. In order to improve the area spectral efficiency of video transmission in cellular systems, small cells heterogeneous architectures (e.g., femtocells, WiFi off-loading) are being proposed, such that video traffic to nomadic users can be handled by short-range links to the nearest small cell access points (referred to as “helpers”). As the helper deployment density increases, the backhaul capacity becomes the system bottleneck. In order to alleviate such bottleneck we propose a system where helpers with low-rate backhaul but high storage capacity cache popular video files. Files not available from helpers are transmitted by the cellular base station. We analyze the optimum way of assigning files to the helpers, in order to minimize the expected downloading time for files. We distinguish between the uncoded case (where only complete files are stored) and the coded case, where segments of Fountain-encoded versions of the video files are stored at helpers. We show that the uncoded optimum file assignment is NP-hard, and develop a greedy strategy that is provably within a factor 2 of the optimum. Further, for a special case we provide an efficient algorithm achieving a provably better approximation ratio of 1-(1-1/d )d, where d is the maximum number of helpers a user can be connected to. We also show that the coded optimum cache assignment problem is convex that can be further reduced to a linear program. We present numerical results comparing the proposed schemes.

1,331 citations