Communication Networks Laboratory is a research and graduate education unit within the Department of Informatics and Telecommunications of the University of Athens focusing on R&D in the area of Communication Networks. During the past years, the CNL has demonstrated an active involvement in the areas of wireless/mobile networks and services, broadband communications, and networked multimedia communications.
CNL is currently active in the following R&D areas:
Mobile/Wireless Networks | |
![]() |
Design and specification of new architectures and protocols
In terms of mobile and IP networks new innovative architectures and protocols have been proposed. These enable network operators to provide to customers connectivity through a variety of access network types (e.g. GERAN, UTRAN, wireless LAN, Bluetooth) and to support its functions over various types of mobile communication networks (e.g. GPRS, UMTS), as well as over wired networks (e.g., dial-up connections, wired LANs). |
![]() |
Wireless Local and Metropolitan Area Networks' Technologies
|
![]() |
Ad-hoc and sensor networks' technologies
The purpose of the ad-hoc networks is the support of robust and efficient communication between mobile users over limited bandwidth wireless links without the presence of a central control unit. Routing capabilities are passed into mobile terminals, as each node forwards traffic that is destined to other users. These networks are required to support dynamic topologies that are often characterized by increased variance. The main challenge for the achievement of efficient operation of these networks is the limited bandwidth of the wireless links between the nodes. A wireless ad hoc sensor network consists of a number of sensors spread across a geographical area. Each sensor has wireless communication capability and some level of intelligence for signal processing and networking of the data. The efficient operation of a sensor network demands for low power consumption, self-organization capabilities, collaborative signal processing and querying ability. |
![]() |
Reconfigurable networks and services
Reconfigurability concerns the dynamic re-arrangement of functional entities in the communication and computing infrastructure for the support of flexible service provision. Additionally, it improves and enriches the overall user experience by enabling unprecedented services and substantially enhancing existing ones. Towards the introduction of mechanisms and systems to support reconfigurability in various layers (e.g. terminal or network side) several efforts have been undertaken. The CNL is among leading institutions in the reconfigurability domain. |
![]() |
Opportunistic Spectrum Access Networks
Opportunistic Spectrum Access (OSA) is a novel paradigm aiming to address the issue of spectrum scarcity and meet the increasing demand for spectrum. It provides the capability to identify unused portions of licensed spectrum and share the wireless channel with licensed users in an opportunistic manner. The vision of OSA networks is to provide high bandwidth to mobile users using dynamic and efficient spectrum management techniques. OSA networks impose unique research challenges due to the high fluctuation in the available spectrum, as well as the diverse quality of service requirements of modern applications. |
![]() |
Pervasive Computing
The vision of pervasive computing consists of the unnoticeable integration of computers with people's everyday activities. Computing and networking resources are distributed in physical environments, allowing the users to access information and computational resources anytime anywhere. The technology functions in the background, assisting users' current tasks posing the minimum possible distraction as the interactions with the system are pleasant and natural.Pervasive computing environments introduce new challenges for application development, due to the diversity and the dynamic nature of the devices involved.This vision, sometimes called ubiquitous computing or invisible computing, has inspired many researchers to work on new hardware, networking protocols, human-computer interactions, security and privacy, applications, and social implications. |
![]() |
Physical layer and Multiple Access Aspects
|
![]() |
Cross-Layer Design
The design of a protocol, algorithm or architecture that violates the traditional layered architecture is defined as a Cross-Layer Design. An architecture that follows the traditional discrete layers' structure separates the total networking activity in discrete layers and defines a hierarchy of services offered by each layer. This architecture does not allow the communication between non-adjacent layers. In order to satisfy the constantly increasing user QoS requirements, a large number of different performance enhancement mechanisms are introduced in almost all layers of the typical protocol stack. The completely independent operation of these mechanisms can lead to situations of inefficient operation, mainly in cases where conflicting actions are performed. To address this issue, the "violation" of the traditional architecture is proposed, with the adoption of Cross-Layer mechanisms that coordinate the operations of the individual adaptation mechanisms, and provide flexible and efficient solutions in different areas of interest, such as resource allocation, mobility management, QoS provision, security etc. |
![]() |
Network Security
The protection of the communication and network resources is of vital importance for a networking environment. The key components of secure communication are confidentiality, authentication, message integrity and nonrepudiation and availability and access control. Network security does not only involve the protection, but also the detection of breaches of secure communication and attacks on the infrastructure, as well as the response to these attacks. |
Networked Multimedia Communications, Services and Applications | |
![]() |
Quality of Service (QoS) support
|
![]() |
Continuous media streaming and content distribution
|
![]() |
Design and development of multimedia applications
|
![]() |
Deployment of new services (tele-education, tele-medicine)
|
![]() |
Network and Service Management
|
![]() |
Location based services
The exploitation of location information presents a powerful new dimension to the range of information services that can be offered. By combining positional mechanisms with location sensitive user information, it is possible to offer truly customized personal communication services through the mobile phone or other mobile devices. In order to cope with the management and use of the location information in mobile communication systems the CNL introduces and develops an open and reconfigurable service provision architecture that exploits the location information to provide location aware service management and provision in 3G networks and beyond. |
![]() |
Semantic Web Technologies
According to Tim Berners-Lee, inventor of the World Wide Web (WWW), the Semantic Web is an extension of the current Web, in which information is given well-defined meaning, better enabling computers and people to work in cooperation. The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. For the Semantic Web to function, computers must have access to structured collections of information and sets of inference rules that they can use to conduct automated reasoning. |
Performance Evaluation and Protocol Specification/Testing | |
![]() |
Stochastic modeling and queuing studies
Large Scale Network Deployment (with different types of applications) demands a through Network Dimensioning in order to predict the behavior under varying traffic load. The dynamic behavior of networks is affected by the imposed Workload and the resource consumption. The characterization of the Workload requires adequate stochastic Modeling Techniques. Furthermore, the modeling of resource consumption in the specific nodes and links arises the need for adequate queuing models. |
![]() |
Simulations
The ever increasing demand for more bandwidth and more sophisticated services poses the requirement to adapt the network architecture (and the respective control and management functions) in order to provide the end-to-end services through different types of network (e.g. UMTS, Wireless LAN, HIPERLAN, Bluetooth). The complexity of these types of networks has to be tackled in order to study not only the functional correctness, but also performance aspects by means of simulation studies. |
![]() |
Conformance testing
The emergence of downloadable services and software reconfigurable networks and terminals in new communication era brings to front the requirement for new advanced testing approaches. Protocols, services and applications prior to their final release for downloading and installation have to be tested for meeting user and quality requirements, as well as ensuring conformity and interoperability into the hosting execution environment. Conformance testing captures the technical description of a specification to measure whether a service, application or protocol faithfully implements the specification. The testing result provides developers, users, and operators with increased levels of confidence in product quality and increases the probability of successful interoperability. |
![]() |
Formal protocol specification and validation
In CNL the SDL-based modeling techniques are used for specification of mobile communication protocols (Mobility Management, Resource Control, Call Handling). The performance evaluation of SDL based models with the QUEST tool has been applied in the area of ATM networks and UMTS based mobile radio networks. Furthermore, the discrete event simulation tool OPNET has been used for the performance evaluation of MAC protocols for wireless ATM, the resource management of wireless Internet based on WLAN/HIPERLAN 2, the ATM based infrastructure of the UMTS and the resource management of ATM based WLANs. Due to the convergence of different networking technologies the CNL studies the applicability of the above tools and potential combination of their features in an integrated modeling approach. |