Dr.-Ing. Kiran Mathews

Computer scientist, Coder, Hiker, Gooner#COYG

About Me:

I am Dr.-Ing. Kiran Mathews, a postdoctoral research scientist at Fraunhofer IESE, Kaiserslautern, Germany. I completed my PhD dissertation under the supervision of Prof. Dr Reinhard Gotzhein at Technische Universität Kaiserslautern (now Rheinland-Pfälzische Technische Universität Kaiserslautern), Germany. I have also completed my master’s in Computer Science from the Technical University of Kaiserslautern, Germany. My current research focuses on Developing Software for safety-critical applications, Industrial Automation, Distributed protocols, Wireless communications, Ad-hoc networks, and Network Security.






Token bucket based traffic shaping and monitoring for WLAN-based control systems

2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
In industrial automation, there is strong interest in using wireless technologies to run production environments, and in particular to build networked control systems. To operate such networks effectively, sufficient control over the communication system is needed, regarding, e.g., bandwidth usage, frame latency, and frame loss. In this paper, we present an approach for traffic shaping that applies a variant of the token bucket algorithm, and an approach for traffic monitoring in order to determine network overload. In particular, we introduce and apply a metric called unusable wasted bandwidth ratio, which is derived from the number of unusable wasted tokens to detect network overload locally. We have implemented both approaches on a commercial platform with WLAN adapters, and have conducted real experiments to assess their performance.

Download PDF

OB-EWMA:A Link Metric for Reliability-constrained Routing in Wireless Networks

2021 IEEE Wireless Communications and Networking Conference (WCNC)
Reliability of end-to-end communication is crucial for applications such as wireless networked control systems. To discover routes that satisfy specified reliability requirements, adaptive, conservative, and stable link reliability estimates are required. Traditional metrics do not support these objectives well enough. In this paper, we propose OB-EWMA (Outlier Bounded Exponential Weighted Moving Average) as link metric for reliability-constrained routing in contention-based wireless networks. We have implemented OB-EWMA along with a topology explorer, evaluate its fidelity in a Wi-Fi testbed, and compare it to other link metrics.

Download PDF

Cooperative fair bandwidth scaling in contention-based wireless networks using time token bucket

2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)
Applications with Quality of Service (QoS) requirements such as networked control systems are not well supported by today's off-the-shelf wireless standards such as IEEE 802.11 (WiFi). Specifying a range of minimally required base QoS and preferred QoS combined with dynamic scaling in this range can help to support QoS while improving network utilization. However, scaling is typically happening in a greedy and therefore unfair way, with each node trying to maximize its throughput. In this paper, we present a cooperative algorithm for dynamical cooperative bandwidth scaling using a time token bucket approach. We show that our approach improves bandwidth utilization in a fair way. Furthermore, it dynamically reacts to topology changes, e.g. due to node mobility, as well as to traffic of uncooperative (external) nodes. Finally, it achieves stable bandwidth usage of participating nodes, even in networks with external traffic. We evaluate our approach in an IEEE 802.11 testbed.

Download PDF

rmin-Routing:Discovery and Operation of Routes in Wireless Ad-hoc Networks with Specified Statistical Minimum Reliabilities

2019 IEEE 44th Conference on Local Computer Networks (LCN)
In this paper, we propose a new approach for Quality-of-Service routing in wireless ad-hoc networks called rmin-routing, with the provision of statistical minimum route reliability as main route selection criterion. Discovery of r min routes is based on a network model with statistical link reliabilities, which are combined into path reliabilities. To achieve specified minimum route reliabilities, we improve the reliability of individual links by well-directed retransmissions, to be applied during the operation of routes. To select among a set of candidate routes, we define and apply route quality criteria concerning network load. We have applied rmin-routing in sample topologies, and compare it to other routing approaches.

Download PDF

Network Sensing In WLAN

Master Thesis
In industrial automation, there is strong interest in using wireless technologies to run production environments, and in particular to build networked control systems. To operate such networks effectively, sufficient control over the communication system is needed, regarding, e.g., bandwidth usage, frame latency, and frame loss. In this paper, we present an approach for traffic shaping that applies a variant of the token bucket algorithm, and an approach for traffic monitoring in order to determine network overload. In particular, we introduce and apply a metric called unusable wasted bandwidth ratio, which is derived from the number of unusable wasted tokens to detect network overload locally. We have implemented both approaches on a commercial platform with WLAN adapters, and have conducted real experiments to assess their performance.

Download PDF

Analysis of time synchronization of OpenSky sensor nodes

Guided Research
The goal of this project is to synchronize the Open-Sky sensor network with nanosecond precision. For this, we checked the messages sent by the aircraft to two receivers and checked the offset in their reception time. To check the correctness of our system, we compare the calculated measurements to the ground-truth value, i.e., the difference in the timestamps between two receivers should be equal to the difference in the message propagation delay between the two receivers to the aircraft.

Download PDF

Automatic Topology Discovery in WiFi(IEEE 802.11) network

Guided Research
The main goal of this guided research was to develop a protocol to detect the topology of the network with nodes connected via IEEE 802.11. We came up with a protocol, which terminates with consistent topology information among nodes. One of the main tasks was the termination of the distributed protocol, which was solved by introducing a master node to compare the hash values of the topology matrix of each node. As a part of guided research, the protocol was implemented and tested.

Download PDF

Mesh Networks Based on IEEE 802.11

Research Report
A study about mesh networks based on IEEE 802.11: in this work, we discuss mesh formation, routing techniques, frame structure, and internetworking. We also studied mesh projects such as One Laptop Per Child (OLPC) and Seamless Mesh (SMesh).

Download PDF

Topology Explorer for WLAN
This research focuses to develop a protocol that detects the communication topology of the network consisting of nodes connected via IEEE 802.11. The proposed protocol terminates with consistent topology information among nodes. The termination of the distributed protocol is initiated by the predetermined master node by comparing the hash values of the topology matrix at each node. As a part of guided research, the protocol was implemented and tested. date: true

Technologies
C++ C



WiPS
WiPS is an extensible framework, defining interfaces and a code structure, which support the implementation and integration of higher level protocols. Each application using WiPS can select an - for their use case - appropriate subset of protocols integrated into WiPS. Based on this selection, WiPS builds a tailored protocol stack only consisting of these protocols, that can be easily used by the application.

Technologies
C++ Python Protobuf libPCAP



Time synchronisation in OpenSky network
This research evaluates the synchronization error in the Open-Sky network. For evaluation, location messages broadcasted by the aircraft received by at least two receivers (of the networks) are used. The calculated measurements are compared to the ground truth value to check the correctness of the system. I.e., the difference in the timestamps between two receivers should be equal to the difference in the message propagation delay between the two receivers to the aircraft.

Technologies
R