• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 194
  • 59
  • 37
  • 23
  • 14
  • 12
  • 11
  • 11
  • 6
  • 6
  • 5
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 433
  • 300
  • 205
  • 102
  • 96
  • 79
  • 70
  • 69
  • 66
  • 63
  • 48
  • 47
  • 45
  • 45
  • 45
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks

Sardana, Divya January 2009 (has links)
No description available.
302

Lessons Learned Constructing the NG-Mesh Wireless Test-Bed

Ng, WK Stanley 10 1900 (has links)
<p>This thesis presents the lessons learned from building an IEEE 802.11 wireless mesh network (WMN) test-bed. Each network node consists of a Linux processor with multiple IEEE 802.11b/g transceivers operating in the 2.4 GHz band. Each transceiver consists of a medium access control (MAC) and base-band processor (BBP) in addition to a radio. A device driver was modified to control some of the key transceiver functions. The test-bed's Wi-Fi interfaces can be programmed to implement any mesh communication topology. All Wi-Fi interfaces use omni-directional antennas and the IEEE 802.11b operation mode.</p> <p>The test-bed design is easily extendable to incorporate newer Wi-Fi technologies. Measurements of co-channel interference in each Wi-Fi channel including received signal strength (RSS) and signal-to-interference-and-noise ratio (SINR) are presented. The AutoMin algorithm was developed in order to use the captured physical layer (PHY) metrics to avoid Wi-Fi congestion during test-bed operation. A comparison of a software-based spectrum analyzer to a commercial one is described. Key Wi-Fi functions in the Ralink driver source code are explored in depth. The compliance of the Ralink chip-set to the IEEE 802.11b spectral mask was verified. The maximum driver-induced retuning rate for the popular Ralink radio was found experimentally. This data can be used to optimize the performance of IEEE 802.11 WMNs.</p> / Master of Applied Science (MASc)
303

Estudio de la migración del estándar 802.11 al 802.16 en zonas rurales / Eduardo Montes Moscol

Montes Moscol, Eduardo 09 May 2011 (has links)
Se plantea la posibilidad de migrar a IEEE 802.16 (WiMAX) en los lugares donde se usa WiFi como solución tecnológica ya que la primera es una tecnología inalámbrica diseñada para redes MAN que no solo permite conectividad inalámbrica sino también velocidades de banda ancha; lográndose llenar los vacíos que deja WiFi. De esta manera se estaría fomentando el acceso universal el cual es un componente en la estrategia del desarrollo de las telecomunicaciones en el Perú.
304

Estudio del impacto de IEEE 802.11N sobre las redes wireless en el Perú / Luis Felipe Hernández Correa

Hernández Correa, Luis Felipe 09 May 2011 (has links)
En esta tesis se estudia la tecnología 802.11n, detallando las modificaciones realizadas en la capa MAC y Física respecto de las tecnologías legadas. Así mismo, cuales serán los resultados como solución de acceso en redes de área local y como podría influir esta tecnología como solución de enlaces punto a punto y punto multipunto de banda ancha en zonas no urbanas. Para esto se analizarán las condiciones de adaptación que deben ser consideradas para lograr los escenarios propuestos en zonas no urbanas de difícil acceso. Finalmente siguiendo los parámetros del último draft se determinará si esta tecnología podría ser en un futuro una solución paralela a otras tecnologías para realizar un enlace de banda ancha de larga distancia.
305

Enabling Cognitive Radios through Radio Environment Maps

Zhao, Youping 23 May 2007 (has links)
In recent years, cognitive radios and cognitive wireless networks have been introduced as a new paradigm for enabling much higher spectrum utilization, providing more reliable and personal radio services, reducing harmful interference, and facilitating the interoperability or convergence of different wireless communication networks. Cognitive radios are goal-oriented, autonomously learn from experience and adapt to changing operating conditions. Cognitive radios have the potential to drive the next generation of radio devices and wireless communication system design and to enable a variety of niche applications in demanding environments, such as spectrum-sharing networks, public safety, natural disasters, civil emergencies, and military operations. This research first introduces an innovative approach to developing cognitive radios based on the Radio Environment Map (REM). The REM can be viewed as an integrated database that provides multi-domain environmental information and prior knowledge for cognitive radios, such as the geographical features, available services and networks, spectral regulations, locations and activities of neighboring radios, policies of the users and/or service providers, and past experience. The REM, serving as a vehicle of network support to cognitive radios, can be exploited by the cognitive engine for most cognitive functionalities, such as situation awareness, reasoning, learning, planning, and decision support. This research examines the role of the REM in cognitive radio development from a network point of view, and focuses on addressing three specific issues about the REM: how to design and populate the REM; how to exploit the REM with the cognitive engine algorithms; and how to evaluate the performance of the cognitive radios. Applications of the REM to wireless local area networks (WLAN) and wireless regional area networks (WRAN) are investigated, especially from the perspectives of interference management and radio resource management, which illustrate the significance of cognitive radios to the evolution of wireless communications and the revolution in spectral regulation. Network architecture for REM-enabled cognitive radios and framework for REM-enabled situation-aware cognitive engine learning algorithms have been proposed and formalized. As an example, the REM, including the data model and basic application programmer interfaces (API) to the cognitive engine, has been developed for cognitive WRAN systems. Furthermore, REM-enabled cognitive cooperative learning (REM-CCL) and REM-enabled case- and knowledge-based learning algorithms (REM-CKL) have been proposed and validated with link-level or network-level simulations and a WRAN base station cognitive engine testbed. Simulation results demonstrate that the WRAN CE can adapt orders of magnitude faster when using the REM-CKL than when using the genetic algorithms and achieve near-optimal global utility by leveraging the REM-CKL and a local search. Simulation results also suggest that exploiting the Global REM information can considerably improve the performance of both primary and secondary users and mitigate the hidden node (or hidden receiver) problem. REM dissemination schemes and the resulting overhead have been investigated and analyzed under various network scenarios. By extending the optimized link state routing protocol, the overhead of REM dissemination in wireless ad hoc networks via multipoint relays can be significantly reduced by orders of magnitude as compared to plain flooding. Performance metrics for various cognitive radio applications are also proposed. REM-based scenario-driven testing (REM-SDT) has been proposed and employed to evaluate the performances of the cognitive engine and cognitive wireless networks. This research shows that REM is a viable, cost-efficient approach to developing cognitive radios and cognitive wireless networks with significant potential in various applications. Future research recommendations are provided in the conclusion. / Ph. D.
306

A Taxonomy of Computer Attacks with Applications to Wireless Networks

Lough, Daniel Lowry 30 April 2001 (has links)
The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with the aspect of security in mind; and security that is present is typically added as an afterthought. What makes these systems so vulnerable is that the security design process is based upon assumptions that have been made in the past; assumptions which now have become obsolete or irrelevant. In addition, fundamental errors in the design and implementation of systems repeatedly occur, which lead to failures. This research presents a comprehensive analysis of the types of attacks that are being leveled upon computer systems and the construction of a general taxonomy and methodologies that will facilitate design of secure protocols. To develop a comprehensive taxonomy, existing lists, charts, and taxonomies of host and network attacks published over the last thirty years are examined and combined, revealing common denominators among them. These common denominators, as well as new information, are assimilated to produce a broadly applicable, simpler, and more complete taxonomy. It is shown that all computer attacks can be broken into a taxonomy consisting of improper conditions: <b>V</b>alidation <b>E</b>xposure <b>R</b>andomness <b>D</b>eallocation <b>I</b>mproper <b>C</b>onditions <b>T</b>axonomy; hence described by the acronym <b>VERDICT</b>. The developed methodologies are applicable to both wired and wireless systems, and they are applied to some existing Internet attacks to show how they can be classified under VERDICT. The methodologies are applied to the IEEE 802.11 wireless local area network protocol and numerous vulnerabilities are found. Finally, an extensive annotated bibliography is included. / Ph. D.
307

Rogue Access Point Detection through Statistical Analysis

Kanaujia, Swati 26 May 2010 (has links)
The IEEE 802.11 based Wireless LAN (WLAN) has become increasingly ubiquitous in recent years. However, due to the broadcast nature of wireless communication, attackers can exploit the existing vulnerabilities in IEEE 802.11 to launch various types of attacks in wireless and wired networks. This thesis presents a statistical based hybrid Intrusion Detection System (IDS) for Rogue Access Point (RAP) detection, which employs distributed monitoring devices to monitor on 802.11 link layer activities and a centralized detection module at a gateway router to achieve higher accuracy in detection of rogue devices. This detection approach is scalable, non-intrusive and does not require any specialized hardware. It is designed to utilize the existing wireless LAN infrastructure and is independent of 802.11a/b/g/n. It works on passive monitoring of wired and wireless traffic, and hence is easy to manage and maintain. In addition, this approach requires monitoring a smaller number of packets for detection as compared to other detection approaches in a heterogeneous network comprised of wireless and wired subnets. Centralized detection is done at a gateway router by differentiating wired and wireless TCP traffic using Weighted Sequential Hypothesis Testing on inter-arrival time of TCP ACK-pairs. A decentralized module takes care of detection of MAC spoofing and totally relies on 802.11 beacon frames. Detection is done through analysis of the clock skew and the Received Signal Strength (RSS) as fingerprints using a naïve Bayes classifier to detect presence of rogue APs. Analysis of the system and extensive experiments in various scenarios on a real system have proven the efficiency and accuracy of the approach with few false positives/negatives and low computational and storage overhead. / Master of Science
308

Design and Evaluation of a Mobile Instrumentation Platform for Unmanned Vehicle Testing

Gombar, Brett Anthony 28 July 2006 (has links)
Unmanned vehicle systems are becoming more important in the future of the military and in commercial applications. These systems are used to prevent humans from entering dangerous situations or to automate dull tasks. In order to facilitate rapid development of these systems, testing procedures and infrastructure need to be created. Once developed, the performance characteristics of unmanned vehicle systems can be determined and compared to similar systems. This information will be beneficial to system developers and potential customers. In order to provide the infrastructure and test procedures to the unmanned systems community, the Joint Robotics Program created the National Unmanned Systems Experimentation Environment (NUSE2). NUSE2 consists of a variety of military organizations and academic resources, including the Joint Unmanned Systems Test Experimentation and Research (JOUSTER) site at Virginia Tech. JOUSTER was tasked specifically with creating a mobile instrumentation platform capable of providing wireless communications, data collection, and video coverage of a testing site. This thesis presents the system designed and created to meet this need. For the first time, a mobile instrumentation platform has been created to specifically support unmanned systems research. Additionally, the performance characteristics of this system have been fully evaluated and will serve as a benchmark for future improvements to the system. / Master of Science
309

Investigation of performance enhancements in wireless lans using IEEE 802.11 b

Bojan, Vinodh 01 April 2003 (has links)
No description available.
310

Adaptations inter-couches pour la diffusion des services vidéo sans fil / Cross-Layer Adaptations for wireless video streaming services

Djama, Ismail 10 November 2008 (has links)
L’un des défis majeurs dans la convergence des réseaux et des services vers la technologie IP est le maintien de la qualité de service (QoS) des flux audio/vidéo transmis sur des réseaux sans fil pour des utilisateurs mobiles et hétérogènes. Dans cet environnement, les services multimédia doivent faire face à plusieurs inconvénients engendrés par le manque de fiabilité d’un canal sans fil et son partage par plusieurs utilisateurs. Ces inconvénients sont accentués par l’hétérogénéité des terminaux de réception (capacité de décodage, espace de stockage, résolution d’affichage, etc.) qui doivent recevoir, décoder et afficher les flux multimédia. Afin d’assurer un accès universel aux services n’ importe où, n’importe quand et en utilisant n’importe quel terminal d’accès, les applications multimédia de nouvelle génération doivent interagir avec leur environnement pour, d’une part, informer les réseaux sous-jacents de leur besoins en QoS, et d’autre part, adapter dynamiquement leurs services en fonction des terminaux de réception et des variations intempestives des conditions de transmission. Dans ce contexte, nous proposons un nouveau système pour la transmission des flux audio/vidéo sur les réseaux 802.11 basé sur l’approche Cross-layer. Ce nouveau système, appelé XLAVS (Cross Layer Adaptive Video Streaming), communique activement avec l’ensemble des couches réseaux ainsi que le récepteur final pour déterminer l’adaptation optimale qui permet d’optimiser la QoS des flux audio/vidéo. Nos contributions se focalisent principalement sur les adaptations Cross-layer mises en œuvre par le XLAVS. Ces contributions sont organisées en deux grandes catégories : les adaptations ascendantes exécutées au niveau applicatif et les adaptations descendantes exécutées au niveau MAC 802.11. Dans la première catégorie, notre apport s’articule au tour de : (1) l’adaptation dynamique du débit vidéo en fonction du débit physique disponible dans le réseau 802.11 et (2) l’adaptation conjointe du taux de redondance FEC et du débit vidéo contrôlée par la puissance du signal et les taux de perte. Dans la deuxième catégorie, nous proposons deux mécanismes Cross-layer au niveau MAC 802.11 : (1) une fragmentation 802.11 adaptative pour trouver un compromis entre les pertes de paquets et l’overhead introduit par les couches 802.11 et (2) un groupage des images vidéo au niveau MAC pour permettre au flux vidéo d’avoir un accès au canal 802.11 proportionnel à son débit. / One of the big challenges in the convergence of networks and services to the IP technology is to maintain the Quality of service (QoS) for audio/video streams transmitted over wireless networks to heterogeneous mobiles users. In this environment, the multimedia services should face many shortcomings caused mainly by the wireless channel unreliability and its sharing among many users. These shortcomings are increased by the terminals heterogeneity (i.e. decoding capability, memory storage, display resolution, etc.) which should receive, decode and display the multimedia streams. In order to allow universal access to multimedia services anywhere, anytime and using any kind of terminal, the new generation of multimedia applications have to interact with their environment, on the one hand, to inform the underling network about their need in term of QoS, and on the other hand, to dynamically adapt their services according to the receiver terminal and the changing in network conditions. In this context, we have proposed a new Cross-layer based streaming system to transmit audio/video streams over 802.11 networks. This new system, called XLAVS (Cross layer Adaptive video streaming), actively communicates with all network layers and the end receiver to determine the optimal adaptation that optimize the QoS of audio/video streams. Our contributions focus mainly on the Cross-layer adaptations implemented on the XLAVS. These contributions are classified into two major categories: the bottom-up adaptations performed at the application level and the top-down adaptations performed at the 802.11 MAC level. In the first category, our proposals have revolved around: (1) a dynamic adaptation of video throughput according to the physical rate available in the 802.11 network and (2) a join FEC and video throughput adaptation steered by the signal strength and the loss ratio. In the second category, we have proposed two Cross-layer mechanisms at the 802.11 MAC level: (1) an adaptive 802.11 MAC fragmentation to find an optimal trade-off between the packet loss and the overhead introduced by the MAC layer and (2) a video frame grouping at MAC level that allows video stream to get access to the 802.11 channel proportionally to its throughput.

Page generated in 0.0176 seconds