• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 306
  • 34
  • 25
  • 21
  • 12
  • 12
  • 10
  • 6
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 523
  • 523
  • 523
  • 241
  • 200
  • 147
  • 145
  • 116
  • 110
  • 104
  • 83
  • 70
  • 55
  • 53
  • 50
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
351

Development of an improved link metric for routing protocols in wireless ad-hoc networks.

Kabiwa Tchokonte, Maxime Stephane. January 2014 (has links)
M. Tech. Electrical engineering. / Discusses the interference and bandwidth adjusted ETX routing metric uses a logical interference model that refers to the interference arising from the Carrier Sensing Multiple Access with Collision Avoidance (CSMA-CA) based Medium Access Control. This approach of capturing inter-flow is complex and more restrictive. In this dissertation, a more realistic and less restrictive approach based on the information available at the physical layer (signal strength) is used to capture the interference.In contrast to the logical interference model, this has the excellent advantage of measuring the parameters using online data traffic. The question is whether actual capacity improvements can be achieved by considering the physical interference model.
352

Scheduling and QoS enhancement in wireless vehicular ad-hoc networks.

Miao, Lusheng. January 2014 (has links)
D. Tech. Electrical Engineering. / Discusses the protocol design in VANETs is very challenging due to their low latency and high data rate requirements in a high mobility environment. Hence, the central metrics of QoS such as throughput, reliability and delays are critical to the design of protocol in VANETs. Therefore, this project focuses on the scheduling and QoS enhancement algorithms. The QoS analytical model and multi-channel MAC protocol were completed; this was significant for the development of the VANETs.The anticipated benefits of this study may be described as: 1. The duty cycle adaptive MAC protocol could improve the QoS of VANET in the situation where the OBU is equipped with only one transceiver. 2. The results obtained from this model is significant for the designing and evaluation of the vehicular network. 3. Due to the characteristics of VANETs, the requirements of high throughput and low latency are critical in VANETs. An efficient multi-channel MAC protocol is a vital requirement in order to offer efficient, fair and stable channel access using the limited channel resources.
353

Fundamentals of distributed transmission in wireless networks : a transmission-capacity perspective

Liu, Chun-Hung 01 June 2011 (has links)
Interference is a defining feature of a wireless network. How to optimally deal with it is one of the most critical and least understood aspects of decentralized multiuser communication. This dissertation focuses on distributed transmission strategies that a transmitter can follow to achieve reliability while reducing the impact of interference. The problem is investigated from three directions : distributed opportunistic scheduling, multicast outage and transmission capacity, and ergodic transmission capacity, which study distributed transmission in different scenarios from a transmission-capacity perspective. Transmission capacity is spatial throughput metric in a large-scale wireless network with outage constraints. To understand the fundamental limits of distributed transmission, these three directions are investigated from the underlying tradeoffs in different transmission scenarios. All analytic results regarding the three directions are rigorously derived and proved under the framework of transmission capacity. For the first direction, three distributed opportunistic scheduling schemes -- distributed channel-aware, interferer-aware and interferer-channel-aware scheduling are proposed. The main idea of the three schemes is to avoid transmitting in a deep fading and/or sever interfering context. Theoretical analysis and simulations show that the three schemes are able to achieve high transmission capacity and reliability. The second direction focuses on the study of the transmission capacity problem in a distributed multicast transmission scenario. Multicast transmission, wherein the same packet must be delivered to multiple receivers, has several distinctive traits as opposed to more commonly studied unicast transmission. The general expression for the scaling law of multicast transmission capacity is found and it can provide some insight on how to do distributed single-hop and multi-hop retransmissions. In the third direction, the transmission capacity problem is investigated for Markovain fading channels with temporal and spatial ergodicity. The scaling law of the ergodic transmission capacity is derived and it can indicate a long-term distributed transmission and interference management policy for enhancing transmission capacity. / text
354

Αλγόριθμοι δρομολόγησης πολλαπλών κριτηρίων και η απόδοση τους σε ad-hoc δίκτυα / Multicost routing algorithms and their performance in ad-hoc networks

Κόκκινος, Παναγιώτης 25 September 2007 (has links)
Στην παρούσα εργασία εξετάζουμε το πρόβλημα της δρομολόγησης σε δίκτυα ad-hoc, όπου οι κόμβοι είναι ακίνητοι και έχουν πεπερασμένα αλλά επαναφορτιζόμενα ενεργειακά αποθέματα. Αρχικά μελετάμε σε θεωρητική βάση τους ενεργειακούς και χωρητικούς περιορισμούς. Ενεργειακοί είναι οι περιορισμοί που οφείλονται στην μικρή ενεργειακή αυτοτέλεια των κόμβων, ενώ οι χωρητικοί περιορισμοί οφείλονται στην περιορισμένη χωρητικότητα του ασύρματου μέσου και στην παρεμβολή. Συγκεκριμένα εξετάζουμε πώς ορισμένα δικτυακά χαρακτηριστικά επηρεάζουν την απόδοση του δικτύου. Τέτοια δικτυακά χαρακτηριστικά είναι η πυκνότητα των κόμβων του δικτύου, η φυσική απόσταση τους, η ακτίνα μετάδοσης τους κ.α. Εξετάζουμε διαφόρων ειδών δίκτυα και σε γενικές γραμμές αποδεικνύουμε ότι η ενέργεια είναι ο κρίσιμος πόρος σε δίκτυα τα οποία είναι αραιά ή οι κόμβοι τους έχουν μικρό ρυθμό επαναφόρτισης της ενέργειας ή μεγάλη ακτίνα μετάδοσης. Στην αντίθετη περίπτωση η απόδοση των δικτύων περιορίζεται από την χωρητικότητα και την παρεμβολή. Επιπλέον προτείνουμε και υλοποιούμε έναν ενεργειακά-αποδοτικό αλγόριθμο δρομολόγησης με πολλαπλά κόστη, όπου ένα διάνυσμα από παραμέτρους, εν’αντιθέσει με μία μόνο παράμετρο, ανατίθεται σε κάθε σύνδεσμο του δικτύου. Σε κάθε ανακαλυπτόμενη διαδρομή ανατίθεται ομοίως ένα διάνυσμα παραμέτρων, που προκύπτει από τα αντίστοιχα διανύσματα των συνδέσμων της διαδρομής. Οι παράμετροι που χρησιμοποιούμε είναι ο αριθμός των συνδέσμων της διαδρομής, η υπολειπόμενη ενέργεια και η ισχύς μετάδοσης. Ο αλγόριθμος αυτός συγκρίνεται με τον αλγόριθμο ελάχιστου-μήκους διαδρομής, για την επίλυση του προβλήματος του άπειρου χρονικού ορίζοντα. Στο πρόβλημα του άπειρου χρονικά ορίζοντα, ενέργεια και νέα πακέτα δεδομένων δημιουργούνται συνεχώς σε κάθε κόμβο του δικτύου. Στα πειράματα που εκτελέσαμε μας ενδιαφέρει να υπολογίσουμε την μέγιστη πιθανότητα δημιουργίας πακέτων δεδομένων pmax στους κόμβους, η οποία επιτρέπει στο δίκτυο μας να παραμένει ευσταθές. Ένα δίκτυο χαρακτηρίζεται ευσταθές όταν η εισερχόμενη κίνηση εξυπηρετείται από το δίκτυο με μικρή μέση καθυστέρηση παράδοσης αλλά και μεγάλο ποσοστό επιτυχούς παράδοσης των πακέτων δεδομένων στους προορισμούς τους. Όταν μία από αυτές τις συνθήκες δεν ισχύει τότε θεωρούμε ότι το δίκτυο είναι ασταθές και δεν μας ενδιαφέρει περαιτέρω η μελέτη του. Ουσιαστικά η μέγιστη πιθανότητα δημιουργίας πακέτων δεδομένων pmax είναι η μέγιστη απόδοση του δικτύου μας. Η μέση καθυστέρηση παράδοσης των πακέτων δεδομένων ορίζεται ως ο μέσος χρόνος μεταξύ της δημιουργίας ενός πακέτου στον κόμβο-πηγή και της λήψης του πακέτου στον κόμβο-προορισμού. Το ποσοστό της επιτυχούς παράδοσης των πακέτων δεδομένων ορίζεται σαν τον λόγο του αριθμού των πακέτων που παρελήφθησαν επιτυχώς από τους κόμβους-προορισμού προς τον αριθμό των πακέτων που δημιουργήθηκαν στους κόμβους-πηγής. Κατά την διάρκεια των πειραμάτων μας δοκιμάζουμε διάφορες πιθανότητες δημιουργίας πακέτων δεδομένων p και διάφορους ρυθμούς επαναφόρτισης των κόμβων X. Από τα αποτελέσματα των πειραμάτων μας παρατηρούμε ότι ο ενεργειακά-αποδοτικός αλγόριθμος δρομολόγησης με πολλαπλά κόστη υπερτερεί του αλγορίθμου ελάχιστου-μήκους διαδρομής, πετυχαίνοντας όταν το δίκτυο είναι ενεργειακά περιορισμένο, μέγιστη πιθανότητα δημιουργίας πακέτων δεδομένων pmax σχεδόν διπλάσια από αυτή που πετυχαίνει ο ελάχιστου-μήκους διαδρομής αλγόριθμος. Ακόμα παρατηρούμε ότι η μέση καθυστέρηση καθώς και το ποσοστό επιτυχούς παράδοσης των πακέτων δεδομένων παρουσιάζουν καλύτερα αποτελέσματα με την χρήση του ενεργειακά-αποδοτικού αλγορίθμου. Επιπλέον παρατηρούμε ότι η μέση καθυστέρηση αυξάνει πολύ απότομα σε σχέση με την πιθανότητα δημιουργίας πακέτων δεδομένων p, όταν το δίκτυο γίνεται ασταθές λόγο των ενεργειακών περιορισμών. Αντίθετα η αύξηση αυτή είναι πολύ πιο ομαλή, όταν το δίκτυο γίνεται ασταθές λόγο των χωρητικών περιορισμών. / In our thesis we examine the problem of routing in ad-hoc networks, where the nodes are stationary and have limited but rechargeable energy reserves. Initially we study theoretically, the energy and the capacity constraints. The energy constraints are the result of the limited energy reserves of the nodes, while the capacity constraints are the result of the limited capacity and of the interference in the wireless medium. In our theoretically study we examine how the various network characteristics, influence the network performance. Such network characteristics are the nodes density, their distance, the transmission radius etc. We examine various network topologies and in every case we prove that energy is a vital resource in networks which are sparsely or where the nodes have small recharge rate or big transmission radius. In every other case the performance of a network is constrained by the capacity and the interference. Furthermore we propose and implement an energy-aware multicost routing algorithm, where a vector of parameters, instead of just one parameter, is assigned to each link of the network. In the same way in every discovered path, a vector of parameters is assigned. This vector is calculated using the vectors of the links from which the path consists of. The parameters used are the hops number, the residual energy and the transmission power. The proposed algorithm is compared with the minimum-hop algorithm, under the infinite time horizon problem. In this problem energy and data packets are constantly created in every node of the network. In our experiments we are interested in finding the maximum packet generation probability pmax in the nodes, under which the network remains stable. A network is characterized as stable when the incoming traffic is served by the network with small average delivery delay and big successful delivery ratio, of the packets in their destinations. When one of these conditions doesn’t hold, then we assume that the network is unstable and we do not study it anymore. The maximum packet generation probability pmax is in fact the maximum throughput of the network. The average delivery delay is defined as the average time between the creation of a data packet in the source-node and the reception of the packet in the destination-node. The successful delivery ratio is defined as the ratio of the number of packets successfully received by their destinations by the number of packets created in the source-nodes. During our experiments we tried various packet generation probabilities p and recharge rates at the nodes X. From the results of ours experiments we observe that the energy-aware multicost routing algorithm outperforms the minimum-hop algorithm. Specifically when the network is energy constrained, the maximum packet generation probability pmax is almost double as the one achieved by the minimum-hop algorithm. Furthermore the average delivery delay and the successful delivery ratio present better results using the energy-aware algorithm. Also we generally observe that the average delivery delay increases suddenly as the packet generation probability p increases, when the network becomes unstable because of the energy constraints. On the other hand the increase in the average delivery delay is much more normal, when the network becomes unstable because of the capacity constraints.
355

Rörelsebaserad kommunikation i mobila ad hoc-nätverk / Movement based communication in mobile ad hoc networks

Wandemo, Daniel January 2007 (has links)
I många nätverk antas det att någon form av fix infrastruktur existerar och att nätverkets olika noder kan använda denna för att kommunicera med varandra. I ett ad hoc-nätverk antar man att det inte finns någon fix infrastruktur och att noderna måste använda varandra för att kunna kommunicera. Ett exempel på ett ad hoc-nätverk kan vara bärbara datorer sammankopplade med infraröda länkar under ett möte. När ad hoc-nätverket är mobilt innebär det att noderna rör sig. I detta arbete har de tre protokollen Epidemic, GeoMean och GeoMove tillsammans med de två rörelsemodellerna Waypoint och den utökade slumpmässiga vandringen implementerats i en nyskriven simulator för denna typ av nätverk. De två Geo-protokollen är nyutvecklade och syftar till att använda geografisk information för att underlätta kommunikationen i denna kategori av nätverk tillsammans med den nya utvidgade slumpmässiga vandringsmodellen. / In many networks, some kind of fix infrastructure is assumed to exist and the nodes of the network can use this infrastructure to communicate with each other. In an ad hoc network one assumes that there don't exist any kind of fix infrastructure and that the nodes must use each other to be able to communicate. One example of an ad hoc network could be laptops connected together with infrared links during a meeting. When an ad hoc network is mobile it implies that the nodes are moving. In this work, the three protocols Epidemic, GeoMean and GeoMove together with the two mobility models Waypoint and Extended Random Walk, have been implemented in a newly written simulator for this kind of network. The two Geo-protocols are newly developed and aim to use geographical information to aid communication in this category of networks together with the new Extended Random Walk model.
356

Multi-antenna physical layer models for wireless network design

Shekhar, Hemabh 15 January 2008 (has links)
In this thesis, CMs of linear and non-linear multiple antenna receivers, in particular linear minimum mean squared error (LMMSE) and LMMSE with decision feedback (LMMSE-DF), are developed. To develop these CMs, first a simple analytical expression of the distribution of the post processing signal to interference and noise (SINR) of an LMMSE receiver is developed. This expression is then used to develop SINR- and ABER-based CMs. However, the analytical forms of these CMs are derived only for the following scenarios: (i) any number of receive antennas with three users having arbitrary received powers and (ii) two antenna receiver with arbitrary number of equal received power users. For all the other scenarios a semi-analytical CM is used. The PHY abstractions or CMs are next used in the evaluation of a random access cellular network and an ad hoc network. Analytical model of the random access cellular network is developed using the SINR- and ABER-based CM of the LMMSE receiver. The impact of receiver processing is measured in terms of throughput. In this case, the random access mechanism is modeled by a single channel S-Aloha channel access scheme. Another analytical model is developed for single and multi-packet reception in a multi-channel S-Aloha channel access. An emph{ideal} receiver is modeled in this case, i.e. the packet(s) are successfully received as long as the total number of colliding packets is not greater than the number of antennas. Throughput and delay are used as performance metrics to study the impact of different PHY designs. Finally, the SINR-based semi-analytical CMs of LMMSE and LMMSE-DF are used to evaluate the performance of multi-hop ad hoc networks. Throughput is used as the performance evaluation metric. A novel MAC, called S-MAC, is proposed and its performance is compared against another MAC for wireless networks, called CSMA/CA(k).
357

Trust-based routing in pure ad-hoc wireless networks

Pirzada, Asad Amir January 2007 (has links)
[Truncated abstract] An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. Due to its peculiar establishment and operational properties it is also often termed an infrastructure-less, self-organised, or spontaneous network. In order to extend the communication range of the nodes, beyond a single hop, specially configured routing protocols are used. The unique feature of these protocols is their ability to form routes in spite of a dynamic topology. For effective functioning of the network it is essential that the network nodes execute the routing protocols in a truthful manner regardless of their contemporary commitments and workload. In real life, this is more than often extremely difficult to realise, and so we often find malicious nodes also present in the same network. These nodes can either join externally or may originate internally by compromis- ing an existing benevolent node in the network. These malicious nodes can carry out an array of attacks against the routing protocols leading to route severing, unavailability of service or deception. A number of secure routing protocols, which make use of cryptographic algorithms to secure the routes, have recently been proposed. ... In order to sustain the improvised nature of ad-hoc networks, in this thesis, we have moved from the common mechanism of achieving trust via security to enforcing dependability through collaboration. We desist from the customary strategy of employing cryptography and instead use a trust model that is influ- enced by the human behavioural model. All nodes in the network independently execute this trust model and maintain their own assessment concerning other nodes in the network. Each node, based upon its individual experiences, rewards collabo- rating nodes for their benevolent behaviour and penalises malicious nodes for their malevolent conduct. To highlight the efficacy of this unique approach, we apply the trust model to three contemporary reactive routing protocols in a pure ad-hoc network. These trust reinforced routing protocols locate dependable routes in the network by observing the sincerity in participation of other nodes using a set of trust categories. The routes worked out in this way are neither protected in terms of security nor minimal in terms of hops. However, these routes traverse nodes, which have been identified as more trustworthy than others and for this reason are more dependable in extemporised circumstances. Through the help of extensive simulations, we have demonstrated that the usage of these protocols significantly improves the overall performance of the network even in the presence of a high percentage of malicious nodes. These protocols, being independent of a trust infrastructure, also enable rapid deployment and improved operation with dynamic adaptation to the current scenario. The prime advantage being gained is the ability to seamlessly integrate ad-hoc wireless networks belonging to dissimilar organisations.
358

Utilising behaviour history and fuzzy trust levels to enhance security in ad-hoc networks

Hallani, Houssein. January 2007 (has links)
Thesis (Ph.D.)--University of Western Sydney, 2007. / A thesis submitted to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliography.
359

Multi initiator connected dominating set construction for mobile ad hoc networks

Kim, Kyoung Min, Sun, Min-Te, January 2008 (has links)
Thesis--Auburn University, 2008. / Abstract. Vita. Includes bibliographical references (p. 45-48).
360

Modelling collaborative motion in mobile ad hoc networks

Boulkaibet, Ilyes 12 1900 (has links)
Thesis (MSc (Mathematical Sciences)--University of Stellenbosch, 2010. / ENGLISH ABSTRACT: In this thesis, a pricing mechanism to stimulate cooperation between nodes in ad hoc networks is explored. The model incorporates incentives for users to act as transit nodes and carry the traffic between other nodes on multi-hop paths, and to be rewarded with their own ability to send traffic. The thesis investigates the consequences of this pricing model by means of simulation of a network and illustrates the way in which network resources are allocated to users according to their geographical position. Moreover, since modelling node movements is an important aspect in ad hoc network simulation, a collective mobility model, the adaptive mobility model, is used to maximise the area coverage of the nodes. / AFRIKAANSE OPSOMMING: In hierdie tesis word ’n koste meganisme gebruik om samewerking te stimuleer tussen nodusse in ad hoc netwerke. Die model inkorporeer trekpleisters deur gebruikers te beloon om verkeer te stuur deur op te tree as transito nodusse, en verkeer tussen nodusse op multi-skakel paaie te dra. Die tesis ondersoek die ge- volge van die koste model deur die simulering van ’n netwerk, en demonstreer die manier waarop die netwerk hulpbronne geallokeer word aan gebruikers gebaseer op hulle geografiese posisie. Siende dat die modellering van nodus bewegings ’n belangrike aspek is in ad hoc netwerk simulasie, word ’n kollek- tiewe mobiliteits model sowel as ’n veranderlike mobiliteits model gebruik om die dekkings areas van die nodusse te maksimeer.

Page generated in 0.0294 seconds