• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 65
  • 40
  • 19
  • 19
  • 16
  • 15
  • 12
  • 11
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Implementation of the WirelessHART MAC Layer in the OPNET Simulator

Yipeng, Wang January 2013 (has links)
Industrial wireless sensor network (IWSN) is an application area of WSN used in industrial process monitoring and control with strict time and reliability requirement. WirelessHART standard is the first international standard for IWSN approved by International Electrotechnical Commission (IEC). This is worthwhile to implement this standard on simulator platform. Based on the study of WirelessHART standard, this thesis set up a primary implementation of the MAC layer of WirelessHART standard. To our best knowledge, this is the first comprehensive implementation of WirelessHART using OPNET simulator. The implementation has been evaluated rational. And some improvement of current implementation and standard have also been proposed and implemented. Flexible dedicated slot assignment has also been proposed to reduce the packet loss rate caused by influences of the physical channel.
12

Efficient GTS Allocation Schemes for IEEE 802.15.4

Haque, Syed E 11 April 2012 (has links)
IEEE 802.15.4 is a standard defined for wireless sensor network applications with limited power and relaxed throughput needs. The devices transmit data during two periods: Contention Access Period (CAP) by accessing the channel using CSMA/CA and Contention Free Period (CFP), which consists of Guaranteed Time Slots (GTS) allocated to individual devices by the network coordinator. The GTS is used by devices for cyclic data transmission and the coordinator can allocate GTS to a maximum of only seven devices. In this work, we have proposed two algorithms for an efficient GTS allocation. The first algorithm is focused on improving the bandwidth utilization of devices, while the second algorithm uses traffic arrival information of devices to allow sharing of GTS slots between more than seven devices. The proposed schemes were tested through simulations and the results show that the new GTS allocation schemes perform better than the original IEEE 802.15.4 standard.
13

Entwicklung eines Verfahrens zur Emulation der Medienzugriffssteuerung in Wireless LAN

Yang, Zhenxiang. January 2004 (has links)
Stuttgart, Univ., Diplomarb., 2004.
14

Performance Study for Co-existing Wi-Fi and ZigBee Systems and Design of Interoperability Techniques

Tang, Yong January 2012 (has links)
Wireless local area networks (WLANs) and wireless sensor networks (WSNs) technologies have been comprehensively developed and deployed during recent years. Since commercial WLAN and WSN products share the same free of license frequency band, the low power, low rate ZigBee based WSNs are vulnerable to the interference from Wi-Fi WLANs. Therefore, it is important to evaluate the performance of ZigBee WSNs that are subjected to interference generated by collocated Wi-Fi WLANs and to design effective counter-measuring techniques should performance improvement is needed. In this research, a versatile testbed for conducting various experiments is established and the ZigBee system’s performance with different clear channel assessment (CCA) modes and energy detection (ED) thresholds are evaluated through extensive experimental measurements in the testbed. It can be concluded from the results that CCA has significant impact on ZigBee’s performance. An existing theoretical analysis approach that is based on the collision time model between ZigBee and Wi-Fi packets is suitably modified to provide analytical evaluation means of the cases we examined. In order to mitigate the interference from the collocated Wi-Fi system, a novel and effective interference-aware adaptive CCA (IAACCA) scheme is proposed and implemented as firmware flashed into Crossbow motes. Experiments confirmed the ability of IAACCA to countermeasure effectively interference generated by Wi-Fi and thus improve the performance of ZigBee WSNs. Finally, a thorough statistical analysis is performed to understand the factors impacting the performance of ZigBee system and is used to further verify our experimental methods.
15

Simulation of the MAC Portion of IEEE 802.11 and Bursts of Errors for Wireless Data Networks

Moslehi, Farhood 28 August 1997 (has links)
The focus of this research is to investigate the effects of bursts of errors and packet collisions on the performance of the medium access control (MAC) portion of the IEEE 802.11 wireless local area network (LAN) protocol.An important ingredient in rapid expansion of wireless networks is the seamless transition between wired and wireless systems. The IEEE standards group in charge of developing the widely used IEEE 802.3 LAN standard has developed the IEEE 802.11 wireless LAN standard. IEEE 802.11 remains hidden from the upper levels of the network, thus allowing a seamless transition between networks. The foundation protocol for the IEEE 802.11 standard, known as Distributed Foundation Wireless Medium Access Control (DFWMAC), operates at the MAC level of the Data Link Layer. The protocol bases its access control mechanism on a principle called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which is an adaptation of the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol used by IEEE 802.3 standard. The collision avoidance scheme in CSMA/CA allows data packets to be transferred via the wireless medium with lower probability of packet collision. In a slotted multi-access wireless system, performance parameters are affected by the bit error rates on the communication channel. These errors occur as a result of noise introduced by the radio channel or data packet collisions. Collisions occur when two or more stations select the same time slot to transmit their data, thus causing corruption in data packets. In this research, a simulation model coded in Microsoft's Visual Basic programming environment is utilized to investigate the effects of bit errors and packet collisions on performance in CSMA/CA. Performance parameters used in this study include throughput, medium utilization, collisions and station data queue lengths. In the simulation model, error bursts in the communication channel are modeled using a simple Gilbert model with two states, good (G) and bad (B). State G is error free, thus errors can only occur while the model is in state B. Collisions are simulated by two or more stations starting to transmit data packets in the same time slot. Therefore, as the number of stations increases, more and more stations compete for the medium, resulting in an increase in the number of collisions. Collisions are also increased by the amount of traffic that each station introduces into the system. Station load is defined here as the number of data packets per unit time that are released by the higher network protocol layers.The results in Chapter 5 demonstrate that higher network throughput can be achieved when the aggregate load on the network is distributed. For example, 30 stations offering 20 kilobits per second (kbps) of load for a total of 600 kpbs, results in a network throughput of 585 kbps. However, three stations offering 200 kbps of load for a total of 600 kbps offered load, results in a network throughput of 486 kbps. The distributed load is serviced at a 17 percent higher rate. However, once the network becomes saturated at above 40 stations for this model, collisions will more than offset the performance gains produced by the distribution of load.Furthermore, reducing the packet size by 50 percent under an approximately 19.5 percent packet error rate results in a 12 percent gain in throughput. This is primarily due to higher utilization of the network by shorter packets. However, as the packet error rate is reduced, the performance gap between the two packet sizes is reduced. Once the errors are removed completely from the communications channel, the longer packets produce a higher throughput than the shorter packets. / Master of Science
16

UWB-TWR performance comparison in a hybrid node network

Sundin, Oskar January 2021 (has links)
This thesis investigated the performance of a positioning system that utilised UWB technology where devices regularly shifts between acting as an initiator and as a responder for distance measurements between each other. The goal was to investigate existing positional techniques and to implement a novel network where devices initiates and responds to distance measurement exchanges. Additionally, the intention of this positioning system is to prevent severe work accidents and reduce vehicle congestion costing lives, money and time in industrial workplace environments. In the thesis, two ranging techniques, skew-aware single-sided two-way ranging (SASS-TWR) and asymmetric double-sided two-way ranging (ADS-TWR) were compared to each other as well as two MAC protocols, CSMA/CA and the token ring protocol. Results showed that SASS-TWR and ADS-TWR had similar precision, but SASS-TWR was faster, making it the preferred option in a positioning system. For the MAC protocols, simulations showed that the token ring protocol outperformed CSMA/CA but had a major flaw in its current implementation with the lack of recoverability in cases where devices in the network stops functioning or leaves. The conclusion is that both ranging techniques are viable options, and for the MAC protocols, CSMA/CA could be used but lacks scalability. The token ring protocol outperformed CSMA/CA in speed and scalability but requires improvements in recoverability before it could be used in a positional system intended for the industrial workplace.
17

PERFORMANCE ANALYSIS AND ENHANCEMENT OF MAC PROTOCOLS FOR IEEE 802.11 WLANS

CHEN, YUNLI January 2004 (has links)
No description available.
18

Gestion des messages de sécurité dans les réseaux VANET. / Handling Safety Messages in Vehicular Ad-HocNetworks (VANETs)

Bouchaala, Younes 21 December 2017 (has links)
Les exigences de Qualité de Service (QoS) des applications VANET varient selon la nature et le type de l’application. Par conséquent, un protocole de communication VANET doit pouvoir répondre aux diverses exigences de QoS selon le type du trafic. Dans VANET, le canal de transmission est partagé par tous les véhicules en utilisant une même fréquence radio. Une mauvaise exploitation du canal peut donc conduire à des collisions et peut aussi engendrer un gaspillage de la bande passante. Un protocole MAC doit être alors conçu pour partager le canal entre les différents noeuds d’une manière efficace et équitable.Dans cette thèse nous présentons les contributions suivantes :1- Analyse et amélioration de la diffusion dans la norme IEEE 802.11.2- Optimisation de la technique CSMA pour des réseaux 1D et 2D.3- Développement d’un algorithme CSMA de transmission adaptatif qui met à jour le taux de détection de la porteuse en fonction d’une valeur de référence.4- Étude du gain obtenu par l’utilisation d’antennes directionnelles pour Aloha, Aloha non-slotté, et CSMA. / Quality of Service (QoS) requirements for VANET applications vary depending on the nature and type of the application. Therefore, a communication protocol in VANETs must be able to meet various QoS requirements according to the type of traffic. In VANET, the transmission channel is shared by all the vehicles using the same radio frequency. A poor exploitation of the channel can therefore lead to collisions and wasted bandwidth. A MAC protocol must therefore be designed to share the channel between the different nodes in an efficient and fair way.In this thesis we present the following contributions:1- Analysis and improvement of diffusion in the IEEE 802.11 standard.2- Optimization of the CSMA technique for 1D and 2D networks.3- Design of an adaptive transmission algorithm that updates the Carrier Sense threshold to reach a target value.4- Study the gain obtained by the use of directional antennas for Aloha, non-slotted Aloha, and CSMA.
19

Modèles probabilistes et statistiques pour la conception et l'analyse des systèmes de communications

Bermolen, Paola 26 February 2010 (has links) (PDF)
Dans cette thèse nous abordons deux problématiques différentes : la prédiction et la classification de trafic et les mécanismes d'accès dans les réseaux MANETs. Dans la première partie de la thèse, nous abordons le problème de la prédiction et la classification du trafic. Sur la base des observations du passé et sans considérer aucun modèle en particulier, nous analysons le problème de la prédiction en ligne de la charge sur un lien. Concernant la classification du trafic, nous nous concentrons principalement sur des applications P2P, et particulièrement la télévision P2P (P2P-TV). Dans les deux cas, nous employons la technique de Support Vector Machines (SVM). Les algorithmes que nous proposons fournissent des résultats très précis. De plus, ils sont robustes et leur coût est extrêmement bas. Ces propriétés font que nos solutions soient particulièrement adaptées à des applications en temps réel. Dans la deuxième partie de la thèse, nous abordons deux problèmes différents liés aux mécanismes d'accès dans les réseaux MANETs, et en particulier, nous nous concentrons sur CSMA. Nous présentons d'abord les différents modèles existants pour CSMA et nous identifions leurs principaux points faibles. Des solutions possibles sont proposées, bases sur les outils de la géométrie aléatoire. Nous abordons ensuite le problème de QoS dans CSMA et nous proposons deux mécanismes différents permettant de garantir un débit minimum pour chaque transmission admise. Le but principal étant d'identifier le meilleur mécanisme dans un scénario donné comparé au protocole CSMA.
20

Simulation des conditions de trafic intracellulaire d'un réseau sans fil en milieu industriel par un modèle de propagation composite

Benferhat, Sabri 12 June 2009 (has links) (PDF)
Cette thèse traite de l'utilisation des réseaux locaux sans fil dans un environnement industriel. Nous traitons l'impact des conditions de propagation et leur implémentation, sur des outils de simulations. La première partie s'intéresse au choix du modèle par des méthodes analytiques appliquées sur des mesures. La comparaison des performances obtenues dans un site avec les résultats de simulations montre une nette différence. Elle nous a permis de conclure que les modèles classiques ne permettent pas de simulations pertinentes pour un tel contexte. Pour ces raisons, nous proposons une nouvelle façon de modéliser les conditions de propagation. Notre modèle appelé "split model" permet de distinguer : liens entre stations et point d'accès des liens entre stations. Nous avons utilisé le modèle dans la simulation pour étudier les performances dans une cellule en mode infrastructure de la norme 802.11. Les résultats montrent que des collisions au niveau du point d'accès sont constatées et en résulte une dégradation des performances pour laquelle les mécanismes prévus pour compenser l'effet du terminal caché (RTS/CTS) se sont montrés inefficaces. L'utilisation du split model dans un processus de simulation met en avant les effets dus a l'existence de ces zones cachées et permet d'avoir des résultats obtenus par simulation plus représentatifs du comportement d'une cellule recouvrant une chaîne de production.

Page generated in 0.0241 seconds