• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

On the interaction of cooperation techniques with channel coding and ARQ in wireless communications / Interactions de la coopération, des techniques ARQ et du codage canal dans le contexte des communications sans fil

Maliqi, Faton 19 December 2017 (has links)
De nos jours, les communications mobiles sont caractérisées par une demande croissante de services basés sur Internet. Les services vidéo représentent une grande partie du trafic Internet aujourd'hui. Selon Cisco, 75% du trafic mondial de données mobiles sera constitué par données vidéo d'ici 2020. Cette demande toujours croissante a été le principal moteur du développement du réseau cellulaire numérique 4G, où les services numériques à commutation de paquet sont la principale brique de conception. En particulier, le système global doit assurer à la fois hauts et bas débit de transmission, et fournir des garanties de temps réel, par exemple dans le cas du streaming vidéo ou des jeux en ligne. Cela a motivé, dans la dernière décennie, un intérêt renouvelé dans la technologie d'accès radio. Le canal sans fil est affecté par divers phénomènes physiques, comme les Chemins multiples, le shadowing, l'évanouissement, l'interférence, etc. Dans les technologies les plus récentes, ces effets sont contrastés en utilisant le protocole ARQ (Automatic Repeat reQuest), qui consiste à retransmettre le même signal depuis la source. Le protocole ARQ est généralement combiné avec des codes de canal au niveau de la couche physique, qui est connu comme HARQ (Hybrid ARQ). Une autre technique pour améliorer la communication entre une source et une destination est la communication coopérative, où un relais est utilisé comme nœud intermédiaire. La communication coopérative et le HARQ, si appliquées individuellement, améliorent considérablement les performances du système de communication. Une question ouverte est de savoir si leur combinaison apporterait la somme des améliorations singulières, ou si ne serait que marginalement bénéfique. Dans la littérature on peut trouver de nombreuses études sur la combinaison de ces deux techniques, mais dans notre thèse, nous nous concentrons principalement sur cette interaction à niveau de la couche physique (PHY) et de la couche de contrôle d'accès (MAC). Nous utilisons des exemples de protocoles sur un réseau composé de trois noeuds (source, destination et relais). Pour l'analyse théorique nous nous concentrons sur les Chaînes de Markov à états finis (FSMC). Nous abordons le cas où le relais fonctionne en mode Decode-and-Forward (DCF), très commun dans la littérature, mais notre analyse se concentre de manière plus accentuée sur le cas où le relais fonctionne en mode Demodulate-and-Forward (DMF), en raison de sa simplicité d'implémentation et de son efficacité. Ce cas est beaucoup plus rarement abordé dans la littérature disponible, à cause de la complexité supérieure demandée par son analyse. Habituellement, l'interaction entre les deux techniques a été étudiée dans le cas de protocoles déterministes, mais dans notre analyse, nous nous concentrerons sur les protocoles déterministes et probabilistes. Jusqu'à présent, les protocoles probabilistes, où le noeud retransmetteur est choisi selon un modèle probabiliste, ont été principalement proposés pour des couches supérieures du système de communication. Au contraire, cette thèse étudie des protocoles probabilistes sur la couche PHY et sur la couche MAC, qui permet de mieux analyser et optimiser les performances. Le protocole probabiliste ne contient que deux paramètres, qui peut être optimisé pour de meilleures performances. Ces paramètres peuvent être calculés pour imiter le comportement d'un protocole déterministe donné, et ses performances optimisées ne peuvent que s'améliorer par rapport à celui-ci. De plus, les performances du protocole probabiliste est comparées aux résultats présent en littérature, et la comparaison montre que notre protocole fonctionne mieux. Enfin, la question de la sélection des relais est également abordée. Nous proposons un critère pour opérer le choix du relais à utiliser, en cas de plusieurs candidats. La performance obtenue par ce critère est comparée à celle obtenue avec les critères de référence dans la littérature. / Nowadays, mobile communications are characterized by a fast-increasing demand for internet-based services (voice, video data). Video services constitutes a large fraction of the internet traffic today. According to a report by Cisco, 75% of the world's mobile data traffic will be video-based by 2020. This ever-increasing demand in delivering internet-based services, has been the main driver for the development of the 4G digital cellular network, where packet- switched services are the primary design target. In particular, the overall system needs to ensure high peak data rates to the user and low delay in the delivery of the content, in order to support real time applications such as video streaming and gaming. This has motivated, in the last decade, a renewed and raising interest and research in wireless radio access technology. Wireless channel suffers from various physical phenomena like path-loss, shadowing, fading, interference, etc. In the most recent technologies, these effects are contrasted using Automatic Repeat re-Quest (ARQ) protocol, which consist on the retransmission of the same signal from the same node. ARQ protocol is usually combined with channel codes at the physical layer, which is known as Hybrid Automatic Repeat re-Quest (HARQ) protocol. Another improvement for communications over wireless channels is achieved when Relays are used as intermediate nodes for helping the communication between a Source and a Destination, which is known as cooperative communication. Both techniques, cooperation and HARQ, if individually applied, significantly improve the performance of the communication system. One open question is whether their combination would bring the sum of the singular improvements, or be only marginally beneficial. In the literature we can find many studies for the combination of these two techniques, but in our thesis we focus mainly on this interaction at the level of the physical layer (PHY) and the medium access control layer (MAC). We use example protocols on a network of three nodes (Source, Destination and Relay). For the theoretical analysis of these systems we focus on Finite State Markov Chains (FSMC). We discuss the case where Relay works in Decode-and-Forward (DCF) mode, which is very common in the literature, but our analysis focuses more strongly on the case where the Relay works in Demodulate-and-Forward (DMF) mode, because of its simplicity of implementation and its efficiency. This case is much more rarely addressed in the available literature, because of the higher complexity required by its analysis. Usually, the interaction between the two techniques has been studied using deterministic protocols, but in our analysis we will focus on both, deterministic and probabilistic protocols. So far, probabilistic protocols, where the retransmitting node is chosen with a given probability, have been mainly proposed for higher layers of communication systems, but, in contrast, this thesis studies probabilistic protocols on the physical layer and MAC layer, which give more insight on the analysis and performance optimization. The probabilistic protocols contains very few parameters (only 2) that can be optimized for best performance. Note that these parameters can be computed to mimic the behavior of a given deterministic protocol, and the result of the probabilistic protocol after optimization can only improve over this one. Moreover, the performance of our optimized probabilistic protocol is checked against results of the literature, and the comparison shows that our protocol performs better. In the end, there is also discussed the issue of relay selection. In a scenario of several candidate Relays, we propose a criterion for choosing the best Relay. The performance obtained by this criterion is compared to that obtained with the reference criteria in the literature.
2

Cooperation techniques to improve peer-to-peer wireless networks security

Serrat Olmos, Manuel David 15 October 2013 (has links)
Computer networks security is a topic which has been extensively researched. This research is fully justified when one notices the dimensions of the problem faced. One can easily identify different kinds of networks, a large quantity of network protocols, and an overwhelming amount of user applications that make extensive use of networks for the purposes those applications were built. This conforms a vast research field, where it is possible for a researcher to set his or her interests over a set of threats, vulnerabilities, or types of attacks, and devise a mechanism to prevent the attack, mitigate its effects or repair the final damages, based upon the specific characteristics of the scenario. Our research group on Computer Networks has been researching on certain kinds of computer networks security risks, specially those affecting wireless networks. In previous doctoral works [13], detection and exclusion methods for dealing with malicious nodes in mobile ad hoc networks (MANETs) had been proposed, from the point of view of every individual network node, using a technique called Intrusion Detection Systems (IDS) based on Watchdog methods. In this scope, we pretend to optimize network throughput removing misbehaved nodes from the network communication processes, a task performed specifically by the Watchdog systems. When isolated security techniques obtain good results on dealing with one type of attacks, a way to improve the whole network performance could be establishing mechanisms for cooperatively sharing information between well-behaved nodes to speed up misbehaved node detection and increase accuracy. Obviously, these mechanisms will have a cost in terms of network transmission overhead and also a small computing time overhead needed to analize the received data and to obtain an opinion about a suspect node. The key issue here it to adequately balance the costs and the benefits related to these cooperation techniques to ensure that the overall network performance is increased if compared with a non-collaborative one. / Serrat Olmos, MD. (2013). Cooperation techniques to improve peer-to-peer wireless networks security [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/32831 / Alfresco

Page generated in 0.0645 seconds