• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 6
  • 2
  • 2
  • Tagged with
  • 26
  • 26
  • 10
  • 9
  • 8
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Interactions of Vertical Handoffs with 802.11b wireless LANs : Handoff Policy

Mola, Guilo January 2004 (has links)
Nomadic computing aims to be a leading short term revolution in the Internet, however to succeed in this the infrastructure, the protocols, the handoff mechanisms have to be designed and implemented to provide mobile computing with both reliability and transparency. A good deal of the work is addressed by mobile IP itself, but addressing wireless diversity is perhaps the most important next step. Many different wireless technologies are available; while one technology might provide wide coverage, another provides higher bandwidth, but can only be deployed locally, even uni-directional ad-hoc links can be used to carry IP traffic. To take full advantage of the potential infrastructure, a mobile device, with multiple network interfaces, should be able to dynamically switch from one link technology to another; hopefully totally transparently to the user. Moreover, having multiple interfaces allows the device to choose, each time a new connection is established, which interface to select to route the datagrams through, based on the type of service desired. In this thesis a possible solution is presented, involving both vertical handoff optimization and policy management. Our testing device is the the SmartBadge v4, provided with a GPRS link and a 802.11b WLAN interface. / Nomadic Computing har för avsikt att revolutionera dagens Internet tillämpningar. För att lyckas måste dock infrastrukturen, IT protokollen och handoff procedurer utformas och implementeras med intentionen att förse mobilt dataöverföring med både driftsäkerhet och autonoma processer. En stor del av de nödvändiga förutsättningarna är tillgängliga tack vare Mobile IP, men mångfalden inom de befintliga Wireless teknologierna utgör fortfarande ett problem. Det stora antalet disponibla Wireless tekniker varierar från teknologierer som förser användaren med en stor täckningsgrad, till sådana som förser användaren med högre bandbredd, begränsad till lokala anv ändningområden. Även Uni-directional ad-hoc links kan läggas i denna lista av mångfald. För att förverkliga fördelarna med den tänkta infrastrukturen fullt ut måste den mobila enheten kunna utföra omkopplingar från den ena wireless teknologin till den andra, med syftet att vara osynlig för användaren. Utöver detta är det meningen att en apparat med många anslutningar ska kunna välja den anslutning som passar bäst, var gång en ny koppling ska göras, beroende på den tjänst som efterfrågas. Det här examensarbetet presenterar en möjlig lösning, som utnyttjar både Vertical Handoff optimering och Policy Management. Prototyp-enheten vi anv änder oss av för att genomföra undersökningen är Smart Badge v4, utrustad med GPRS och 802.11b Wireless LAN anslutningar.
12

A selective automatic repeat request protocol for undersea acoustic links

Kalscheuer, Jon M. 06 1900 (has links)
Approved for public release, distribution is unlimited / A recent improvement to the Seaweb underwater wireless network was the implementation of a Selective Automatic Repeat Request (SRQ) mechanism. SRQ is a protocol implemented in the Seaweb link layer as a measure for mitigating unreliability inherent in the telesonar physical layer. In January 2004, an experiment was performed in St. Andrew's Bay, Panama City, Florida. The goal was to transmit large data files through the network, in accordance with a Naval Special Warfare need for imagery file telemetry. For three point-to-point test geometries, SRQ was tested with a noisy and variable physical layer. Through the incorporation of SRQ, the unreliability was overcome. A link-budget model calibrated with the sound channel data collected from the experiment establishes the benefit of a "SRQ gain." / Ensign, United States Navy
13

Interactions inter-couches et liens à long délai / Cross-layer interactions and long delay links

Kuhn, Nicolas 21 November 2013 (has links)
La demande accrue de services en temps rel, comme la vidéo streaming, justifie le besoin d'études qui visent à optimiser le délai de transmission de données. En plus du délai de transmission au niveau physique, les délais nécessaires à l'accès à la ressource et à la récupération de données venant des couches basses peuvent avoir un impact important sur les performances et ne doivent pas être négligés. Aussi, des études cross-layer doivent être menées pour minimiser le délai de transmission de l'information. Comprendre l'impact des mécanismes des couches basses sur les performances de bout-en-bout permet un meilleur dimensionnement du réseau, une adaptation du trafic transmis, ou l'introduction de service à faible priorité. Dans cette thèse, nous avons mesuré l'impact des mécanismes des couches liaison et réseau sur les performances de divers protocols de congestion de la couche transport.Dans le contexte des liens 4G par satellite, nous proposons un ensemble d'outils, Trace Manager Tool (TMT) et Cross Layer InFormation Tool (CLIFT), pour simuler de manière réaliste l'ensemble de la couche OSI dans le simulateur de réseau NS-2. Nous avons montré que, pour l'ensemble des variantes de TCP considérées, quand le débit au niveau transport est proche de la capacité de canal, utiliser ARQ au niveau liaison est optimal. Dans le cas où le taux d'erreur au niveau de la couche physique est plus élevé, H-ARQ permet d'obtenir un meilleur débit au niveau transport.Les dernières spécifications concernant l'accès au lien satellite DVB-RCS2 présentent deux méthodes d'accès (aléatoire et dédié) qui peuvent être implémentées pour permettre aux utilisateurs des services proposés par DVB d'aller sur Internet ou de transmettre des données. Nous avons développé un module pour NS-2, Physical Channel Access (PCA), qui modèle l'accès au canal pour chacune de ces méthodes afin de comparer leur impact sur les performances de bout-en-bout. Nous avons mesuré que les méthodes d'accès dédié permettent un débit plus important et les méthodes d'accès aléatoire une transmission rapide des flots courts. Nous avons donc proposé de mixer ces méthodes d'accès, en fonction de l'évolution dynamique de la charge du réseau et de la taille du flot de données transmis.Finalement, nous avons étudié s'il était possible d'exploiter les données de la gateway du satellite pour introduire un trafic à priorité basse. Nous avons montré qu'il était possible avec Low Ewtra Delay Background Transport (LEDBAT) comme protocole de la couche transport d'introduire un trafic en tâche de fond. Cependant, en fonction de la variation de la charge du réseau, paramétrer correctement des paramètres internes à ce protocole sont nécessaires. / Network providers offer services in line with users’ requests, even though the challengesintroduced by their mobility and the download of large content are crucial. Mobile videostreaming applications are delay sensitive and the increasing demand for this service legitimateextensive studies evaluating transmission delays. On top of physical transmissiondelays, accessing a resource or recovering data from lower layers should not be neglected.Indeed, recovery schemes or channel access strategies variously introduce end-to-end delays.This document argues that those cross-layer effects should be explored to minimizethe transmission delays and optimize the use of network resources. Also, understandingthe impacts of low layers protocols on the end-to-end transmission will enable betterdimensioning of the network and adapt the traffic carried on.In the context of satellite 4G links, we measure the impact of link layer retransmissionschemes on the performance of various transport layer protocols. We develop Trace ManagerTool (TMT) and Cross Layer InFormation Tool (CLIFT) to lead realistic cross layersimulations in NS-2. We show that, for all target TCP variants, when the throughput ofthe transport protocol is close to the channel capacity, using the ARQ mechanism is mostbeneficial for TCP performance improvement. In conditions where the physical channelerror rate is high, Hybrid-ARQ results in better performance.In the last specifications for DVB-RCS2, two access schemes (random and dedicated)are presented and can be implemented to manage the way home users access to the satellitelink for Web browsing or data transmission. We developed Physical Channel Access (PCA)that models in NS-2 the behaviour of those link layer level access methods. We measurethat, even though dedicated access methods can transmit more information data, randomaccess methods enable a faster transmission of short flows. Based on these results, wepropose to mix random and dedicated access methods depending on the dynamic load ofthe network and the sequence number of the TCP segments.As a potential exploitation of cross layer information, we explore the feasibility to introducelow priority traffic on long delay path. The rationale is to grab the unused 4G satellitelinks’ capacity to carry non-commercial traffic. We show that this is achievable with LEDBAT.However, depending on the fluctuation of the load, performance improvements couldbe obtained by properly setting the target value.
14

Implementace standardu IEEE 802.11ah pro přenos M2M dat / Implementation of the Standard IEEE 802.11ah for Transmitting M2M Data

Masár, Marek January 2015 (has links)
This diploma thesis deals with the implementation of standard IEEE 802.11ah into network simulator NS-3. The first part of the diploma thesis describes M2M communication for which the standard IEEE 802.11ah would be suitable. M2M communication is being more and more used in the society, that is why there is an effort to develop a new standard for this type of communication. The thesis contains a description of this standard based on technical specifications brought out by the Task Group ah (TGah). Some changes have been made in NS-3 for the purpose of this thesis in order to support this standard. In the next part there is a created scenario with basic topology in NS-3 with usage of standard IEEE 802.11ah, in which the functionality of the standard is tested. The result of this diploma thesis is a description of the changes which have been made and analysis of the output files from the simulation.
15

Modelování protokolů IS-IS a TRILL / Modelling IS-IS and TRILL

Marek, Marcel January 2013 (has links)
In this thesis, we describe the principles of IS-IS routing protocol. We introduce the current state of implementation of this protocol within the simulation framework OMNeT++. We present the implementation of the IS-IS protocol created within the ANSA project. Moreover, we employ its variant called TRILL that is nowadays deployed as replacement of STP in data-center environment. The aim is to enable the modelling of the protocols without the need having to build physical architecture.
16

Using link layer information to enhance mobile IP handover mechanism : an investigation into the design, analysis and performance evaluation of the enhanced mobile IP handover mechanism using link layer information schemes in the IP environment

Alnas, Mohamed Jimaa Ramadan January 2010 (has links)
Mobile computing is becoming increasingly important, due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet, irrespective of the physical location of the node. We have also seen a steady growth of the market for wireless communication devices. Such devices can only have the effect of increasing the options for making connections to the global Internet. The Internet infrastructure is built on top of a collection of protocols called the TCP/IP protocol suite. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the core protocols in this suite. There are currently two standards: one to support the current IPv4 and one for the upcoming IPv6 [1]. IP requires the location of any node connected to the Internet to be uniquely identified by an assigned IP address. This raises one of the most important issues in mobility because, when a node moves to another physical location, it has to change its IP address. However, the higher-level protocols require the IP address of a node to be fixed for identifying connections. The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet Engineering Task Force (IETF) that addresses this issue. It enables mobile devices to stay connected to the Internet regardless of their locations, without changing their IP addresses and, therefore, an ongoing IP session will not be interrupted [2, 3, 4]. More precisely, Mobile IP is a standard protocol that builds on the Internet Protocol by making mobility transparent to applications and higher-level protocols like TCP. However, before Mobile IP can be broadly deployed, there are still several technical barriers, such as long handover periods and packet loss that have to be overcome, in addition to other technical obstacles, including handover performance, security issues and routing efficiency [7]. This study presents an investigation into developing new handover mechanisms based on link layer information in Mobile IP and fast handover in Mobile IPv6 environments. The main goal of the developed mechanisms is to improve the overall IP mobility performance by reducing packet loss, minimizing signalling overheads and reducing the handover processing time. These models include the development of a cross-layer handover scheme using link layer information and Mobile Node (MN) location information to improve the performance of the communication system by reducing transmission delay, packet loss and registration signalling overheads. Finally, the new schemes are developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of these schemes.
17

Underwater acoustic networks: evaluation of the impact of media access control on latency, in a delay constrained network

Coelho, Jose Manuel dos Santos 03 1900 (has links)
This thesis presents an evaluation of the performance, in terms of throughput and latency, of two Media Access Control (MAC) mechanisms in Underwater Acoustic Networks (UANs), using a model designed in the COTS simulation tool OPNET 10.5. The carrier sense multiple access with collision avoidance is the predominant approach for implementing the MAC mechanism in UANs. However, the underwater acoustic environment is characterized by extreme propagation delays and limited bandwidth, which suggests that an Aloha-like scheme may merit consideration. The performance of these two schemes was compared with respect to two topologies: tree and grid. The results showed that an Aloha-like scheme that does not segment messages outperforms the contention-based scheme under all load conditions, in terms of both throughput and latency, for the two topologies. This thesis is the first to establish that Aloha-like MAC mechanisms can be more than a limited alternative for lightly loaded networks; more specifically, they can be the preferred choice for an environment with large propagation delays. / Lieutenant Commander, Portuguese Navy
18

Feasibility study: Implementation of a gigabit Ethernet controller using an FPGA

Fält, Richard January 2003 (has links)
<p>Background: Many systems that Enea Epact AB develops for theirs customers communicates with computers. In order to meet the customers demands on cost effective solutions, Enea Epact wants to know if it is possible to implement a gigabit Ethernet controller in an FPGA. The controller shall be designed with the intent to meet the requirements of IEEE 802.3. </p><p>Aim: Find out if it is feasible to implement a gigabit Ethernet controller using an FPGA. In the meaning of feasible, certain constraints for size, speed and device must be met. </p><p>Method: Get an insight of the standard IEEE 802.3 and make a rough design of a gigabit Ethernet controller in order to identify parts in the standard that might cause problem when implemented in an FPGA. Implement the selected parts and evaluate the results. </p><p>Conclusion: It is possible to implement a gigabit Ethernet controller using an FPGA and the FPGA does not have to be a state-of-the-art device.</p>
19

Feasibility study: Implementation of a gigabit Ethernet controller using an FPGA

Fält, Richard January 2003 (has links)
Background: Many systems that Enea Epact AB develops for theirs customers communicates with computers. In order to meet the customers demands on cost effective solutions, Enea Epact wants to know if it is possible to implement a gigabit Ethernet controller in an FPGA. The controller shall be designed with the intent to meet the requirements of IEEE 802.3. Aim: Find out if it is feasible to implement a gigabit Ethernet controller using an FPGA. In the meaning of feasible, certain constraints for size, speed and device must be met. Method: Get an insight of the standard IEEE 802.3 and make a rough design of a gigabit Ethernet controller in order to identify parts in the standard that might cause problem when implemented in an FPGA. Implement the selected parts and evaluate the results. Conclusion: It is possible to implement a gigabit Ethernet controller using an FPGA and the FPGA does not have to be a state-of-the-art device.
20

Modelování L2 protokolů zajišťujících bezsmyčkovost / Modelling of L2 Loop-Preventing Protocols

Hrnčiřík, Matej January 2012 (has links)
This thesis informs about currently used technologies, which provide loop protection on data link layer of computer networks. It clarifies issues of Ethernet networks. Chosen protocols are then closely described. There are presented advantages and disadvantages of chosen protocols and they are compared to other technologies. Practical section describes the initial implementation of IS-IS in OMNeT++ environment, which serves as the basic building block of TRILL protocol. An important issue is to verify correctness of implementation.

Page generated in 0.0445 seconds