• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 135
  • 35
  • 10
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 233
  • 233
  • 233
  • 180
  • 62
  • 52
  • 49
  • 38
  • 22
  • 22
  • 21
  • 19
  • 19
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

An investigation of parameter relationships in a high-speed digital multimedia environment

Chigwamba, Nyasha January 2014 (has links)
With the rapid adoption of multimedia network technologies, a number of companies and standards bodies are introducing technologies that enhance user experience in networked multimedia environments. These technologies focus on device discovery, connection management, control, and monitoring. This study focused on control and monitoring. Multimedia networks make it possible for devices that are part of the same network to reside in different physical locations. These devices contain parameters that are used to control particular features, such as speaker volume, bass, amplifier gain, and video resolution. It is often necessary for changes in one parameter to affect other parameters, such as a synchronised change between volume and bass parameters, or collective control of multiple parameters. Thus, relationships are required between the parameters. In addition, some devices contain parameters, such as voltage, temperature, and audio level, that require constant monitoring to enable corrective action when thresholds are exceeded. Therefore, a mechanism for monitoring networked devices is required. This thesis proposes relationships that are essential for the proper functioning of a multimedia network and that should, therefore, be incorporated in standard form into a protocol, such that all devices can depend on them. Implementation mechanisms for these relationships were created. Parameter grouping and monitoring capabilities within mixing console implementations and existing control protocols were reviewed. A number of requirements for parameter grouping and monitoring were derived from this review. These requirements include a formal classification of relationship types, the ability to create relationships between parameters with different underlying value units, the ability to create relationships between parameters residing on different devices on a network, and the use of an event-driven mechanism for parameter monitoring. These requirements were the criteria used to govern the implementation mechanisms that were created as part of this study. Parameter grouping and monitoring mechanisms were implemented for the XFN protocol. The mechanisms implemented fulfil the requirements derived from the review of capabilities of mixing consoles and existing control protocols. The formal classification of relationship types was implemented within XFN parameters using lists that keep track of the relationships between each XFN parameter and other XFN parameters that reside on the same device or on other devices on the network. A common value unit, known as the global unit, was defined for use as the value format within value update messages between XFN parameters that have relationships. Mapping tables were used to translate the global unit values to application-specific (universal) units, such as decibels (dB). A mechanism for bulk parameter retrieval within the XFN protocol was augmented to produce an event-driven mechanism for parameter monitoring. These implementation mechanisms were applied to an XFN-protocol-compliant graphical control application to demonstrate their usage within an end user context. At the time of this study, the XFN protocol was undergoing standardisation within the Audio Engineering Society. The AES-64 standard has now been approved. Most of the implementation mechanisms resulting from this study have been incorporated into this standard.
222

Design and analysis of evolutionary and swarm intelligence techniques for topology design of distributed local area networks

Khan, S.A. (Salman Ahmad) 27 September 2009 (has links)
Topology design of distributed local area networks (DLANs) can be classified as an NP-hard problem. Intelligent algorithms, such as evolutionary and swarm intelligence techniques, are candidate approaches to address this problem and to produce desirable solutions. DLAN topology design consists of several conflicting objectives such as minimization of cost, minimization of network delay, minimization of the number of hops between two nodes, and maximization of reliability. It is possible to combine these objectives in a single-objective function, provided that the trade-offs among these objectives are adhered to. This thesis proposes a strategy and a new aggregation operator based on fuzzy logic to combine the four objectives in a single-objective function. The thesis also investigates the use of a number of evolutionary algorithms such as stochastic evolution, simulated evolution, and simulated annealing. A number of hybrid variants of the above algorithms are also proposed. Furthermore, the applicability of swarm intelligence techniques such as ant colony optimization and particle swarm optimization to topology design has been investigated. All proposed techniques have been evaluated empirically with respect to their algorithm parameters. Results suggest that simulated annealing produced the best results among all proposed algorithms. In addition, the hybrid variants of simulated annealing, simulated evolution, and stochastic evolution generated better results than their respective basic algorithms. Moreover, a comparison of ant colony optimization and particle swarm optimization shows that the latter generated better results than the former. / Thesis (PhD)--University of Pretoria, 2009. / Computer Science / unrestricted
223

A feasibility study of wireless network technologies for rural broadband connectivity

Twele, Nombulelo January 2013 (has links)
The adoption of wireless broadband technologies to provide network and Internet connectivity in rural communities has conveyed the possibility to overcome the challenges caused by marginalization and many other characteristics possessed by these rural communities. With their different capabilities, these technologies enable communication for rural communities internally within the community and externally on a global scale. Deployment of these technologies in rural areas requires consideration of different factors - these are in contrast, to those considered when deploying these technologies in non-rural, urban areas. Numerous research show consideration of facts for deployment of broadband technologies in urban/ non-rural environments and a little has been done in considering facts for deployment in rural environments. Hence this research aims to define guidelines for selection of broadband technologies and make recommendations on which technologies are suitable for deployment in rural communities, thereby considering facts that are true only within these rural communities. To achieve this, the research determines the metrics that are relevant and important to consider when deploying wireless broadband technology in rural communities of South Africa. It further undertakes a survey of wireless broadband technologies that are suitable for deployment in such areas. The study first profiles a list of wireless communication technologies, determines and documents characteristics of rural communities in Africa, determines metrics used to declare technologies feasible in rural areas. The metrics and rural characteristics are then used to identify technologies that are better suited than others. Informed by this initial profiling, one technology: mobile WiMAX is then selected for deployment and further evaluation. A technical review of mobile WiMAX is then carried out by deploying it at our research site in the rural, marginalized community of Dwesa (Eastern Cape, South Africa). The final section of this research provides recommendations that mobile WiMAX, LTE and Wi-Fi are the best suitable technologies for deployment in rural marginalized environments. This has been supported by extensive research and real life deployment of both Wi-Fi and mobile WiMAX. This research also recommends consideration of the following facts when seeking deployment of these technologies in rural communities: the geographical setting of the target terrain, the distances between sources and target customers and distances between target communities, weather conditions of the area, applications to be deployed over the network, social well-being of the community and their financial freedom as well.
224

IEEE 802.11b MAC layer's influence on VoIP quality parameters : Measurements and Analysis

Martín Severiano, Juan Carlos January 2004 (has links)
Real-time voice measurements were performed to assess whether there are significant problems with 802.11b wireless networks regarding real-time voice communication. We present an analysis of how the 802.11b MAC protocol and diverse environmental conditions affect the quality of real-time voice in terms of loss, delay, and jitter. We also reveal practical issues of wireless monitoring with passive sniffers for this type of analysis. The results obtained in our measurements show that in the majority of the experiments the quality was good, but under some circumstances the requirements for an acceptable voice communication were not met. / Realtidsröstmätningar gjordes för att testa om det finns problem med 802.11b trådlösa nätverk beträffande realtidsröstkommunikation. En analys presenteras av hur 802.11b MACs protokoll och olika tillstånd i omgivningen påverkar kvaliteten på realtidsrösten i form av förluster, fördröjningar och jitter. Även praktiska angelägenheter om trådlös övervakning med passiva sniffers visas. De erhållna resultaten visar att i en majoritet av fallen var kvaliteten acceptabel, men under vissa förhållanden blev inte kraven för röstkommunikation uppfyllda.
225

Topics In Modeling, Analysis And Optimisation Of Wireless Networks

Ramaiyan, Venkatesh 01 1900 (has links)
The work in this thesis is concerned with two complementary aspects of wireless networks research; performance analysis and resource optimization. The first part of the thesis focusses on the performance analysis of IEEE 802.11(e) wireless local area networks. We study the distributed coordination function (DCF) and the enhanced distributed channel access (EDCA) MAC of the IEEE 802.11(e) standard. We consider n IEEE 802.11(e) DCF (EDCA) nodes operating as a single cell; by single cell, we mean that every packet transmission can be heard by every other node. Packet loss is attributed only to simultaneous transmissions by the nodes (i.e., collisions). Using the well known decoupling approximation [19], we characterize the collision behaviour and the throughput performance of the WLAN with a set of fixed point equations involving the backoff parameters of the nodes. We observe that the fixed point equations can have multiple solutions, and in such cases, the system exhibits multistability and short-term unfairness of throughput. Also, the fixed point analysis fails to characterize the average system behaviour when the system has multiple solutions. We then obtain sufficient conditions (in terms of the backoff parameters of the nodes) under which the fixed point equations have a unique solution. For such cases, using simulations, we observe that the fixed point analysis predicts the long term time average throughput behaviour accurately. Then, using the fixed point analysis, we study throughput differentiation provided by the different backoff parameters, including minimum contention window (CWmin), persistence factor and arbitration interframe space (AIFS) of the IEEE 802.11e standard. Finally, we extend the above results to the case where the receiver supports physical layer capture. In the second part of the thesis, we study resource allocation and optimization problems for a variety of wireless network scenarios. For a dense wireless network, deployed over a small area and with a network average power constraint, we show that single cell operation (the channel supports only one successful transmission at any time) is throughput efficient in the asymptotic regime (in which the network average power is made large). We show that, for a realistic path loss model and a physical interference model (SINR based), the maximum aggregate bit rate among arbitrary transmitter-receiver pairs scales only as Θ(log(¯P)), where¯P is the network average power. Spatial reuse is ineffective and direct transmission between source destination pairs is the throughput optimal strategy. Then, operating the network with only a single successful transmission permitted at a time, and with CSMA being used to select the successful transmitter-receiver pair, we consider the situation in which there is stationary spatiotemporal channel fading. We study the optimal hop length (routing strategy) and power control (for a fading channel) that maximizes the network aggregate throughput for a given network power constraint. For a fixed transmission time scheme, we study the throughput maximizing schedule under homogeneous traffic and MAC assumptions. We also characterize the optimal operating point (hop length and power control) in terms of the network power constraint and the channel fade distribution. It is now well understood that in a multihop network, performance can be enhanced if, instead of just forwarding packets, the network nodes create output packets by judiciously combining their input packets, a strategy that is called “network coding.” For a two link slotted wireless network employing a network coding strategy and with fading channels, we study the optimal power control and optimal exploitation of network coding opportunities that minimizes the average power required to support a given arrival rate. We also study the optimal power-delay tradeoff for the network. Finally, we study a vehicular network problem, where vehicles are used as relays to transfer data between a pair of stationary source and destination nodes. The source node has a file to transfer to the destination node and we are interested in the delay minimizing schedule for the vehicular network. We characterize the average queueing delay (at the source node) and the average transit delay of the packets (at the relay vehicles) in terms of the vehicular speeds and their interarrival times, and study the asymptotically optimal tradeoff achievable between them.
226

Session hijacking attacks in wireless local area networks

Onder, Hulusi 03 1900 (has links)
Approved for public release, distribution is unlimited / Wireless Local Area Network (WLAN) technologies are becoming widely used since they provide more flexibility and availability. Unfortunately, it is possible for WLANs to be implemented with security flaws which are not addressed in the original 802.11 specification. IEEE formed a working group (TGi) to provide a complete solution (code named 802.11i standard) to all the security problems of the WLANs. The group proposed using 802.1X as an interim solution to the deficiencies in WLAN authentication and key management. The full 802.11i standard is expected to be finalized by the end of 2004. Although 802.1X provides a better authentication scheme than the original 802.11 security solution, it is still vulnerable to denial-of-service, session hijacking, and man-in-the- middle attacks. Using an open-source 802.1X test-bed, this thesis evaluates various session hijacking mechanisms through experimentation. The main conclusion is that the risk of session hijacking attack is significantly reduced with the new security standard (802.11i); however, the new standard will not resolve all of the problems. An attempt to launch a session hijacking attack against the new security standard will not succeed, although it will result in a denial-of-service attack against the user. / Lieutenant Junior Grade, Turkish Navy
227

User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking

Lin, Yi-Hui 12 September 2012 (has links)
Authentication protocols are used for two parties to authenticate each other and build a secure channel over wired or wireless public channels. However, the present standards of authentication protocols are either insufficiently secure or inefficient for light weight devices. Therefore, we propose two authentication protocols for improving the security and user efficiency in wired and wireless environments, respectively. Traditionally, TLS/SSL is the standard of authentication and key exchange protocols in wired Internet. It is known that the security of TLS/SSL is not enough due to all sorts of client side attacks. To amend the client side security, multi-factor authentication is an effective solution. However, this solution brings about the issue of biometric privacy which raises public concern of revealing biometric data to an authentication server. Therefore, we propose a truly three factor authentication protocol, where the authentication server can verify their biometric data without the knowledge of users¡¦ templates and samples. In the major wireless technologies, extensible Authentication Protocol (EAP) is an authentication framework widely used in IEEE 802.11 WLANs. Authentication mechanisms built on EAP are called EAP methods. The requirements for EAP methods in WLANs authentication have been defined in RFC 4017. To achieve user efficiency and robust security, lightweight computation and forward secrecy, excluded in RFC 4017, are desired in WLAN authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the above properties. We will present a complete EAP method that utilizes stored secrets and passwords to verify users so that it can (1) meet the requirements of RFC 4017, (2) provide lightweight computation, and (3) allow for forward secrecy. In order to prove our proposed protocols completely, we apply two different models to examine their security properties: Bellare¡¦s model, a standard reduction based on computational model, that reduces the security properties to the computationally hard problems and the OFMC/AVISPA tool, a model checking approach based on formal model, that uses the concept of the search tree to systematically find the weaknesses of a protocol. Through adopting Bellare¡¦s model and OFMC/AVISPA tool, the security of our work is firmly established.
228

Τεχνολογίες ηλεκτροακουστικών συστημάτων για απευθείας αναπαραγωγή και ασύρματη μετάδοση ψηφιακών ηχητικών σημάτων

Τάτλας, Νικόλαος-Αλέξανδρος 20 February 2009 (has links)
Στη Διδακτορική Διατριβή αναλύονται ζητήματα που αφορούν την ασύρματη μετάδοση καθώς και την απευθείας εκπομπή ψηφιακών ηχητικών σημάτων με σκοπό την βελτιστοποίηση των τεχνικών αυτών. Ως προς τo σκέλος της ασύρματης μετάδοσης, η διατριβή εστιάστηκε σε δίκτυο WLAN με υποστήριξη QoS. Για την μελέτη του συστήματος διεξήχθησαν δοκιμές χρησιμοποιώντας πρωτότυπη πλατφόρμα που επιτρέπει την μετατροπή ηχητικών ροών για την εισαγωγή τους και εξαγωγή τους σε εφαρμογή εξομοίωσης δικτύου ώστε να αξιολογηθεί η πιστότητα ηχητικής αναπαραγωγής. Η ανάλυση του συστήματος οδήγησε στην ανάπτυξη πρωτότυπης τεχνικής για τον συγχρονισμό διακριτών καναλιών αναπαραγωγής, που μπορεί να εφαρμοστεί με χρήση τυπικού υλικού WLAN καθώς και πρωτότυπου αλγορίθμου για την συγκάλυψη ακουστών παραμορφώσεων που ενδεχομένως εισάγονται κατά τη μετάδοση. Επίσης, στη διατριβή εισάγονται αποτελέσματα με νέες μεθόδους που σχετίζονται με τη μελέτη Μοναδιαίων Συστοιχιών Ψηφιακής Εκπομπής που οδηγούνται από σήμα Σίγμα-Δέλτα ενός ψηφίου, όπως στο πρότυπο DSD. Η προσέγγιση βασίζεται σε πρωτότυπο αλγόριθμο αντιστοίχησης ροής ενός ψηφίου σε στοιχεία ακουστικής εκπομπής και παρουσιάζει σημαντικά πλεονεκτήματα, ως προς την επιτυγχανόμενη πιστότητα και κατευθυντικότητα, όσο και στην δυνατότητα υλοποίησης. Ο σχεδιασμός και η λειτουργία πρωτοτύπου ψηφιακού ηχείου Σίγμα-Δέλτα τεκμηριώνουν τη θεωρητική ανάλυση ενώ οι μετρήσεις που ελήφθησαν από την κατασκευή βρίσκονται σε αντιστοιχία με τις αναμενόμενες από αντίστοιχες εξομοιώσεις, αλλά διάφοροι πρακτικοί περιορισμοί οδηγούν σε ηχητική πιστότητα κατώτερη της αναμενόμενης. / The dissertation analyzes issues concerning the wireless transmission and the direct emission of digital audio signals, in order to optimize these techniques. Regarding the wireless transmission, the dissertation focuses on the WLAN family of networks, supporting QoS. In order to study the system, trials were conducted using a novel platform that allows the conversion of audio streams for them to be imported an exported from a network simulation application, facilitating the final audio playback fidelity estimation. The above analysis led to the development of a prototype technique for the synchronization of discreet reproduction channels that can be implemented using typical WLAN hardware, as well as a prototype algorithm for concealing audible distortion that might be added during the transmission. Moreover, results using new methods relating to the study of Unary Digital Transmission Arrays driven by one-bit Delta-Sigma signals, as in the DSD standard, are introduced in the dissertation. The approach is based on a prototype algorithm for mapping a one-bit stream to the acoustic transmission elements and exhibits important advantages, namely increased fidelity and improved directivity, as well as ease of implementation. The design and operation of the prototype digital Delta-Sigma speaker substantiates the theoretical analysis, while the measurements obtained from the device are in accordance with what expected from respective simulations. However, various practical limitations lead to lower than expected acoustic fidelity.
229

'Technic' practices of the computer game Lanner: identity development through the LAN-gameplay experience

Khunyeli, Ramotsamai Itumeleng January 2011 (has links)
This thesis is a reception analysis using qualitative interviews to investigate the formation of cultural groups around computer-game LANs present in Rhodes University. It also looks at how issues of social inequalities evident on the university's campus impact on the participation of students in these LANs. The findings of this study are that the participants have established a community around the practice of computer LAN-gameplay based on values developed through the combination of the material and gameworlds. It serves as a home-on-campus for them; where they can fully explore their passion for games thus reaffirming their identity as gamers on a campus where being a gamer is viewed negatively. In this light, computer-game playing is not just a practice these participants perform, but a culture they live out every day. This is a culture predominantly lived out by men. One of the reasons for this is because most women have been raised to believe to have negative predispositions about digital gaming e.g. that it is childish, addictive and anti-social, but also that computer are meant to be used by men - women use them only when it is absolutely necessary, for example, that it is childish, for academic-related purposes. As a result, not many of them will use computers for any otherreason for fear of being socially criticised. In addition, the gaming culture being dominated by whites is due to the fact that admittance in to this community is still unaffordable for the majority of black students on the Rhodes University campus as a result of their social backgrounds.
230

Wireless and Social Networks : Some Challenges and Insights

Sunny, Albert January 2016 (has links) (PDF)
Wireless networks have potential applications in wireless Internet connectivity, battlefields, disaster relief, and cyber-physical systems. While the nodes in these networks communicate with each other over the air, the challenges faced by and the subsequent design criteria of these networks are diverse. In this thesis, we study and discuss a few design requirements of these networks, such as efficient utilization of the network bandwidth in IEEE 802.11 infrastructure networks, evaluating utility of sensor node deployments, and security from eavesdroppers. The presence of infrastructure IEEE 802.11 based Wireless Local Area Networks (WLANs) allows mobile users to seamlessly transfer huge volumes of data. While these networks accommodate mobility, and are a cost-effective alternative to cellular networks, they are well known to display several performance anomalies. We study a few such anomalies, and provide a performance management solution for IEEE 802.11 based WLANs. On the other hand, in sensor networks, the absence of infrastructure mandates the use of adhoc network architectures. In these architectures, nodes are required to route data to gateway nodes over a multi-hop network. These gateway nodes are larger in size, and costlier in comparison with the regular nodes. In this context, we propose a unified framework that can be used to compare different deployment scenarios, and provide a means to design efficient large-scale adhoc networks. In modern times, security has become an additional design criterion in wireless networks. Traditionally, secure transmissions were enabled using cryptographic schemes. However, in recent years, researchers have explored physical layer security as an alternative to these traditional cryptographic schemes. Physical layer security enables secure transmissions at non-zero data rate between two communicating nodes, by exploiting the degraded nature of the eavesdropper channel and the inherent randomness of the wireless medium. Also, in many practical scenarios, several nodes cooperate to improve their individual secrecy rates. Therefore, in this thesis, we also study scenarios, where cooperative schemes can improve secure end-to-end data transmission rates, while adhering to an overall power budget. In spite of the presence of voluminous reservoirs of information such as digital libraries and the Internet, asking around still remains a popular means of seeking information. In scenarios where the person is interested in communal, or location-specific information, such kind of retrieval may yield better results than a global search. Hence, wireless networks should be designed, analyzed and controlled by taking into account the evolution of the underlying social networks. This alliance between social network analysis and adhoc network architectures can greatly advance the design of network protocols, especially in environments with opportunistic communications. Therefore, in addition to the above mentioned problem, in this thesis, we have also presented and studied a model that captures the temporal evolution of information in social networks with memory.

Page generated in 0.1342 seconds