• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 8
  • 4
  • 1
  • 1
  • Tagged with
  • 57
  • 57
  • 38
  • 34
  • 22
  • 14
  • 12
  • 11
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Design of Efficient MAC Protocols for IEEE 802.15.4-based Wireless Sensor Networks

Khanafer, Mounib 01 May 2012 (has links)
Wireless Sensor Networks (WSNs) have enticed a strong attention in the research community due to the broad range of applications and services they support. WSNs are composed of intelligent sensor nodes that have the capabilities to monitor different types of environmental phenomena or critical activities. Sensor nodes operate under stringent requirements of scarce power resources, limited storage capacities, limited processing capabilities, and hostile environmental surroundings. However, conserving sensor nodes’ power resources is the top priority requirement in the design of a WSN as it has a direct impact on its lifetime. The IEEE 802.15.4 standard defines a set of specifications for both the PHY layer and the MAC sub-layer that abide by the distinguished requirements of WSNs. The standard’s MAC protocol employs an intelligent backoff algorithm, called the Binary Exponent Backoff (BEB), that minimizes the drainage of power in these networks. In this thesis we present an in-depth study of the IEEE 802.15.4 MAC protocol to highlight both its strong and weak aspects. We show that we have enticing opportunities to improve the performance of this protocol in the context of WSNs. We propose three new backoff algorithms, namely, the Standby-BEB (SB-BEB), the Adaptive Backoff Algorithm (ABA), and the Priority-Based BEB (PB-BEB), to replace the standard BEB. The main contribution of the thesis is that it develops a new design concept that drives the design of efficient backoff algorithms for the IEEE 802.15.4-based WSNs. The concept dictates that controlling the algorithms parameters probabilistically has a direct impact on enhancing the backoff algorithm’s performance. We provide detailed discrete-time Markov-based models (for AB-BEB and ABA) and extensive simulation studies (for the three algorithms) to prove the superiority of our new algorithms over the standard BEB.
12

802.11 Fingerprinting to Detect Wireless Stealth Attacks

Venkataraman, Aravind 20 November 2008 (has links)
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include unauthorized access points, selfish behavior at the MAC layer and MAC layer covert timing channels. We employ the Bayesian binning technique as a means of classifying between delay distributions. The scheme requires no change to the 802.11 nodes or protocol, exhibits minimal computational overhead and offers a single point of discovery. We evaluate our model using experiments and simulations.
13

Hard synchronous real-time communication with the time-token MAC protocol

Wang, Jun January 2009 (has links)
The timely delivery of inter-task real-time messages over a communication network is the key to successfully developing distributed real-time computer systems. These systems are rapidly developed and increasingly used in many areas such as automation industry. This work concentrates on the timed-token Medium Access Control (MAC) protocol, which is one of the most suitable candidates to support real-time communication due to its inherent timing property of bounded medium access time. The support of real-time communication with the timed-token MAC protocol has been studied using a rigorous mathematical analysis. Specifically, to guarantee the deadlines of synchronous messages (real-time messages defined in the timed-token MAC protocol), a novel and practical approach is developed for allocating synchronous bandwidth to a general message set with the minimum deadline (Dmin) larger than the Target Token Rotation Time (TTRT). Synchronous bandwidth is defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token. It is a sensitive paramater in the control of synchronous message transmission and must be properly allocated to individual nodes to guarantee deadlines of real-time messages. Other issues related to the schedulability test, including the required buffer size and the Worst Case Achievable Utilisation (WCAU) of the proposed approach, are then discussed. Simulations and numerical examples demonstrate that this novel approach performs better than any previously published local synchronous bandwidth allocation (SBA) schemes, in terms of its ability to guarantee the real-time traffic. A proper selection of the TTRT, which can maximise the WCAU of the proposed SBA scheme, is addressed. The work presented in this thesis is compatible with any network standard where timed-token MAC protocol is employed and therefore can be applied by engineers building real-time systems using these standards.
14

A novel MAC protocol for cognitive radio networks

Shah, Munam Ali January 2013 (has links)
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient.
15

Design of Efficient MAC Protocols for IEEE 802.15.4-based Wireless Sensor Networks

Khanafer, Mounib 01 May 2012 (has links)
Wireless Sensor Networks (WSNs) have enticed a strong attention in the research community due to the broad range of applications and services they support. WSNs are composed of intelligent sensor nodes that have the capabilities to monitor different types of environmental phenomena or critical activities. Sensor nodes operate under stringent requirements of scarce power resources, limited storage capacities, limited processing capabilities, and hostile environmental surroundings. However, conserving sensor nodes’ power resources is the top priority requirement in the design of a WSN as it has a direct impact on its lifetime. The IEEE 802.15.4 standard defines a set of specifications for both the PHY layer and the MAC sub-layer that abide by the distinguished requirements of WSNs. The standard’s MAC protocol employs an intelligent backoff algorithm, called the Binary Exponent Backoff (BEB), that minimizes the drainage of power in these networks. In this thesis we present an in-depth study of the IEEE 802.15.4 MAC protocol to highlight both its strong and weak aspects. We show that we have enticing opportunities to improve the performance of this protocol in the context of WSNs. We propose three new backoff algorithms, namely, the Standby-BEB (SB-BEB), the Adaptive Backoff Algorithm (ABA), and the Priority-Based BEB (PB-BEB), to replace the standard BEB. The main contribution of the thesis is that it develops a new design concept that drives the design of efficient backoff algorithms for the IEEE 802.15.4-based WSNs. The concept dictates that controlling the algorithms parameters probabilistically has a direct impact on enhancing the backoff algorithm’s performance. We provide detailed discrete-time Markov-based models (for AB-BEB and ABA) and extensive simulation studies (for the three algorithms) to prove the superiority of our new algorithms over the standard BEB.
16

A communication protocol framework for wireless sensor networks in industrial environments

Phua, Cheng Tatt Valance January 2009 (has links)
[Truncated abstract] Developing wireless sensor network communication protocols for industrial environments is a challenging task. The wireless channel conditions in industrial environments are harsher as a result of multipath propagation of radio signals within an environment where the mechanics of the surrounding industrial activities often lead to severe small-scale fading effects. The design of network protocols to function in such an environment needs to provide a robust communication platform for the wireless sensor nodes, while optimizing the utilization of the limited node resources available. As existing general MAC protocols for wireless sensor networks do not work well under harsh channel conditions, we address this problem in this thesis by proposing a medium access control (MAC) protocol framework for wireless sensor networks in industrial environments. To describe the impact of an automated industrial site on small-scale fading effects in an industrial indoor wireless network, we use a site-specific ray-tracer for predicting signal propagation based on building blue prints to simulate the signal propagation paths through an industrial site with periodically moving objects. We found that in a fully automated industrial site, the periodic movements of objects with constant velocities result in an approximately periodic distribution of fading periods in the channel. Based on this finding, we propose a link state dependent TDMA-based MAC protocol for wireless sensor networks designed for automated industrial applications. ... This technique also conserves energy and maximizes packet integrity as the sensor nodes avoid performing network activities when the channel is sampled to be affected by fading. As a measure for fault-tolerance, we also propose a dynamic link reconstruction technique that allows sensor nodes to reconstruct new parent links when their present links are severely affected by fading. MAC protocols that adopt active buffering in fading-affected channels suffer bufferoverflow and latency issues as a result of the postponement of scheduled transmissions during periods when the channel is in a fade. Consequently, time-sensitive data packets that may contain critical information may miss their deadlines in a severely affected fading channel. Hence, we propose a general fading-aware data management (FADE) MAC protocol extension that uses buffer nodes to offload the memory buffer off sensor nodes in the network and prioritizes traffic based on a simple proposed priority scheme. The FADE extension provides a balance balance between minimum end-to-end latency for critical event reporting, high packet delivery guarantee, low energy consumption, and minimum buffer requirements on the sensor nodes. In summary, this thesis presents the design, implementation, and evaluation of all our proposed network protocols that are combined as a framework for wireless sensor networks in industrial environments.
17

Cooperative Multi-Channel MAC Protocols for Wireless Ad Hoc Networks

January 2010 (has links)
abstract: Today, many wireless networks are single-channel systems. However, as the interest in wireless services increases, the contention by nodes to occupy the medium is more intense and interference worsens. One direction with the potential to increase system throughput is multi-channel systems. Multi-channel systems have been shown to reduce collisions and increase concurrency thus producing better bandwidth usage. However, the well-known hidden- and exposed-terminal problems inherited from single-channel systems remain, and a new channel selection problem is introduced. In this dissertation, Multi-channel medium access control (MAC) protocols are proposed for mobile ad hoc networks (MANETs) for nodes equipped with a single half-duplex transceiver, using more sophisticated physical layer technologies. These include code division multiple access (CDMA), orthogonal frequency division multiple access (OFDMA), and diversity. CDMA increases channel reuse, while OFDMA enables communication by multiple users in parallel. There is a challenge to using each technology in MANETs, where there is no fixed infrastructure or centralized control. CDMA suffers from the near-far problem, while OFDMA requires channel synchronization to decode the signal. As a result CDMA and OFDMA are not yet widely used. Cooperative (diversity) mechanisms provide vital information to facilitate communication set-up between source-destination node pairs and help overcome limitations of physical layer technologies in MANETs. In this dissertation, the Cooperative CDMA-based Multi-channel MAC (CCM-MAC) protocol uses CDMA to enable concurrent transmissions on each channel. The Power-controlled CDMA-based Multi-channel MAC (PCC-MAC) protocol uses transmission power control at each node and mitigates collisions of control packets on the control channel by using different sizes of the spreading factor to have different processing gains for the control signals. The Cooperative Dual-access Multi-channel MAC (CDM-MAC) protocol combines the use of OFDMA and CDMA and minimizes channel interference by a resolvable balanced incomplete block design (BIBD). In each protocol, cooperating nodes help reduce the incidence of the multi-channel hidden- and exposed-terminal and help address the near-far problem of CDMA by supplying information. Simulation results show that each of the proposed protocols achieve significantly better system performance when compared to IEEE 802.11, other multi-channel protocols, and another protocol CDMA-based. / Dissertation/Thesis / Ph.D. Computer Science 2010
18

Multi-channel MAC Protocol for Wireless Real-Time Communication

Naqvi, Syed Hasan Yousuf January 2010 (has links)
Embedded systems have become more complex and it is hard to predict the behavior of networkdue to its dynamic nature. Several devices can interact to perform highly sophisticated real-timetasks while having the demand of interaction and sharing of resources. The interactingcomponents in these systems have strict timing constraints which require time criticalcommunication.We have designed the DCC-EDF protocol for wireless communication using the motivation fromthe research done in optical communication. We have chosen dedicated control channel protocolbecause it does not require time synchronization. To provide real-time services, we will use theEarly Deadline First scheduling algorithm (EDF) because of its optimality and efficiency. Theperformance for the soft real-time traffic is analyzed through simulation.
19

Design And Development Of Modular System For QoS Guarantee In Wireless Networks

Chetan Kumar, S 11 1900 (has links) (PDF)
No description available.
20

Design of Efficient MAC Protocols for IEEE 802.15.4-based Wireless Sensor Networks

Khanafer, Mounib January 2012 (has links)
Wireless Sensor Networks (WSNs) have enticed a strong attention in the research community due to the broad range of applications and services they support. WSNs are composed of intelligent sensor nodes that have the capabilities to monitor different types of environmental phenomena or critical activities. Sensor nodes operate under stringent requirements of scarce power resources, limited storage capacities, limited processing capabilities, and hostile environmental surroundings. However, conserving sensor nodes’ power resources is the top priority requirement in the design of a WSN as it has a direct impact on its lifetime. The IEEE 802.15.4 standard defines a set of specifications for both the PHY layer and the MAC sub-layer that abide by the distinguished requirements of WSNs. The standard’s MAC protocol employs an intelligent backoff algorithm, called the Binary Exponent Backoff (BEB), that minimizes the drainage of power in these networks. In this thesis we present an in-depth study of the IEEE 802.15.4 MAC protocol to highlight both its strong and weak aspects. We show that we have enticing opportunities to improve the performance of this protocol in the context of WSNs. We propose three new backoff algorithms, namely, the Standby-BEB (SB-BEB), the Adaptive Backoff Algorithm (ABA), and the Priority-Based BEB (PB-BEB), to replace the standard BEB. The main contribution of the thesis is that it develops a new design concept that drives the design of efficient backoff algorithms for the IEEE 802.15.4-based WSNs. The concept dictates that controlling the algorithms parameters probabilistically has a direct impact on enhancing the backoff algorithm’s performance. We provide detailed discrete-time Markov-based models (for AB-BEB and ABA) and extensive simulation studies (for the three algorithms) to prove the superiority of our new algorithms over the standard BEB.

Page generated in 0.0343 seconds