• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 16
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 30
  • 30
  • 15
  • 11
  • 10
  • 9
  • 8
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Design of energy efficient protocols-based optimisation algorithms for IoT networks

Al-Janabi, Thair January 2018 (has links)
The increased globalisation of information and communication technologies has transformed the world into the internet of things (IoT), which is accomplished within the resources of wireless sensor networks (WSNs). Therefore, the future IoT networks will consist of high density of connected nodes that suffer from resource limitation, especially the energy one, and distribute randomly in a harsh and large-scale areas. Accordingly, the contributions in this thesis are focused on the development of energy efficient design protocols based on optimisation algorithms, with consideration of the resource limitations, adaptability, scalability, node density and random distribution of node density in the geographical area. One MAC protocol and two routing protocols, with both a static and mobile sink, are proposed. The first proposed protocol is an energy efficient hybrid MAC protocol with dynamic sleep/wake-up extension to the IEEE 802.15.4 MAC, namely, HSW-802.15.4. The model automates the network by enabling it to work exibly in low and high-density networks with a lower number of collisions. A frame structure that offers an enhanced exploitation for the TDMA time slots (TDMAslots) is provided. To implement these enhanced slots exploitation, this hybrid protocol rst schedules the TDMAsslots, and then allocates each slot to a group of devices. A three-dimensional Markov chain is developed to display the proposed model in a theoretical manner. Simulation results show an enhancement in the energy conservation by 40% - 60% in comparison to the IEEE 802.15.4 MAC protocol. Secondly, an efficient centralised clustering-based whale optimisation algorithm (CC- WOA) is suggested, which employs the concept of software de ned network (SDN) in its mechanism. The cluster formulation process in this algorithm considers the random di- versi cation of node density in the geographical area and involves both sensor resource restrictions and the node density in the tness function. The results offer an efficient con- servation of energy in comparison to other protocols. Another clustering algorithm, called centralised load balancing clustering algorithm (C-LBCA), is also developed that uses par- ticle swarm optimisation (PSO) and presents robust load-balancing for data gathering in IoT. However, in large scale networks, the nodes, especially the cluster heads (CHs), suffer from a higher energy exhaustion. Hence, in this thesis, a centralised load balanced and scheduling protocol is proposed utilising optimisation algorithms for large scale IoT net- works, named, optimised mobile sink based load balancing (OMS-LB). This model connects the impact of the Optimal Path for the MS (MSOpath) determination and the adjustable set of data aggregation points (SDG) with the cluster formulation process to de ne an op- timised routing protocol suitable for large scale networks. Simulation results display an improvement in the network lifespan of up to 54% over the other approaches.
2

Performance modelling and QoS support for wireless Ad Hoc networks

Khayyat, Khalid M. Jamil 19 October 2011 (has links)
We present a Markov chain analysis for studying the performance of wireless ad hoc networks. The models presented in this dissertation support an arbitrary backoff strategy. We found that the most important parameter affecting the performance of binary exponential backoff is the initial backoff window size. Our experimental results show that the probability of collision can be reduced when the initial backoff window size equals the number of terminals. Thus, the throughput of the system increases and, at the same time, the delay to transmit the frame is reduced. In our second contribution, we present a new analytical model of a Medium Access Control (MAC) layer for wireless ad hoc networks that takes into account frame retry limits for a four-way handshaking mechanism. This model offers flexibility to address some design issues such as the effects of traffic parameters as well as possible improvements for wireless ad hoc networks. It effectively captures important network performance characteristics such as throughput, channel utilization, delay, and average energy. Under this analytical framework, we evaluate the effect of the Request-to-Send (RTS) state on unsuccessful transmission probability and its effect on performance particularly when the hidden terminal problem is dominant, the traffic is heavy, or the data frame length is very large. By using our proposed model, we show that the probability of collision can be reduced when using a Request-to-Send/Clear- to-Send (RTS/CTS) mechanism. Thus, the throughput increases and, at the same time, the delay and the average energy to transmit the frame decrease. In our third contribution, we present a new analytical model of a MAC layer for wireless ad hoc networks that takes into account channel bit errors and frame retry limits for a two-way handshaking mechanism. This model offers flexibility to address design issues such as the effects of traffic parameters and possible improvements for wireless ad hoc networks. We illustrate that an important parameter affecting the performance of binary exponential backoff is the initial backoff window size. We show that for a low bit error rate (BER) the throughput increases and, at the same time, the delay and the average energy to transmit the frame decrease. Results show also that the negative acknowledgment-based (NAK-based) model proves more useful for a high BER. In our fourth contribution, we present a new analytical model of a MAC layer for wireless ad hoc networks that takes into account Quality of Service (QoS) of the MAC layer for a two-way handshaking mechanism. The model includes a high priority traffic class (class 1) and a low priority traffic class (class 2). Extension of the model to more QoS levels is easily accomplished. We illustrate an important parameter affecting the performance of an Arbitration InterFrame Space (AIFS) and small backoff window size limits. They cause the frame to start contending the channel earlier and to complete the backoff sooner. As a result, the probability of sending the frame increases. Under this analytical framework, we evaluate the effect of QoS on successful transmission probability and its effect on performance, particularly when high priority traffic is dominant. / Graduate
3

THROUGHPUT AND LATENCY PERFORMANCE OF IEEE 802.11E WITH 802.11A, 802.11B, AND 802.11G PHYSICAL LAYERS

Shah, Vishal, Cooklev, Todor 10 1900 (has links)
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California / IEEE 802.11e is an amendment of the medium-access control (MAC) layer of the standard for wireless local area networking IEEE 802.11. The goal of 802.11e is to provide 802.11 networks with Quality of Service (QoS). 802.11 has three physical layers (PHY) of practical importance: 802.11b, 802.11a, and 802.11g. 802.11a and 802.11g provide data rates between 6 and 54 Mbps, and 802.11b provides data rates of 5.5 Mbps and 11 Mbps. However these data rates are not the actual throughput. The actual throughput that a user will experience will be lower. The throughput depends on both the PHY and MAC layers. It is important to estimate what exactly is the throughput when the physical layer is 802.11a, 802.11b, or 802.11g, and the MAC layer is 802.11e. In other words, how does providing QoS change the throughput for each of the three physical layers? In this paper we provide answers to this problem. Analytic formulae are derived. The maximum achievable throughput and minimum delay involved in data transfers are determined. The obtained results have further significance for the design of high-throughput wireless protocols.
4

Investigation of IEEE standard 802.16 Medium Access

Robles Rico, Pedro Francisco January 2006 (has links)
<p>This paper is a study of IEEE Standard 802.16 Medium Access Control (MAC) Layer in Distributed Mesh Networks. IEEE Standard 802.16 is a Wireless Metropolitan Area Network (WMAN) technology that can connect different IEEE 802.11 (Wifi) host post with each other and to other parts of internet. It can provide network for a wireless router and at the same time this router can be installed in the office, house or university.</p><p>WiMAX (Worldwide Interoperability for Microwave Access) is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards. Products that pass the conformity tests for WiMAX are capable of forming wireless connections between them to permit the carrying of internet packet data. The idea of WiMAX is similar than Wi-Fi but it is not the same. It is a step much higher than Wi-Fi because it is focused to offer internet for a whole city.</p><p>It has much higher capacity and longer distances. IEEE 802.16 defines a MAC Layer that supports multiple physical layer (PHY) Specifications and different topologies; Point to Multipoint (PMP) and Mesh Networks. In this first topology there exist a Base Station (BS) that have direct links with all the Subscriber Stations (SS). If any Subscriber Station requires transmitting to another SS, the message must convey the Base Station.</p>
5

Efficient GTS Allocation Schemes for IEEE 802.15.4

Haque, Syed E 11 April 2012 (has links)
IEEE 802.15.4 is a standard defined for wireless sensor network applications with limited power and relaxed throughput needs. The devices transmit data during two periods: Contention Access Period (CAP) by accessing the channel using CSMA/CA and Contention Free Period (CFP), which consists of Guaranteed Time Slots (GTS) allocated to individual devices by the network coordinator. The GTS is used by devices for cyclic data transmission and the coordinator can allocate GTS to a maximum of only seven devices. In this work, we have proposed two algorithms for an efficient GTS allocation. The first algorithm is focused on improving the bandwidth utilization of devices, while the second algorithm uses traffic arrival information of devices to allow sharing of GTS slots between more than seven devices. The proposed schemes were tested through simulations and the results show that the new GTS allocation schemes perform better than the original IEEE 802.15.4 standard.
6

Investigation of IEEE standard 802.16 Medium Access

Robles Rico, Pedro Francisco January 2006 (has links)
This paper is a study of IEEE Standard 802.16 Medium Access Control (MAC) Layer in Distributed Mesh Networks. IEEE Standard 802.16 is a Wireless Metropolitan Area Network (WMAN) technology that can connect different IEEE 802.11 (Wifi) host post with each other and to other parts of internet. It can provide network for a wireless router and at the same time this router can be installed in the office, house or university. WiMAX (Worldwide Interoperability for Microwave Access) is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards. Products that pass the conformity tests for WiMAX are capable of forming wireless connections between them to permit the carrying of internet packet data. The idea of WiMAX is similar than Wi-Fi but it is not the same. It is a step much higher than Wi-Fi because it is focused to offer internet for a whole city. It has much higher capacity and longer distances. IEEE 802.16 defines a MAC Layer that supports multiple physical layer (PHY) Specifications and different topologies; Point to Multipoint (PMP) and Mesh Networks. In this first topology there exist a Base Station (BS) that have direct links with all the Subscriber Stations (SS). If any Subscriber Station requires transmitting to another SS, the message must convey the Base Station.
7

Cross-Layer TCP Congestion Window Control for Multihop Ad-Hoc Networks

Huang, Chi-Jen 01 August 2006 (has links)
The amount of packets on-the-fly in a wireless ad-hoc network increases when the size of congestion window and the number of hop count increase. It is possible that packets may have to retransmit because large amount of on-the-fly packets may increase the media contention. Besides, packet delay can grow rapidly when the wireless network becomes congested or the channel interference remains unresolved. This thesis presents a cross-layer TCP congestion window control mechanism for multihop ad-hoc networks to dynamically adjust the size of congestion window according to the MAC-layer contention statistics measured at each hop along the routing path. With the proposed scheme, the congestion window of each traffic flow can be dynamically set to an appropriate size to reduce packet delay and increase flow throughput. For the purpose of evaluation, we perform simulations on NS-2. The simulation results have shown the advantage of our proposed scheme over the two previous works, NewReno and CWL(Congestion Window Limit), especially when the ad-hoc network is loaded with background traffic.
8

DESIGN AND EVALUATION OF BLUETOOTH INTRA-PICONET SCHEDULING ALGORITHMS TO SUPPORT SCATTERNETS

MOHANTY, ARCHANA January 2003 (has links)
No description available.
9

Implementing Energy-Saving Improvements to the IEEE 802.15.4 MAC Protocol

Valero, Marco 14 April 2009 (has links)
IEEE 802.15.4 is a standard designed for low data rate wireless personal area networks (WPANs) intended to provide connectivity to mobile devices. Such devices present considerable storage, energy, and communication constraints. However, they can be used in a variety of applications like home/office automation, environmental control and more. In order to extend the lifetime of the WPAN, we propose some changes to the standard including modifications to the Superframe Guaranteed Time Slot (GTS) distribution which can be optimized to reduce energy consumption. We implemented the proposed improvements to the IEEE 802.15.4 protocol using real sensor nodes. Specifically, we conducted an energy study of the proposed acknowledgment-based GTS descriptor distribution scheme and compared the results with the standard implementation. Experiments show that the proposed changes reduce energy consumption up to nearly 50% when 7 devices allocate guaranteed time slots descriptors during normal communication.
10

Ultra-low power energy harvesting wireless sensor network design

Zheng, Chenyu January 1900 (has links)
Master of Science / Department of Electrical and Computer Engineering / William B. Kuhn and Balasubramaniam Natarajan / This thesis presents an energy harvesting wireless sensor network (EHWSN) architecture customized for use within a space suit. The contribution of this research spans both physical (PHY) layer energy harvesting transceiver design and appropriate medium access control (MAC) layer solutions. The EHWSN architecture consists of a star topology with two types of transceiver nodes: a powered Gateway Radio (GR) node and multiple energy harvesting (EH) Bio-Sensor Radio (BSR) nodes. A GR node works as a central controller to receive data from BSR nodes and manages the EHWSN via command packets; low power BSR nodes work to obtain biological signals, packetize the data and transmit it to the GR node. To demonstrate the feasibility of an EHWSN at the PHY layer, a representative BSR node is designed and implemented. The BSR node is powered by a thermal energy harvesting system (TEHS) which exploits the difference between the temperatures of a space suit's cooling garment and the astronaut's body. It is shown that through appropriate control of the duty-cycle in transmission and receiving modes, it is possible for the transceiver to operate with less than 1mW power generated by the TEHS. A super capacitor, energy storage of TEHS, acts as an energy buffer between TEHS and power consuming units (processing units and transceiver radio). The super capacitor charges when a BSR node is in sleep mode and discharges when the node is active. The node switches from sleep mode to active mode whenever the super capacitor is fully charged. A voltage level monitor detects the system's energy level by measuring voltage across the super capacitor. Since the power generated by the TEHS is extremely low(less than 1mW) and a BSR node consumes relatively high power (approximately 250mW) during active mode, a BSR node must work under an extremely low duty cycle (approximately 0.4%). This ultra-low duty cycle complicates MAC layer design because a BSR node must sleep for more than 99.6% of overall operation time. Another challenge for MAC layer design is the inability to predict when the BSR node awakens from sleep mode due to unpredictability of the harvested energy. Therefore, two feasible MAC layer designs, CSA (carrier sense ALOHA based)-MAC and GRI (gateway radio initialized)-MAC, are proposed in this thesis.

Page generated in 0.0445 seconds