• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 83
  • 16
  • 12
  • 11
  • 8
  • 7
  • 6
  • 4
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 198
  • 74
  • 73
  • 56
  • 51
  • 44
  • 40
  • 38
  • 31
  • 24
  • 23
  • 22
  • 22
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Die "Déjeuner"-Malerei von Edouard Manet, Claude Monet und Pierre-Auguste Renoir Untersuchung zur Darstellung von Mahlzeiten in der Zeit des französischen Impressionismus

Ahrens, Beatrix January 2007 (has links)
Zugl.: Freiburg (Breisgau), Univ., Diss., 2007
92

A New Backoff Strategy Using Topological Persistence In Wireless Networks

January 2013 (has links)
abstract: Contention based IEEE 802.11MAC uses the binary exponential backoff algorithm (BEB) for the contention resolution. The protocol suffers poor performance in the heavily loaded networks and MANETs, high collision rate and packet drops, probabilistic delay guarantees, and unfairness. Many backoff strategies were proposed to improve the performance of IEEE 802.11 but all ignore the network topology and demand. Persistence is defined as the fraction of time a node is allowed to transmit, when this allowance should take into account topology and load, it is topology and load aware persistence (TLA). We develop a relation between contention window size and the TLA-persistence. We implement a new backoff strategy where the TLA-persistence is defined as the lexicographic max-min channel allocation. We use a centralized algorithm to calculate each node's TLApersistence and then convert it into a contention window size. The new backoff strategy is evaluated in simulation, comparing with that of the IEEE 802.11 using BEB. In most of the static scenarios like exposed terminal, flow in the middle, star topology, and heavy loaded multi-hop networks and in MANETs, through the simulation study, we show that the new backoff strategy achieves higher overall average throughput as compared to that of the IEEE 802.11 using BEB. / Dissertation/Thesis / M.S. Computer Science 2013
93

Performance Analysis of AODV, DSR and OLSR in MANET / Resultatanalys av AODV, DSR och OLSR i MANET

Ali, Sajjad, Ali, Asad January 2010 (has links)
A mobile ad hoc network (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared three routing protocols i.e. AODV, DSR and OLSR. Our simulation tool will be OPNET modeler. The performance of these routing protocols is analyzed by three metrics: delay, network load and throughput. All the three routing protocols are explained in a deep way with metrics. The comparison analysis will be carrying out about these protocols and in the last the conclusion will be presented, that which routing protocol is the best one for mobile ad hoc networks. / In all the three scenarios of small, large and very large networks OLSR gives considerably less delay and high throughput as compared to AODV and DSR. OLSR outperforms AODV and DSR with prominent difference in delay and throughput. While the AODV puts low load on the network in large and very large networks. OLSR outperforms in our study, but it is not necessary that OLSR always perform better in all the networks, its performance may vary by varying the network. / sajj_ali2003@yahoo.com, asad322@gmail.com
94

Analysis of Black Hole attack on MANETs Using different MANET routing protocol

Ur-Rehman, Shoaib, Ullah, Irshan January 2010 (has links)
ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc on Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET). Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc on Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET.
95

Security Threats in Mobile Ad Hoc Network

Biswas, Kamanashis, Ali, Md. Liakat January 2007 (has links)
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
96

Performance Evaluation of MANET using MPLS

Baig, Mirza Hamid, Kiani, Hassan Shahzad January 2010 (has links)
Mobile Ad Hoc Network (MANET) is special kind of wireless network which does not have any fixed structure. They are paired for specific purpose within some concise time period. As the concept of “Micro Products” with a feature of “Mobility” has gain popularity, the MANET has benefited the mankind in many ways and in number of situations such as Natural Disaster, War Zone, and Medical Camp in far-flung Earthquake hit areas etc. In every situation mobile nodes organized themselves on temporary bases in network topology. Autonomous nodes having wireless infrastructure are interconnected to form an autonomous network and easily establish a connection from one place to another. These mobile nodes act either as routers or as a host. These nodes have routing capabilities for multi hop paths through which these are interconnected. The mobility of nodes needs efficient routing for MANET. So therewith, Multi Protocol Label Switching (MPLS) enhances routing with respect to path and packet forwarding. In our thesis we try to analyze the various effects of MPLS on MANET protocols when integrated with MPLS. Simulations were carried out using OPNET modeler 14.5 for analyzing the MPLS effects on the metrics like route discovery time, packet end-to-end delay and throughput. Moreover case study is also included to present a conceptual model for integrating MPLS with MANET protocols.
97

Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols

ULLAH, IRSHAD, REHMAN, SHOAIB UR January 2010 (has links)
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc On Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET).
98

Performance Issues of Routing Protocols in MANET

Tahir, Saleem January 2010 (has links)
A mobile ad-hoc network is an assortment of wireless mobile hosts, which establishes a momentary network without any assist of centralized administrator. The characteristics of an ad-hoc network can be explored on the base of routing protocols. The dynamic topology is the vital characteristic in which nodes frequently change their position. In the ad-hoc networks, there are mobile nodes such as Personal Digital Assistance (PDA), smart phone and laptops; they have limited operational resources like battery power and bandwidth. The control traffic is to be minimized, which is the main responsibility of routing protocols by selecting the shortest path and controlling the traffic. In this study work, we focus on performance issues of routing protocols, Optimized Link State Routing (OLSR), Ad Hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Temporally Ordered Routing Algorithm (TORA) in mobility and standalone ad-hoc networks. For this purpose, we first study and explain these protocols and then we use the Optimized Network Engineering Tool (OPNET) modeler tool and analyze the performance metrics delay, throughput and network load.
99

Implementation of a manycast protocol for intermittently connected mobile ad hoc networks in disaster areas

Vergara Alonso, Ekhiotz Jon January 2010 (has links)
Nowadays, the use of mobile phones and other wireless devices has become an indispensable part of daily life. However, the focus of wireless communication is on infrastructure-based networks, making them prone to service outage if for any reason the infrastructure is overloaded or there is no network coverage. This is the case in a disaster area, where the infrastructure that supports the communication may be destroyed or could become useless. Different approaches to complement the exchange of information in these scenarios are emerging as research results. This thesis concerns Random-Walk Gossip (RWG), which is a protocol to disseminate information in disaster areas. RWG is a many-cast protocol for intermittently connected mobile ad hoc networks. The more people can communicate, the more chances of success there are. Therefore, it is useful to investigate the possibility of implementing such protocols on commodity devices. Since Symbian is currently the most widespread mobile phone operating system, this master's thesis presents the implementation of the protocol in that platform. The protocol is also implemented in Linux and Mac OS X in order to provide heterogeneity. Finally, some aspects of the performance of the protocol in different devices are analyzed, studying the CPU load, memory consumption, radio range, energy consumption and response time of different devices using the protocol. The studies show that the use of the RWG protocol in both laptops and handheld devices is viable.
100

ORWAR: a delay-tolerant protocol implemented on the Android platform

Anzaldi, Davide January 2010 (has links)
The Aim of this thesis is to implement the "Opportunistic DTN Routing with Window-aware Adaptive Replication" (ORWAR) protocol on the Android platform.Delay-Tolerant Networks (DTNs) are particular mobile ad-hoc network (MANET) architectures that try to solve the issues related to the lack of point to point connectivity between the nodes of the network or between its sub-networks (partitions). The general approach is based on techniques of store-carry-forward of the messages whereby delivery can be achieved even in partitioned networks, though with mobility-dependent delays. DTNs can be considered as a means of communication for scenarios where infrastructure-based networks cannot be deployed or get dysfunctional for some reasons, such as in the case of a natural disaster or highly overloaded infrastructure. ORWAR is a DTN protocol that tries to exploit knowledge about the context of mobile nodes (speed, direction of movement and radio range) to estimate the size of a contact window in order to avoid the energy waste deriving from partial transmissions. This report presents the design and the implementation of the protocol on the Android platform. It then describes some functional tests together with an analysis of the energy consumption and the performance reachable on our test device Android Development Phone 1.

Page generated in 0.0158 seconds