• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 17
  • 17
  • 17
  • 9
  • 9
  • 8
  • 7
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Diseño de un protocolo MAC con una multiplexión temporal eficiente para redes inalámbricas locales energéticamente autosustentables equipados con dispositivos captadores de energía

Torres Norambuena, Boris Antonio January 2016 (has links)
Magíster en Ciencias de la Ingeniería, Mención Eléctrica. Ingeniero Civil Eléctrico / En la actualidad existe un crecimiento acelerado en el número de dispositivos que utilizan la red para comunicarse, sumado a que la de manda por velocidades de transmisión más altas ha aumentado. Conjuntamente con este requerimiento, existe una exigencia tácita: dispositivos más autónomos, es decir, dispositivos que tengan baterías lo suficientemente eficiente para no tener que cargarlos frecuentemente. Esto ha creado la necesidad de contar con protocolos que utilicen eficientemente el ancho de banda disponible de Internet, además de que sean considerados con la batería de los equipos. Una de las soluciones que se han planteado es la de utilizar frecuencias más elevadas de comunicación, llegando en la actualidad a transmitir a frecuencias de decenas de Gigahertz. Una banda que tiene especial interés, es la banda de 60 Ghz (58 -61 GHz), pues es una banda no licenciada y provee una alta tasa de transmisión de datos. Esta tesis presenta un protocolo Media Access Control (MAC), orientado a las ondas milimétricas (ondas que trabajan a frecuencias entre 30 y 300 GHz), que mejora el desempeño del protocolo Process-Stacking Multiplexing Access (PSMA) y adaptarlo a una red centralizada. Aquí se propone el protocolo Variable Slot Time-Time Division Multiple Access (VST-TDMA). Este usa de forma más eficiente el ancho de banda pues no desperdicia tiempo, como si ocurre en Multiplexación por División de Tiempo (TDMA, Time Division Multiple Access). Además, es energéticamente eficiente y autosustentable, pues variará su tasa de transmisión dependiendo del estado de carga (SOC, State of Charge) de la batería del dispositivo. Para diseñar este, se mantuvo el funcionamiento general del protocolo PSMA, cuya idea central es la de agendar procesos, reservando el uso de canal a medida que los equipos que integran la red soliciten usarla, asignando a cada uno de ellos el tiempo exacto que requieran de utilización del canal. No obstante, el principal cambio que se añade es que la Estación Base (BS, Base Station) envía cíclicamente un broadcast, para para incorporar y/o sincronizar cualquier dispositivo que requiera acceder la red, o si la BS necesita enviar datos a alguno de los nodos. Seguidamente, se describirá el algoritmo que se usó para la estimación de los parámetros que condicionan el comportamiento de la batería. El principal resultado de VST-TDMA, es lo relacionado con la batería. En términos de desempeño en transferencia de datos, tiene un resultado similar a PSMA. No obstante, en lo relacionado a la energía, se puede notar que la información que se puede obtener de la batería permite que el protocolo decida en qué momento debe bajar su tasa de transferencia, para no degradarla, y de esta forma tenga mayor vida útil. Además, se llegó al hecho que el parámetro que condiciona principalmente a la batería es el parámetro α, logrando errores bajos en el caso de ser estimado con precisión. Como trabajo futuro, para empezar, se propone el implementar completamente el protocolo en Opnet, tanto desde el punto de vista de funcionamiento, como de la estimación de los parámetros que modelan la batería. De esta forma, será posible conocer el comportamiento más completo del protocolo. Finalmente, se podría implementar este protocolo con algún medio físico, y a las frecuencias a la cual fue diseñado. Se podría utilizar field-programmable gate array (FPGA), dónde se programaría el protocolo y se podría observar el comportamiento en un ambiente real.
2

Scheduling Algorithm with Network Coding for Wireless Access Networks

Yang, Ya-Fang 30 July 2009 (has links)
Unlike the traditional store-and-forward mechanism in packet-switching networks,network coding schemes could combine and modify the contents of a number of packets from different source before the packets are forwarded.It has been recently shown that network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. In wireless networks,each transmitted packet is broadcasted within a certain area and can be overheard by the neighboring nodes.When a node needs to transmit packets,it employs the coding approach that uses the knowledge of what the node's neighbors have heard in order to reduce the number of transmissions. In this thesis,I propose jointly designing the network coding scheme and the media access control scheme to improve the performance of wireless networks.
3

Airtime Management for Low-Latency Densely Deployed Wireless Networks / 低遅延稠密無線ネットワークのためのエアタイム管理

Yin, Bo 23 March 2021 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第23327号 / 情博第763号 / 新制||情||130(附属図書館) / 京都大学大学院情報学研究科通信情報システム専攻 / (主査)教授 守倉 正博, 教授 原田 博司, 教授 大木 英司 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
4

Underwater acoustic networks: evaluation of the impact of media access control on latency, in a delay constrained network

Coelho, Jose Manuel dos Santos 03 1900 (has links)
This thesis presents an evaluation of the performance, in terms of throughput and latency, of two Media Access Control (MAC) mechanisms in Underwater Acoustic Networks (UANs), using a model designed in the COTS simulation tool OPNET 10.5. The carrier sense multiple access with collision avoidance is the predominant approach for implementing the MAC mechanism in UANs. However, the underwater acoustic environment is characterized by extreme propagation delays and limited bandwidth, which suggests that an Aloha-like scheme may merit consideration. The performance of these two schemes was compared with respect to two topologies: tree and grid. The results showed that an Aloha-like scheme that does not segment messages outperforms the contention-based scheme under all load conditions, in terms of both throughput and latency, for the two topologies. This thesis is the first to establish that Aloha-like MAC mechanisms can be more than a limited alternative for lightly loaded networks; more specifically, they can be the preferred choice for an environment with large propagation delays. / Lieutenant Commander, Portuguese Navy
5

Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard

Almantheri, Hamed 03 1900 (has links)
Approved for public release; distribution in unlimited. / In spite of the fact that wireless network technology has been available for long period of time, there has been very limited wireless networks deployments around the world before 1997 due to the lack of widely recognized standard for wireless networks. Thanks to the approval of the IEEE 802.11 family of standards in 1997, the world has witnessed tremendous deployment and proliferation of wireless networks in all aspects of life. Although the IEEE 802.11 family of standards has been ratified to design radio transceivers for wireless computer stations capable of interconnecting with other wireless computer stations in close proximity, the technology has been successfully employed to design and implement wireless networks with great number of distant wireless computer stations with reasonable data throughput and flexibility. This thesis explores the wireless network technology and the primary building blocks and components of a wireless network. It also explores the IEEE 802.11 standard and its technical specifications including the Physical layer (PHY), the Media Access Control layer (MAC) and the ongoing task forces. Additionally, the thesis examines the wireless network security including the vulnerabilities, ongoing improvements and recommendations. Next, it investigates the market for available wireless devices compatible with the IEEE 802.11 standard that can be used to build a wireless network with high data throughput and high level of security. Subsequently, the thesis formulates a design plan for civilian wireless network with different scenarios in order to provide a speedy solution to the limited broadband service availability in the Sultanate of Oman. Additionally, the thesis formulates a generic design plan for a military wireless network with different scenarios that can be rapidly deployed in the field of operations. / Computer Engineer, Royal Army of Oman
6

Advanced link and transport control protocols for broadband optical access networks

Xiao, Chunpeng 13 November 2006 (has links)
The objective of this dissertation is to improve the service quality of broadband optical access networks by developing advanced link- and transport- layer protocols. Current access technologies represent a significant bottleneck in bandwidth and service quality between a high-speed residential/enterprise network and a largely overbuilt core network. Although it is believed that passive optical network (PON) will be the most promising solution to provide truly broadband connections to end users, a suit of protocols are required to provide quality of service (QoS). In this dissertation, we design a new reservation MAC scheme that arbitrates upstream transmission, prevents collisions, and varies bandwidth according to demand and priority. The new access scheme exploits both WDM and TDM to cater for both light and heavy bandwidth requirements. Next, we introduce delta compression as an efficient method for fast content download. In the third part of this dissertation, we enhance the transport performance of Ethernet services by addressing the throughput optimization issue at the edge of the network. A novel SLA-aware transport control scheme is proposed to utilize reserved bandwidth more efficiently using a shifted additive increase multiplicative decrease (AIMD) algorithm, and to detect congestion more accurately based on hypothesis test. The performance of the proposed scheme is compared with traditional TCP through theoretical analyses and simulations.
7

Enhancing Attack Resilience in Cognitive Radio Networks

Chen, Ruiliang 07 March 2008 (has links)
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks. / Ph. D.
8

Wi-Fi tracking : Fingerprinting attacks and counter-measures / Traçage Wi-Fi : Attaques par prise d'empreinte et contre-mesures

Matte, Célestin 07 December 2017 (has links)
Le récent développement des appareils portatifs possédant une interface Wi-Fi (smartphones, tablettes et « wearables ») s'accompagne d'une menace sur la vie privée de leurs utilisateurs, et sur la société toute entière. Ces appareils émettent en continu des signaux pouvant être capturés par un attaquant passif, à l'aide de matériel peu coûteux et de connaissances basiques. Ces signaux contiennent un identifiant unique appelé l'adresse MAC. Pour faire face à cette menace, les acteurs du secteur déploient actuellement une contre-mesure sur les appareils récents: le changement aléatoire de l'adresse MAC. Malheureusement, nous montrons que cette mesure, dans son état actuel, n'est pas suffisante pour empêcher le traçage des appareils. Pour cela, nous introduisons plusieurs attaques basées sur le contenu et la répartition temporelle des signaux. En complément, nous étudions les implémentations du changement aléatoire de l'adresse MAC sur des appareils récents, et trouvons un certain nombre de manquements limitant l'efficacité de ces implémentations à prévenir le traçage. En parallèle, nous effectuons deux études de terrain. La première s'attaque au développement des acteurs exploitant les problèmes cités plus haut afin d'installer des systèmes de traçage basés sur le Wi-Fi. Nous listons certaines de ces installations et examinons plusieurs aspects de ces systèmes : leur régulation, les implications en terme de vie privée, les questions de consentement et leur acceptation par le public. La seconde étude concerne la progression du changement aléatoire d'adresse MAC dans la population des appareils. Finalement, nous présentons deux outils : le premier est un système de traçage expérimental développé pour effectuer des tests et sensibiliser le public aux problèmes de vie privée liés à de tels systèmes. Le second estime l'unicité d'un appareil en se basant sur le contenu des signaux qu'il émet, même si leur identifiant est modifié. / The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using cheap hardware and basic knowledge. These signals contain a unique identifier, called the MAC address. To mitigate the threat, device vendors are currently deploying a countermeasure on new devices: MAC address randomization. Unfortunately, we show that this mitigation, in its current state, is insufficient to prevent tracking. To do so, we introduce several attacks, based on the content and the timing of emitted signals. In complement, we study implementations of MAC address randomization in some recent devices, and find a number of shortcomings limiting the efficiency of these implementations at preventing device tracking. At the same time, we perform two real-world studies. The first one considers the development of actors exploiting this issue to install Wi-Fi tracking systems. We list some real-world installations and discuss their various aspects, including regulation, privacy implications, consent and public acceptance. The second one deals with the spread of MAC address randomization in the devices population. Finally, we present two tools: an experimental Wi-Fi tracking system for testing and public awareness raising purpose, and a tool estimating the uniqueness of a device based on the content of its emitted signals even if the identifier is randomized.
9

Protocolo assíncrono de acesso ao meio iniciado pelo receptor para redes de sensores sem fio / Asynchronous receiver-initiated media access protocol for wireless sensor networks

Fernandes Junior, Renato Ferreira 29 June 2018 (has links)
A internet das coisas é considerada um novo sistema de comunicação que promete otimizar e melhorar diferentes áreas de aplicação com base em módulos sensores e objetos unicamente interligados através da internet. Em aplicações de redes de sensores sem fio em larga escala, as redes possuem características peculiares, como grande quantidade de módulos sensores de baixa potência, consumo limitado e perdas de comunicação intermitentes. Estas redes precisam operar com protocolos escaláveis e eficientes em termos de consumo de energia. Desta forma, esta tese propõe um protocolo multicanal assíncrono iniciado pelo receptor de acesso ao meio para redes de sensores sem fio de baixa potência para aplicações de internet das coisas. Através de uma comparação com soluções já existentes, o protocolo apresentado procura mitigar a colisão de mensagens e as perdas de energia com ociosidade na espera pela comunicação de um transmissor, através de um mecanismo de reconhecimento inicial eficiente. Adicionalmente, é proposto um diagnóstico efetivo de detecção de falha na comunicação ainda no ciclo de comunicação, de forma a auxiliar a economia de energia. Complementarmente, é proposto um mecanismo multicanal baseado no conhecimento do canal da vizinhança, além de serviços de inicialização e manutenção da rede. Para validação da proposta, o protocolo proposto foi comparado tanto com protocolos assíncronos multicanais iniciado pelo receptor quanto com protocolo síncrono relevantes na literatura científica. Os critérios de avaliação utilizados foram medição do consumo, latência e taxa de entrega da rede em diferentes cenários. Os resultados mostraram que o protocolo proposto minimiza o consumo de energia em relação aos protocolos assíncronos, além de melhorar a comunicação quando comparado aos protocolos analisados. Na comparação com o protocolo síncrono, demonstrou desempenho e consumo compatíveis, quando em período de trabalho menor, e consumo reduzido com períodos de trabalho maiores. / The Internet of Things is considered a new communication system that promises to optimize and improve different application areas. It is based on sensor modules and intelligent objects only interconnected through the internet. In large-scale wireless sensor network applications, networks have own specific characteristics such as many low-power, limited-power sensor modules with intermittent communication losses. These networks need to operate with scalable, energy-efficient protocols. Thus, this thesis proposes an asynchronous multichannel receiver-initiated MAC protocol for low power wireless sensor networks and internet of things applications. Through a comparison with already existing solutions, the proposed protocol tries to mitigate message containment and the effect of idle listening through an efficient initial recognition mechanism. It is also proposed an effective diagnosis of communication failure detection in the communication cycle, which also helps to save energy. In addition, a multichannel mechanism is proposed based on the knowledge of the neighborhood channel in addition to services of initialization and maintenance of the network. To validate the proposed protocol, evaluations were made for the consumption of each node sensor, the network traffic for each link, the latency and the network delivery rate in a web application. Tests were performed using asynchronous multichannel receiver-initiated and synchronous protocols based on literature scientific. The results show that the proposed protocol minimizes the energy consumption in relation to the asynchronous protocols, besides improving the communication when compared to the analyzed protocols. In the comparison with the synchronous protocol the proposed protocol showed performance and consumption compatible, when in a smaller duty cycles, and reduced consumption with longer duty cycles.
10

Protocolo assíncrono de acesso ao meio iniciado pelo receptor para redes de sensores sem fio / Asynchronous receiver-initiated media access protocol for wireless sensor networks

Renato Ferreira Fernandes Junior 29 June 2018 (has links)
A internet das coisas é considerada um novo sistema de comunicação que promete otimizar e melhorar diferentes áreas de aplicação com base em módulos sensores e objetos unicamente interligados através da internet. Em aplicações de redes de sensores sem fio em larga escala, as redes possuem características peculiares, como grande quantidade de módulos sensores de baixa potência, consumo limitado e perdas de comunicação intermitentes. Estas redes precisam operar com protocolos escaláveis e eficientes em termos de consumo de energia. Desta forma, esta tese propõe um protocolo multicanal assíncrono iniciado pelo receptor de acesso ao meio para redes de sensores sem fio de baixa potência para aplicações de internet das coisas. Através de uma comparação com soluções já existentes, o protocolo apresentado procura mitigar a colisão de mensagens e as perdas de energia com ociosidade na espera pela comunicação de um transmissor, através de um mecanismo de reconhecimento inicial eficiente. Adicionalmente, é proposto um diagnóstico efetivo de detecção de falha na comunicação ainda no ciclo de comunicação, de forma a auxiliar a economia de energia. Complementarmente, é proposto um mecanismo multicanal baseado no conhecimento do canal da vizinhança, além de serviços de inicialização e manutenção da rede. Para validação da proposta, o protocolo proposto foi comparado tanto com protocolos assíncronos multicanais iniciado pelo receptor quanto com protocolo síncrono relevantes na literatura científica. Os critérios de avaliação utilizados foram medição do consumo, latência e taxa de entrega da rede em diferentes cenários. Os resultados mostraram que o protocolo proposto minimiza o consumo de energia em relação aos protocolos assíncronos, além de melhorar a comunicação quando comparado aos protocolos analisados. Na comparação com o protocolo síncrono, demonstrou desempenho e consumo compatíveis, quando em período de trabalho menor, e consumo reduzido com períodos de trabalho maiores. / The Internet of Things is considered a new communication system that promises to optimize and improve different application areas. It is based on sensor modules and intelligent objects only interconnected through the internet. In large-scale wireless sensor network applications, networks have own specific characteristics such as many low-power, limited-power sensor modules with intermittent communication losses. These networks need to operate with scalable, energy-efficient protocols. Thus, this thesis proposes an asynchronous multichannel receiver-initiated MAC protocol for low power wireless sensor networks and internet of things applications. Through a comparison with already existing solutions, the proposed protocol tries to mitigate message containment and the effect of idle listening through an efficient initial recognition mechanism. It is also proposed an effective diagnosis of communication failure detection in the communication cycle, which also helps to save energy. In addition, a multichannel mechanism is proposed based on the knowledge of the neighborhood channel in addition to services of initialization and maintenance of the network. To validate the proposed protocol, evaluations were made for the consumption of each node sensor, the network traffic for each link, the latency and the network delivery rate in a web application. Tests were performed using asynchronous multichannel receiver-initiated and synchronous protocols based on literature scientific. The results show that the proposed protocol minimizes the energy consumption in relation to the asynchronous protocols, besides improving the communication when compared to the analyzed protocols. In the comparison with the synchronous protocol the proposed protocol showed performance and consumption compatible, when in a smaller duty cycles, and reduced consumption with longer duty cycles.

Page generated in 0.1772 seconds