• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 79
  • 79
  • 56
  • 24
  • 18
  • 18
  • 12
  • 12
  • 11
  • 11
  • 10
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Lessons Learned Constructing the NG-Mesh Wireless Test-Bed

Ng, WK Stanley 10 1900 (has links)
<p>This thesis presents the lessons learned from building an IEEE 802.11 wireless mesh network (WMN) test-bed. Each network node consists of a Linux processor with multiple IEEE 802.11b/g transceivers operating in the 2.4 GHz band. Each transceiver consists of a medium access control (MAC) and base-band processor (BBP) in addition to a radio. A device driver was modified to control some of the key transceiver functions. The test-bed's Wi-Fi interfaces can be programmed to implement any mesh communication topology. All Wi-Fi interfaces use omni-directional antennas and the IEEE 802.11b operation mode.</p> <p>The test-bed design is easily extendable to incorporate newer Wi-Fi technologies. Measurements of co-channel interference in each Wi-Fi channel including received signal strength (RSS) and signal-to-interference-and-noise ratio (SINR) are presented. The AutoMin algorithm was developed in order to use the captured physical layer (PHY) metrics to avoid Wi-Fi congestion during test-bed operation. A comparison of a software-based spectrum analyzer to a commercial one is described. Key Wi-Fi functions in the Ralink driver source code are explored in depth. The compliance of the Ralink chip-set to the IEEE 802.11b spectral mask was verified. The maximum driver-induced retuning rate for the popular Ralink radio was found experimentally. This data can be used to optimize the performance of IEEE 802.11 WMNs.</p> / Master of Applied Science (MASc)
42

Channel Time Allocations and Handoff Management for Fair Throughput in Wireless Mesh Networks

Qin, Lei 10 1900 (has links)
<p>In this thesis we study a wireless mesh network (WMN), where a number of access points (APs) form a wireless infrastructure and provide communications to the mobile stations (MSs). Different APs share the same frequency channel. We study how to provide fair throughput for the MSs while efficiently utilizing the channel resources through effective handoff management and channel timeline allocations.</p> <p>In the first part of the thesis, we assume that the channel time allocations at the AP level are given, and jointly consider the handoff management of the MSs and the channel time allocations at the MS level. An optimization problem is formulated based on long-term proportional fairness (PF) and solved. A heuristic distributed scheme is then proposed, which can be easily implemented in a practical WMN.</p> <p>In the second part, we jointly study the channel time allocations at the AP level and the MS level together with the MS handoff management. An optimization problem is first formulated and solved as a benchmark. Two distributed schemes are proposed by decoupling the handoff management and time allocations. The HO-CA scheme performs heuristic handoff decisions for the MSs and then optimizes the channel time allocations. The CA-HO scheme allocates the channel time to individual APs based on the neighboring relationship of the APs, and then makes handoff.</p> <p>Numerical results indicate that our proposed distributed schemes can achieve close-to-optimum fairness, improve the network utilization and balance the traffic load under uneven MSs geographical distributions.</p> / Master of Applied Science (MASc)
43

Threat and Application of Frequency-Agile Radio Systems

Zeng, Kexiong 16 November 2018 (has links)
As traditional wireless systems that only operate on fixed frequency bands are reaching their capacity limits, advanced frequency-agile radio systems are developed for more efficient spectrum utilization. For example, white space radios dynamically leverage locally unused TV channels to provide high-speed long-distance connectivity. They have already been deployed to connect the unconnected in rural areas and developing countries. However, such application scenarios are still limited due to low commercial demand. Hence, exploring better applications for white space radios needs more effort. With the benefits come the threats. As frequency-agile radio systems (e.g., software-defined radios) are flexible and become extremely low-cost and small-sized, it is very convenient for attackers to build attacking tools and launch wireless attacks using these radios. For example, civilian GPS signals can be easily spoofed by low-cost portable spoofers built with frequency-agile radio systems. In this dissertation, we study both the threat and application of frequency-agile radio systems. Specifically, our work focuses on the spoofing threat of frequency-agile radio towards GPS-based systems and the application of TV white space radio for ocean communications. Firstly, we explore the feasibility of using frequency-agile radio to stealthily manipulate GPS-based road navigation systems without alerting human drivers. A novel attacking algorithm is proposed, where the frequency-agile radio transmits fake GPS signals to lead the victim to drive on a wrong path that looks very similar with the navigation route on the screen. The attack's feasibility is demonstrated with real-world taxi traces in Manhattan and Boston. We implement a low-cost portable GPS spoofer using an off-the-shelf frequency-agile radio platform to perform physical measurements and real-world driving tests, which shows the low level of difficulty of launching the attack in real road environment. In order to study human-in-the-loop factor, a deceptive user study is conducted and the results show that 95% of the users do not recognize the stealthy attack. Possible countermeasures are summarized and sensor fusion defense is explored with preliminary tests. Secondly, we study similar GPS spoofing attack in database-driven cognitive radio networks. In such a network, a secondary user queries the database for available spectrum based on its GPS location. By manipulating GPS locations of surrounding secondary users with a frequency-agile radio, an attacker can potentially cause serious primary user interference and denial-of-service to secondary users. The serious impact of such attacks is examined in simulations based on the WhiteSpaceFinder spectrum database. Inspired by the characteristics of the centralized system and the receiving capability of cognitive radios, a combination of three defense mechanisms are proposed to mitigate the location spoofing threat. Thirdly, we explore the feasibility of building TV white space radio based on frequency-agile radio platform to provide connectivity on the ocean. We design and implement a low-cost low-power white space router ($523, 12 watts) customized for maritime applications. Its communication capability is confirmed by field link measurements and ocean-surface wave propagation simulations. We propose to combine this radio with an energy harvesting buoy so that the radio can operate independently on the ocean and form a wireless mesh network with other similar radios. / PHD / As traditional wireless systems, such as mobile phones and WiFi access points, only operate on some fixed frequency bands, it becomes increasingly crowded for those popular bands. Hence, for more efficient frequency resource utilization, frequency-agile radio systems that can dynamically operate on different frequency bands are developed. With these new technologies come new threats and applications, which are the focus of our work. On the one hand, as frequency-agile radio systems become low-cost and portable, attackers can easily launch wireless attacks with them. For example, we explored the feasibility, impact, and countermeasures for GPS spoofing attacks using frequency-agile radio systems in different scenarios. In a GPS spoofing attack, an attacker transmits false GPS signals to manipulate users’ GPS receivers. This kind of attack can be very dangerous and even life-threatening if it is launched against critical GPS-based applications. For example, once GPS-based navigation systems in self-driving cars are stealthily manipulated by remote attackers, attackers can divert self-driving cars to pre-defined destinations or dangerous situations like wrong-way driving on highway. On the other hand, since there is rich under-utilized spectrum resource in remote areas with no broadband connection yet, frequency-agile radio systems can be used to provide broadband internet connectivity there. For example, based on frequency-agile radio platform, we developed a low-cost low-power wireless router that can dynamically operate on TV broadcasting band. It is able to provide high-speed wireless connection to a large area on the ocean. This technology has the potential to bring low-cost high-speed connection to people and industry on the ocean, which will facilitate various maritime applications.
44

A Mesh Architecture for Robust Packet Delivery in Airborne Networks

Fu, Bo 15 August 2008 (has links)
As a special subset of ad hoc networks, airborne networks aim to provide efficient network access for airborne and ground assets in a tactical environment. Conventional ad hoc routing protocols face some difficulties in such networks. First, significant overhead may be generated due to the high node mobility and dramatic topology changes. Second, temporary link failure may abort the delivery of a packet in some intermediate router. In this thesis, we propose a cluster-based reactive routing protocol to alleviate these problems. Our solution takes advantage of mesh routers installed in unmanned aerial vehicles or aircraft capable of hovering, when such airborne assets are available. As those mesh points usually have relatively stable connections among themselves, they play the role of cluster heads, forming a hierarchical routing structure. A simple self-organizing rule is introduced in cluster management to limit the cluster control overhead and route discovery flooding. In addition, a disruption tolerant mechanism (DTM) is deployed in the routing protocol to increase resilience to temporary link or node failure. The DTM utilizes the location, bearing and speed information provided by each node and intelligently maintains a buffer of packets that cannot be immediately delivered. If a temporary link failure occurs in the intermediate router during delivery, the packet is then buffered in that router up to a maximum time-to-live. The DTM also keeps track of link changes and tries to deliver the message as soon as a new path toward the destination is found. If the buffered messages are about to time out and the destination is still unreachable, the DTM still makes an effort to deliver the packet to another router with higher probability of eventually reaching the destination. This thesis also presents an implementation of the proposed solution in the ns-2 network simulator. The conventional Ad hoc On-Demand Distance Vector (AODV) routing protocol is adopted as the base model in the implementation. A mesh router model is programmed with two wireless interfaces. One of the interfaces is utilized to exchange routing information and packets with cluster members; the other is used to communicate with other mesh routers. This model is then installed on top of the AODV routing protocol and forms the hierarchical routing structure. The traditional AODV messages, including RREQ, RREP and HELLO, and routing tables are modified to support additional location information. Finally, the DTM is programmed and added to the AODV buffer management. The objective of this research is to use a mesh structure and DTM to improve the reliability and performance of airborne networks. The metrics of throughput and routing overhead are taken into consideration. The simulation results demonstrate that the proposed solution satisfies our research objectives. It achieves better performance than the conventional AODV, but introduces little overhead. The mesh structure can effectively adapt to high mobility, dynamic topology and different routing capabilities. The DTM provides a sophisticated way to maintain the buffer and mitigates the impact of intermittent links. / Master of Science
45

Comparing Cloud Architectures in terms of Performance and Scalability

Jääskeläinen, Perttu January 2019 (has links)
Cloud Computing is becoming increasingly popular, with large amounts of corporations revenue coming in from various cloud solutions offered to customers. When it comes to choosing a solution, multiple options exist for the same problem from many competitors. This report focuses on the ones offered by Microsoft in their Azure platform, and compares the architectures in terms of performance and scalability.In order to determine the most suitable architecture, three offered by Azure are considered: Cloud Services (CS), Service Fabric Mesh (SFM) and Virtual Machines (VM). By developing and deploying a REST Web API to each service and performing a load test, average response times in milliseconds are measured and compared. To determine scalability, the point at which each service starts timing out requests is identified. The services are tested both by scaling up, by increasing the power of a single instance of a machine, and by scaling out, if possible, by duplicating instances of machines running in parallel.The results show that VMs fall considerably behind both CS and SFM in both performance and scalability, for a regular use case. For low amounts of requests, all services perform about the same, but as soon as the requests increase, it is clear that both SFM and CS outperform VMs. In the end, CS comes ahead both in terms of scalability and performance.Further research may be done into other platforms which offer the same service solutions, such as Amazon Web Services (AWS) and Google Cloud, or other architectures within Azure. / Molntjänster blir alltmer populära i dagens industri, där stora mängder av företagens omsättning består av tjänster erbjudna i form av molnlösningar. När det kommer till att välja en lösning finns många för samma problem, där det är upp till kunden att välja vilken som passar bäst. Denna rapport fokuserar på tjänster erbjudna av Microsofts Azure plattform, i en jämförelse av arkitekturer som belastningstestas för att mäta prestanda och skalbarhet.För att avgöra vilken arkitektur som är optimalast mäts tre olika tjänster erbjudna i Azure: Cloud Services (CS), Service Fabric Mesh (SFM) och Virtual Machines (VM). Detta görs genom att utveckla och deploya ett REST Web API som är simulerat med användare, där prestanda mäts genom att ta medelresponstiden i millisekunder per anrop. För att avgöra skalbarhet identifieras en punkt där tjänsten inte längre klarar av antalet inkommande anrop och börjar returnera felkoder. Maskinerna för varje tjänst testas både genom att skala upp, genom att förstärka en maskin, men även genom att skala ut, där det skapas flera instanser av samma maskin.Resultatet visar att Virtual Machines hamnar betydligt efter både CS och SFM i både prestanda och skalbarhet för ett vanligt användarfall. För låga mängder anrop ligger samtliga tjänster väldigt lika, men så fort anropen börjar öka så märks det tydligt att SFM och CS presterar bättre än Virtual Machines. I slutändan ligger CS i framkant, både i form av prestanda och skalbarhet.Vidare undersökning kan göras för de olika plattformarna erbjudna av konkurrenter, så som Amazon Web Services (AWS) och Google Cloud, samt andra arkitekturer från Azure.
46

無線網狀網路多元速率下的多跳接路徑容納量與延遲之研究與分析 / A Study on Multi-rate Multi-hop Path Capacity and Delay in Wireless Mesh Networks

蔡承璋, Tsai, Cheng-Chang Unknown Date (has links)
近年來興起一個前瞻性無線技術,稱之為無線網狀網路(Wireless Mesh Networks;WMNs) 以所費低廉方式提供無線網路最後一哩存取Internet,同時具備ad hoc網路全部優點。例如自我組織(self-organization)、自我組態(self-configuration)等。而802.11協議已經納入802.11s草案。雖然802.11的實體層支持多元速率,大多數研究為了簡化多假設在單一速率的情況下。但事實上,802.11可以支援的Automatic Rate Fallback (ARF)多元速率演算法;換句話說,由於信號雜訊比和資料錯誤率的不同,資料傳輸速率將自動調整。在這裡,我們假定在WMNs上使用 802.11協定,並且考慮路徑容量,延遲,流量公平及多元速率多跳接的環境。為了設法指出和改善這方面的議題,我們提出了經由改進802.11競爭視窗和加權公平調度機制的跨階層設計。透過一系列的模擬指出問題並找出合適的解決方案。結果顯示,如果增加低速率連結的優先權和考慮流量公平問題,容量及延遲將得到改善。 / A new promising wireless technology has emerged recently, called wireless mesh networks (WMNs). WMNs are an inexpensive way to provide wireless last-mile broadband Internet access and have all the advantages of ad hoc networks, such as self-organization, self-configuration. IEEE 802.11 MAC protocol has been adopted in 802.11s draft. Although IEEE 802.11 physical layer supports multiple rates, most researches assume single rate environment for simplicity. However, in reality, 802.11 adopts automatic rate fallback (ARF) multi-rate algorithm. In other words, the data rate will be automatically adjusted due to its signal-to-noise ratio, or error rate. Here, we assume the fitness of IEEE 802.11 over WMNs, and considering path capacity, delay, flow fairness, in multi-hop multi-rate environments. They all are affected by data rates on the links along the path. In order to address and improve the above issues, we propose a cross layer scheme which is modified by the contention window of IEEE 802.11 DCF MAC and weighted fairness scheduling mechanism. We point out the problem and find out the suitable solution via a series of scenarios simulations. The results show that if increasing the priority of the low data link and taking care about flow fairness problem, the capacity and delay will be improved.
47

Achieving Soft Real-time Guarantees for Interactive Applications in Wireless Mesh Networks

Reid, Cecil 22 January 2008 (has links)
The use of 802.11-based multi-hop wireless mesh networks for Internet access is extensive and growing. The primary advantages of this approach are ease of deployment and lower cost. However, these networks are designed for web and e-mail applications. Highly interactive applications, such as multiplayer online games and VoIP, with their requirements for low delay, present significant challenges to these networks. In particular, the interaction between real-time traffic and TCP traffic tends to result in either a failure of the real-time traffic getting its needed QoS or the TCP traffic unnecessarily experiencing very poor throughput. To solve this problem we place real-time and TCP traffic into separate queues. We then rate-limit TCP traffic based on the average queue size of the local or remote real-time queues. Thus, TCP traffic is permitted to use excess bandwidth as long as it does not interfere with real-time traffic guarantees. We therefore call our scheme Real-time Queue-based Rate and Admission Control, RtQ-RAC. Extensive simulations using the network simulator, ns-2, demonstrate that our approach is effective in providing soft real-time support, while allowing efficient use of the remaining bandwidth for TCP traffic.
48

Achieving Soft Real-time Guarantees for Interactive Applications in Wireless Mesh Networks

Reid, Cecil 22 January 2008 (has links)
The use of 802.11-based multi-hop wireless mesh networks for Internet access is extensive and growing. The primary advantages of this approach are ease of deployment and lower cost. However, these networks are designed for web and e-mail applications. Highly interactive applications, such as multiplayer online games and VoIP, with their requirements for low delay, present significant challenges to these networks. In particular, the interaction between real-time traffic and TCP traffic tends to result in either a failure of the real-time traffic getting its needed QoS or the TCP traffic unnecessarily experiencing very poor throughput. To solve this problem we place real-time and TCP traffic into separate queues. We then rate-limit TCP traffic based on the average queue size of the local or remote real-time queues. Thus, TCP traffic is permitted to use excess bandwidth as long as it does not interfere with real-time traffic guarantees. We therefore call our scheme Real-time Queue-based Rate and Admission Control, RtQ-RAC. Extensive simulations using the network simulator, ns-2, demonstrate that our approach is effective in providing soft real-time support, while allowing efficient use of the remaining bandwidth for TCP traffic.
49

Time-synchronized wireless mesh networks using battery-powered nodes

Karlsson, Leif January 2018 (has links)
This thesis proposes an implementation of battery-powered, time-synchronized wireless nodes that can be deployed in a wireless network topology. Wireless sensor networks are used in a wide variety of scenarios where emphasis is placed on the wireless nodes’ battery life. The main area of focus in this thesis is to examine how wireless nodes can save battery power by utilizing a deep sleep mode and wake up simultaneously using time synchronization to carry out their data communication. This was achieved by deploying five time-synchronized, battery-powered nodes in a wireless network topology. The difference in battery current draw between continuously running nodes and sleep-enabled nodes were measured, as well as the time duration needed by the nodes to successfully send their payloads and route other nodes’ data. The nodes needed between 1502 ms and 3273 ms on average to carry out their data communication, depending on where they were located in the network topology. Measurements show that sleep-enabled nodes on average draw substantially less current than continuously running nodes during a complete data communication cycle. When sleep-enabled nodes were powered by two AA batteries, an increase in battery life of up to 1800% was observed.
50

Situation-aware routing for wireless mesh networks with mobile nodes

Kobo, Hlabishi January 2012 (has links)
Magister Scientiae - MSc / This thesis demonstrates that a situation-aware algorithm improves quality of service on small mesh networks running BATMAN-adv with some mobile nodes. BATMAN-adv is a proactive mesh routing protocol that counts beacons as a link quality metric. BATMAN-adv was modi ed to give more recently received beacons more weight, thereby calculating a more precise indication of the current state of a link that BATMAN-adv can use to forward packets. BATMAN-adv `original' was compared with a situation-aware version in two laboratory test beds with the same voice traffic profile on actual hardware with a realistic voice traffic profile; with controlled transmission rates and buffer sizes to simulate congestion. The second test bed included mesh potatoes, PCs and laptops as mobile nodes. BATMAN-adv achieved better jitter and packet loss than the situation-aware version in the initial, smaller test bed, and average throughput for both versions was almost identical. However, in the second slightly larger test bed, with additional mobile nodes, the situation-aware algorithm performed better than the original BATMAN-adv algorithm for all quality of service metrics, including throughput. Thus the thesis concludes that a situation-aware protocol offers a promising solution to address issues pertaining to mobility, congestion and scalability for voice traffic in mesh networks with mobile nodes. / South Africa

Page generated in 0.048 seconds