• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 2
  • 1
  • Tagged with
  • 15
  • 15
  • 15
  • 11
  • 10
  • 10
  • 6
  • 6
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Reliable communication under mismatched decoding

Scarlett, Jonathan Mark January 2014 (has links)
No description available.
2

Wireless multiple access communication over collision frequency shift keyed channels

Xia, Chen. January 1900 (has links)
Thesis (Ph.D.)--University of Nebraska-Lincoln, 2007. / Title from title screen (site viewed Dec. 5, 2007). PDF text: xvi, 142 p. : ill. ; 5 Mb. UMI publication number: AAT 3273188. Includes bibliographical references. Also available in microfilm and microfiche formats.
3

Performance and control of CSMA wireless networks. / CUHK electronic theses & dissertations collection

January 2010 (has links)
Motivated by the fact that the contention graph associated with ICN is a Markov random field (MRF) with respect to the probability distribution of its system states, and that the belief propagation algorithm (BP) is an efficient way to solve "inference" problems in graphical models such as MRF, we study how to apply BP algorithms to the analysis and control of CSMA wireless networks. We investigate three applications: (1) computation of link throughputs given link access intensities; (2) computation of link access intensities required to meet target link throughputs; and (3) optimization of network utility via the control of link access intensities. We show that BP solves the three problems with exact results in tree networks and has manageable computation errors in a network with loopy contention graph. In particular, we show how a generalized version of BP, GBP, can be designed to solve the three problems above with higher accuracy. Importantly, we show how the BP and GBP algorithms can be implemented in a distributed manner, making them useful in practical CSMA network operation. / The above studies focus on computation and control of "equilibrium" link throughputs. Besides throughputs, an important performance measure in CSMA networks is the propensity for starvation. In this thesis, we show that links in CSMA wireless networks are particularly susceptible to "temporal" starvation. Specifically, certain links may have good equilibrium throughputs, yet they can still receive no throughput for extended periods from time to time. We develop a "trap theory" to analyze temporal throughput fluctuations. The trap theory serves two functions. First, it allows us to derive new mathematical results that shed light on the transient behavior of CSMA networks. Second, we can develop automated analytical tools for computing the "degrees of starvation" for CSMA networks to aid network design. We believe that the ability to identify and characterize temporal starvation as established in this thesis will serve as an important first step toward the design of effective remedies for it. / This thesis investigates the performance and control of CSMA wireless networks. To this end, an analytical model of CSMA wireless networks that captures the essence of their operation is important. We propose an Ideal CSMA Network (ICN) model to characterize the dynamic of the interactions and dependency of links in CSMA wireless networks. This model allows us to address various issues related to performance and control of CSMA networks. / We show that the throughput distributions of links in ICN can be computed from a continuous-time Markov chain and are insensitive to the distributions of the transmission time (packet duration) and the backoff countdown time in the CSMA MAC protocol given the ratio of their means rho, referred to as the access intensity. An outcome of the ICN model is a Back-of-the-Envelope (BoE) approximate computation method that allows us to bypass complicated stochastic analysis to compute link throughputs in many network configurations quickly. The BoE computation method emerges from ICN in the limit rho → infinity. Our results indicate that BoE is a good approximation technique for modest-size networks such as those typically seen in 802.11 deployments. Beyond serving as the foundation for BoE, the theoretical framework of ICN is also a foundation for understanding and optimization of large CSMA networks. / Kai, Caihong. / Adviser: Soung Chang Liew. / Source: Dissertation Abstracts International, Volume: 73-03, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (leaves 180-183). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
4

Protocol sequences for the collision channel without feedback. / CUHK electronic theses & dissertations collection

January 2010 (has links)
At last, we focus on the detection problem in the protocol sequence design. The objective is to construct user-detectable sequences that allow any active user be detected by the receiver via some algorithm within some bounded delay if and only if it has become active. / First of all, in order to minimize variation of throughput due to delay offsets, we investigate protocol sequences whose pairwise Hamming cross-correlation is a constant for all possible relative offsets. It can be viewed as a generalization of completely shift-invariant sequences, which can achieve the zero-variation in throughput over a slot-synchronized channel. / Provided that the number of active users is smaller than the number of potential users, strongly conflict-avoiding codes are introduced with the non-blocking property in the asynchronous channel. It can be viewed as an extension of completely irrepressible sequences. / The second one is a non-blocking property which ensures that each active user can successfully transmit information at least once in its each active period. With the assumption that all potential users may be active simultaneously, user-irrepressible sequences and completely irrepressible sequences are studied respectively for different level of synchronization, to support the non-blocking property. / This thesis is based on Massey's model on collision channels without feedback, in which collided packets are considered unrecoverable. A collision occurs if two or more packets are partially or totally overlapped. Each potential user is assigned a deterministic zero-one pattern, called the protocol sequence, and sends a packet if and only if it is active and the value of the sequence is equal to one. Due to lack of feedback, the beginning of the protocol sequences cannot be synchronized and variation in relative offsets is inevitable. It further yields variation in throughput. / We study the design of protocol sequences from three different perspectives. / Zhang, Yijin. / Adviser: Wing Shing Wong. / Source: Dissertation Abstracts International, Volume: 73-03, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (leaves 1116). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
5

Topics in resource allocation in wireless sensor networks

Li, Chaofeng (James) January 2008 (has links)
The focus of this thesis is on the resource allocation problems in wireless sensor and cooperative networks. Typically, wireless sensor networks operate with limited energy and bandwidth are often required to meet some specified Quality-of-Service (QoS) constraints. The ultimate objective for the majority of the problems considered in this thesis is to save battery energy and maximize the network lifetime. / In the first part of this thesis, we employ complex mathematical models to emulate a variety of power drains in wireless sensor nodes. In the first instance, we address a lifetime optimization problem of a wireless TDMA/CDMA sensor network for joint transmit power and rate allocations. The effect of fast fading is captured by including rate outage and link outage constraints on each link. After that, a single-hop wireless sensor network is deployed for a certain application - to estimate a Gaussian source within a pre-specified distortion threshold. In this part, we consider lifetime maximization, in different multiple access protocols such as TDMA, an interference limited non-orthogonal multiple access (NOMA) and an idealized Gaussian multiple access channel. This problem is further studied in a multi-hop scenario where sensing and receiving powers are also included in addition to transmission power. Finally, we investigate a balancing problem between the source coding and transmission power for video wireless sensor systems where the sensor node is required to send the collected video clips, through wireless media, to a base station within a corresponding distortion threshold. All these energy saving and lifetime optimization problems in sensor networks can be formulated via nonlinear nonconvex optimization problems, which are generally hard to solve. However, with favourable variable substitution and reasonable approximation, most of these problems are shown to be convex. The only exception is the Gaussian source esitmation problem in NOMA scenario for which we provide a simple successive convex approximation based algorithm for the NOMA case that converges fast to a suboptimal solution. / In the second part of the thesis, we propose an optimal power allocation scheme with a K-block coding delay constraint on data transmission using a three node cooperative relay network assuming a block fading channel model. Channel information is fed back to the transmitter only in a causal fashion, so that the optimal power allocation strategy is only based on the current and past channel gains. We consider the two simplest schemes for information transmission using a three node (a source, a relay and a destination) relay network, namely the amplify and forward (AF) and decode and forward (DF) protocols. We use the dynamic programming methodology to solve the (K-block delay constrained) expected capacity maximization problem and the outage probability minimization problem with a short term sum power (total transmission power of the source and the relay) constraint. / The main contribution of the thesis is a comprehensive suite of power minimization and lifetime maximization methods that can be used in wireless sensor networks. We present several such applications and extensive numerical examples at the end of each chapter.
6

Outage limited cooperative channels protocols and analysis /

Azarian Yazdi, Kambiz, January 2006 (has links)
Thesis (Ph. D.)--Ohio State University, 2006. / Title from first page of PDF file. Includes bibliographical references (p. 175-177).
7

Topics in resource allocation in wireless sensor networks

Li, Chaofeng (James) January 2008 (has links)
The focus of this thesis is on the resource allocation problems in wireless sensor and cooperative networks. Typically, wireless sensor networks operate with limited energy and bandwidth are often required to meet some specified Quality-of-Service (QoS) constraints. The ultimate objective for the majority of the problems considered in this thesis is to save battery energy and maximize the network lifetime. / In the first part of this thesis, we employ complex mathematical models to emulate a variety of power drains in wireless sensor nodes. In the first instance, we address a lifetime optimization problem of a wireless TDMA/CDMA sensor network for joint transmit power and rate allocations. The effect of fast fading is captured by including rate outage and link outage constraints on each link. After that, a single-hop wireless sensor network is deployed for a certain application - to estimate a Gaussian source within a pre-specified distortion threshold. In this part, we consider lifetime maximization, in different multiple access protocols such as TDMA, an interference limited non-orthogonal multiple access (NOMA) and an idealized Gaussian multiple access channel. This problem is further studied in a multi-hop scenario where sensing and receiving powers are also included in addition to transmission power. Finally, we investigate a balancing problem between the source coding and transmission power for video wireless sensor systems where the sensor node is required to send the collected video clips, through wireless media, to a base station within a corresponding distortion threshold. All these energy saving and lifetime optimization problems in sensor networks can be formulated via nonlinear nonconvex optimization problems, which are generally hard to solve. However, with favourable variable substitution and reasonable approximation, most of these problems are shown to be convex. The only exception is the Gaussian source esitmation problem in NOMA scenario for which we provide a simple successive convex approximation based algorithm for the NOMA case that converges fast to a suboptimal solution. / In the second part of the thesis, we propose an optimal power allocation scheme with a K-block coding delay constraint on data transmission using a three node cooperative relay network assuming a block fading channel model. Channel information is fed back to the transmitter only in a causal fashion, so that the optimal power allocation strategy is only based on the current and past channel gains. We consider the two simplest schemes for information transmission using a three node (a source, a relay and a destination) relay network, namely the amplify and forward (AF) and decode and forward (DF) protocols. We use the dynamic programming methodology to solve the (K-block delay constrained) expected capacity maximization problem and the outage probability minimization problem with a short term sum power (total transmission power of the source and the relay) constraint. / The main contribution of the thesis is a comprehensive suite of power minimization and lifetime maximization methods that can be used in wireless sensor networks. We present several such applications and extensive numerical examples at the end of each chapter.
8

MAC and routing protocols for multi-hop cognitive radio networks

Kondareddy, Yogesh Reddy, Agrawal, Prathima, January 2008 (has links) (PDF)
Thesis (M.S.)--Auburn University, 2008. / Abstract. Vita. Includes bibliographical references (p. 42-44).
9

EM-MAC : an energy-aware multi-channel medium access control protocol for multi-hop wireless networks

Sivanantha, Akhil 22 March 2012 (has links)
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access capabilities while minimizing energy consumption. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium contention on the common control channel, and to select the best available data channel for data communication. Our protocol saves energy by allowing devices that have not gained access to the medium to switch to doze mode until the channel becomes idle again. The pair of devices that gains access to the data channel reserves and uses the channel until the end of the reservation period. At the end of each reservation period, devices belonging to a given data channel contend again for the medium, and only the pair of devices that wins access to the medium is allowed to communicate on the channel while all other devices switch to doze mode. Using simulations, we show that EM-MAC yields substantial energy savings when compared with iMAC. / Graduation date: 2012
10

Spatial spectrum reuse in wireless networks design and performance

Kim, Yuchul 01 June 2011 (has links)
This dissertation considers the design, evaluation and optimization of algorithms/ techniques/ system parameters for distributed wireless networks specifically ad-hoc and cognitive wireless networks. In the first part of the dissertation, we consider ad-hoc networks using opportunistic carrier sense multiple access (CSMA) protocols. The key challenge in optimizing the performance of such systems is to find a good compromise among three interdependent quantities: the density and channel quality of the scheduled transmitters, and the resulting interference seen at receivers. We propose two new channel-aware slotted CSMA protocols and study the tradeoffs they achieve amongst these quantities. In particular, we show that when properly optimized these protocols offer substantial improvements relative to regular CSMA -- particularly when the density of nodes is moderate to high. Moreover, we show that a simple quantile based opportunistic CSMA protocol can achieve robust performance gains without requiring careful parameter optimization. In the second part of the dissertation, we study a cognitive wireless network where licensed (primary) users and unlicensed 'cognitive' (secondary) users coexist on shared spectrum. In this context, many system design parameters affect the joint performance, e.g., outage and capacity, seen by the two user types. We explore the performance dependencies between primary and secondary users from a spatial reuse perspective, in particular, in terms of the outage probability, node density and joint network capacity. From the design perspective the key system parameters determining the joint transmission capacity, and tradeoffs, are the detection radius (detection signal to interference and noise power ratio (SINR) threshold) and decoding SINR threshold. We show how the joint network capacity region can be optimized by varying these parameters. In the third part of the dissertation, we consider a cognitive network in a heterogeneous environment, including indoor and outdoor transmissions. We characterize the joint network capacity region under three different spectrum (white space) detection techniques which have different degrees of radio frequency (RF) - environment awareness. We show that cognitive devices relying only on the classical signal energy detection method perform poorly due to limitations on detecting primary transmitters in environments with indoor shadowing. This can be circumvented through direct use (e.g., database access) of location information on primary transmitters, or better yet, on that of primary receivers. We also show that if cognitive devices have positioning information, then the secondary network's capacity increases monotonically with increased indoor shadowing in the environment. This dissertation extends the recent efforts in using stochastic geometric models to capture large scale performance characteristics of wireless systems. It demonstrates the usefulness of these models towards understanding the impact of physical /medium access (MAC) layer parameters and how they might be optimized. / text

Page generated in 0.0584 seconds