• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 11
  • 7
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 56
  • 56
  • 22
  • 14
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Development of Mobile Ad-Hoc Network for Collaborative Unmanned Aerial Vehicles

Patibandla, Siva Teja 28 June 2013 (has links)
The purpose of this research was to develop a mobile ad-hoc network for collaborative Unmanned Aerial Vehicles (UAVs) based on a mesh networking standard called IEEE 802.11s. A low-cost, small form-factor, IEEE 802.11a based wireless modem was selected and integrated with the existing flight control system developed at Virginia Commonwealth University (VCU) UAV Laboratory. A self-configurable user-space application on the wireless modem was developed to provide functionality to collaborative algorithms, and to monitor the performance of the wireless network. The RAMS simulator, developed at VCU, was upgraded to support the simulation of advanced networking capabilities by integrating with a simulator called ns-3. The reconfigurability and performance of the IEEE 802.11s mesh network was validated and evaluated by conducting real-world flights. The results show that the IEEE 802.11s is a promising solution for collaborative UAV applications.
2

Návrh laboratorní úlohy zaměřené na protokol AODV / Design of laboratory tasks focused on the AODV protocol.

Hlavatý, Josef January 2018 (has links)
This diploma thesis focuses on the MANET Network (Mobile Ad-Hoc Network). There are theoretically elaborated basic information, the characteristics of the MANET network and great emphasis is placed on routing in these networks. In the next chapter the diploma thesis focuses on the Ad Hoc Demand Distance Vector (AODV) routing protocol. It features the characteristics of this protocol and the principle of communication and routing in MANET networks. Hereinafter, the individual reports of the AODV protocol are described in detail. In the third chapter, the thesis introduces the NS-3 simulation environment (network Simulator - 3) and then deals with the design of the MANET network in NS-3 using the AODV routing protocol. The practical part of the diploma thesis is the MANET network simulation and testing with the AODV routing protocol. Laboratory task is built from these simulations and the results of the testing.
3

Návrh laboratorní úlohy zaměřené na protokol OLSR / Design of laboratory tasks focused on the OLSR protocol.

Pecina, Martin January 2018 (has links)
An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to simplify communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered on time. Route construction should be done with a minimum of overhead and bandwidth consumption. This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The key concept used in the protocol is that of multipoint relays (MPRs). MPRs provide an efficient mechanism for flooding control traffic by reducing the number of transmissions required.
4

CDSSim - Multi UAV Communication and Control Simulation Framework

Mohini, Arshi 12 July 2019 (has links)
No description available.
5

Performance Evaluation of Optimal Rate Allocation Models for Wireless Networks

Padilla, Ryan Michael 13 April 2012 (has links) (PDF)
Convex programming is used in wireless networks to optimize the sending or receiving rates of links or flows in a network. This kind of optimization problem is formulated into a rate allocation problem, where each node in the network will distributively solve the convex problem and all links or flows will converge to their optimal rate. The objective function and constraints of these problems are represented in a simplified model of contention, interference, and sending or receiving rates. The Partial Interference model is an optimal rate allocation model for use in wireless mesh networks that has been shown to be theoretically superior to other conceptual models. This paper compares the Partial Interference model to three other models of wireless networks using the ns-3 simulator to verify these claims. It discusses where the model works as expected, where the model fails to improve network utility, and the limitations inherent to its use.
6

Laboratorní úlohy v prostředí NS3 pro předmět Pokročilé komunikační techniky / Laboratory exercises in NS3 enviroment for Advanced communication technology course

Vadkerti, Gabriel January 2015 (has links)
This master thesis deals with creating laboratory exercises for students in simulator NS-3, where the IPv4 and IPv6 protocols, unicast and multicast transmission types, quality of services in wireless networks, furthermore protocols TCP and UDP are analyzed. The first section describes the NS-3 network simulator, the Eclipse development environment and the method how to connect them. In the next section protocols IPv4 and IPv6 are presented, the structure of the headers and the technique of fragmentation are described in detail. Based on this a laboratory exercise is created which deals with comparison of protocols IPv4 and IPv6. In the next section the types of transmissions are described, furthermore the multicast transmission type is explained more in detail. In the next practical section the second laboratory exercise is created, which deals with comparison of unicast and multicast transmission types. The subject of the following section is ensuring quality of services in data networks, the EDCA access method is discussed more in detail. In the next section the EDCA access method is implemented in a simulation as a laboratory exercise, in which the impact of the access category of EDCA to different transmission parameters is investigated. The next section deals with protocols TCP and UDP, furthermore with the structure of their headers. In the last section a laboratory exercise is created, in which the properties of the protocols TCP and UDP are compared.
7

HTR Heterogeneous Routing Protocol, um protocolo de roteamento para redes ad hoc heterogêneas

AMORIM, Rodrigo Diego Melo 31 January 2011 (has links)
Made available in DSpace on 2014-06-12T15:58:24Z (GMT). No. of bitstreams: 2 arquivo4095_1.pdf: 1892388 bytes, checksum: 36bca1d45a0d20795951c6d7db402746 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2011 / Faculdade de Amparo à Ciência e Tecnologia do Estado de Pernambuco / A popularidade de dispositivos móveis como meio de comunicação tem crescido nos últimos anos devido à facilidade de uso, custo e as mais variadas tecnologias. O aumento no número dessas opções como WiFi, Bluetooth ou até mesmo rede de telefonia móvel permitem uma maior conectividade desses dispositivos móveis na rede. Determinadas tarefas, como compartilhamento de stream de vídeo, implicam diferentes requisitos, o que pode requerer diferentes tecnologias de rede. Nos cenários de emergência, que incluem operações militares, força-tarefa para desastres e grupos de busca e resgate, onde se pressupõe a ausência de infraestrutura, o uso de redes sem fio e a permanente conectividade podem ser requisitos essenciais para realização de algumas tarefas. Para tanto o uso de um protocolo de roteamento que seja adequado a esse ambiente é de fundamental importância. Este trabalho faz um estudo comparativo de um novo protocolo de roteamento para redes heterogêneas ad hoc, chamado Heterogeneous Routing Protocol ou simplesmente HTR, focado em cenários de emergência, com um dos protocolos de roteamento para redes ad hoc mais usado, o OLSR. A fim de fazer uma análise robusta e escalável, o protocolo HTR foi implementado no simulador NS-3 e comparado ao OLSR através de métricas como taxa de entrega, atraso, pacotes perdidos, entre outros
8

Analýza vehicular ad hoc sítě / Analysis of vehicular ad hoc network

Varmus, Pavol January 2019 (has links)
This diploma thesis aims to study VANET (vehicular ad hoc network), to describe the theory of this networks and describe attributes of these networks and to set the starting point for practical part. Thesis includes VANETs possibilities, its signal transportation and description of routing protocols. Another goal was to familiarize program NS-3 and set up simulation models in its interface. The main output of the practical part is program which simulates vehicle movement in Brno city and set the communication module which is adapted to fulfill the most realistic transmission capabilities. Practical part is divided to two parts. The goal of the first one was to simulate basic communication in theorized unrealistic scenario and the second part was the more realistic scenario. Overall, throughout the practical part was tested a variety of attributes, such as mobility models, standards, routing protocols and other parameters that provided diversity in final results. All the results, which consisted of summary of basic transmission capabilities and reclassification of the applicability of those technologies in real world, are discussed in the summary of the simulations output.
9

Návrh nových laboratorních úloh pro výuku principů komunikačních protokolů / Creation of new laboratory exercises explaining the principles of communication protocols

Babjarčiková, Lenka January 2021 (has links)
The aim of this master thesis is to create two laboratory exercises in ns-3 network simulator for chosen communication protocols. The chosen protocols are BGP and ICMPv6. The first part of this thesis contains teoretical knowledge used in order to design laboratory exercise. It contains descriptions of funcionality of both protocols and messages they use. This chapter also includes brief description of three options which were considered for implementation of BGP protocol into ns-3 enviroment. The second chapter consists of actual laboratory exercises which were created as a purpose of this thesis. Exercise for BGP protocol deals with creating neighborhoods between routers at autonomous system level, analyzing the way routers communicate within their neighborhoods and how protocol reacts when the connection between two neighbor routers fails. Exercise created for ICMPv6 protocol is focused on its messages and their usage within multiple protocol funcionalities, such as address configuration, link address resolution and error detection.
10

Network AIS-based DDoS attack detection in SDN environments with NS-3

Jevtic, Stefan G. 21 July 2017 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / With the ever increasing connectivity of and dependency on modern computing systems, our civilization is becoming ever more susceptible to cyberattack. To combat this, identifying and disrupting malicious traffic without human intervention becomes essential to protecting our most important systems. To accomplish this, three main tasks for an effective intrusion detection system have been identified: monitor network traffic, categorize and identify anomalous behavior in near real time, and take appropriate action against the identified threat. This system leverages distributed SDN architecture and the principles of Artificial Immune Systems and Self-Organizing Maps to build a network-based intrusion detection system capable of detecting and terminating DDoS attacks in progress.

Page generated in 0.0169 seconds