• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 303
  • 109
  • 60
  • 54
  • 52
  • 25
  • 20
  • 15
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • Tagged with
  • 761
  • 256
  • 227
  • 150
  • 141
  • 121
  • 103
  • 89
  • 79
  • 73
  • 71
  • 70
  • 68
  • 61
  • 59
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
731

Analysis and improvement of medium access control protocols in wireless networks. Performance modelling and Quality-of-Service enhancement of IEEE 802.11e MAC in wireless local area networks under heterogeneous multimedia traffic.

Hu, Jia January 2010 (has links)
In order to efficiently utilize the scarce wireless resource as well as keep up with the ever-increasing demand for Quality-of-Service (QoS) of multimedia applications, wireless networks are undergoing rapid development and dramatic changes in the underlying technologies and protocols. The Medium Access Control (MAC) protocol, which coordinates the channel access and data transmission of wireless stations, plays a pivotal role in wireless networks. Performance modelling and analysis has been and continues to be of great theoretical and practical importance in the design and development of wireless networks. This research is devoted to developing efficient and cost-effective analytical tools for the performance analysis and enhancement of MAC protocols in Wireless Local Area Networks (WLANs) under heterogeneous multimedia traffic. To support the MAC-layer QoS in WLANs, the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) protocol has proposed three QoS differentiation schemes in terms of Arbitrary Inter-Frame Space (AIFS), Contention Window (CW), and Transmission Opportunity (TXOP). This research starts with the development of new analytical models for the TXOP scheme specified in the EDCA protocol under Poisson traffic. A dynamic TXOP scheme is then proposed to adjust the TXOP limits according to the status of the transmission queue. Theoretical analysis and simulation experiments show that the proposed dynamic scheme largely improves the performance of TXOP. To evaluate the TXOP scheme in the presence of ii heterogeneous traffic, a versatile analytical model is developed to capture the traffic heterogeneity and model the features of burst transmission. The performance results highlight the importance of taking into account the heterogeneous traffic for the accurate evaluation of the TXOP scheme in wireless multimedia networks. To obtain a thorough and deep understanding of the performance attributes of the EDCA protocol, a comprehensive analytical model is then proposed to accommodate the integration of the three QoS schemes of EDCA in terms of AIFS, CW, and TXOP under Poisson traffic. The performance results show that the TXOP scheme can not only support service differentiation but also improve the network performance, whereas the AIFS and CW schemes provide QoS differentiation only. Moreover, the results demonstrate that the MAC buffer size has considerable impact on the QoS performance of EDCA under Poisson traffic. To investigate the performance of EDCA in wireless multimedia networks, an analytical model is further developed for EDCA under heterogeneous traffic. The performance results demonstrate the significant effects of heterogeneous traffic on the total delay and frame losses of EDCA with different buffer sizes. Finally, an efficient admission control scheme is presented for the IEEE 802.11e WLANs based on analytical modelling and a game-theoretical approach. The admission control scheme can maintain the system operation at an optimal point where the utility of the Access Point (AP) is maximized with the QoS constraints of various users.
732

Performance Analysis of Virtualisation in a Cloud Computing Platform. An application driven investigation into modelling and analysis of performance vs security trade-offs for virtualisation in OpenStack infrastructure as a service (IaaS) cloud computing platform architectures.

Maiyama, Kabiru M. January 2019 (has links)
Virtualisation is one of the underlying technologies that led to the success of cloud computing platforms (CCPs). The technology, along with other features such as multitenancy allows delivering of computing resources in the form of service through efficient sharing of physical resources. As these resources are provided through virtualisation, a robust agreement is outlined for both the quantity and quality-of-service (QoS) in a service level agreement (SLA) documents. QoS is one of the essential components of SLA, where performance is one of its primary aspects. As the technology is progressively maturing and receiving massive acceptance, researchers from industry and academia continue to carry out novel theoretical and practical studies of various essential aspects of CCPs with significant levels of success. This thesis starts with the assessment of the current level of knowledge in the literature of cloud computing in general and CCPs in particular. In this context, a substantive literature review was carried out focusing on performance modelling, testing, analysis and evaluation of Infrastructure as a Service (IaaS), methodologies. To this end, a systematic mapping study (SMSs) of the literature was conducted. SMS guided the choice and direction of this research. The SMS was followed by the development of a novel open queueing network model (QNM) at equilibrium for the performance modelling and analysis of an OpenStack IaaS CCP. Moreover, it was assumed that an external arrival pattern is Poisson while the queueing stations provided exponentially distributed service times. Based on Jackson’s theorem, the model was exactly decomposed into individual M/M/c (c ≥ 1) stations. Each of these queueing stations was analysed in isolation, and closed-form expressions for key performance metrics, such as mean response time, throughput, server (resource) utilisation as well as bottleneck device were determined. Moreover, the research was extended with a proposed open QNM with a bursty external arrival pattern represented by a Compound Poisson Process (CPP) with geometrically distributed batches, or equivalently, variable Generalised Exponential (GE) interarrival and service times. Each queueing station had c (c ≥ 1) GE-type servers. Based on a generic maximum entropy (ME) product form approximation, the proposed open GE-type QNM was decomposed into individual GE/GE/c queueing stations with GE-type interarrival and service times. The evaluation of the performance metrics and bottleneck analysis of the QNM were determined, which provided vital insights for the capacity planning of existing CCP architectures as well as the design and development of new ones. The results also revealed, due to a significant impact on the burstiness of interarrival and service time processes, resulted in worst-case performance bounds scenarios, as appropriate. Finally, an investigation was carried out into modelling and analysis of performance and security trade-offs for a CCP architecture, based on a proposed generalised stochastic Petri net (GSPN) model with security-detection control model (SDCM). In this context, ‘optimal’ combined performance and security metrics were defined with both M-type or GE-type arrival and service times and the impact of security incidents on performance was assessed. Typical numerical experiments on the GSPN model were conducted and implemented using the Möbius package, and an ‘optimal’ trade-offs were determined between performance and security, which are crucial in the SLA of the cloud computing services. / Petroleum technology development fund (PTDF) of the government of Nigeria Usmanu Danfodiyo University, Sokoto
733

Providing QoS in Autonomous and Neighbor-aware multi-hop Wireless Body Area Networks

Iyengar, Navneet 15 October 2015 (has links)
No description available.
734

An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models

Miskeen, Guzlan M.A., Kouvatsos, Demetres D., Habib Zadeh, Esmaeil January 2013 (has links)
No / Security mechanisms, such as encryption and authentication protocols, require extra computing resources and therefore, have an adverse effect upon the performance of robotic mobile wireless ad hoc networks (RANETs). Thus, an optimal performance and security trade-off should be one of the main aspects that should be taken into consideration during the design, development, tuning and upgrading of such networks. In this context, an exposition is initially undertaken on the applicability of Petri nets (PNs) and queueing networks (QNs) in conjunction with their generalisations and hybrid integrations as robust quantitative modelling tools for the performance analysis of discrete flow systems, such as computer systems, communication networks and manufacturing systems. To overcome some of the inherent limitations of these models, a novel hybrid modelling framework is explored for the quantitative evaluation of RANETs, where each robotic node is represented by an abstract open hybrid G-GSPN_QN model with head-of-line priorities, subject to combined performance and security metrics (CPSMs). The proposed model focuses on security processing and state-based control and it is based on an open generalised stochastic PN (GSPN) with a gated multi-class 'On-Off' traffic and mobility model. Moreover, it employs a power consumption model and is linked in tandem with an arbitrary QN consisting of finite capacity channel queues with blocking for 'intra' robot component-to-component communication and 'inter' robot-to-robot transmission. Conclusions and future research directions are included.
735

Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks

Cho, Jin-Hee 10 December 2008 (has links)
Many mobile applications in wireless networks such as military battlefield, emergency response, and mobile commerce are based on the notion of secure group communications. Unlike traditional security protocols which concern security properties only, in this dissertation research we design and analyze a class of QoS-aware protocols for secure group communications in wireless networks with the goal to satisfy not only security requirements in terms of secrecy, confidentiality, authentication, availability and data integrity, but also performance requirements in terms of latency, network traffic, response time, scalability and reconfigurability. We consider two elements in the dissertation research: design and analysis. The dissertation research has three major contributions. First, we develop three "threshold-based" periodic batch rekeying protocols to reduce the network communication cost caused by rekeying operations to deal with outsider attacks. Instead of individual rekeying, i.e., performing a rekeying operation right after each group membership change event, these protocols perform batch rekeying periodically. We demonstrate that an optimal rekey interval exists that would satisfy an imposed security requirement while minimizing the network communication cost. Second, we propose and analyze QoS-aware intrusion detection protocols for secure group communications in mobile ad hoc networks to deal with insider attacks. We consider a class of intrusion detection protocols including host-based and voting-based protocols for detecting and evicting compromised nodes and examine their effect on the mean time to security failure metric versus the response time metric. Our analysis reveals that there exists an optimal intrusion detection interval under which the system lifetime metric can be best traded off for the response time performance metric, or vice versa. Furthermore, the intrusion detection interval can be dynamically adjusted based on the attacker behaviors to maximize the system lifetime while satisfying a system-imposed response time or network traffic requirement. Third, we propose and analyze a scalable and efficient region-based group key management protocol for managing mobile groups in mobile ad hoc networks. We take a region-based approach by which group members are broken into region-based subgroups, and leaders in subgroups securely communicate with each other to agree on a group key in response to membership change and member mobility events. We identify the optimal regional area size that minimizes the network communication cost while satisfying the application security requirements, allowing mobile groups to react to network partition/merge events for dynamic reconfigurability and survivability. We further investigate the effect of integrating QoS-aware intrusion detection with region-based group key management and identify combined optimal settings in terms of the optimal regional size and the optimal intrusion detection interval under which the security and performance properties of the system can be best optimized. We evaluate the merits of our proposed QoS-aware security protocols for mobile group communications through model-based mathematical analyses with extensive simulation validation. We perform thorough comparative analyses against baseline secure group communication protocols which do not consider security versus performance tradeoffs, including those based on individual rekeying, no intrusion detection, and/or no-region designs. The results obtained show that our proposed QoS-aware security protocols outperform these baseline algorithms. â / Ph. D.
736

[en] DEVELOPMENT, VALIDATION AND APPLICATION OF A FLEXIBLE TOOL FOR THE SIMULATION OF CELLULAR MOBILE SYSTEMS / [pt] DESENVOLVIMENTO, VALIDAÇÃO E APLICAÇÃO DE UMA FERRAMENTA FLEXÍVEL PARA A SIMULAÇÃO DE SISTEMAS MÓVEIS CELULARES

ILDELANO FERREIRA E SILVA 12 June 2002 (has links)
[pt] Este trabalho descreve uma ferramenta de simulação esenvolvida para analisar o gerenciamento dos recursos de rádio e parâmetros de QoS (Quality of Service) dos sistemas móveis celulares. Pela natureza de um sistema real de telefonia celular, é extremamente difícil que as variáveis de saída de um simulador sejam derivadas de um conjunto real de funções. Isso se deve à grande quantidade de parâmetros que devem ser considerados no comportamento da mobilidade, nas condições de tráfego, nas características geográficas e morfológicas da região, na modelagem complexa do canal rádio propagação móvel, entre outras. Visando a desenvolver uma ferramenta de simulação próxima da realidade, adotam-se modelos de propagação, de mobilidade e de tráfego que sejam satisfatoriamente adequados ao caso real. A contribuição deste trabalho é oferecer uma ferramenta de simulação flexível, aqui adequada ao sistema norte-americano TDMA (IS-136), que possibilite ao usuário, além de analisar a capacidade do sistema,também avaliar novos algoritmos de controle de potência, novas estratégias de handoff, novos esquemas de alocação de canal e modelos de propagação. A ferramenta será validada seguindo o processo de um projeto real de telefonia celular e ao final, será aplicada a um sistema celular com sobreposição macro-células/micro-células, analisando-se algumas estratégias de handoff dedicadas a esses sistemas. / [en] This work describes a simulation tool, which was developed to analyze the radio resources and QoS (Quality of Service) parameters in mobile systems. Because of the complex characteristics of an actual cellular network, it is extremely difficult having the outputs of the simulator being derived from a real set of functions, due to the large amount of parameters that have to be considered such as the mobility behavior, the traffic conditions, the geographic and morphologic characteristics of the region, the complex modeling of mobile radio propagation channel, and so on. In order to develop a simulation tool as near as possible to the reality, models that are satisfactorily adequate to the real case have been considered. So, propagation, mobility and traffic models were adapted from the IS-136 American system. The contribution of this work is to offer a flexible simulation tool that allows the user, in addition to analyzing the capacity of the system, to evaluate new algorithms of power control, handoff strategies, channel allocation schemes and propagation models. The tool will be validated following the process of a real project of cellular telephony and at the end, it will be applied to a cellular system with overlapped macro- cells/micro-cells, and some handoff strategies dedicated to those systems will be analyzed.
737

[en] DEVELOPMENT OF A SIMULATION TOOL FOR CELLULAR NETWORK PLANNING AND PERFORMANCE EVALUATION BASED ON THE SIGNALING LOAD / [pt] DESENVOLVIMENTO DE UMA FERRAMENTA DESIMULAÇÃO PARA PLANEJAMENTO E ANÁLISE DO DESEMPENHO DE REDES CELULARES A PARTIR DA CARGA DE SINALIZAÇÃO GERADA

RODRIGO CESAR D ALBRIEUX DE CARVALHO 14 June 2002 (has links)
[pt] Com o advento dos sistemas celulares de segunda e terceira gerações é esperado que as operadoras se vejam obrigadas a enfrentar um aumento dramático na carga de sinalização que trafega sobre a parte fixa da rede móvel. Apesar disso, são raros os provedores de serviços de comunicações móveis que possuem atualmente a capacidade de prever com relativa precisão o montante desse aumento. Este trabalho apresenta as etapas do desenvolvimento de uma ferramenta de simulação para análise de desempenho de redes de comunicação móvel celular com base na carga de sinalização gerada pelos procedimentos que a mantém em operação. A plataforma de simulação inclui um modelo de mobilidade e teletráfego para caracterizar o processo de geração dos cenários típicos de uma rede móvel celular e um modelo de retardos para representação da rede de sinalização. Ao final do estudo,são apresentados exemplos de aplicação da ferramenta na obtenção de resultados sobre gerência de status, gerência de localização, avaliação da carga de sinalização,dimensionamento da rede de sinalização e análise de desempenho para diferentes configurações de rede. / [en] The advent of second and third generation cellular systems make cellular operators face dramatic increase in the signaling traffic over the fixed part of the mobile network. In spite of this, rare mobile communications service providers are able to forecast the above mention increase and quantify it with reasonable precision. This work describes the development process of a simulation tool for performance analysis of cellular mobile network based on the signaling load generated by the procedures that keeps it working. The simulation platform inlcudes a mobility and teletraffic model to describe the generation process of cellular mobile networks tipical scenarios and a delay model to represent the signaling network. At the end, examples showing the application of the simulation tool to obtain results about status and location management, signaling load evaluation, signaling network planning and performance analysis for different network configurations are presented.
738

Integrated network application management (INAM)

Nelson, Mark D. 12 1900 (has links)
Approved for public release, distribution is unlimited / This thesis attempts to create a desire for change in DoD's current approach to Network Application Management (NAM). The evolution of NAM into Integrated Network Application Management (INAM) is a crucial component of Network Centric Warfare and achieving Information Superiority and Interoperability. INAM is outlined as three functional requirements, which are Network Awareness, Mission Prioritization linkage to Network Resources, and the Balancing of Service Management. Scenarios play a key role in illustrating the new threats that DoD faces today. These scenarios also identify limitations and challenges to NAM as it exists today. These challenges require significant improvements in flexibility and responsiveness, while providing for wide integration. Trends supporting change are identified in this thesis. Two of the more important trends are the rise of Architectural and Object Oriented Development. Examples such as Training and Testing Enabled Architecture (TENA), Surveillance and Target Acquisition Network (STAN), and Virtual Proving Ground (VPG) are clear examples of these trends. The merging of the Computer Industry's efforts to expand the reach of Operating Systems with the traditional efforts from Network Management is also a trend that is examined. Organizations like Distributed Management Task Force (DMTF) are important to such examinations. Successful change can not be achieved without planning for the transition. This thesis also presents some active transition efforts addressing Network Centric Warfare. TENA, VPG and Naval Postgraduate School's Information Technology Management Master's Program provide three examples of addressing transition in DoD. / Civilian, United States Army Yuma Proving Ground
739

Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans-fil, pour optimiser la qualité de service et l'énergie / Evaluation and enhancement of software platforms for wireless sensor networks, to optimize quality of service and energy consumption

Roussel, Kévin 03 June 2016 (has links)
Dans le domaine des réseaux de capteurs sans-fil (dits « WSN »), les piles réseau spécialisées constituent un domaine de recherche très actif depuis maintenant de nombreuses années. Toutefois, beaucoup de ces études, notamment concernant les couches basses de ces piles réseau, n’ont pas dépassé le stade de la théorie. Leurs implantations n’ont sauf exception pas fait l’objet d’efforts poussés ou systématiques, surtout dans le cadre des systèmes d’exploitation spécialisés. Nous nous proposons donc, dans cette thèse, de nous focaliser sur l’analyse des interactions entre les protocoles des couches basses et les plates-formes logicielles dédiées, et de les optimiser, notamment au niveau de l’implantation. Nous passons d’abord en revue et évaluons les différents systèmes d’exploitation spécialisés, et choisissons celui offrant les fonctionnalités, notamment temps-réel, que nous estimons nécessaires pour implanter des protocoles MAC / RDC novateurs et performants. Nous entreprenons ensuite un effort d’étude, d’amélioration et d’optimisation de ces couches basses des piles spécialisées, et montrons, avec une implantation concrète d’un de nos protocoles MAC / RDC avancés, que nous pouvons amener des progrès notables dans la qualité de service (QdS) des WSN, notamment avec un trafic réseau intense. Nous examinons en outre des inexactitudes inattendues dans les simulations / émulations effectuées par Cooja / MSPSim, et analysons les problèmes de fiabilité posés par l’utilisation de cet outil pour effectuer des évaluations de performances, notamment temporelles, de WSN. Nous proposons enfin de nouvelles pistes pour de futures améliorations et optimisations de ces couches basses des piles réseau spécialisées, afin d’améliorer encore la fiabilité, les performances et la consommation énergétique des WSN. / In the field of wireless sensors networks (WSN), specialized network stacks have been a very active research field for many years. However, most of this research, especially on lower layers of the network stacks, did not go beyond theory. Their implementations have generally not been the subject of deep or systematic effort, especially within the framework of dedicated operating systems. We thus propose, in this thesis, to focus on interaction analysis between lower layers’ protocols and dedicated software platforms, and to optimize them, especially at the implementation level. We first review and evaluate the various dedicated operating systems, and choose the one offering the necessary features to implement efficient and innovative MAC/RDC protocols. We then study, improve and optimize these lower layers of specialized stacks, and show, with an actual implementation of one of our advanced MAC/RDC protocols, that we can bring significant improvements in the quality of service (QoS) of WSNs, especially under heavy network traffic. We also report inaccuracies in Cooja/MSPSim simulations/emulations, and analyze the reliability issues caused by the use of this tool for performing evaluations (especially time-related) of WSNs. We finally propose some new leads for future enhancements and optimizations of the lower layers of these specialized network stacks, in order to further improve the liability, performances and energy consumption of WSNs.
740

Estratégias de planejamento de Smart Grids: uma abordagem baseada em meta-heurísticas e simulação

SANTOS, Ederson Costa dos 15 May 2017 (has links)
Submitted by Hellen Luz (hellencrisluz@gmail.com) on 2017-10-16T17:46:02Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_EstrategiasPlanejamentoSmart.pdf: 3494830 bytes, checksum: e201884feda341a4df9471c6c2e42d2a (MD5) / Approved for entry into archive by Edisangela Bastos (edisangela@ufpa.br) on 2017-11-14T16:15:10Z (GMT) No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_EstrategiasPlanejamentoSmart.pdf: 3494830 bytes, checksum: e201884feda341a4df9471c6c2e42d2a (MD5) / Made available in DSpace on 2017-11-14T16:15:10Z (GMT). No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_EstrategiasPlanejamentoSmart.pdf: 3494830 bytes, checksum: e201884feda341a4df9471c6c2e42d2a (MD5) Previous issue date: 2017-05-15 / Atualmente o Sistema Elétrico de Potência passa por grandes modificações, as quais concentram-se em diversos níveis e sub-níveis dos sub-sistemas de geração, transmissão e distribuição, todos concentrados a lógica de Smart Grids. Este conceito caracteriza-se pela inclusão das novas tecnologias digitais no sistema elétrico, com o intuito trazer segurança, velocidade, monitoramento, dentre outros muitos benefícios. Para pleno desenvolvimento das Smart Grids, muito ainda necessita ser feito em diversas áreas de pesquisa. Nesta linha, este trabalho apresenta simulações de um modelo de planejamento de Smart Grid, caracterizando-a a partir de protocolos, os quais são tendências para esse tipo de rede. Para isto, também foi analisado um método de otimização, que utiliza algoritmos inteligentes para otimização de dispositivo sem uma Smart Grid. A solução proposta se baseia na alocação otimizada de equipamentos em uma rede de comunicação, que utiliza como meio físico de transmissão de dados a própria fiação elétrica, tecnologia Power Line Communitation. Nesta rede são inseridas aplicações Smart Grid definidas através da International Eletrotechnical Commission (IEC) 61850. Assim, com esse modelo proposto, foram realizadas simulações no software de eventos discretos Network Simulator–3.Os resultados mostram uma diminuição significativa no quantitativo de equipamentos, mantendo os níveis de qualidade de serviço para as aplicações. / Currently, the Electric Power System undergoes major modifications, which focus on various levels and sub-levels of the generation, transmission and distribution subsystems, all of which are based on Smart Grids logic. This concept is characterized by the inclusion of new digital technologies in the electrical system, with the purpose of bringing security, speed, monitoring, among many other benefits. For the full development of Smart Grids, a lot still needs to be done in several areas of research. In this line, this work presents simulations of a Smart Grid planning model, characterizing it from protocols, which are trends for this type of network. For this, we also analyzed an optimization method, which uses intelligent algorithms to optimize devices in a Smart Grid. The proposed solution is based on the optimized allocation of equipment in acommunication network, which uses as its physical transmission medium its own electrical wiring, Power Line Communitation technology. In this network are inserted Smart Grid applications defined through IEC 61850. Thus, with this proposed model, simulations were performed in the Network Simulator-3 discrete event software. The results show a significant decrease in the quantity of equipment, maintaining the quality levels to the applications.

Page generated in 0.0327 seconds