• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 209
  • 23
  • 9
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 274
  • 274
  • 98
  • 93
  • 91
  • 88
  • 50
  • 46
  • 42
  • 41
  • 33
  • 26
  • 26
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Design and analysis of handoff schemes for VoIP over wireless LANs. / Design & analysis of handoff schemes for VoIP over wireless LANs

January 2006 (has links)
Chui Sai Kit. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 73-77). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Introduction --- p.1 / Chapter 1.2 --- Wireless LAN --- p.3 / Chapter 1.2.1 --- Ad Hoc Mode --- p.3 / Chapter 1.2.2 --- Infrastructure Mode --- p.3 / Chapter 1.3 --- Handoff --- p.4 / Chapter 1.3.1 --- IP Layer Handoff --- p.5 / Chapter 1.3.2 --- MAC Layer Handoff --- p.6 / Chapter 1.4 --- Voice over Internet Protocol (VoIP) --- p.6 / Chapter 1.5 --- Significance of Research Outcomes --- p.8 / Chapter 1.6 --- Outline of Thesis --- p.10 / Chapter 2 --- Background Study --- p.11 / Chapter 2.1 --- Handoff Process --- p.12 / Chapter 2.2 --- MAC Layer Handoff --- p.12 / Chapter 2.2.1 --- MAC Layer Handoff Process --- p.12 / Chapter 2.2.2 --- MAC Layer Handoff Scheme --- p.16 / Chapter 2.3 --- IP Layer Handoff --- p.20 / Chapter 2.3.1 --- IP Layer Handoff Process --- p.20 / Chapter 2.3.2 --- IP Layer Handoff Scheme --- p.22 / Chapter 2.4 --- Chapter Summary --- p.25 / Chapter 3 --- AP Coordination System and Performance Analysis for Sync-Scan --- p.26 / Chapter 3.1 --- Introduction --- p.26 / Chapter 3.2 --- Problem Formulation --- p.27 / Chapter 3.3 --- Fast Handoff Scheme --- p.27 / Chapter 3.3.1 --- Access Point Coordination System --- p.28 / Chapter 3.3.2 --- Simulation Results --- p.30 / Chapter 3.3.3 --- Further Discussion --- p.33 / Chapter 3.3.4 --- Improved Handoff Process --- p.34 / Chapter 3.4 --- SyncScan Performance Analysis --- p.36 / Chapter 3.4.1 --- Beacon Delay --- p.36 / Chapter 3.4.2 --- Handoff Latency --- p.38 / Chapter 3.5 --- Chapter Summary --- p.41 / Chapter 4 --- Handoff Control Message Analysis --- p.43 / Chapter 4.1 --- Introduction --- p.43 / Chapter 4.2 --- Problem Formulation --- p.44 / Chapter 4.3 --- Key System Parameters --- p.45 / Chapter 4.4 --- System Model --- p.47 / Chapter 4.4.1 --- Markov Modulated Poisson Process (MMPP) Model --- p.47 / Chapter 4.4.2 --- System Time Distribution --- p.52 / Chapter 4.5 --- Performance Analysis --- p.58 / Chapter 4.6 --- Further Discussion --- p.63 / Chapter 4.6.1 --- Handoff Scheme Strategy --- p.63 / Chapter 4.6.2 --- Channel Reservation for Handoff Process --- p.66 / Chapter 4.7 --- Chapter Summary --- p.68 / Chapter 5 --- Conclusion --- p.70 / Bibliography --- p.73
72

Exposing the medium access control vulnerabilities in IEEE 802.11.

January 2007 (has links)
Ma Yu Tak. / Thesis submitted in: October 2006. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 70-73). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- IEEE 802.11 Standard --- p.4 / Chapter 3 --- Vulnerabilities of IEEE 802.11 --- p.8 / Chapter 3.1 --- Authentication Vulnerabilities --- p.8 / Chapter 3.2 --- Medium Access Control Vulnerabilities --- p.9 / Chapter 3.3 --- Proposed Counter-Measures --- p.10 / Chapter 4 --- Denial-of-Service Attacks by Exploiting the MAC protocol --- p.12 / Chapter 5 --- Simulation Results --- p.20 / Chapter 5.1 --- General DoS Attack Simulations --- p.21 / Chapter 5.1.1 --- Topology 1: A Simple Wireless Network --- p.21 / Chapter 5.1.2 --- Topology 2: Wireless Network in Ad-Hoc Mode --- p.24 / Chapter 5.1.3 --- Topology 3: Network with Hidden Node Problem --- p.29 / Chapter 5.2 --- Targeted DoS Attack Simulations --- p.32 / Chapter 5.2.1 --- Topology 4: A Simple Wireless Network --- p.32 / Chapter 5.2.2 --- Topology 4: A Simple Network with Reversed TCP Flows --- p.38 / Chapter 6 --- Detecting and Solving the Attacks --- p.41 / Chapter 6.1 --- Detection of Attacker --- p.41 / Chapter 6.1.1 --- Detecting General DoS Attackers --- p.41 / Chapter 6.1.2 --- Detecting Targeted DoS Attackers --- p.44 / Chapter 6.2 --- Possible Solutions to the DoS Attacks --- p.53 / Bibliography --- p.70 / Chapter A --- TCP Exponential Backoff with Non-Zero Throughput --- p.74 / Chapter A.1 --- TCP Exponential Backoff Background --- p.74 / Chapter A.2 --- Illustration by Simulation --- p.76 / Chapter A.3 --- Implication of the Finding --- p.77 / Chapter B --- Idle Sense in networks with Hidden Node Problem --- p.79 / Chapter B.1 --- Simulation findings --- p.79 / Chapter B.1.1 --- Four hidden nodes case --- p.79 / Chapter B.1.2 --- Analysis of the simulation results --- p.81 / Chapter B.1.3 --- Study of mixed node types --- p.82 / Chapter B.2 --- Possible approaches to use Idle Sense with Hidden Node Problem --- p.84 / Chapter B.2.1 --- Performance Evaluation --- p.88 / Chapter B.3 --- Conclusions --- p.91
73

Protocol design, testing and diagnosis towards dependable wireless sensor networks. / 面向可靠的無線傳感器網絡的協議設計, 測試和診斷 / CUHK electronic theses & dissertations collection / Mian xiang ke kao de wu xian chuan gan qi wang luo de xie yi she ji, ce shi he zhen duan

January 2012 (has links)
本文研究面向可靠的無線傳感器網絡的協議設計,測試和診斷。 / 在協議設計方面,我們集中研究媒體接入層的協議設計。首先,我們為水下無線傳感器網絡提出一個有效的媒體接入層協議RAS 。這個協議利用了水下無線傳感器網絡和地面無線傳感器網絡的媒體傳輸時延的差別,采用了並行傳輸的優先級方法。由于會導致碰撞,這種並行傳輸的方法不能被用在地面無線傳感器網絡中。該方法為高負荷的傳感器節點分配更長的傳輸時間。這種具有優先級的機制也同時提高了公平方面的性能。第二,我們處理水下無線傳感器網絡中由于報文失導致的不可靠的問題。基于之前提出的協議RAS ,我們提出了可靠的RAS 協議。該協議可以在可靠性和有效性方便達到一個平衡。它里面的報文確認和重傳機制同傳統的方法不同,所以它可以在提高可靠性的同時保證吞吐量不會被大幅降低。 / 第三,在協議測試方面,我們設計了RealProct ,一種新的可靠的用于無線傳感器網絡的一致性協議測試(測試協議實現是否符合協議規範)的架構。RealProct 采用了實際的傳感器節點來保證測試盡可能的接近實際部署。為了節省使用大規模實際部署來測試的硬件成本和控制成本, RealProct 使用少量傳感器節點虛擬各樣的拓撲結構和事件。同時,測試執行和裁決算法也用于最小化測試用例執行次數,並保證假陰和假陽錯誤低于給定值。 / 最後,我們提出了MDiag,一種使用移動智能手機巡視無線傳感器網絡並診斷網絡錯誤的方法。由于該智能手機不是無線傳感器網絡的組成部分,因此該診斷不會像其它已有的診斷方法那樣影響原無線傳感器網絡的運行。並且,使用智能手機巡視並診斷無線傳感器網絡比部署另一個用于診斷的網絡更有效。在巡視過程中,無線傳感器網絡所交互的報文被收集起來,然後被我們所設計的報文解析器所分析。然後,我們設計了統計性規則來指導異常現象的診斷。為了提高巡視效率,我們提出了一個巡視方法MSEP。 / 我們做了大量實驗驗證以上提出的方法和算法,結果表明它們在達到可靠性無線傳感器網絡的目標上很有效。 / This thesis investigates the protocol design, testing, and diagnosis of Wireless Sensor Networks (WSNs) to achieve dependable WSNs. / In the aspect of protocol design, we focus on the MAC (Medium Access Control) layer protocol design. First, we propose an efficient MAC protocol RAS (routing and application based scheduling protocol) for underwater acoustic sensor networks (UWASNs), a type of WSNs that are deployed in the water. Utilizing the medium propagation difference between UWASNs and terrestrial wireless sensor networks (TWSNs), RAS performs parallel transmissions which would definitely result in collisions in TWSNs. It schedules the transmissions with different priorities by allocating longer time to heavier-traffic sensor nodes. The priority mechanism also benefits the fairness performance. Second, we tackle the unreliability problem caused by the packet loss in UWASNs. Based on the previously designed RAS, we propose a reliable RAS called RRAS that obtains a tradeoff between the reliability and the efficiency. RRAS applies an ACK and retransmission mechanism that is different from the traditional one, so that it can maintain a comparable throughput while improving reliability. / Third, in the area of protocol testing, we design RealProct (reliable Protocol conformance testing with Real sensor nodes), a novel and reliable framework for performing protocol conformance testing in WSNs, i.e., testing the protocol implementations against their specifications. With real sensor nodes, RealProct can ensure that the testing scenarios are as close to the real deployment as possible. To save the hardware cost and control efforts required by testing with large-scale real deployments, RealProct virtualizes a network with any topology and generates non-deterministic events using only a small number of sensor nodes. In addition, test execution and verdict are optimized to minimize the number of test case runs, while guaranteeing satisfactory false positive and false negative rates. / Finally, we propose MDiag, a Mobility-assisted Diagnosis approach that employs smartphones to patrol the WSNs and diagnose failures. Diagnosing with a smartphone which is not a component of WSNs does not intrude the execution of the WSNs as most of the existing diagnosis methods. Moreover, patrolling the smartphone in the WSNs to investigate failures is more efficient than deploying another diagnosis network. During the patrol, packets exchanged in the WSNs are collected and then analyzed by our implemented packet decoder. Statistical rules are also designed to guide the detection of abnormal cases. Aiming at improving the patrol efficiency, a patrol approach MSEP (maximum snooping efficiency patrol) is proposed. We compare MSEP with a naive method, the greedy method, and a baseline method, and demonstrate that MSEP is better in increasing the detection rate and reducing the patrol time than other methods. / We perform extensive evaluations to verify the proposed techniques and algorithms, and the results confirm their advantages in achieving dependable WSNs. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Xiong, Junjie. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 136-154). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction and Background Study --- p.1 / Chapter 1.1 --- Wireless Sensor Networks (WSNs) --- p.1 / Chapter 1.1.1 --- Sensor Node --- p.5 / Chapter 1.1.2 --- The Base Station (BS) --- p.8 / Chapter 1.1.3 --- The Operating System (OS) of the Sensor Node --- p.8 / Chapter 1.1.4 --- The Protocol Design of WSNs --- p.11 / Chapter 1.2 --- Thesis Scope and Contributions --- p.20 / Chapter 1.2.1 --- Protocol Design --- p.20 / Chapter 1.2.2 --- Protocol Testing --- p.22 / Chapter 1.2.3 --- Protocol Diagnosis --- p.23 / Chapter 1.3 --- Thesis Organization --- p.23 / Chapter 2 --- An Efficient MAC Protocol Design --- p.25 / Chapter 2.1 --- Introduction --- p.26 / Chapter 2.2 --- Related Work --- p.28 / Chapter 2.3 --- RAS Overview --- p.29 / Chapter 2.3.1 --- Scheduling Element --- p.32 / Chapter 2.4 --- The Scheduling Problem in UWASNs --- p.34 / Chapter 2.4.1 --- Scheduling Principles --- p.34 / Chapter 2.4.2 --- Scheduling Problem Formulation --- p.35 / Chapter 2.4.3 --- Scheduling Problem Analysis --- p.37 / Chapter 2.5 --- RAS Protocol --- p.38 / Chapter 2.5.1 --- Scheduling Algorithm of the RAS Protocol --- p.38 / Chapter 2.5.2 --- Analysis of the RAS Protocol --- p.39 / Chapter 2.6 --- Performance Evaluation --- p.42 / Chapter 2.6.1 --- Schedule Length --- p.42 / Chapter 2.6.2 --- Network Throughput --- p.44 / Chapter 2.6.3 --- Average End-to-end Delay --- p.46 / Chapter 2.6.4 --- Average Maximum Queue Length per Node --- p.47 / Chapter 2.7 --- Discussions and Conclusions --- p.49 / Chapter 3 --- A Reliable MAC Protocol Design --- p.51 / Chapter 3.1 --- Introduction --- p.52 / Chapter 3.2 --- Related Work --- p.54 / Chapter 3.3 --- RRAS Protocol --- p.55 / Chapter 3.3.1 --- Overview of NACK-retransmission Mechanism --- p.56 / Chapter 3.3.2 --- Retransmission Mechanism --- p.57 / Chapter 3.3.3 --- Retransmission Time --- p.59 / Chapter 3.4 --- Performance Evaluation --- p.61 / Chapter 3.4.1 --- Retransmission Time of RRAS --- p.62 / Chapter 3.4.2 --- Working Time of RRAS and RAS --- p.63 / Chapter 3.4.3 --- Success Rate of RRAS and RAS --- p.64 / Chapter 3.4.4 --- Throughput of RRAS and RAS --- p.65 / Chapter 3.5 --- Conclusions --- p.66 / Chapter 4 --- Reliable Protocol Conformance Testing --- p.67 / Chapter 4.1 --- Introduction --- p.68 / Chapter 4.2 --- Related Work --- p.71 / Chapter 4.3 --- Protocol Conformance Testing --- p.73 / Chapter 4.3.1 --- PCT Process --- p.74 / Chapter 4.3.2 --- PCT Architecture --- p.75 / Chapter 4.4 --- Design of the RealProct Framework --- p.76 / Chapter 4.5 --- RealProct Techniques --- p.79 / Chapter 4.5.1 --- Topology Virtualization --- p.80 / Chapter 4.5.2 --- Event Virtualization --- p.81 / Chapter 4.5.3 --- Dynamic Test Execution --- p.85 / Chapter 4.6 --- Generality of RealProct --- p.88 / Chapter 4.7 --- Evaluation --- p.89 / Chapter 4.7.1 --- Detecting New Bugs in TCP --- p.90 / Chapter 4.7.2 --- Detecting Previous Bugs in TCP --- p.94 / Chapter 4.7.3 --- Testing Routing Protocol RMRP --- p.98 / Chapter 4.8 --- Conclusions --- p.99 / Chapter 5 --- Mobility-assisted Diagnosis for WSNs --- p.101 / Chapter 5.1 --- Introduction --- p.102 / Chapter 5.2 --- Related Work --- p.105 / Chapter 5.3 --- MDiag Background --- p.108 / Chapter 5.3.1 --- Network Architecture --- p.108 / Chapter 5.3.2 --- Failure Classification --- p.108 / Chapter 5.4 --- MDiag Framework --- p.109 / Chapter 5.4.1 --- Packet Decoder Input and Output --- p.111 / Chapter 5.4.2 --- Statistical Rules on Packet Analysis --- p.112 / Chapter 5.5 --- Coverage-oriented Smartphone Patrol Algorithms --- p.115 / Chapter 5.5.1 --- Naive Method (NM) --- p.115 / Chapter 5.5.2 --- Greedy Method (GM) --- p.116 / Chapter 5.5.3 --- Maximum Snooping Efficiency Patrol (MSEP) --- p.118 / Chapter 5.6 --- Evaluations --- p.119 / Chapter 5.6.1 --- Permanent Failure Detection --- p.121 / Chapter 5.6.2 --- Short-term Failure Detection --- p.122 / Chapter 5.7 --- Conclusions --- p.130 / Chapter 6 --- Conclusions --- p.132 / Bibliography --- p.136
74

Wireless LAN security.

January 2005 (has links)
Chan Pak To Patrick. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references (leaves 82-86). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iii / Contents --- p.iv / List of Figures --- p.vii / List of Tables --- p.viii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- The Problems --- p.3 / Chapter 1.3 --- My Contribution --- p.4 / Chapter 1.4 --- Thesis Organization --- p.5 / Chapter 2 --- Wireless LAN Security Model --- p.6 / Chapter 2.1 --- Preliminary Definitions on WLAN --- p.6 / Chapter 2.2 --- Security Model --- p.7 / Chapter 2.2.1 --- Security Attributes --- p.7 / Chapter 2.2.2 --- Security Threats in WLAN --- p.8 / Chapter 2.2.3 --- Attacks on Authentication Scheme --- p.10 / Chapter 2.2.4 --- Attacks on Keys --- p.10 / Chapter 2.3 --- Desired Properties of WLAN Authentication --- p.11 / Chapter 2.3.1 --- Security Requirements of WLAN Authentication --- p.11 / Chapter 2.3.2 --- Security Requirements of Session Keys --- p.12 / Chapter 2.3.3 --- Other Desired Properties of WLAN Authentication --- p.12 / Chapter 3 --- Cryptography --- p.14 / Chapter 3.1 --- Overview on Cryptography --- p.14 / Chapter 3.2 --- Symmetric-key Encryption --- p.15 / Chapter 3.2.1 --- Data Encryption Standard (DES) --- p.15 / Chapter 3.2.2 --- Advanced Encryption Standard (AES) --- p.15 / Chapter 3.2.3 --- RC4 --- p.16 / Chapter 3.3 --- Public-key Cryptography --- p.16 / Chapter 3.3.1 --- RSA Problem and Related Encryption Schemes --- p.17 / Chapter 3.3.2 --- Discrete Logarithm Problem and Related Encryption Schemes --- p.18 / Chapter 3.3.3 --- Elliptic Curve Cryptosystems --- p.19 / Chapter 3.3.4 --- Digital Signature --- p.19 / Chapter 3.4 --- Public Key Infrastructure --- p.20 / Chapter 3.5 --- Hash Functions and Message Authentication Code --- p.21 / Chapter 3.5.1 --- SHA-256 --- p.22 / Chapter 3.5.2 --- Message Authentication Code --- p.22 / Chapter 3.6 --- Entity Authentication --- p.23 / Chapter 3.6.1 --- ISO/IEC 9798-4 Three-pass Mutual --- p.23 / Chapter 3.6.2 --- ISO/IEC 9798-4 One-pass Unilateral --- p.24 / Chapter 3.7 --- Key Establishment --- p.24 / Chapter 3.7.1 --- Diffie-Hellman Key Exchange --- p.24 / Chapter 3.7.2 --- Station-to-Station Protocol --- p.25 / Chapter 3.8 --- Identity-Based Cryptography --- p.25 / Chapter 3.8.1 --- The Boneh-Franklin Encryption Scheme --- p.26 / Chapter 3.8.2 --- Au and Wei's Identification Scheme and Signature Scheme --- p.27 / Chapter 4 --- Basics of WLAN Security and WEP --- p.29 / Chapter 4.1 --- Basics of WLAN Security --- p.29 / Chapter 4.1.1 --- "Overview on ""Old"" WLAN Security" --- p.29 / Chapter 4.1.2 --- Some Basic Security Measures --- p.29 / Chapter 4.1.3 --- Virtual Private Network (VPN) --- p.30 / Chapter 4.2 --- WEP --- p.31 / Chapter 4.2.1 --- Overview on Wired Equivalent Privacy (WEP) --- p.31 / Chapter 4.2.2 --- Security Analysis on WEP --- p.33 / Chapter 5 --- IEEE 802.11i --- p.38 / Chapter 5.1 --- Overview on IEEE 802.11i and RSN --- p.38 / Chapter 5.2 --- IEEE 802.1X Access Control in IEEE 802.11i --- p.39 / Chapter 5.2.1 --- Participants --- p.39 / Chapter 5.2.2 --- Port-based Access Control --- p.40 / Chapter 5.2.3 --- EAP and EAPOL --- p.40 / Chapter 5.2.4 --- RADIUS --- p.41 / Chapter 5.2.5 --- Authentication Message Exchange --- p.41 / Chapter 5.2.6 --- Security Analysis --- p.41 / Chapter 5.3 --- RSN Key Management --- p.43 / Chapter 5.3.1 --- RSN Pairwise Key Hierarchy --- p.43 / Chapter 5.3.2 --- RSN Group Key Hierarchy --- p.43 / Chapter 5.3.3 --- Four-way Handshake and Group Key Handshake --- p.44 / Chapter 5.4 --- RSN Encryption and Data Integrity --- p.45 / Chapter 5.4.1 --- TKIP --- p.45 / Chapter 5.4.2 --- CCMP --- p.46 / Chapter 5.5 --- Upper Layer Authentication Protocols --- p.47 / Chapter 5.5.1 --- Overview on the Upper Layer Authentication --- p.47 / Chapter 5.5.2 --- EAP-TLS --- p.48 / Chapter 5.5.3 --- Other Popular ULA Protocols --- p.50 / Chapter 6 --- Proposed IEEE 802.11i Authentication Scheme --- p.52 / Chapter 6.1 --- Proposed Protocol --- p.52 / Chapter 6.1.1 --- Overview --- p.52 / Chapter 6.1.2 --- The AUTHENTICATE Protocol --- p.56 / Chapter 6.1.3 --- The RECONNECT Protocol --- p.59 / Chapter 6.1.4 --- Packet Format --- p.61 / Chapter 6.1.5 --- Ciphersuites Negotiation --- p.64 / Chapter 6.1.6 --- Delegation --- p.64 / Chapter 6.1.7 --- Identity Privacy --- p.68 / Chapter 6.2 --- Security Considerations --- p.68 / Chapter 6.2.1 --- Security of the AUTHENTICATE protocol --- p.68 / Chapter 6.2.2 --- Security of the RECONNECT protocol --- p.69 / Chapter 6.2.3 --- Security of Key Derivation --- p.70 / Chapter 6.2.4 --- EAP Security Claims and EAP Methods Requirements --- p.72 / Chapter 6.3 --- Efficiency Analysis --- p.76 / Chapter 6.3.1 --- Overview --- p.76 / Chapter 6.3.2 --- Bandwidth Performance --- p.76 / Chapter 6.3.3 --- Computation Speed --- p.76 / Chapter 7 --- Conclusion --- p.79 / Chapter 7.1 --- Summary --- p.79 / Chapter 7.2 --- Future Work --- p.80 / Bibliography --- p.82
75

Energy-efficient query processing in wireless sensor networks

Wu, Minji 01 January 2006 (has links)
No description available.
76

Call admission control for adaptive bit-rate VoIP over 802.11 WLAN.

January 2009 (has links)
Cui, Yuanyuan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. / Includes bibliographical references (p. 64-68). / Abstract also in Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1 .1 --- Motivations and Contributions --- p.1 / Chapter 1.2 --- Related Works --- p.3 / Chapter 1.3 --- Organization of the Thesis --- p.4 / Chapter Chapter 2 --- Background --- p.5 / Chapter 2.1 --- IEEE 802.11 --- p.5 / Chapter 2.1.1 --- IEEE 802.11 Topologies --- p.5 / Chapter 2.1.2 --- IEEE 802.11 MAC --- p.8 / Chapter 2.2 --- Voice over Internet Protocol (VoIP) --- p.11 / Chapter 2.2.1 --- A VoIP system --- p.11 / Chapter 2.2.2 --- QoS requirements for VoIP --- p.11 / Chapter 2.2.3 --- VoIP speech codecs --- p.12 / Chapter 2.3 --- VoIP over WLAN --- p.13 / Chapter 2.3.1 --- System Architecture of VoIP over WLAN --- p.14 / Chapter 2.3.2 --- VoIP Capacity over WLAN --- p.15 / Chapter 2.4 --- Skype --- p.16 / Chapter Chapter 3 --- Skype Rate Adaptation Mechanism --- p.17 / Chapter 3.1 --- Experimental Setting --- p.17 / Chapter 3.2 --- Overview --- p.19 / Chapter 3.3 --- Flow Rate Region --- p.20 / Chapter 3.4 --- Feedback: Receiver Report (RR) --- p.21 / Chapter 3.5 --- Bandwidth Usage Target (BM) --- p.24 / Chapter 3.6 --- Summary of Skype Rate Adaptation Mechanism --- p.28 / Chapter 3.7 --- Skype-emulating Traffic Generator --- p.28 / Chapter Chapter 4 --- "Call Admission, Fairness and Stability Control" --- p.32 / Chapter 4.1 --- Unfair and Instability problems for AVoIP --- p.32 / Chapter 4.1.1 --- Analysis --- p.32 / Chapter 4.1.2 --- Simulation Evaluation --- p.34 / Chapter 4.2 --- CFSC scheme --- p.37 / Chapter 4.2.1 --- Pre-admission Bandwidth-reallocation Call Admission Control (PBCAC) --- p.39 / Chapter 4.2.2 --- Fairness Control --- p.42 / Chapter 4.2.3 --- Stability Control --- p.43 / Chapter Chapter 5 --- Performance Evaluation of CFSC --- p.44 / Chapter 5.1 --- Evaluation of Fairness Control --- p.44 / Chapter 5.2 --- Evaluation of Stability Control --- p.46 / Chapter 5.3 --- Evaluation of PBCAC --- p.46 / Chapter 5.4 --- Evaluation of complete CFSC --- p.49 / Chapter Chapter 6 --- Conclusion --- p.51 / Appendices --- p.53 / References --- p.64
77

Performance analysis and protocol design of opportunistic routing in multi-hop wireless networks.

January 2008 (has links)
Luk, Chun Pong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 122-125). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction / Motivation --- p.1 / Chapter 1.1 --- Background and Motivation --- p.1 / Chapter 1.2 --- Performance Analysis of Opportunistic Routing in Multi-hop Wireless Network --- p.3 / Chapter 1.3 --- Opportunistic Routing Protocol Design --- p.5 / Chapter 1.4 --- Chapter Summary --- p.6 / Chapter 2 --- Literature Review --- p.8 / Chapter 2.1 --- Introduction --- p.8 / Chapter 2.2 --- Opportunistic Routing Protocols --- p.9 / Chapter 2.2.1 --- Challenges of the Opportunistic Routing Protocol Design --- p.9 / Chapter 2.2.2 --- Overview of Existing Opportunistic Routing Protocols --- p.11 / Chapter 2.2.3 --- Forwarding Set Selection Algorithms --- p.12 / Chapter 2.2.4 --- Actual Forwarder Determination --- p.13 / Chapter 2.2.5 --- Duplicate Suppression Strategies --- p.14 / Chapter 2.2.6 --- Variations of Opportunistic Routing Protocols --- p.16 / Chapter 2.3 --- Performance Evaluation and Analysis of Opportunistic Routing --- p.16 / Chapter 2.4 --- Routing in Networks with Directional Antennas --- p.19 / Chapter 2.4.1 --- Performance Analysis of the use of Directional Antenna in Routing --- p.20 / Chapter 2.4.2 --- Existing Routing and MAC protocols for Networks with Directional Antennas --- p.21 / Chapter 2.5 --- Chapter Summary --- p.22 / Chapter 3 --- Performance Analysis of Opportunistic Routing in Multi-hop Wireless Network --- p.24 / Chapter 3.1 --- Introduction --- p.24 / Chapter 3.2 --- Analytical Derivation of the Expected Progress per Transmission of Opportunistic Routing --- p.25 / Chapter 3.2.1 --- Problem Formulations and Assumptions --- p.26 / Chapter 3.2.2 --- Reception Probability of a Node in a Given Region --- p.28 / Chapter 3.2.3 --- Radio Channel Models --- p.30 / Chapter 3.2.4 --- Average Progress per Transmission --- p.32 / Chapter 3.3 --- Validation and Analytical Results --- p.34 / Chapter 3.3.1 --- Results Validation --- p.34 / Chapter 3.3.2 --- Baseline Models --- p.35 / Chapter 3.3.3 --- Results and Analysis --- p.36 / Chapter 3.4 --- Further Extension of the Model --- p.40 / Chapter 3.5 --- Chapter Summary --- p.42 / Chapter 4 --- Opportunistic Routing in Multi-hop Wireless Networks with Directional Antennas --- p.44 / Chapter 4.1 --- Introduction --- p.44 / Chapter 4.2 --- Performance Analysis of Opportunistic Routing in Networks with Directional Antennas --- p.46 / Chapter 4.2.1 --- Network Model --- p.46 / Chapter 4.2.2 --- Radio Channel Models --- p.47 / Chapter 4.2.3 --- Antenna Models --- p.49 / Chapter 4.2.4 --- Expected Progress per Transmission with Directional Antenna --- p.51 / Chapter 4.2.5 --- Simulation Setup --- p.52 / Chapter 4.2.6 --- Results and Analysis --- p.54 / Chapter 4.3 --- Maximizing the Gain of Opportunistic Routing by Adjusting Antenna Beamwidth and Direction --- p.60 / Chapter 4.3.1 --- Introduction and Motivation --- p.60 / Chapter 4.3.2 --- Network Models --- p.61 / Chapter 4.3.3 --- Algorithms --- p.61 / Chapter 4.3.4 --- Results and Discussions --- p.66 / Chapter 4.3.5 --- Section Summary --- p.71 / Chapter 4.4 --- Chapter Summary --- p.72 / Chapter 5 --- Impact of Interference on Opportunistic Routing --- p.74 / Chapter 5.1 --- Introduction --- p.74 / Chapter 5.2 --- Interference Model --- p.75 / Chapter 5.3 --- MAC Protocols --- p.76 / Chapter 5.4 --- Simulation Results and Discussions --- p.78 / Chapter 5.4.1 --- Simulation Setup --- p.78 / Chapter 5.4.2 --- Baseline Models --- p.78 / Chapter 5.4.3 --- Results and Analysis --- p.79 / Chapter 5.5 --- Chapter Summary --- p.84 / Chapter 6 --- Threshold-based Opportunistic Routing Protocol --- p.86 / Chapter 6.1 --- Introduction --- p.86 / Chapter 6.2 --- Limitations of Existing Opportunistic Routing Protocols --- p.87 / Chapter 6.3 --- System Model --- p.89 / Chapter 6.4 --- Operating Principles of TORP --- p.91 / Chapter 6.5 --- Protocol Details --- p.93 / Chapter 6.5.1 --- Forwarding Set Computation --- p.93 / Chapter 6.5.2 --- Update of Forwarding Set and Remaining Transmission Counts --- p.97 / Chapter 6.5.3 --- Forwarding Threshold Computation and Details of the Packet Forwarding Process --- p.100 / Chapter 6.5.4 --- Node State --- p.101 / Chapter 6.5.5 --- Packet Format --- p.101 / Chapter 6.5.6 --- Batched Acknowledgement --- p.102 / Chapter 6.6 --- Advantages of TORP --- p.102 / Chapter 6.6.1 --- Distributed Forwarding Set Computation --- p.102 / Chapter 6.6.2 --- Threshold-based Forwarding --- p.103 / Chapter 6.6.3 --- MAC-Independence --- p.104 / Chapter 6.7 --- Protocol Extensions --- p.104 / Chapter 6.7.1 --- Implicit ACK --- p.104 / Chapter 6.7.2 --- Progress Recovery --- p.105 / Chapter 6.7.3 --- Modification of TORP for Large Networks --- p.106 / Chapter 6.8 --- Results and Discussions --- p.106 / Chapter 6.8.1 --- Simulation Setup --- p.106 / Chapter 6.8.2 --- Baseline Models --- p.107 / Chapter 6.8.3 --- Performance Evaluations and Analysis --- p.108 / Chapter 6.9 --- Chapter Summary --- p.116 / Chapter 7 --- Conclusion and Future Works --- p.118 / Chapter 7.1 --- Conclusion --- p.118 / Chapter 7.2 --- Future Work --- p.120 / Bibliography --- p.122
78

Design of a variable gain, high linearity, low power baseband filter for WLAN transmitters

Ranganathan, Sachin 15 April 2003 (has links)
A variable gain, high linearity, low power baseband filter for WLAN applications is implemented in a 1.5 V 3 V 0.15 ��m CMOS process. This fourth-order low-pass filter, which is introduced in the transmit channel as a reconstruction filter between the D/A converter and the mixer, has a measured cut-off frequency of 9 MHz. The active-RC configuration has single amplifier biquads (SABs) to save power and is implemented using three-stage opamps with nested-Miller compensation for better linearity. It also features a special ��-to-Tee transformation network for the resistor arrays, used for frequency or gain trimming, in order to obtain higher linearity than conventional Sallen-Key circuits. The measured THD for a 2 V [subscript p-p] signal at 1 MHz is -72 dB. / Graduation date: 2004
79

Network-based control, monitoring and calibration of shipboard sensors /

Silva, Eusebio Pedro da. January 2003 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2003. / Thesis advisor(s): Xiaoping Yun, Fotis Papoulias. Includes bibliographical references (p. 61-62). Also available online.
80

Resource sharing in a WiFi-WiMAX integrated network

Andrews, Nirmal, Agrawal, Prathima. January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Includes bibliographic references (p.70-72).

Page generated in 0.0533 seconds