Spelling suggestions: "subject:"aireless betworks."" "subject:"aireless conetworks.""
131 |
Παρακολούθηση και διαχείριση έξυπνων κτιρίων με χρήση ετερογενών ασυρμάτων δικτύων αισθητήρωνΑμαξηλάτης, Δημήτριος 16 May 2014 (has links)
Στην παρούσα µεταπτυχιακή διπλωµατική εργασία παρουσιάζεται ο σχεδιασµός, η ανάπτυξη, η εγκατάσταση και λειτουργία ενός ολοκληρωµένου
συστήματος παρακολούθησης και διαχείρισης έξυπνων κτιρίων με χρήση ετε-
ρογενών ασυρµάτων δικτύων αισθητήρων. Οι συγκεκριµένες συσκευές µπο-
ρούν να λειτουργήσουν είτε ως απλοί αισθητήρες είτε ως ελεγκτές συσκευών,
με χρήση ασύρµατης επικοινωνίας και state-of-the-art τεχνολογιών του Δια-
δικτύου των Συσκευών που διευκολύνουν την αλληλεπίδραση με αυτές αλλά
και την εννοποίησή τους με διαδυκτιακές εφαρμογές. Στα πλαίσια της συ-
γκεκριµένης διπλωµατικής, εστιάζουµε αρχικά στην υλοποίηση του πρωτο-
κόλλου CoAP που προσφέρη τις δυνατότητες ελένχου και αίσθησης μέσω της
ασύρµατη επικοινωνία των συσκευών με ένα δομημένο και κοινά κατανοητό
τρόπο. Προτείνουµε επίσης, µια ένα συγκεκριµένου συστήµατος το οποίο προ-
σφέρει κεντρικά τις υπηρησίες των ασύρματων αισθητήρων για την διευκό-
ληνση της αναζήτησης συσκευών και χαρακτηριστικών όπως και την δυνα-
τότητα κεντρικής διαχείρισης των συσκευών. Το συγκεκριµένο σύστηµα εί-
ναι ανεξάρτητο από τις συσκευές που χρησιµοποιούνται (platform & hardware
independent) καθώς οι λειτουργίες και τα δεδοµένα παρέχονται µε δοµηµένο
τρόπο με την χρήση RESTful Web Services. Για την µελέτη της συµπεριφο-
ράς του συστήµατος αναπτύχθηκαν ολοκληρωµένες εφαρµογές οι οποίες απο-
δικνύουν την ευκολία χρήσης των δεδομένων που προέρχονται από τις συ-
σκευές και αλληλεπίδρασης με αυτές. Κάθε µία από αυτές υλοποιήθηκε με
χρήση διαφορετικών τεχνολογιών όπως HTML5, Android, Microsoft Windows
8 και On{x}, αλλά και διαφορετικές συσκευές αισθητήρων και συγκεκριµένα
iSense, Arduino, TelosB και XBee. / Within the scope of this MSc dissertation, we present the design
and implementation of pervasive applications on top of heterogeneous
wireless sensor network environment. The wireless communication between
heterogeneous devices is an inherently difficult research problem due to
fundamental differences in system architecture, properties and capabilities
of the these devices. Initially, our research focused on the identification of
the problems related to the intercommunication among the devices of a
heterogeneous wireless sensor network. As a solution, we propose a new
abstract system that provides the key qualities needed for a successful
pervasive system; expandability, scalability and performance. The new
architecture achieves interoperability among the devices by introducing
abstraction in the communication protocols (MAC, Transport and Application
Layers). In order to demonstrate the applicability of our system we include
various representative use case scenarios, that illustrate the usage of our
infrastructure. Each scenario focuses on different properties of the system and
uses a combination of devices such as iSense, Arduino, SunSPOT, TelosB and
XBee.
|
132 |
Medium Access Control and Adaptive Transmission Techniques in Wireless NetworksMuqattash, Alaa Hilal January 2005 (has links)
Efficient utilization of the limited wireless spectrum while satisfying applications’ quality of service requirements is an essential design goal of forthcoming wireless networks and a key to their successful deployment. The need for spectrally efficient systems has motivated the development of adaptive transmission techniques. Enabling this adaptation requires protocols for information exchange as well as mathematical tools to optimize the controllable parameters. In this dissertation, we provide insights into such protocols and mathematical tools that target efficient utilization of the wireless spectrum. First, we propose a distributed CDMA-based medium access protocol for mobile ad hoc networks (MANETs). Our approach accounts for multiple access interference at the protocol level, thereby addressing the notorious near-far problem that undermines the throughput performance in MANETs. Second, we present a novel power-controlled MAC protocol, called POWMAC, which enjoys the same single-channel, single-transceiver design of the IEEE 802.11 Ad Hoc MAC protocol, but which achieves a significant throughput improvement over the 802.11 protocol. Third, we consider joint power/rate optimization in the context of orthogonal modulation (OM) and investigate the performance gains achieved through adaptation of the OM order using recently developed optimization techniques. We show that such adaptation can significantly increase network throughput while simultaneously reducing the per-bit energy consumption relative to fixed-order modulation systems. Finally, we determine the maximum achievable “performance” of a wireless CDMA network that employs a conventional matched filter receiver and that operates under optimal link-layer adaptation where each user individually achieves the Shannon capacity. The derived bounds serve as benchmarks against which adaptive CDMA systems can be compared.
|
133 |
POWER-CONTROLLED CHANNEL ACCESS AND ROUTING PROTOCOLS FOR MIMO-CAPABLE WIRELESS NETWORKSSiam, Mohammad Zakariya January 2009 (has links)
Transmission power control (TPC) has been used in wireless networks to improve channel reuse and/or reduce energy consumption. It has been mainly applied to single-input single-output (SISO) systems. Significant improvement in performancecan be achieved by employing multi-input multi-output (MIMO) techniques. In this dissertation, we propose adaptive medium-access control (MAC) protocols for power-controlled MIMO-capable wireless networks. In these protocols, we adapt the number of transmit/receive antennas, along with the transmission powers/rates, for the purpose of minimizing total energy consumption and/or maximizing network throughput. Our first protocol, called E-BASIC, exploits the diversity gain of MIMO by adapting the transmission mode, transmission power, and modulation order so as to minimize the total energy consumption. We incorporate E-BASIC in the design of an energy-efficient routing (EER) scheme that selects the least-energy end-to-end path. We then propose two MAC protocols that exploit the multiplexing gain of MIMO, and consider their integration into legacy systems. We alsopropose a combined energy/throughput MAC protocol, called CMAC, which dynamically switches between diversity and multiplexing modes so as to maximize a utility function that depends on both energy consumption and throughput. Finally, we consider employing "virtual" MIMO capability into single-antenna wireless sensor networks (WSNs). We propose a distributed MIMO-adaptive energy-efficient clustering/routing protocol, coined CMIMO, which aims at reducing energy consumption in multi-hop WSNs. In CMIMO, each cluster has up to two cluster heads (CHs), which are responsible for routing traffic between clusters. Simulation results indicate that our proposed protocols achieve significant energy/throughput improvement compared with non-adaptive protocols.
|
134 |
ALGORITHMS FOR ROUTING AND CHANNEL ASSIGNMENT IN WIRELESS INFRASTRUCTURE NETWORKSAhuja, Sandeep Kour January 2010 (has links)
Wireless communication is a rapidly growing segment of the communication industry, with the potential to provide low-cost, high-quality, and high-speed information exchange between portable devices. To harvest the available bandwidth efficientlyin a wireless network, they employ multiple orthogonal channels over multiple ra-dios at the nodes. In addition, nodes in these networks employ directional antennasas radios to improve spatial throughput. This dissertation develops algorithms forrouting and broadcasting with channel assignment in such networks. First, we com-pute the minimum cost path between a given source-destination pair with channelassignment on each link in the path such that no two transmissions interfere witheach other. Such a path must satisfy the constraint that no two consecutive links onthe path are assigned the same channel, referred to as "channel discontinuity con-straint." To compute such a path, we develop two graph expansion techniques basedon minimum cost perfect matching and dijkstra's algorithm. Through extensive sim-ulations, we study the effectiveness of the routing algorithms developed based onthe two expansion techniques and the benefits of employing the minimum cost per-fect matching based solution. Secondly, we study the benefits of sharing channelbandwidth across multiple flows. We model the routing and channel assignmentproblem in two different ways to account for the presence and absence of inter-flowbandwidth sharing. Benefits of multiple paths between a source-destination pairmotivates the problem of computing multiple paths between a source-destinationpair with channel assignment such that all the paths can be active simultaneouslyto achieve maximal flow between the pair in the considered network. Since finding even two such paths is NP-hard, we formulate the problem as an integer linearprogram and develop efficient heuristic to find these paths iteratively. Thirdly, wecompute a broadcast tree from a given root with channel assignment such that all the links in the broadcast tree can be active simultaneously without interferingwith each other. Since finding such a tree is an NP-hard problem, we formulatethe problem as an integer linear program (ILP) and develop heuristics to find thebroadcast tree with channel assignment. We evaluate and compare the performanceof the developed heuristics with respect to their success rate, average depth of theobtained tree, and average path length from root to a node in the network. Thisdissertation also analyzes the blocking performance of a channel assignment schemein a multi-channel wireless line network. We assume that the existing calls in thenetwork may be rearranged on different channels to accommodate an incoming call.The analysis is limited to single-hop calls with different transmission ranges.Finally, this dissertation evaluates the performance of disjoint multipath routingapproaches for all-to-all routing in packet-switched networks with respect to packetoverhead, path lengths, and routing table size. We develop a novel approach basedon cycle-embedding to obtain two node-disjoint paths between all source-destinationpairs with reduced number of routing table entries maintained at a node (hence thereduced look up time), small average path lengths, and less packet overhead. Westudy the trade-off between the number of routing table entries maintained at anode and the average length of the two disjoint paths by: (a) formulating the cycle-embedding problem as an integer linear program; and (b) developing a heuristic.We show that the number of routing table entries at a node may be reduced toat most two per destination using cycle-embedding approach, if the length of thedisjoint paths are allowed to exceed the minimum by 25%.
|
135 |
AN INDOOR GEO-FENCING BASED ACCESS CONTROL SYSTEM FOR WIRELESS NETWORKSRahimi, Hossein 31 July 2013 (has links)
Use of wireless network information for indoor positioning has been an area of interest since wireless networks became very popular.
On the other hand, the market started to grow in variety and production volumes leading to a variety of devices with many different hardware and software combinations.
In the field of indoor positioning, most of the existing technologies are dependent on additional hardware and/or infrastructure, which increases the cost and requirements for both users and providers.
This thesis investigates possible methods of coupling indoor geo-fencing with access control including authentication, identification, and registration in a system. Moreover, various techniques are studied in order to improve the robustness and security of such a system. The focus of these studies is to improve the proposed system in such a way that gives it the ability to operate properly in noisy, heterogeneous, and less controlled environments where the presence of attackers is highly probable. To achieve this, a classification based geo-fencing approach using Received Signal Strength Indicator (RSSI) has been employed so that accurate geo-fencing is coupled with secure communication and computing.
Experimental results show that considerable positioning accuracy has been achieved while providing high security measures for communication and transactions.
Favouring diversity and generic design, the proposed implementation does not mandate users to undergo any system software modification or adding new hardware components.
|
136 |
Cross layer hybrid ARQ2 : cooperative diversity.January 2008 (has links)
Cooperative communication allows for single users in multi user wireless network to share
their antennas and achieve virtual antenna transmitters, which leads to transmit diversity.
Coded Cooperation introduced channel coding into cooperative diversity over traditional
pioneer cooperative diversity methods which were based on a user repeating its partner's
transmitted signals in a multi-path fading channel environment in order to improve Bit Error
Rate (BER) performance..
In this dissertation the Coded Cooperation is simulated and the analytical bounds are
evaluated in order to understand basic cooperation principles. This is done using Rate
Compatible Punctured Convolutional Codes (RCPC). Based on the understanding of these
principles a new protocol called Cross Layer Hybrid Automatic Repeat reQuest (ARQ) 2
Cooperative Diversity is developed to allow for improvements in BER and throughput.
In Cross Layer Hybrid ARQ 2 Cooperation, Hybrid ARQ 2 (at the data-link layer) is
combined with cooperative diversity (at the physical layer), in a cross layer design manner, to
improve the BER and throughput based on feedback from the base station on the user's initial
transmissions. This is done using RCPC codes which partitions a full rate code into sub code
words that are transmitted as incremental packets in an effort to only transmit as much parity
as is required by the base station for correct decoding of a user's information bits. This allows
for cooperation to occur only when it is necessary unlike with the conventional Coded
Cooperation, where bandwidth is wasted cooperating when the base station has already
decoded a user's information bits.
The performance of Cross Layer Hybrid ARQ 2 Cooperation is quantised by BER and
throughput. BER bounds of Cross Layer Hybrid ARQ 2 Cooperation are derived based on the
Pairwise Error Probability (PEP) of the uplink channels as well as the different inter-user and
base station Cyclic Redundancy Check (CRC) states. The BER is also simulated and
confirmed using the derived bound. The throughput of this new scheme is also simulated and
confirmed via analytical throughput bounds. This scheme maintains BER and throughput
gains over the conventional Coded Cooperation even under the worst inter-user channel
conditions. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2008.
|
137 |
TCP performance enhancement over wireless networksJayananthan, Aiyathurai January 2007 (has links)
Transmission Control Protocol (TCP) is the dominant transport protocol in the Internet and supports many of the most popular Internet applications, such as the World Wide Web (WWW), file transfer and e-mail. TCP congestion control algorithms dynamically learn the network bandwidth and delay characteristics of a network and adapt its performance to changes in traffic so as to avoid network collapse. TCP is designed to perform well in traditional wireline networks with the assumptions that packet losses are mainly due to network congestion and random bit error rate (BER) is negligible. However, networks with wireless links suffer from significant packet losses due to random bit errors and handoffs. Hence TCP performs poorly in networks with wireless links because it treats any packet loss in the network to be a result of network congestion and slows down its transmission rate, or even cause the TCP sender to experience unnecessary timeouts, further reducing its performance. The development of advance wireless networks, such as WiFi, UMTS and WiMAX, make it necessary to find ways to improve TCP's efficiency and resource utilization, as well as improve the user's experience and reduce latency times. In order to find effective solutions to this effect, packet losses across wireless links should be distinguished from congestion related packet losses. In this thesis, we concentrate on two main strategies for enabling the TCP congestion control mechanism to determine the cause for a packet loss. One is a proxy-based mechanism that monitors the radio network interface and sends radio network feedback (RNF) to the TCP sender with the status of the wireless link. The other one is an end-to-end mechanism, in which the packet error pattern is used as the system metric to fine-tune the congestion control mechanism. It also presents an analytical model of TCP with enhanced recovery mechanism for wireless environments. In a proxy-based mechanism, TCP sender is explicitly informed of any effects caused by wireless links. However, the implementation technique is network dependent. We have proposed and developed three proxy-based schemes; the radio network feedback (RNF) scheme over an 802.11 WLAN network, the radio network controller (RNC) feedback over a UMTS network and a wireless enhancement proxy (WENP) over both the 802.11 WLAN and UMTS networks. The RNF scheme is introduced at the 802.11 WLAN base station that monitors the TCP packet flows over the wireless links, detects wireless packet losses and provides feedback to the TCP sender using one of the TCP header reserved control bits, called RNF flag. TCP Reno is modified to utilize the radio network feedback to distinguish the losses due to wireless effects form the congestion and fine-tuned to perform wireless enhanced fast retransmit and fast recovery mechanisms. The RNF scheme is implemented using the OPNET tool, and the simulation results show that the TCP performance is significantly improved. The RNC feedback mechanism, similar to the RNF scheme, is developed and implemented in a UMTS network. The GPRS Tunneling Protocol (GTP) layer of the UMTS Radio Network Control (RNC) protocol stack was modified to detect and notify the TCP sender of the wireless packet losses, which is the main difference between the RNF and RNC mechanisms. The simulation results shows that the RNC feedback mechanism significantly improves the TCP performance compared to that of standard TCP over UMTS. The wireless enhancement proxy (WENP) is developed to minimize spurious TCP timeouts over wireless networks and implemented in both 802.11 WLAN and UMTS networks. WENP extends the proposed RNF and RNC feedback mechanisms to detect both wireless packet losses and large delays across the wireless link, and to notify the TCP sender of these events with the aid of two reserved bits in the TCP header. TCP Reno is further modified to utilize the WENP feedback to distinguish both wireless packet losses from congestion losses and spurious timeouts from normal timeouts. It is also fine-tuned to perform both the wireless enhanced fast retransmit and fast recovery mechanism and the timeout mechanism. The simulation results demonstrate that the proposed scheme markedly improves the TCP performance compared to that of standard WLAN and UMTS implementations. An end-to-end early packet loss recovery (EPLR) mechanism that modifies the TCP Reno fast retransmit algorithm to detect packet losses early and to speed up the packet recovery process to reduce the number of TCP timeouts over networks with heavy packet losses, such as wireless networks is also presented. TCP Reno with EPLR scheme is implemented in a UMTS network and its performance is compared with that of TCP Reno and New Reno. Simulation results shows that Reno with EPLR improves the TCP performance and application response time significantly compared to that of both Reno and New Reno by reducing the TCP timeouts, which is the main cause of degradation of the TCP performance in a wireless environment. Finally, we develop an analytical TCP throughput model with enhanced TCP Reno fast retransmit algorithm to avoid timeouts. The model captures the TCP fast retransmit mechanism and expresses the steady state congestion window and throughput as a function of network utilization factor, round trip time (RTT) and loss rate. Another new feature added to the model is dynamic adjustment of the congestion window size depending on the packet drop rates. This speeds up the packet recovery process and reduces the number of TCP timeouts over networks with heavy packet losses. The proposed model is implemented over a UMTS network and its performance is compared with that of TCP Reno. Simulation results show that the proposed model reduces the TCP timeouts and improves the TCP performance compared to that of TCP Reno. It is also found that the model provides a very good match to the steady-state congestion window behavior.
|
138 |
Radio Resource Management in a Heterogeneous Wireless Access MediumMuhammad, Muhammad Ismail 08 July 2013 (has links)
In recent years, there has been a rapid evolution and deployment of wireless networks. In populated areas, high-rate data access is enabled anywhere and anytime with the pervasive wireless infrastructure such as the fourth-generation (4G) cellular systems, IEEE 802.11-based wireless local area networks (WLANs), and IEEE 802.16-based wireless metropolitan area networks (WMANs). In such a heterogeneous wireless access medium, multi-radio devices become a trend for users to conveniently explore various services offered by different wireless systems. This thesis presents radio resource management mechanisms, for bandwidth allocation, call admission control (CAC), and mobile terminal (MT) energy management, that can efficiently exploit the available resources in the heterogeneous wireless medium and enhance the user perceived quality-of-service (QoS).
Almost all existing studies on heterogeneous networking are limited to the traditional centralized infrastructure, which is inflexible in dealing with practical scenarios, especially when different networks are operated by different service providers. In addition, in most current wireless networks, mobile users are simply viewed as service recipients in network operation, with passive transceivers completely or partially under the control of base stations or access points. In this thesis, we present efficient decentralized bandwidth allocation and CAC mechanisms that can support single-network and multi-homing calls. The decentralized architecture gives an active role to the MT in the resource management operation. Specifically, an MT with single-network call can select the best wireless network available at its location, while an MT with multi-homing call can determine a required bandwidth share from each network to satisfy its total required bandwidth. The proposed mechanisms rely on cooperative networking and offer a desirable flexibility between performance measures (in terms of the allocated bandwidth per call and the call blocking probability), and between the performance and the implementation complexity.
With the increasing gap between the MT demand for energy and the offered battery capacity, service degradation is expected if the MT cannot efficiently manage its energy consumption. Specifically, for an uplink multi-homing video transmission, the existing studies do not guarantee that the MT available energy can support the entire call, given the battery energy limitation. In addition, the energy management mechanism should take account of video packet characteristics, in terms of packet distortion impact, delay deadline, and precedence constraint, and employ the available resources in the heterogeneous wireless medium. In this thesis, we present MT energy management mechanisms that can support a target call duration, with a video quality subject to the MT battery energy limitation. In addition, we present a statistical guarantee framework that can support a consistent video quality for the target call duration with minimum power consumption.
|
139 |
An Efficient Hybrid Objects Selection Protocol for 3D Streaming over Mobile DevicesAlja'afreh, Mohammad Mahmoud 20 December 2012 (has links)
With the rapid development in the areas of mobile manufacturing and multimedia communications, there is an increasing demand for Networked Virtual Environment (NVE) applications, such as Augmented Reality (AR), virtual walk-throughs, and massively multiplayer online games (MMOGs), on hand-held devices. Unfortunately, downloading and rendering a complex 3D scene is very computationally intensive and is not compatible with current mobile hardware specifications nor with available wireless bandwidth. Existing NVE applications deploy client/server based 3D streaming over thin mobile devices, which suffer from single point of failure, latency, and scalability issues. To address these issues, image-based rendering (IBR) and cloud-based 3D streaming have been introduced. The former introduces visual artifacts that reduce, and usually cancel, the realistic behaviors of the Virtual Environment (VE) application, while the latter is considered very expensive to implement. Peer-to-peer (P2P) 3D streaming is promising and affordable, but it has to tackle issues in object discovery and selection as well as content provider strategies. Distributing VE content over a mobile ad-hoc network (MANET) makes the system difficult to update due to the dynamic nature of the mobile clients. In order to tackle these issues, we came up with a novel protocol that combines the pros of both central and distributed approaches. Our proposed hybrid protocol, called OCTET, enables 3D scene streaming over thin devices in a way that can cope with current mobile hardware capabilities and mitigate the challenges of client/server and P2P 3D streaming. In fact, OCTET provides strategies that select, prioritize, and deliver only those objects that contribute to the user’s visible scene. OCTET is implemented using the "ns-2" simulation environment, and extensive experiments have clearly demonstrated significant achievements in mobile resource utilization, throughput, and system scalability.
|
140 |
Simulation-Assisted QoS-Aware VHO in Wireless Heterogeneous NetworksAl Ridhawi, Ismaeel 08 January 2014 (has links)
The main goal of today’s wireless Service Providers (SPs) is to provide optimum and ubiquitous service for roaming users while maximizing the SPs own monetary profits. The fundamental objective is to support such requirements by providing solutions that are adaptive to varying conditions in highly mobile and heterogeneous, as well as dynamically changing wireless network infrastructures. This can only be achieved through well-designed management systems. Most techniques fail to utilize the knowledge gained from previously tested reconfiguration strategies on system and network behaviour.
This dissertation presents a novel framework that automates the cooperation among a number of wireless SPs facing the challenge of meeting strict service demands for a large number of mobile users. The proposed work employs a novel policy-based system configuration model to automate the process of adapting new network policies. The proposed framework relies on the assistance of a real-time simulator that runs as a constant background process in order to continuously find optimal policy configurations for the SPs’ networks. To minimize the computational time needed to find these configurations, a modified tabu-search scheme is proposed. An objective is to efficiently explore the space of network configurations in order to find optimal network decisions and provide a service performance that adheres to contracted service level agreements.
This framework also relies on a distributed Quality of Service (QoS) monitoring scheme. The proposed scheme relies on the efficient identification of candidate QoS monitoring users that can efficiently submit QoS related measurements on behalf of their neighbors. These candidate users are chosen according to their devices’ residual power and transmission capabilities and their estimated remaining service lifetime. Service monitoring users are then selected from these candidates using a novel user-to-user semantic similarity matching algorithm. This step ensures that the monitoring users are reporting on behalf of other users that are highly similar to them in terms of their mobility, used services and device profiles.
Experimental results demonstrate the significant gains achieved in terms of the reduced traffic overhead and overall consumed users’ devices power while achieving a high monitoring accuracy, adaptation time speedup, base station load balancing, and individual providers’ payoffs.
|
Page generated in 0.0631 seconds