• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 5
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 48
  • 48
  • 48
  • 17
  • 15
  • 14
  • 10
  • 8
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters

Akbar, Yousef M. A. H. 11 May 2020 (has links)
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to most researchers and operators in this field. The new computing and communications structure brings new vulnerabilities along with all the benefits it provides. Cyber security of the power grid is critical due to the potential impact it can make on the community or society that relies on the critical infrastructure. These vulnerabilities have already been exploited in the attack on the Ukrainian power grid, a highly sophisticated, multi-layered attack which caused large power outages for numerous customers. There is an urgent need to understand the cyber aspects of the modernized power grid and take the necessary precautions such that the security of the CPS can be better achieved. The power grid is dependent on two main cyber infrastructures, i.e., Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI). This thesis investigates the AMI in power grids by developing a testbed environment that can be created and used to better understand and develop security strategies to remove the vulnerabilities that exist within it. The testbed is to be used to conduct and implement security strategies, i.e., an Intrusion Detections Systems (IDS), creating an emulated environment to best resemble the environment of the AMI system. A DoS flooding attack and an IDS are implemented on the emulated testbed to show the effectiveness and validate the performance of the emulated testbed. / M.S. / The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
42

Towards autonomous irrigation : comparison of two moisture sensing technologies, irrigation distribution analysis, and wireless network performance at an ornamental container nursery

Bailey, Daniel R. (Daniel Roger) 22 December 2011 (has links)
As ornamental container nurseries face diminishing water allocations, many are looking to automated irrigation solutions to increase their water application efficiency. This thesis presents the findings of a study conducted at a commercial container nursery to determine 1) whether a capacitance or load cell sensor was better suited for monitoring volumetric water content in the substrate; 2) if the actual irrigation distribution conformed to the expected pattern, how uniform were the weights of plants, and how these combined with plant canopy affected the leaching fraction; and 3) the reliability of the wireless network used to transmit the data to a central database. It was found that 1) the load cells outperformed the capacitance-based sensors because the load cells took an integrated measure; 2) the actual irrigation pattern followed the expected pattern, the variation of irrigation sections were low (C.V. = 0.06) and similar (C.V. ranging from 0.029 to 0.12), and unpruned plant canopies produced greater leaching fraction than pruned canopies (P < 0.18); and 3) wireless network transmission reliability was low (75.2%), suggesting that the system was not suitable for real-time irrigation control, but was sufficient for calculating irrigation length and monitoring net effective irrigation application and evapotranspirative consumption. / Graduation date: 2012
43

Optimisation de la capacité et de la consommation énergétique dans les réseaux maillés sans fil / Energy and capacity optimization for wireless mesh networks

Ouni, Anis 12 December 2013 (has links)
Les réseaux maillés sans fil sont une solution efficace, de plus en plus mise en œuvre en tant qu’infrastructure, pour interconnecter les stations d’accès des réseaux radio. Ces réseaux doivent absorber une croissance très forte du trafic généré par les terminaux de nouvelle génération. Cependant, l’augmentation du prix de l’énergie, ainsi que les préoccupations écologiques et sanitaires, poussent à s’intéresser à la minimisation de la consommation énergétique de ces réseaux. Ces travaux de thèse s’inscrivent dans les problématiques d’optimisation de la capacité et de la minimisation de la consommation énergétique globale des réseaux radio maillés. Nous définissons la capacité d’un réseau comme la quantité de trafic que le réseau peut supporter par unité de temps. Ces travaux s’articulent autour de quatre axes. Tout d’abord, nous abordons le problème d’amélioration de la capacité des réseaux radio maillés de type WIFI où l’accès au médium radio se base sur le protocole d’accès CSMA/CA. Nous mettons en lumière, les facteurs déterminants qui impactent la capacité du réseau, et l’existence d’un goulot d’étranglement qui limite cette capacité du réseau. Ensuite, nous proposons une architecture de communication basée sur l’utilisation conjointe de CSMA/CA et de TDMA afin de résoudre ce problème de goulot d’étranglement. Dans la deuxième partie de cette thèse, nous nous intéressons aux réseaux maillés sans fil basés sur un partage des ressources temps-fréquence. Afin de calculer des bornes théoriques sur les performances du réseau, nous développons des modèles d’optimisation basés sur la programmation linéaire et la technique de génération de colonnes. Ces modèles d’optimisation intègrent un modèle d’interférence SINR avec contrôle de puissance continue et variation de taux de transmission. Ils permettent, en particulier, de calculer une configuration optimale du réseau qui maximise la capacité ou minimise la consommation d’énergie. Ensuite, dans le troisième axe de recherche, nous étudions en détail le compromis entre la capacité du réseau et la consommation énergétique. Nous mettons en évidence plusieurs résultats d’ingénierie nécessaires pour un fonctionnement optimal d’un réseau maillé sans fil. Enfin, nous nous focalisons sur les réseaux cellulaires hétérogènes. Nous proposons des outils d’optimisation calculant une configuration optimale des stations de base qui maximise la capacité du réseau avec une consommation efficace d’énergie. Ensuite, afin d’économiser l’énergie, nous proposons une heuristique calculant un ordonnancement des stations et leur mise en mode d’endormissement partiel selon deux stratégies différentes, nommées LAFS et MAFS. / Wireless mesh networks (WMN) are a promising solution to support high data rate and increase the capacity provided to users, e.g. for meeting the requirements of mobile multimedia applications. However, the rapid growth of traffic load generated by the terminals is accompanied by an unsustainable increase of energy consumption, which becomes a hot societal and economical challenges. This thesis relates to the problem of the optimization of network capacity and energy consumption of wireless mesh networks. The network capacity is defined as the maximum achievable total traffic in the network per unit time. This thesis is divided into four main parts. First, we address the problem of improvement of the capacity of 802.11 wireless mesh networks. We highlight some insensible properties and deterministic factors of the capacity, while it is directly related to a bottleneck problem. Then, we propose a joint TDMA/CSMA scheduling strategy for solving the bottleneck issue in the network. Second, we focus on broadband wireless mesh networks based on time-frequency resource management. In order to get theoretical bounds on the network performances, we formulate optimization models based on linear programming and column generation algorithm. These models lead to compute an optimal offline configuration which maximizes the network capacity with low energy consumption. A realistic SINR model of the physical layer allows the nodes to perform continuous power control and use a discrete set of data rates. Third, we use the optimization models to provide practical engineering insights on WMN. We briefly study the tradeoff between network capacity and energy consumption using a realistic physical layer and SINR interference model. Finally, we focus on capacity and energy optimization for heterogeneous cellular networks. We develop, first, optimization tools to calculate an optimal configuration of the network that maximizes the network capacity with low energy consumption. We second propose a heuristic algorithm that calculates a scheduling and partial sleeping of base stations in two different strategies, called LAFS and MAFS.
44

Analýza komerčního využití Wireless Mesh Network / Commercial use analysis of Wireless Mesh Network

Bystřická, Radka January 2011 (has links)
There is a constant development and continuous progress in the wireless technology field as it is in the all fields of information and communication technologies. One of the latest trends is the wireless mesh network. This type of network brings new features into the wireless field such as multihop, self-configuration, self-organization and self-healing. This enables the usage of wireless networks in new fields and industries or the upgrade of current implementations to meet new market demands. This thesis summarizes theoretical findings from this field from the users' point of view and functionality dimension. This is followed by a summary of possible applications, available technologies and known standards. The second half of the thesis consists of a requirement analysis of a chosen user group (the Fire Rescue Service of the Czech Republic) focusing on application of wireless mesh network for rescue operations. The analysis also includes test criteria and principles for test procedures for this application.
45

Gestion adaptative des ressources dans les réseaux maillés sans fil à multiples-radios multiples-canaux

Rezgui, Jihene 08 1900 (has links)
Depuis quelques années, la recherche dans le domaine des réseaux maillés sans fil ("Wireless Mesh Network (WMN)" en anglais) suscite un grand intérêt auprès de la communauté des chercheurs en télécommunications. Ceci est dû aux nombreux avantages que la technologie WMN offre, telles que l'installation facile et peu coûteuse, la connectivité fiable et l'interopérabilité flexible avec d'autres réseaux existants (réseaux Wi-Fi, réseaux WiMax, réseaux cellulaires, réseaux de capteurs, etc.). Cependant, plusieurs problèmes restent encore à résoudre comme le passage à l'échelle, la sécurité, la qualité de service (QdS), la gestion des ressources, etc. Ces problèmes persistent pour les WMNs, d'autant plus que le nombre des utilisateurs va en se multipliant. Il faut donc penser à améliorer les protocoles existants ou à en concevoir de nouveaux. L'objectif de notre recherche est de résoudre certaines des limitations rencontrées à l'heure actuelle dans les WMNs et d'améliorer la QdS des applications multimédia temps-réel (par exemple, la voix). Le travail de recherche de cette thèse sera divisé essentiellement en trois principaux volets: le contrôle d‟admission du trafic, la différentiation du trafic et la réaffectation adaptative des canaux lors de la présence du trafic en relève ("handoff" en anglais). Dans le premier volet, nous proposons un mécanisme distribué de contrôle d'admission se basant sur le concept des cliques (une clique correspond à un sous-ensemble de liens logiques qui interfèrent les uns avec les autres) dans un réseau à multiples-sauts, multiples-radios et multiples-canaux, appelé RCAC. Nous proposons en particulier un modèle analytique qui calcule le ratio approprié d'admission du trafic et qui garantit une probabilité de perte de paquets dans le réseau n'excédant pas un seuil prédéfini. Le mécanisme RCAC permet d‟assurer la QdS requise pour les flux entrants, sans dégrader la QdS des flux existants. Il permet aussi d‟assurer la QdS en termes de longueur du délai de bout en bout pour les divers flux. Le deuxième volet traite de la différentiation de services dans le protocole IEEE 802.11s afin de permettre une meilleure QdS, notamment pour les applications avec des contraintes temporelles (par exemple, voix, visioconférence). À cet égard, nous proposons un mécanisme d'ajustement de tranches de temps ("time-slots"), selon la classe de service, ED-MDA (Enhanced Differentiated-Mesh Deterministic Access), combiné à un algorithme efficace de contrôle d'admission EAC (Efficient Admission Control), afin de permettre une utilisation élevée et efficace des ressources. Le mécanisme EAC prend en compte le trafic en relève et lui attribue une priorité supérieure par rapport au nouveau trafic pour minimiser les interruptions de communications en cours. Dans le troisième volet, nous nous intéressons à minimiser le surcoût et le délai de re-routage des utilisateurs mobiles et/ou des applications multimédia en réaffectant les canaux dans les WMNs à Multiples-Radios (MR-WMNs). En premier lieu, nous proposons un modèle d'optimisation qui maximise le débit, améliore l'équité entre utilisateurs et minimise le surcoût dû à la relève des appels. Ce modèle a été résolu par le logiciel CPLEX pour un nombre limité de noeuds. En second lieu, nous élaborons des heuristiques/méta-heuristiques centralisées pour permettre de résoudre ce modèle pour des réseaux de taille réelle. Finalement, nous proposons un algorithme pour réaffecter en temps-réel et de façon prudente les canaux aux interfaces. Cet algorithme a pour objectif de minimiser le surcoût et le délai du re-routage spécialement du trafic dynamique généré par les appels en relève. Ensuite, ce mécanisme est amélioré en prenant en compte l‟équilibrage de la charge entre cliques. / In the last few years, Wireless Mesh Networks (WMNs) area brought a new field of advanced research among network specialized scientists. This is due to the many advantages which WMN technology offers, such as: easy and inexpensive installation, reliable connectivity and flexible interoperability with other existing networks (Wi-Fi, WiMax, Cellular, Sensors, WPAN networks, etc.). However, several problems still remain to be solved such as the scalability, the security, the quality of service (QoS), the resources management, etc. These problems persist for WMNs, therefore the researchers propose to improve the existing protocols or to conceive new protocols for WMNs. In order to solve some of the current limitations met in the wireless networks and to improve QoS of real time multimedia applications in such networks, our research will be divided primarily into three parts: traffic admission control, traffic differentiation and handoff-aware channel assignment schemes. In the first part, we propose a distributed admission control scheme for WMNs, namely, Routing on Cliques (a clique is defined as a subset of logical links that interfere with each other) Admission Control (RCAC). Particularly, we propose an analytical model to compute the appropriate acceptance ratio and guarantee that the packet loss probability in the network does not exceed a threshold value. The model also allows computing end-to-end delay to process flow requests with delay constraints. In the second part, we design an efficient scheduler for Mesh Deterministic Access (MDA) in IEEE 802.11s-based WMNs, called Enhanced Differentiated-MDA (ED-MDA) to support voice and video applications with strict requirements on delay and on blocking/dropping probability. ED-MDA together with Enhanced Admission Control, namely EAC, reserves the minimum amount of necessary resources while maintaining an acceptable handoff call dropping and high resource utilization. The final section addresses handoff-aware channel assignment (CA) problem in Multiple Radios WMNs (MR-WMNs). In this section, we first propose a multi-objective optimization model that, besides maximizing throughput, improves fairness and handoff experience of mesh clients. In this model, the Jain’s index is used to maximize users’ fairness and to allow same channel assignments to links involved in the same high handoff traffic, thus reducing handoff-triggered re-routing characterized by its high latency. Second, we solved this model to obtain exact solutions by the CPLEX software for a limited number of nodes. We therefore propose to use centralized heuristics/meta-heuristics algorithms as an offline CA process to obtain near-optimal solutions for larger instances (real size network). Moreover, in order to adapt to traffic dynamics caused especially by user handoffs, an online CA scheme is proposed that carefully re-assigns channels to interfaces with the purpose of continuously minimizing the re-routing overhead/latency during user handoffs. This online scheme is improved using load balancing.
46

Contention techniques for opportunistic communication in wireless mesh networks

Kurth, Mathias 06 February 2012 (has links)
Auf dem Gebiet der drahtlosen Kommunikation und insbesondere auf den tieferen Netzwerkschichten sind gewaltige Fortschritte zu verzeichnen. Innovative Konzepte und Technologien auf der physikalischen Schicht (PHY) gehen dabei zeitnah in zelluläre Netze ein. Drahtlose Maschennetzwerke (WMNs) können mit diesem Innovationstempo nicht mithalten. Die Mehrnutzer-Kommunikation ist ein Grundpfeiler vieler angewandter PHY Technologien, die sich in WMNs nur ungenügend auf die etablierte Schichtenarchitektur abbilden lässt. Insbesondere ist das Problem des Scheduling in WMNs inhärent komplex. Erstaunlicherweise ist der Mehrfachzugriff mit Trägerprüfung (CSMA) in WMNs asymptotisch optimal obwohl das Verfahren eine geringe Durchführungskomplexität aufweist. Daher stellt sich die Frage, in welcher Weise das dem CSMA zugrunde liegende Konzept des konkurrierenden Wettbewerbs (engl. Contention) für die Integration innovativer PHY Technologien verwendet werden kann. Opportunistische Kommunikation ist eine Technik, die die inhärenten Besonderheiten des drahtlosen Kanals ausnutzt. In der vorliegenden Dissertation werden CSMA-basierte Protokolle für die opportunistische Kommunikation in WMNs entwickelt und evaluiert. Es werden dabei opportunistisches Routing (OR) im zustandslosen Kanal und opportunistisches Scheduling (OS) im zustandsbehafteten Kanal betrachtet. Ziel ist es, den Durchsatz von elastischen Paketflüssen gerecht zu maximieren. Es werden Modelle für Überlastkontrolle, Routing und konkurrenzbasierte opportunistische Kommunikation vorgestellt. Am Beispiel von IEEE 802.11 wird illustriert, wie der schichtübergreifende Entwurf in einem Netzwerksimulator prototypisch implementiert werden kann. Auf Grundlage der Evaluationsresultate kann der Schluss gezogen werden, dass die opportunistische Kommunikation konkurrenzbasiert realisierbar ist. Darüber hinaus steigern die vorgestellten Protokolle den Durchsatz im Vergleich zu etablierten Lösungen wie etwa DCF, DSR, ExOR, RBAR und ETT. / In the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY technologies rely on multi-user communication, so that the established abstraction of the network stack does not work well for WMNs. The scheduling problem in WMNs is inherent complex. Surprisingly, carrier sense multiple access (CSMA) in WMNs is asymptotically utility-optimal even though it has a low computational complexity and does not involve message exchange. Hence, the question arises whether CSMA and the underlying concept of contention allows for the assimilation of advanced PHY technologies into WMNs. In this thesis, we design and evaluate contention protocols based on CSMA for opportunistic communication in WMNs. Opportunistic communication is a technique that relies on multi-user diversity in order to exploit the inherent characteristics of the wireless channel. In particular, we consider opportunistic routing (OR) and opportunistic scheduling (OS) in memoryless and slow fading channels, respectively. We present models for congestion control, routing and contention-based opportunistic communication in WMNs in order to maximize both throughput and fairness of elastic unicast traffic flows. At the instance of IEEE 802.11, we illustrate how the cross-layer algorithms can be implemented within a network simulator prototype. Our evaluation results lead to the conclusion that contention-based opportunistic communication is feasible. Furthermore, the proposed protocols increase both throughput and fairness in comparison to state-of-the-art approaches like DCF, DSR, ExOR, RBAR and ETT.
47

Gestion adaptative des ressources dans les réseaux maillés sans fil à multiples-radios multiples-canaux

Rezgui, Jihene 08 1900 (has links)
Depuis quelques années, la recherche dans le domaine des réseaux maillés sans fil ("Wireless Mesh Network (WMN)" en anglais) suscite un grand intérêt auprès de la communauté des chercheurs en télécommunications. Ceci est dû aux nombreux avantages que la technologie WMN offre, telles que l'installation facile et peu coûteuse, la connectivité fiable et l'interopérabilité flexible avec d'autres réseaux existants (réseaux Wi-Fi, réseaux WiMax, réseaux cellulaires, réseaux de capteurs, etc.). Cependant, plusieurs problèmes restent encore à résoudre comme le passage à l'échelle, la sécurité, la qualité de service (QdS), la gestion des ressources, etc. Ces problèmes persistent pour les WMNs, d'autant plus que le nombre des utilisateurs va en se multipliant. Il faut donc penser à améliorer les protocoles existants ou à en concevoir de nouveaux. L'objectif de notre recherche est de résoudre certaines des limitations rencontrées à l'heure actuelle dans les WMNs et d'améliorer la QdS des applications multimédia temps-réel (par exemple, la voix). Le travail de recherche de cette thèse sera divisé essentiellement en trois principaux volets: le contrôle d‟admission du trafic, la différentiation du trafic et la réaffectation adaptative des canaux lors de la présence du trafic en relève ("handoff" en anglais). Dans le premier volet, nous proposons un mécanisme distribué de contrôle d'admission se basant sur le concept des cliques (une clique correspond à un sous-ensemble de liens logiques qui interfèrent les uns avec les autres) dans un réseau à multiples-sauts, multiples-radios et multiples-canaux, appelé RCAC. Nous proposons en particulier un modèle analytique qui calcule le ratio approprié d'admission du trafic et qui garantit une probabilité de perte de paquets dans le réseau n'excédant pas un seuil prédéfini. Le mécanisme RCAC permet d‟assurer la QdS requise pour les flux entrants, sans dégrader la QdS des flux existants. Il permet aussi d‟assurer la QdS en termes de longueur du délai de bout en bout pour les divers flux. Le deuxième volet traite de la différentiation de services dans le protocole IEEE 802.11s afin de permettre une meilleure QdS, notamment pour les applications avec des contraintes temporelles (par exemple, voix, visioconférence). À cet égard, nous proposons un mécanisme d'ajustement de tranches de temps ("time-slots"), selon la classe de service, ED-MDA (Enhanced Differentiated-Mesh Deterministic Access), combiné à un algorithme efficace de contrôle d'admission EAC (Efficient Admission Control), afin de permettre une utilisation élevée et efficace des ressources. Le mécanisme EAC prend en compte le trafic en relève et lui attribue une priorité supérieure par rapport au nouveau trafic pour minimiser les interruptions de communications en cours. Dans le troisième volet, nous nous intéressons à minimiser le surcoût et le délai de re-routage des utilisateurs mobiles et/ou des applications multimédia en réaffectant les canaux dans les WMNs à Multiples-Radios (MR-WMNs). En premier lieu, nous proposons un modèle d'optimisation qui maximise le débit, améliore l'équité entre utilisateurs et minimise le surcoût dû à la relève des appels. Ce modèle a été résolu par le logiciel CPLEX pour un nombre limité de noeuds. En second lieu, nous élaborons des heuristiques/méta-heuristiques centralisées pour permettre de résoudre ce modèle pour des réseaux de taille réelle. Finalement, nous proposons un algorithme pour réaffecter en temps-réel et de façon prudente les canaux aux interfaces. Cet algorithme a pour objectif de minimiser le surcoût et le délai du re-routage spécialement du trafic dynamique généré par les appels en relève. Ensuite, ce mécanisme est amélioré en prenant en compte l‟équilibrage de la charge entre cliques. / In the last few years, Wireless Mesh Networks (WMNs) area brought a new field of advanced research among network specialized scientists. This is due to the many advantages which WMN technology offers, such as: easy and inexpensive installation, reliable connectivity and flexible interoperability with other existing networks (Wi-Fi, WiMax, Cellular, Sensors, WPAN networks, etc.). However, several problems still remain to be solved such as the scalability, the security, the quality of service (QoS), the resources management, etc. These problems persist for WMNs, therefore the researchers propose to improve the existing protocols or to conceive new protocols for WMNs. In order to solve some of the current limitations met in the wireless networks and to improve QoS of real time multimedia applications in such networks, our research will be divided primarily into three parts: traffic admission control, traffic differentiation and handoff-aware channel assignment schemes. In the first part, we propose a distributed admission control scheme for WMNs, namely, Routing on Cliques (a clique is defined as a subset of logical links that interfere with each other) Admission Control (RCAC). Particularly, we propose an analytical model to compute the appropriate acceptance ratio and guarantee that the packet loss probability in the network does not exceed a threshold value. The model also allows computing end-to-end delay to process flow requests with delay constraints. In the second part, we design an efficient scheduler for Mesh Deterministic Access (MDA) in IEEE 802.11s-based WMNs, called Enhanced Differentiated-MDA (ED-MDA) to support voice and video applications with strict requirements on delay and on blocking/dropping probability. ED-MDA together with Enhanced Admission Control, namely EAC, reserves the minimum amount of necessary resources while maintaining an acceptable handoff call dropping and high resource utilization. The final section addresses handoff-aware channel assignment (CA) problem in Multiple Radios WMNs (MR-WMNs). In this section, we first propose a multi-objective optimization model that, besides maximizing throughput, improves fairness and handoff experience of mesh clients. In this model, the Jain’s index is used to maximize users’ fairness and to allow same channel assignments to links involved in the same high handoff traffic, thus reducing handoff-triggered re-routing characterized by its high latency. Second, we solved this model to obtain exact solutions by the CPLEX software for a limited number of nodes. We therefore propose to use centralized heuristics/meta-heuristics algorithms as an offline CA process to obtain near-optimal solutions for larger instances (real size network). Moreover, in order to adapt to traffic dynamics caused especially by user handoffs, an online CA scheme is proposed that carefully re-assigns channels to interfaces with the purpose of continuously minimizing the re-routing overhead/latency during user handoffs. This online scheme is improved using load balancing.
48

Modelo de otimização multiobjetivo para roteamento em redes sem fio / Multiobjective optimization model for wireless network routing — a three-purpose approach

Medeiros, Vinícius Nunes 01 September 2017 (has links)
Submitted by Marlene Santos (marlene.bc.ufg@gmail.com) on 2017-09-29T20:50:34Z No. of bitstreams: 2 Dissertação - Vínicius Nunes Medeiros - 2017.pdf: 3262332 bytes, checksum: 6481a1cb0287306368b482913e18928d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-10-02T12:58:17Z (GMT) No. of bitstreams: 2 Dissertação - Vínicius Nunes Medeiros - 2017.pdf: 3262332 bytes, checksum: 6481a1cb0287306368b482913e18928d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Made available in DSpace on 2017-10-02T12:58:17Z (GMT). No. of bitstreams: 2 Dissertação - Vínicius Nunes Medeiros - 2017.pdf: 3262332 bytes, checksum: 6481a1cb0287306368b482913e18928d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-09-01 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / Owing to the huge range of application scenarios for wireless networks, new prospects for the current and future applications of the Internet, making new communication paradigms such as the Internet of Things (IoT) and 5G networks. Two important networks are included in this scenery: Wireless Sensor Networks (WSN) provide key devices for developing the IoT communication paradigm, such as the sensors used for collecting different kind of information, and the Wireless Mesh Network (WMN) that enable interoperability between heterogeneous network, covering large areas with at am low cost.Eeach one these networks have specific characteristics, for example, the WSN has serious restrictions (e.g. power consumption, low speed wireless links, interference) while the WMN offers high data rates through multiple radios and channels. In this context, it is necessary to find solutions that can ensure more efficient communication system based on the optimized utilization of the network resources. So it was created a multi-objective routing algorithm, called Routing-Aware of path Length, Link quality, and traffic Load (RALL). This seeks to strike a balance between three objectives: to minimize the network bottlenecks, to reduce path length, and to avoid links with low quality, for resolution the routing problem for WSN, Then the RALL approach was adapted to match the specialty of the WMN, entitled Routing Aware of path Length, Link quality, and traffic Load Weighted (RALLW). The results indicate that combining multiple objectives when performing routing can benefit networks performance. The RALL and RALLW results in a good performance with regard to the delivery rate, throughput, delay, and power consumption when compared to other approaches, however the RALLW approach did not significant differences when compared to the RALL. / A utilização das redes sem fio em diversas aplicações está criando uma nova perspectiva de utilidade para a Internet atual fazendo com que novos paradigmas de comunicação sejam desenvolvidos, como a Internet das coisas (IoT) e redes 5G. Dois tipos de rede sem fio se destacam nesses novos cenários, a Rede de Sensores Sem Fio (RSSF) que fornece dispositivos fundamentais para a implementação dos ambientes inteligentes e da IoT, e a Rede em Malha Sem Fio (RMSF) que permite a interoperabilidade entre os tipos de redes, cobrindo grandes áreas e com um custo relativamente baixo. Essas redes possuem peculiaridade específicas, por exemplo a RSSF possui fortes restrições de consumo energético e capacidade de transmissão, já a RMSF é uma rede com maior capacidade de transmissão e maior alcance. Nesse contexto, é necessário desenvolver soluções que tornam a rede eficiente através da otimização dos seus recursos. Inicialmente foi desenvolvida a abordagem Routing Aware of path Length, Link quality, and traffic Load (RALL) para realizar o roteamento multiobjetivo em RSSF, em seguida, realizamos uma adaptação dessa abordagem para refletir as especificidades dos cenários de uma RMSF, essa adaptação foi intitulada de Routing Aware of path Length, Link quality, and traffic Load Weigthed (RALLW). Em ambas abordagens o problema de roteamento multiobjetivo é composto por três objetivos (quantidade de saltos, quantidade de enlaces com baixa qualidade e balanceamento da rede), comuns a RSSF e a RMSF, apesar de existirem diferenças significativas entre elas ao modelar os objetivos. Os resultados indicam que a combinação de múltiplos objetivos ao realizar o roteamento pode beneficiar o desempenho da rede. As abordagens RALL e RALLW resultaram em bons resultados quando comparados com outras abordagens, em relação à taxa de entrega, vazão, atraso e consumo de energia, entretanto, a abordagem RALLW não mostrou diferenças significativas quando comparada a abordagem RALL.

Page generated in 0.4763 seconds