• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 95
  • 29
  • 27
  • 19
  • 8
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 234
  • 234
  • 42
  • 37
  • 36
  • 35
  • 31
  • 31
  • 29
  • 27
  • 27
  • 27
  • 22
  • 21
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Optimalizace bezdrátových WiFi distribuovaných sítí / Optimization of WiFi Distributed Nets

Žlůva, Ivan January 2009 (has links)
This thesis describes theoretic proposal and two practical realization of multi - point wireless network, first for communications between two endpoints and second for wireless signal coverage of a structured space. The wireless network is realized by the equipment working in unlicenced 2,4GHz and 5GHz ISM band. The wireless device are configured in three different wireless mods: WDS, WDS bridge and AP. This paper contains short information about IEEE 802.11a/b/g/n standard and associated proprietary wireless specifications. Practical workshop describes several variants connections and present the result of throughtput measurements, depending on wireless network topology.
142

Modeling Security and Resource Allocation for Mobile Multi-hop Wireless Neworks Using Game Theory

Njilla, Laurent L. Y. 09 September 2015 (has links)
This dissertation presents novel approaches to modeling and analyzing security and resource allocation in mobile ad hoc networks (MANETs). The research involves the design, implementation and simulation of different models resulting in resource sharing and security’s strengthening of the network among mobile devices. Because of the mobility, the network topology may change quickly and unpredictably over time. Moreover, data-information sent from a source to a designated destination node, which is not nearby, has to route its information with the need of intermediary mobile nodes. However, not all intermediary nodes in the network are willing to participate in data-packet transfer of other nodes. The unwillingness to participate in data forwarding is because a node is built on limited resources such as energy-power and data. Due to their limited resource, nodes may not want to participate in the overall network objectives by forwarding data-packets of others in fear of depleting their energy power. To enforce cooperation among autonomous nodes, we design, implement and simulate new incentive mechanisms that used game theoretic concepts to analyze and model the strategic interactions among rationale nodes with conflicting interests. Since there is no central authority and the network is decentralized, to address the concerns of mobility of selfish nodes in MANETs, a model of security and trust relationship was designed and implemented to improve the impact of investment into trust mechanisms. A series of simulations was carried out that showed the strengthening of security in a network with selfish and malicious nodes. Our research involves bargaining for resources in a highly dynamic ad-hoc network. The design of a new arbitration mechanism for MANETs utilizes the Dirichlet distribution for fairness in allocating resources. Then, we investigated the problem of collusion nodes in mobile ad-hoc networks with an arbitrator. We model the collusion by having a group of nodes disrupting the bargaining process by not cooperating with the arbitrator. Finally, we investigated the resource allocation for a system between agility and recovery using the concept of Markov decision process. Simulation results showed that the proposed solutions may be helpful to decision-makers when allocating resources between separated teams.
143

Návrh, realizace a simulace síťových protokolů v NS2 / Design, realization and simulation of network protocols in NS2

Zvolenský, Daniel January 2010 (has links)
The aim of this work is to become familiar with simulation environment Network Simulator 2, study the problems of sensor networks and their support in the simulator and implement the selected protocol and verify its funcitonality in a practical simulation.
144

Aplikace pro zobrazení modelu bezdrátové sítě / Application for display wireless network model

Žoldoš, Petr January 2011 (has links)
The first step of Master's thesis was to gain knowledge about technologies Adobe Flex SDK and Google Maps API. Knowledge was used to develop an application, which let users create, generate and modify graphical wireless network model. Position and characteristics of each single unit are monitored either in a map interface or in building plans. Dates are gathered from forms filled by current user, from external file or periodically from connected database system. Theoretical part enlightens technologies that were used. It describes program development and solutions, which were made, along with examples of the source code. Included are printscreens of graphical user interface as well as description of how does it all work.
145

Bezpečnost bezdrátové sítě poskytovatele internetových služeb / Wireless Network Security of Internet Service Provider

Parolek, Pavel January 2013 (has links)
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
146

Využití mobilních AP jednotek pro bezdrátové připojení koncových zařízení / Mobile AP Units Utilization of Wireless Connection for End User Devices

Nárožný, Tomáš January 2009 (has links)
The work deals with design and implementation of multi-point wireless network connecting selected end devices (IP cameras). The Access Points (AP) using frequency band 2.4 GHz establish the connection. They are connected using wireless distribution system (WDS). The work briefly describes standard IEEE 802.11g which is base of the design. Practical part is composed of network throughput measuring, signal strength measuring of access points with description and description of all other used devices.
147

Optimal Content Management and Dimensioning in Wireless Networks / Gestion de contenu optimale et dimensionnement de mémoire dans les réseaux sans fil

Krolikowski, Jonatan 06 November 2018 (has links)
L'augmentation massive du trafic cellulaire pose de sérieux défis à tous les acteurs concernés par la diffusion de contenu sans fil. Alors que la densification du réseau permet d’accéder à des utilisateurs supplémentaires, les liaisons de transport à grande vitesse et à grande capacité sont coûteuses. La mise en cache du contenu populaire en bordure du réseau permettra de décharger le trafic utilisateur de ces connexions, susceptibles d'être encombrées, ainsi que des centres de données du réseau fédérateur. Cette thèse propose un modèle économique dans lequel un opérateur de réseau mobile (Mobile Network Operator, MNO) pré-installe et entretient des caches sur son équipement sans fil (stations de base avec cache, CBS). L’espace mémoire ainsi que les capacités de calcul sont ensuite loués aux fournisseurs de contenu (CP) qui souhaitent rapprocher leur contenu de l'utilisateur. Pour une compensation financière, un CP peut alors décharger le trafic de son centre de données et améliorer la qualité de service des utilisateurs. Le CP prend des décisions de placement de contenu en fonction des données prédictives sur le trafic des utilisateurs et la popularité du contenu. Dans la phase de livraison, un utilisateur peut être desservi à partir des caches pour le cas où il serait associé à une station sur laquelle le contenu demandé est mis en cache. Ce travail examine trois aspects du modèle économique proposé : La première question de recherche porte sur l'association des utilisateurs en tant qu'élément central du schéma de mise en cache à la bordure du réseau. Les stratégies d'association des utilisateurs prenant en compte le cache peuvent permettre aux utilisateurs dans des zones de chevauchement de couverture d'être associés à une CBS contenant le contenu demandé plutôt que conventionnellement à celui qui fournit le signal le plus puissant. La thèse propose un algorithme décentralisé original pour une association d'utilisateurs appelée Generalized Bucket-filling qui permet des gains au-delà de la maximisation du taux de réussite. Les mesures de performance telles que le débit du réseau et l'équilibrage de la charge des utilisateurs parmi les CBS sont prises en compte. Les expériences montrent que l'association des utilisateurs au cache augmente le taux de réussite sans surcharger les CBS uniques tout en fournissant un débit élevé du système. Le deuxième problème traité concerne un seul CP qui doit décider de l'espace de cache à louer à chaque CBS pour un prix fixe et du contenu à placer. Ses choix doivent être basés sur des estimations de la popularité des fichiers ainsi que sur la politique d'association des utilisateurs du MNO. Le problème de leasing et de placement du contenu du cache est formulé sous la forme d'un problème non linéaire mixte en nombres entiers (NLMIP). Dans sa solution, le problème est séparé en un sous-problème linéaire discret et un sous-problème continu non linéaire utilisant la décomposition de Benders. Le CP et le MNO coopèrent, aidant le CP à prendre des décisions optimales qui profitent aux deux parties : Le CP maximise ses économies grâce à la mise en cache tandis que le MNO peut trouver le prix de cache optimal et recevoir la compensation financière maximale. Une troisième question de recherche élargit la portée de l'interaction entre plusieurs CPs et un opérateur de réseau mobile. Désormais, le MNO ne fixe pas de prix fixe par unité de mémoire, mais réagit aux demandes des CPs en matière d'espace mémoire en fonction des économies réalisées grâce à la mise en cache. / The massive increase in cellular traffic poses serious challenges to all actors concerned with wireless content delivery. While network densification provides access to additional users, high-speed and high-capacity backhaul connections are expensive. Caching popular content at the network edge promises to offload user traffic from these congestion prone connections as well as from the data centers in the backbone network. This thesis proposes a business model in which a mobile network operator (MNO) pre-installs and maintains caches at its wireless equipment (Cache-equipped Base Stations, CBSs). Memory space together with computational capabilities is then leased to content providers (CPs) that want to bring their content closer to the user. For a financial compensation, a CP can then offload traffic from its data center and improve user Quality of Service. The CP makes content placement decisions based on predictive user traffic and content popularity data. In the delivery phase, users can be served from the caches in case they are associated to stations that have the requested content cached. This work investigates three aspects of the proposed business model: The first research question focuses on user association as a central element to the edge caching scheme. Cache-aware user association policies can allow for users in coverage overlap areas to be associated to a CBS that holds the requested content rather than conventionally to the one that provides the strongest signal. The thesis proposes an original decentralized algorithm for user association called Generalized Bucket-filling that allows gains beyond maximizing the hit ratio. Performance metrics such as network throughput and load balancing of users among CBSs are taken into account. Experiments show that cache-aware user association a) increases the hit ratio b) without overloading single CBSs while c) providing high system throughput. The second problem treated considers a single CP that needs to decide how much cache space to lease at each CBS for a fixed price, and what content to place. Its choices should be based on estimates of file popularity as well as MNO user association policy. The cache leasing and content placement problem is formulated as a non-linear mixed-integer problem (NLMIP). In its solution, the problem is separated into a linear discrete CP subproblem and a nonlinear continuous subproblem using Benders decomposition. The CP and the MNO cooperate, helping the CP to make optimal decisions that benefit both parties: The CP maximizes its savings from caching while the MNO can find the optimal cache price and receive the maximum financial compensation. A third research question widens the focus to the interaction between several CPs and one MNO. Now, the MNO does not set a fixed price per memory unit but instead reacts to CP demands for memory space that depend on the savings they can achieve from caching.
148

Optimalizace bezdrátových WiFi distribuovaných sítí / Optimization of WiFi Distributed Nets

Žlůva, Ivan January 2010 (has links)
This thesis describes theoretic proposal and two practical realization of multi - point wireless network, first for communications between two endpoints and second for wireless signal coverage of a structured space. The wireless network is realized by the equipment working in unlicenced 2,4GHz and 5GHz ISM band. The wireless device are configured in three different wireless mods: WDS, WDS bridge and AP. This paper contains short information about IEEE 802.11a/b/g/n standard and associated proprietary wireless specifications. Practical workshop describes several variants connections and present the result of throughtput measurements, depending on wireless network topology.
149

An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network

Farhat, Md Tanzin January 2018 (has links)
No description available.
150

Effective Use of Network Coding in Multi-hop Wireless Networks

Chi, Yang January 2013 (has links)
No description available.

Page generated in 0.095 seconds