• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 286
  • 73
  • 43
  • 24
  • 24
  • 14
  • 8
  • 5
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 621
  • 621
  • 121
  • 121
  • 103
  • 95
  • 80
  • 69
  • 66
  • 63
  • 62
  • 61
  • 61
  • 58
  • 54
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Spatial spectrum reuse in wireless networks design and performance

Kim, Yuchul 01 June 2011 (has links)
This dissertation considers the design, evaluation and optimization of algorithms/ techniques/ system parameters for distributed wireless networks specifically ad-hoc and cognitive wireless networks. In the first part of the dissertation, we consider ad-hoc networks using opportunistic carrier sense multiple access (CSMA) protocols. The key challenge in optimizing the performance of such systems is to find a good compromise among three interdependent quantities: the density and channel quality of the scheduled transmitters, and the resulting interference seen at receivers. We propose two new channel-aware slotted CSMA protocols and study the tradeoffs they achieve amongst these quantities. In particular, we show that when properly optimized these protocols offer substantial improvements relative to regular CSMA -- particularly when the density of nodes is moderate to high. Moreover, we show that a simple quantile based opportunistic CSMA protocol can achieve robust performance gains without requiring careful parameter optimization. In the second part of the dissertation, we study a cognitive wireless network where licensed (primary) users and unlicensed 'cognitive' (secondary) users coexist on shared spectrum. In this context, many system design parameters affect the joint performance, e.g., outage and capacity, seen by the two user types. We explore the performance dependencies between primary and secondary users from a spatial reuse perspective, in particular, in terms of the outage probability, node density and joint network capacity. From the design perspective the key system parameters determining the joint transmission capacity, and tradeoffs, are the detection radius (detection signal to interference and noise power ratio (SINR) threshold) and decoding SINR threshold. We show how the joint network capacity region can be optimized by varying these parameters. In the third part of the dissertation, we consider a cognitive network in a heterogeneous environment, including indoor and outdoor transmissions. We characterize the joint network capacity region under three different spectrum (white space) detection techniques which have different degrees of radio frequency (RF) - environment awareness. We show that cognitive devices relying only on the classical signal energy detection method perform poorly due to limitations on detecting primary transmitters in environments with indoor shadowing. This can be circumvented through direct use (e.g., database access) of location information on primary transmitters, or better yet, on that of primary receivers. We also show that if cognitive devices have positioning information, then the secondary network's capacity increases monotonically with increased indoor shadowing in the environment. This dissertation extends the recent efforts in using stochastic geometric models to capture large scale performance characteristics of wireless systems. It demonstrates the usefulness of these models towards understanding the impact of physical /medium access (MAC) layer parameters and how they might be optimized. / text
192

Use Of Directional Antennas For Energy-Efficient Design Of Coordinator And Cluster Protocols In Ad hoc Wireless Networks

Vivek Kumar, * 04 1900 (has links) (PDF)
No description available.
193

Improving Message Dissemination in Opportunistic Networks

HERRERA TAPIA, JORGE 01 September 2017 (has links)
Data transmission has become a need in various fields, like in social networks with the diverse interaction applications, or in the scientific and engineering areas where for example the use of sensors to capture data is growing, or in emergency situations where there is the imperative need to have a communication system to coordinate rescue operations. Wireless networks have been able to solve these issues to a great extent, but what can we do when a fixed supporting infrastructure is not available or becomes inoperative because of saturation? Opportunistic wireless networks are an alternative to consider in these situations, since their operation does not depend on the existence of a telecommunications infrastructure but they provide connectivity through the organized cooperation of users. This research thesis focuses on these types of networks and is aimed at improving the dissemination of information in opportunistic networks analyzing the main causes that influence the performance of data transmission. Opportunistic networks do not depend on a fixed topology but depend on the number and mobility of users, the type and quantity of information generated and sent, as well as the physical characteristics of the mobile devices that users have to transmit the data. The combination of these elements impacts on the duration of the contact time between mobile users, directly affecting the information delivery probability. This thesis starts by presenting a thorough "state of the art" study where we present the most important contributions related to this area and the solutions offered for the evaluation of the opportunistic networks, such as simulation models, routing protocols, simulation tools, among others. After offering this broad background, we evaluate the consumption of the resources of the mobile devices that affect the performance of the the applications of opportunistic networks, both from the energetic and the memory point of view. Next, we analyze the performance of opportunistic networks considering either pedestrian and vehicular environments. The studied approaches include the use of additional fixed nodes and different data transmission technologies, to improve the duration of the contact between mobile devices. Finally, we propose a diffusion scheme to improve the performance of data transmission based on extending the duration of the contact time and the likelihood that users will collaborate in this process. This approach is complemented by the efficient management of the resources of the mobile devices. / La transmisión de datos se ha convertido en una necesidad en diversos ámbitos, como en las redes sociales con sus diversas aplicaciones, o en las áreas científicas y de ingeniería donde, por ejemplo, el uso de sensores para capturar datos está creciendo, o en situaciones de emergencia donde impera la necesidad de tener un sistema de comunicación para coordinar las operaciones de rescate. Las redes inalámbricas actuales han sido capaces de resolver estos problemas en gran medida, pero ¿qué podemos hacer cuando una infraestructura de soporte fija no está disponible o estas se vuelven inoperantes debido a la saturación de peticiones de red? Las redes inalámbricas oportunísticas son una alternativa a considerar en estas situaciones, ya que su funcionamiento no depende de la existencia de una infraestructura de telecomunicaciones sino que la conectividad es a través de la cooperación organizada de los usuarios. Esta tesis de investigación se centra en estos tipos de redes oportunísticas y tiene como objetivo mejorar la difusión de información analizando las principales causas que influyen en el rendimiento de la transmisión de datos. Las redes oportunísticas no dependen de una topología fija, sino que dependen del número y la movilidad de los usuarios, del tipo y cantidad de información generada y enviada, así como de las características físicas de los dispositivos móviles que los usuarios tienen para transmitir los datos. La combinación de estos elementos influye en la duración del tiempo de contacto entre usuarios móviles, afectando directamente a la probabilidad de entrega de información. Esta tesis comienza presentando un exhaustivo estudio del ``estado del arte", donde presentamos las contribuciones más importantes relacionadas con esta área y las soluciones existentes para la evaluación de las redes oportunísticas, tales como modelos de simulación, protocolos de enrutamiento, herramientas de simulación, entre otros. Tras ofrecer esta amplia compilación de investigaciones, se evalúa el consumo de recursos de los dispositivos móviles que afectan al rendimiento de las aplicaciones de redes oportunísticas, desde el punto de vista energético así como de la memoria. A continuación, analizamos el rendimiento de las redes oportunísticas considerando tanto los entornos peatonales como vehiculares. Los enfoques estudiados incluyen el uso de nodos fijos adicionales y diferentes tecnologías de transmisión de datos, para mejorar la duración del contacto entre dispositivos móviles. Finalmente, proponemos un esquema de difusión para mejorar el rendimiento de la transmisión de datos basado en la extensión de la duración del tiempo de contacto, y de la probabilidad de que los usuarios colaboren en este proceso. Este enfoque se complementa con la gestión eficiente de los recursos de los dispositivos móviles. / La transmissió de dades s'ha convertit en una necessitat en diversos àmbits, com ara en les xarxes socials amb les diverses aplicacions d'interacció, o en les àrees científiques i d'enginyeria, en les quals, per exemple, l'ús de sensors per a capturar dades creix en l'actualitat, o en situacions d'emergència en què impera la necessitat de tenir un sistema de comunicació per a coordinar les operacions de rescat. Les xarxes sense fil han sigut capaces de resoldre aquests problemes en gran manera, però què podem fer quan una infraestructura de suport fixa no està disponible, o bé aquestes es tornen inoperants a causa de la saturació de peticions de xarxa? Les xarxes sense fil oportunistes són una alternativa que cal considerar en aquestes situacions, ja que el funcionament d'aquestes xarxes no depèn de l'existència d'una infraestructura de telecomunicacions, sinó que la connectivitat s'hi aconsegueix a través de la cooperació organitzada dels usuaris. Aquesta tesi de recerca se centra en aquest tipus de xarxes, i té com a objectiu millorar la difusió d'informació en xarxes oportunistes tot analitzant les principals causes que influeixen en el rendiment de la transmissió de dades. Les xarxes oportunistes no depenen d'una topologia fixa, sinó del nombre i la mobilitat dels usuaris, del tipus i la quantitat d'informació generada i enviada, i de les característiques físiques dels dispositius mòbils que els usuaris tenen per a transmetre les dades. La combinació d'aquests elements influeix en la durada del temps de contacte entre usuaris mòbils, i afecta directament la probabilitat de lliurament d'informació. Aquesta tesi comença amb un estudi exhaustiu de l'estat de la qüestió, en què presentem les contribucions més importants relacionades amb aquesta àrea i les solucions oferides per a l'avaluació de les xarxes oportunistes, com ara models de simulació, protocols d'encaminament o eines de simulació, entre d'altres. Després de mostrar aquest ampli panorama, s'avalua el consum dels recursos dels dispositius mòbils que afecten l'acompliment de les aplicacions de xarxes oportunistes, tant des del punt de vista energètic com de la memòria. A continuació, analitzem l'acompliment de xarxes oportunistes considerant tant els entorns de vianants com els vehiculars. Els enfocaments estudiats inclouen l'ús de nodes fixos addicionals i diferents tecnologies de transmissió de dades per a millorar la durada del contacte entre dispositius mòbils. Finalment, proposem un esquema de difusió per a millorar el rendiment de la transmissió de dades basat en l'extensió de la durada del temps de contacte, i de la probabilitat que els usuaris col·laboren en aquest procés. Aquest enfocament es complementa amb la gestió eficient dels recursos dels dispositius mòbils. / Herrera Tapia, J. (2017). Improving Message Dissemination in Opportunistic Networks [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/86129 / TESIS
194

Topics In Modeling, Analysis And Optimisation Of Wireless Networks

Ramaiyan, Venkatesh 01 1900 (has links)
The work in this thesis is concerned with two complementary aspects of wireless networks research; performance analysis and resource optimization. The first part of the thesis focusses on the performance analysis of IEEE 802.11(e) wireless local area networks. We study the distributed coordination function (DCF) and the enhanced distributed channel access (EDCA) MAC of the IEEE 802.11(e) standard. We consider n IEEE 802.11(e) DCF (EDCA) nodes operating as a single cell; by single cell, we mean that every packet transmission can be heard by every other node. Packet loss is attributed only to simultaneous transmissions by the nodes (i.e., collisions). Using the well known decoupling approximation [19], we characterize the collision behaviour and the throughput performance of the WLAN with a set of fixed point equations involving the backoff parameters of the nodes. We observe that the fixed point equations can have multiple solutions, and in such cases, the system exhibits multistability and short-term unfairness of throughput. Also, the fixed point analysis fails to characterize the average system behaviour when the system has multiple solutions. We then obtain sufficient conditions (in terms of the backoff parameters of the nodes) under which the fixed point equations have a unique solution. For such cases, using simulations, we observe that the fixed point analysis predicts the long term time average throughput behaviour accurately. Then, using the fixed point analysis, we study throughput differentiation provided by the different backoff parameters, including minimum contention window (CWmin), persistence factor and arbitration interframe space (AIFS) of the IEEE 802.11e standard. Finally, we extend the above results to the case where the receiver supports physical layer capture. In the second part of the thesis, we study resource allocation and optimization problems for a variety of wireless network scenarios. For a dense wireless network, deployed over a small area and with a network average power constraint, we show that single cell operation (the channel supports only one successful transmission at any time) is throughput efficient in the asymptotic regime (in which the network average power is made large). We show that, for a realistic path loss model and a physical interference model (SINR based), the maximum aggregate bit rate among arbitrary transmitter-receiver pairs scales only as Θ(log(¯P)), where¯P is the network average power. Spatial reuse is ineffective and direct transmission between source destination pairs is the throughput optimal strategy. Then, operating the network with only a single successful transmission permitted at a time, and with CSMA being used to select the successful transmitter-receiver pair, we consider the situation in which there is stationary spatiotemporal channel fading. We study the optimal hop length (routing strategy) and power control (for a fading channel) that maximizes the network aggregate throughput for a given network power constraint. For a fixed transmission time scheme, we study the throughput maximizing schedule under homogeneous traffic and MAC assumptions. We also characterize the optimal operating point (hop length and power control) in terms of the network power constraint and the channel fade distribution. It is now well understood that in a multihop network, performance can be enhanced if, instead of just forwarding packets, the network nodes create output packets by judiciously combining their input packets, a strategy that is called “network coding.” For a two link slotted wireless network employing a network coding strategy and with fading channels, we study the optimal power control and optimal exploitation of network coding opportunities that minimizes the average power required to support a given arrival rate. We also study the optimal power-delay tradeoff for the network. Finally, we study a vehicular network problem, where vehicles are used as relays to transfer data between a pair of stationary source and destination nodes. The source node has a file to transfer to the destination node and we are interested in the delay minimizing schedule for the vehicular network. We characterize the average queueing delay (at the source node) and the average transit delay of the packets (at the relay vehicles) in terms of the vehicular speeds and their interarrival times, and study the asymptotically optimal tradeoff achievable between them.
195

Timer-Based Selection Schemes for Wireless Networks

Rajendra, Talak Rajat January 2013 (has links) (PDF)
Opportunistic selection is a practically appealing technique that is often used in multi-node wireless systems such as scheduling and rate adaptation in cellular systems and opportunistic wireless local area networks, wireless sensor networks, cooperative communications, and vehicular networks. In it, each node maintains a local preference number called metric that is function of its channel gains, and the best node with the highest metric is selected. Identifying the best node is challenging as the information about a node's metric is available only locally at each node. In our work, we focus on the popular, simple, and low feedback timer scheme for selection. In it, each node sets a timer as a function of its metric and transmits a packet when the timer expires. The metric-to-timer mapping maps larger metric values to smaller timer values, which ensures that the best node's timer expires first. However, it can fail to select the best node if another node transmits a packet within D s of the transmission by the best node. In this thesis, we make three contributions to the design and understanding of the timer-based selection scheme. Firstly, we introduce feedback overhead-aware contention resolution in the timer-based selection scheme. The outcome is a novel selection scheme that is faster than the splitting scheme and more reliable than the timer-based selection scheme. We analyze and minimize the average time required by the scheme to select the best node. Secondly, we characterize the optimal metric-to-timer mapping when the number of nodes in the system is not known, as is the case in several practical deployments. When the prior distribution of the nodes is known, we propose an optimal mapping that maximizes the success probability averaged over the distribution on the number of nodes. When even the prior distribution is not known, we propose a robust mapping that maximizes the worst case average success probability over all possible probability distributions on the number of nodes. In both cases, we show that the timers can expire only at 0, D, 2D, ... in the optimal timer mapping. For the known prior case, we develop recursive techniques to effectively compute the optimal timer mapping for binomial and Poisson priors. Lastly, we consider a discrete rate adaptive system and design an optimal timer scheme to maximize the end-to-end performance measure of system throughput. We derive several novel, insightful results about the optimal mapping that culminate in an iterative algorithm to compute it. We show that the design of the selection scheme is intimately related to the rate adaptation rule and the selection policy used. In all cases, extensive benchmarking with several ad hoc schemes proposed in the literature shows the significant gains that the proposed designs can deliver.
196

Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless Networks

Biswas, Jayanta 09 1900 (has links) (PDF)
No description available.
197

Stochastic Control of Time-varying Wireless Networks

Lotfinezhad, Mahdi 19 February 2010 (has links)
One critical step to successfully integrate wireless data networks to the high-speed wired backbone is the design of network control policies that efficiently utilize resources to provide Quality of Service (QoS) to the users in the integrated networks. Such a design has remained a challenge since wireless networks are time-varying in nature, not only in terms of user/packet arrivals but also in terms of physical channel conditions and access opportunities. In this thesis, we study the stochastic control of time-varying networks to design efficient scheduling and resource allocation policies. In particular, in Chapter 3, we focus on a broad class of control policies that work based on a pick-and-compare principle for networks with time-varying channels. By trading the throughput for complexity and memory requirement, these policies require less complexity compared to the well-investigated throughput-optimal Generalized Maximum Weight Matching (GMWM) policy and also require only linear-memory storage with the number of data-flows. Through Lyapunov analysis tools, we characterize the stability region and delay performance of the studied policies and show how they vary in response to the channel variations. In Chapter 4, we go into further detail and consider the problem of network control from a new perspective through which we carefully incorporate the time-efficiency of underlying scheduling algorithms. Specifically, we develop a policy that dynamically adjusts the time given to the available scheduling algorithms according to queue-backlog and channel correlations. We study the resulting stability region of developed policy and show that the region is at least as large as the one for any static policy. Finally, motivated by the current under-utilization of wireless spectrum, in Chapter 5, we investigate the control of cognitive radio networks as a special example of networks that provide time-varying access opportunities. We assume that users dynamically join and leave the network and may have different utility functions, or could collaborate for a common purpose. We develop a policy that performs joint admission and resource control and works for any user load, either inside or outside the capacity region. Through Lyapunov Optimization techniques, we show that the developed policy can achieve a utility performance arbitrarily close to the optimality with a tradeoff in the average service delay of admitted users.
198

Stochastic Control of Time-varying Wireless Networks

Lotfinezhad, Mahdi 19 February 2010 (has links)
One critical step to successfully integrate wireless data networks to the high-speed wired backbone is the design of network control policies that efficiently utilize resources to provide Quality of Service (QoS) to the users in the integrated networks. Such a design has remained a challenge since wireless networks are time-varying in nature, not only in terms of user/packet arrivals but also in terms of physical channel conditions and access opportunities. In this thesis, we study the stochastic control of time-varying networks to design efficient scheduling and resource allocation policies. In particular, in Chapter 3, we focus on a broad class of control policies that work based on a pick-and-compare principle for networks with time-varying channels. By trading the throughput for complexity and memory requirement, these policies require less complexity compared to the well-investigated throughput-optimal Generalized Maximum Weight Matching (GMWM) policy and also require only linear-memory storage with the number of data-flows. Through Lyapunov analysis tools, we characterize the stability region and delay performance of the studied policies and show how they vary in response to the channel variations. In Chapter 4, we go into further detail and consider the problem of network control from a new perspective through which we carefully incorporate the time-efficiency of underlying scheduling algorithms. Specifically, we develop a policy that dynamically adjusts the time given to the available scheduling algorithms according to queue-backlog and channel correlations. We study the resulting stability region of developed policy and show that the region is at least as large as the one for any static policy. Finally, motivated by the current under-utilization of wireless spectrum, in Chapter 5, we investigate the control of cognitive radio networks as a special example of networks that provide time-varying access opportunities. We assume that users dynamically join and leave the network and may have different utility functions, or could collaborate for a common purpose. We develop a policy that performs joint admission and resource control and works for any user load, either inside or outside the capacity region. Through Lyapunov Optimization techniques, we show that the developed policy can achieve a utility performance arbitrarily close to the optimality with a tradeoff in the average service delay of admitted users.
199

Avaliação de desempenho de redes sem fio Ad Hoc / Performance analysis of wireless Ad Hoc networks

Dias, Renata Rampim de Freitas, 1971- 27 November 2007 (has links)
Orientador: Paulo Cardieri / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-10T16:22:37Z (GMT). No. of bitstreams: 1 Dias_RenataRampimdeFreitas_M.pdf: 1865625 bytes, checksum: 70ea1bddd1636ac34afdff1b6a97bfb1 (MD5) Previous issue date: 2007 / Resumo: As características intrínsecas de uma rede ad hoc sem fio de múltiplos saltos, tais como a ausência de uma entidade controladora central e de infra-estrutura, a possibilidade de comunicação direta entre as estações, além da degradação imposta pelo canal sem fio, impõem desafios à análise do desempenho de tais redes. Tais desafios são ainda maiores quando se deseja empregar uma formulação analítica. Este trabalho apresenta o desenvolvimento de um modelo analítico para o desempenho de uma rede ad hoc sem fio, estendendo os modelos encontrados na literatura, com a inclusão de parâmetros da camada física. Com base neste modelo, é apresentada a análise de uma rede, avaliando como o atraso e a vazão são afetados por diversos parâmetros da rede. A análise mostra que dependendo do controle da interferência e da robustez do sistema de transmissão, a capacidade da rede pode ser limitada pela interferência ou pelo atraso. Foi mostrada também a possibilidade da rede operar com um sistema de modulação adaptativo, através do qual a robustez da modulação é alterada para controlar a perda de pacotes e garantir a máxima vazão de dados, mas às custas do aumento no atraso / Abstract: The intrinsic characteristics of wireless multi-hop ad-hoc networks, such as the absence of a centralized control entity and infrastructure, the possibility of direct communication between stations and the degradation resultant from the wireless channel, impose challenges to the performance analysis of such networks. These challenges are even grater when analysis is done through analytical formulations. This work presents the development of an analytical model for the performance of wireless ad-hoc networks, which extends models found in the literature by including parameters of the physical channel. Having this model as a basis, a practical network analysis is presented, measuring how delay and throughput are affected by various network parameters. The analysis shows that, depending on the interference control and the robustness of the transmission system, the network capacity can be limited by interference or by delay. The possibility of the network operating with an adaptive modulation system is also shown. In this case, the robustness of the modulation is changed to control the packet loss and guarantee the maximum throughput, having as a cost a increase in delay / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
200

An Interactive Distributed Simulation Framework With Application To Wireless Networks And Intrusion Detection

Kachirski, Oleg 01 January 2005 (has links)
In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the framework execute seamlessly and transparently to the user on a symmetric multiprocessor cluster computer or a network of computers with no modifications to the code or user objects. A visual graphical interface precisely depicts simulation object states and interactions throughout the simulation execution, giving the user full control over the simulation in real time. The network configuration is detected by the framework, and communication latency is taken into consideration when dynamically adjusting the simulation clock, allowing the simulation to run on a heterogeneous computing system. The simulation framework is easily extensible to multi-cluster systems and computing grids. An entire simulation system can be constructed in a short time, utilizing user-created and supplied simulation components, including mobile nodes, base stations, routing algorithms, traffic patterns and other objects. These objects are automatically compiled and loaded by the simulation system, and are available for dynamic simulation injection at runtime. Using our distributed simulation framework, we have studied modern intrusion detection systems (IDS) and assessed applicability of existing intrusion detection techniques to wireless networks. We have developed a mobile agent-based IDS targeting mobile wireless networks, and introduced load-balancing optimizations aimed at limited-resource systems to improve intrusion detection performance. Packet-based monitoring agents of our IDS employ a CASE-based reasoner engine that performs fast lookups of network packets in the existing SNORT-based intrusion rule-set. Experiments were performed using the intrusion data from MIT Lincoln Laboratories studies, and executed on a cluster computer utilizing our distributed simulation system.

Page generated in 0.4258 seconds