Spelling suggestions: "subject:"aireless networks."" "subject:"fireless networks.""
71 |
Trådlösa nätverk, säkerhet och krypteringAhlfors, Andreas January 2008 (has links)
Användandet av trådlösa nätverk breder ut sig mer och mer både bland företag och privatpersoner. För privatpersoner kan det vara skönt att slippa sladdarna som ett vanligt nätverk för med sig och för företag kan det trådlösa nätverket fungera som ett komplement till det vanliga i miljöer där man inte kan eller vill använda vanliga nätverk. Det är ett smidigt sätt att koppla upp sig mot ett nätverk utan att vara fysiskt ansluten till det. Smidigheten har dock ett pris i form av att det är lättare att avlyssna trådlösa nätverk i och med att kommunikationen går genom etern och det saknas fysiskt skydd i form av byggnader och lås som finns för traditionella nätverk. Med tanke på detta är det viktigt att man säkrar nätverket på ett ordentligt sätt.I detta arbete har jag studerat trådlösa nätverk; hur de fungerar, vilka hot som kan finnas och vad man kan göra för att skydda sig. Detta innefattar standarden 802.11 för trådlösa nätverk samt TCP/IP-modellenför datakommunikation. Kryptering, symmetrisk och asymmetrisk sådan, hur dessafungerar, vad de används till och skillnaderna dem emellan gås igenom. Olika säkerhetshot mot trådlösa nätverk och säkerhetslösningar i form av WEP, WPA och WPA2 har tagits upp. Avslutningsvis beskrivs kvantkryptering som är en metod för att på ett säkert sätt med hjälp av fysikens lagar överföra en krypteringsnyckel mellan två parter. / The use of wireless networks increases among both companies and individuals. For individuals it can be nice to get rid of the cables that fixed networks use and for companies the wireless network can be a complement to the fixed one in environments where you cannot or do not want to use that technique. It is a convenient way to connect to a network without having to be physically connected to it. The convenience however comes at a price as it is easier to tap wireless networks since the communicationpasses through the ether and there is a lack of physical protection such as buildings and locks that exists for traditional networks. In view of this it is important to secure the network in a proper way.In this paper, I have studied wireless networks; how they work, which threats that exist and what one can do in order to protect them. This includes the 802.11 standard for wireless networks and theTCP/IP model for data communication. Encryption, both symmetric and asymmetric, how they work, what they are used for and the differences between them is described. Different security threats against wireless networks and security solutions in the forms of WEP, WPA and WPA2 are also reviewed. In conclusion quantum cryptography, which is a method for transmitting a cryptographic key in a secure way by the help of physics, is described.
|
72 |
The Design and Modeling of Ultra-Wideband Position-Location NetworksVenkatesh, Swaroop 09 March 2007 (has links)
Impulse-based Ultrawideband (UWB) is a form of signaling which uses streams of pulses of very short duration, typically on the order of a nanosecond. Impulse-based UWB systems possess the ability to fuse accurate position-location with low-data rate communication, and provide covertness for tactical applications and robustness in dense multipath propagation environments. These features can be leveraged in the design wireless ad hoc position-location networks (PoLoNets) for accurate location tracking and monitoring where GPS is not available, especially indoors. Location information is sequentially propagated through a network of reference nodes in order to create a framework for the tracking of mobile nodes, as well as a multi-hop message-passing infrastructure between mobile nodes and control nodes located outside the area of deployment. The applications of such networks include the location and command-and-control of fire-fighters in emergency scenarios, the location of military personnel deployed in urban or indoor environments, and the guidance of robots through large multi-room indoor environments.
The main objective of this dissertation is to derive design principles, techniques and analytical models for UWB PoLoNets that are useful in the development of practical solutions. Some of the fundamental obstacles to obtaining accurate location information in indoor environments are non-line-of-sight (NLOS) signal propagation, limited connectivity between nodes, and the propagation of localization inaccuracies when using sequential estimation approaches in ad hoc scenarios. Several techniques and algorithms that mitigate these effects, thereby allowing the design of PoLoNets with requisite localization accuracy, are presented. Although these techniques are developed from the perspective of a UWB physical layer, the majority are applicable to generic PoLoNets. / Ph. D.
|
73 |
Algorithms and Optimization for Wireless NetworksShi, Yi 09 November 2007 (has links)
Recently, many new types of wireless networks have emerged for both civil and military applications, such as wireless sensor networks, ad hoc networks, among others. To improve the performance of these wireless networks, many advanced communication techniques have been developed at the physical layer. For both theoretical and practical purposes, it is important for a network researcher to understand the performance limits of these new wireless networks. Such performance limits are important not only for theoretical understanding, but also in that they can be used as benchmarks for the design of distributed algorithms and protocols. However, due to some unique characteristics associated with these networks, existing analytical technologies may not be applied directly. As a result, new theoretical results, along with new mathematical techniques, need to be developed. In this dissertation, we focus on the design of new algorithms and optimization techniques to study theoretical performance limits associated with these new wireless networks.
In this dissertation, we mainly focus on sensor networks and ad hoc networks. Wireless sensor networks consist of battery-powered nodes that are endowed with a multitude of sensing modalities. A wireless sensor network can provide in-situ, unattended, high-precision, and real-time observation over a vast area. Wireless ad hoc networks are characterized by the absence of infrastructure support. Nodes in an ad hoc network are able to organize themselves into a multi-hop network. An ad hoc network can operate in a stand-alone fashion or could possibly be connected to a larger network such as the Internet (also known as mesh networks).
For these new wireless networks, a number of advanced physical layer techniques, e.g., ultra wideband (UWB), multiple-input and multiple-output (MIMO), and cognitive radio (CR), have been employed. These new physical layer technologies have the potential to improve network performance. However, they also introduce some unique design challenges. For example, CR is capable of reconfiguring RF (on the fly) and switching to newly-selected frequency bands. It is much more advanced than the current multi-channel multi-radio (MC-MR) technology. MC-MR remains hardware-based radio technology: each radio can only operate on a single channel at a time and the number of concurrent channels that can be used at a wireless node is limited by the number of radio interfaces. While a CR can use multiple bands at the same time. In addition, an MC-MR based wireless network typically assumes there is a set of "common channels" available for all nodes in the network. While for CR networks, each node may have a different set of frequency bands based on its particular location. These important differences between MC-MR and CR warrant that the algorithmic design for a CR network is substantially more complex than that under MC-MR.
Due to the unique characteristics of these new wireless networks, it is necessary to consider models and constraints at multiple layers (e.g., physical, link, and network) when we explore network performance limits. The formulations of these cross-layer problems are usually in very complex forms and are mathematically challenging. We aim to develop some novel algorithmic design and optimization techniques that provide optimal or near-optimal solutions.
The main contributions of this dissertation are summarized as follows.
1. Node lifetime and rate allocation
We study the sensor node lifetime problem by considering not only maximizing the time until the first node fails, but also maximizing the lifetimes for all the nodes in the network. For fairness, we maximize node lifetimes under the lexicographic max-min (LMM) criteria. Our contributions are two-fold. First, we develop a polynomial-time algorithm based on a parametric analysis (PA) technique, which has a much lower computational complexity than an existing state-of-the-art approach. We also present a polynomial-time algorithm to calculate the flow routing schedule such that the LMM-optimal node lifetime vector can be achieved. Second, we show that the same approach can be employed to address a different but related problem, called LMM rate allocation problem. More important, we discover an elegant duality relationship between the LMM node lifetime problem and the LMM rate allocation problem. We show that it is sufficient to solve only one of the two problems and that important insights can be obtained by inferring the duality results.
2. Base station placement
Base station location has a significant impact on sensor network lifetime. We aim to determine the best location for the base station so as to maximize the network lifetime. For a multi-hop sensor network, this problem is particularly challenging as data routing strategies also affect the network lifetime performance. We present an approximation algorithm that can guarantee (1- ε)-optimal network lifetime performance with any desired error bound ε > 0. The key step is to divide the continuous search space into a finite number of subareas and represent each subarea with a "fictitious cost point" (FCP). We prove that the largest network lifetime achieved by one of these FCPs is (1- ε)-optimal. This approximation algorithm offers a significant reduction in complexity when compared to a state-of-the-art algorithm, and represents the best known result to this problem.
3. Mobile base station
The benefits of using a mobile base station to prolong sensor network lifetime have been well recognized. However, due to the complexity of the problem (time-dependent network topology and traffic routing), theoretical performance limits and provably optimal algorithms remain difficult to develop. Our main result hinges upon a novel transformation of the joint base station movement and flow routing problem from the time domain to the space domain. Based on this transformation, we first show that if the base station is allowed to be present only on a set of pre-defined points, then we can find the optimal sojourn time for the base station on each of these points so that the overall network lifetime is maximized. Based on this finding, we show that when the location of the base station is un-constrained (i.e., can move to any point in the two-dimensional plane), we can develop an approximation algorithm for the joint mobile base station and flow routing problem such that the network lifetime is guaranteed to be at least (1- ε) of the maximum network lifetime, where ε can be made arbitrarily small. This is the first theoretical result with performance guarantee on this problem.
4. Spectrum sharing in CR networks
Cognitive radio is a revolution in radio technology that promises unprecedented flexibility in radio communications and is viewed as an enabling technology for dynamic spectrum access. We consider a cross-layer design of scheduling and routing with the objective of minimizing the required network-wide radio spectrum usage to support a set of user sessions. Here, scheduling considers how to use a pool of unequal size frequency bands for concurrent transmissions and routing considers how to transmit data for each user session. We develop a near-optimal algorithm based on a sequential fixing (SF) technique, where the determination of scheduling variables is performed iteratively through a sequence of linear programs (LPs). Upon completing the fixing of these scheduling variables, the value of the other variables in the optimization problem can be obtained by solving an LP.
5. Power control in CR networks
We further consider the case of variable transmission power in CR networks. Now, our objective is minimizing the total required bandwidth footprint product (BFP) to support a set of user sessions. As a basis, we first develop an interference model for scheduling when power control is performed at each node. This model extends existing so-called protocol models for wireless networks where transmission power is deterministic. As a result, this model can be used for a broad range of problems where power control is part of the optimization space. An efficient solution procedure based on the branch-and-bound framework and convex hull relaxations is proposed to provide (1- ε)-optimal solutions. This is the first theoretical result on this important problem. / Ph. D.
|
74 |
A Reconfigurable Random Access MAC Implementation for Software Defined Radio PlatformsAnyanwu, Uchenna Kevin 03 August 2012 (has links)
Wireless communications technology ranging from satellite communications to sensor networks has benefited from the development of flexible, SDR platforms. SDR is used for military applications in radio devices to reconfigure waveforms, frequency, and modulation schemes in both software and hardware to improve communication performance in harsh environments. In the commercial sector, SDRs are present in cellular infrastructure, where base stations can reconfigure operating parameters to meet specific cellular coverage goals. In response to these enhancements, industry leaders in cellular (such as Lucent, Nortel, and Motorola) have embraced the cost advantages of implementing SDRs in their cellular technology. In the future, there will be a need for more capable SDR platforms on inexpensive hardware that are able to balance work loads between several computational processing elements while minimizing power cost to accomplish multiple goals.
This thesis will present the development of a random access MAC protocol for the IRIS platform. An assessment of different SDR hardware and software platforms is conducted. From this assessment, we present several SDR technology requirements for networking research and discuss the impact of these requirements on future SDR platforms. As a consequence of these requirements, we choose the USRP family of SDR hardware and the IRIS software platform to develop our two random access MAC implementations: Aloha with Explicit ACK and Aloha with Implicit ACK. A point-to-point link was tested with our protocol and then this link was extended to a 3-hop (4 nodes) network. To improve our protocols' efficiency, we implemented carrier sensing on the FPGA of the USRP E100, an embedded SDR hardware platform. We also present simulations using OMNeT++ software to accompany our experimental data, and moreover, show how our protocol scales as more nodes are added to the network. / Master of Science
|
75 |
Distributed Wireless Resource Management in the Internet of ThingsPark, Taehyeun 18 June 2020 (has links)
The Internet of Things (IoT) is a promising networking technology that will interconnect a plethora of heterogeneous wireless devices. To support the connectivity across a massive-scale IoT, the scarce wireless communication resources must be appropriately allocated among the IoT devices, while considering the technical challenges that arise from the unique properties of the IoT, such as device heterogeneity, strict communication requirements, and limited device capabilities in terms of computation and memory. The primary goal of this dissertation is to develop novel resource management frameworks using which resource-constrained IoT devices can operate autonomously in a dynamic environment. First, a comprehensive overview on the use of various learning techniques for wireless resource management in an IoT is provided, and potential applications for each learning framework are proposed. Moreover, to capture the heterogeneity among IoT devices, a framework based on cognitive hierarchy theory is discussed, and its implementation with learning techniques of different complexities for IoT devices with varying capabilities is analyzed. Next, the problem of dynamic, distributed resource allocation in an IoT is studied when there are heterogeneous messages. Particularly, a novel finite memory multi-state sequential learning is proposed to enable diverse IoT devices to reallocate the limited communication resources in a self-organizing manner to satisfy the delay requirement of critical messages, while minimally affecting the delay-tolerant messages. The proposed learning framework is shown to be effective for the IoT devices with limited memory and observation capabilities to learn the number of critical messages. The results show that the performance of learning framework depends on memory size and observation capability of IoT devices and that the learning framework can realize low delay transmission in a massive IoT. Subsequently, the problem of one-to-one association between resource blocks and IoT devices is studied, when the IoT devices have partial information. The one-to-one association is formulated as Kolkata Paise Restaurant (KPR) game in which an IoT device tries to choose a resource block with highest gain, while avoiding duplicate selection. Moreover, a Nash equilibrium (NE) of IoT KPR game is shown to coincide with socially optimal solution. A proposed learning framework for IoT KPR game is shown to significantly increase the number of resource blocks used to successful transmit compared to a baseline. The KPR game is then extended to consider age of information (AoI), which is a metric to quantify the freshness of information in the perspective of destination. Moreover, to capture heterogeneity in an IoT, non-linear AoI is introduced. To minimize AoI, centralized and distributed approaches for the resource allocation are proposed to enable the sharing of limited communication resources, while delivering messages to the destination in a timely manner. Moreover, the proposed distributed resource allocation scheme is shown to converge to an NE and to significantly lower the average AoI compared to a baseline. Finally, the problem of dynamically partitioning the transmit power levels in non-orthogonal multiple access is studied when there are heterogeneous messages. In particular, an optimization problem is formulated to determine the number of power levels for different message types, and an estimation framework is proposed to enable the network base station to adjust power level partitioning to satisfy the performance requirements. The proposed framework is shown to effectively increase the transmission success probability compared to a baseline. Furthermore, an optimization problem is formulated to increase sum-rate and reliability by adjusting target received powers. Under different fading channels, the optimal target received powers are analyzed, and a tradeoff between reliability and sum-rate is shown. In conclusion, the theoretical and performance analysis of the frameworks proposed in this dissertation will prove essential for implementing an appropriate distributed resource allocation mechanisms for dynamic, heterogeneous IoT environments. / Doctor of Philosophy / The Internet of Things (IoT), which is a network of smart devices such as smart phones, wearable devices, smart appliances, and environment sensors, will transform many aspects of our society with numerous innovative IoT applications. Those IoT applications include interactive education, remote healthcare, smart grids, home automation, intelligent transportation, industrial monitoring, and smart agriculture. With the increasing complexity and scale of an IoT, it becomes more difficult to quickly manage the IoT devices through a cloud, and a centralized management approach may not be viable for certain IoT scenarios. Therefore, distributed solutions are needed for enabling IoT devices to fulfill their services and maintain seamless connectivity. Here, IoT device management refers to the fact that the system needs to decide which devices access the network and using which resources (e.g., frequencies). For distributed management of an IoT, the unique challenge is to allocate scarce communication resources to many IoT devices appropriately. With distributed resource management, diverse IoT devices can share the limited communication resources in a self-organizing manner. Distributed resource management overcomes the limitations of centralized resource management by satisfying strict service requirements in a massive, complex IoT.
Despite the advantages and the opportunities of distributed resource management, it is necessary to address the challenges related to an IoT, such as analyzing intricate interaction of heterogeneous devices, designing viable frameworks for constrained devices, and quickly adapting to a dynamic IoT. Furthermore, distributed resource management must enable IoT devices to communicate with high reliability and low delay. In this regard, this dissertation investigates these critical IoT challenges and introduces novel distributed resource management frameworks for an IoT. In particular, the proposed frameworks are tailored to realistic IoT scenarios and consider different performance metrics. To this end, mathematical frameworks and effective algorithms are developed by significantly extending tools from wireless communication, game theory, and machine learning. The results show that the proposed distributed wireless resource management frameworks can optimize key performance metrics and meet strict communication requirements while coping with device heterogeneity, massive scale, dynamic environment, and scarce wireless resources in an IoT.
|
76 |
Backpressure Policies for Wireless ad hoc NetworksShukla, Umesh Kumar 14 May 2010 (has links)
Interference in ad hoc wireless networks causes the performance of traditional networking protocols to suffer. However, some user applications in ad hoc networks demand high throughput and low end-user delay. In the literature, the backpressure policy, i.e. queue backlog differential-based joint routing and scheduling, is known to be throughput-optimal with robust support for traffic load fluctuations \cite{Tssailus92}. Unfortunately, many backpressure-based algorithms cannot be implemented due to high end-user delay, inaccurate assumptions for interference, and high control overhead in distributed scenarios. We develop new backpressure based approaches to address these issues. We first propose a heuristic packet forwarding scheme that solves the issue of high end-user delay and still provides near-optimal throughput. Next we develop a novel interference model that provides simple yet accurate interference relationships among users. Such a model is helpful in designing a simple backpressure scheduling algorithm that does not violate realistic interference constraints. Finally we develop distributed backpressure algorithms based on our proposed ideas. Our distributed algorithms provide throughput performance close to the optimal and have low control overhead and simple implementation. / Master of Science
|
77 |
Improving the Performance of the world Wide Web over Wireless NetworksFleming, Todd B. 04 November 1996 (has links)
The World Wide Web (WWW) has become the largest source of Internet traffic, but it was not designed for wireless networks. Documents with large inline images take a long time to fetch over low-bandwidth wireless networks. Radio signal dropouts cause file transfers to abort; users have to restart file transfers from the beginning. Dropouts also prevent access to documents that have not yet been visited by the user. All of these problems create user frustration and limit the utility of the WWW and wireless networks.
In this work, a new Wireless World Wide Web (WWWW) proxy server and protocol were developed that address these problems. A client based on NCSA Mosaic connects to the proxy server using the new protocol, Multiple Hypertext Stream Protocol (MHSP). The proxy prefetches documents to the client, including inline images. The proxy also reduces the resolution of large bitmaps to improve performance over slow links. MHSP provides the ability to resume file transfers when the link has been broken then reestablished.
The WWWW system was tested and evaluated by running script-controlled clients on different emulated network environments. This new system decreased document load time an average of 32 to 37 percent, depending on network configuration. / Master of Science
|
78 |
Signal formats for code division multiple access wireless networks.Wysocki, Beata J. January 1999 (has links)
One of the fundamental problems related to the development of direct sequence code division multiple access (DS CDMA) wireless data networks is design of spreading sequences possessing semi-optimal characteristics. In this thesis, we introduce three new methods to design spreading sequences, which can be optimised to achieve the desired characteristics.We show that the level of MAI for the DS CDMA systems utilising the example sets of sequences designed by the use of these techniques can be relatively low, compare to the case when the well known Gold-like sequences [29] are used. In addition, we show that by using one of the methods introduced in the thesis, we can construct sets of orthogonal sequences possessing acceptable correlation properties, even for an asynchronous operation, while another of the introduced methods can be used if design of sequences of an arbitrary length is required.Our new methods to design complex polyphase sequences are orientated towards the short length sequences, as a target application for them are high data rate wireless networks. Those methods are based on using discretised chirp pulses, pulses consisting of discretised multiple chirps, or linear combinations of them. In order to achieve orthogonality among the designed polyphase sequences, we combined the sequences based on superimposed chirps and double chirps with the sequences derived from the orthogonal Walsh functions.Finally, we utilise the three most promising sequence sets designed by the use of die introduced methods to simulate the multiuser DS CDMA systems. We compare performance of those simulated systems with the performance of the simulated system utilising 15-chip Gold- like sequences. The comparison results indicate that by using our design methods, we can produce useful sequence sets for applications where short spreading sequences are required. The presented ++ / results also demonstrate that the performance of systems utilising those sequences can be significantly better in terms of the number of simultaneously active users or bit error rate (BER) that the performance of the system employing Gold or Gold-like sequences of the similar length.
|
79 |
Efficient Quality of Service Provision Techniques in Next Generation Wireless NetworksHaldar, Kuheli L., Ph.D. 27 October 2014 (has links)
No description available.
|
80 |
INTEGRATED ARCHITECTURE AND ROUTING PROTOCOLS FOR HETEROGENEOUS WIRELESS NETWORKSCAVALCANTI, DAVE ALBERTO TAVARES 03 April 2006 (has links)
No description available.
|
Page generated in 0.0909 seconds