Spelling suggestions: "subject:"accesscontrol"" "subject:"accesskontroll""
631 |
Estratégias de roteamento e de controle de acesso ao meio para redes de sensores sem fio destinadas a redes urbanas / Routing and medium access control strategies for wireless sensor networks in urban networksRodrigo Palucci Pantoni 31 January 2012 (has links)
Este trabalho propõe estratégias de roteamento e de controle de acesso ao meio destinadas as redes urbanas, motivadas pelo monitoramento e controle de variáveis elétricas relacionadas à iluminação pública. Tais estratégias foram desenvolvidas segundo requisitos da aplicação, trabalhos encontrados na literatura, limitações do protocolo IEEE 802.15.4 e as especificações RFC 5548 e IEEE 802.15.4e (draft). As estratégias desenvolvidas foram incorporadas a protocolos encontrados na literatura, as quais geraram protocolos aperfeiçoados para redes urbanas, dentre eles GGPSR e gradiente em função da maior distância, utilizados para o tráfego divergente e convergente, respectivamente. O protocolo GGPSR é composto pelo algoritmo geográfico GPSR, geocast e retransmissões para os vizinhos seguindo o critério do GGPSR em caso de falha. O protocolo baseado na maior distância é composto pelo algoritmo do gradiente, o qual utiliza a maior distância no caso de receptores com pesos de gradiente iguais e retransmissões seguindo o mesmo critério. Foi utilizado um modelo de propagação realista, no qual foi aplicada a estratégia de mapeamento de vizinhos dos nós de acordo com a distância aproximada fornecida pelo atributo do pacote RSSI. Além disso, para ambos os tipos de tráfego, foi aplicado o mecanismo de controle de acesso ao meio RIT com o objetivo de minimizar o consumo energético. A avaliação dos protocolos gerados a partir dessas estratégias foi feita em simulação utilizando a ferramenta NS-2 integrada em cenários de grande escala fornecidos pela concessionária de iluminação pública Elektro, segundo os critérios de energia remascente da rede, média de atraso fim a fim e taxa de entrega fim a fim. Os resultados obtidos mostram que os protocolos gerados superam protocolos propostos na literatura; além disso, a estratégia baseada na distância obtida pelo atributo RSSI viabiliza a aplicação do protocolo GGPSR. Em relação à aplicação do RIT com a estratégia de parâmetros em função do gradiente, esta se mostrou mais eficiente em comparação com os parâmetros de RIT iguais para todos os nós. / This work proposes routing and medium access control strategies for urban networks, particularly related to monitoring and control of electric variables in the street lighting system. Such strategies were developed according to application requirements, studies in the literature, limitations of the IEEE 802.15.4 protocol, and RFC 5548 and IEEE 802.15.4e (draft) specifications. Strategies were incorporated into protocols found in the literature, which generated specific improved protocols for urban networks, including GGPSR and Gradient based on the farthest neighbor, applied to divergent and convergent traffic, respectively. The GGPSR protocol is composed by the GPSR algorithm, geocast and retransmissions to neighbors according to the GGPSR criterion when a failure occurs. The protocol based on the longest distance comprises the gradient algorithm, which considers the longest distance when receivers have equal gradient weights and retransmissions follow the same criterion. A realistic propagation model was used, implementing the strategy to map neighboring nodes according to the approximate distance provided by the RSSI packet attribute. Moreover, for both traffic ypes, the RIT medium access control mechanism was used in order to minimize energy consumption. Protocols generated by these strategies were evaluated through simulation in NS-2 tool applied to large scale scenarios provided by public street lighting concessionaire Elektro, according to the criteria of remaining energy network, end-to-end average delay and end-to-end delivery rate. Results show that the generated protocols outperform protocols proposed in the literature; in addition, the strategy based on the distance obtained by the RSSI attribute enables the use of the GGPSR protocol. Regarding the use of RIT considering the parameters as a function of the gradient, this strategy is more efficient compared to using the same RIT parameters for all nodes.
|
632 |
Semantically-enriched and semi-autonomous collaboration framework for the Web of Things : design, implementation and evaluation of a multi-party collaboration framework with semantic annotation and representation of sensors in the Web of Things and a case study on disaster managementAmir, Mohammad January 2015 (has links)
This thesis proposes a collaboration framework for the Web of Things based on the concepts of Service-oriented Architecture and integrated with semantic web technologies to offer new possibilities in terms of efficient asset management during operations requiring multi-actor collaboration. The motivation for the project comes from the rise in disasters where effective cross-organisation collaboration can increase the efficiency of critical information dissemination. Organisational boundaries of participants as well as their IT capability and trust issues hinders the deployment of a multi-party collaboration framework, thereby preventing timely dissemination of critical data. In order to tackle some of these issues, this thesis proposes a new collaboration framework consisting of a resource-based data model, resource-oriented access control mechanism and semantic technologies utilising the Semantic Sensor Network Ontology that can be used simultaneously by multiple actors without impacting each other’s networks and thus increase the efficiency of disaster management and relief operations. The generic design of the framework enables future extensions, thus enabling its exploitation across many application domains. The performance of the framework is evaluated in two areas: the capability of the access control mechanism to scale with increasing number of devices, and the capability of the semantic annotation process to increase in efficiency as more information is provided. The results demonstrate that the proposed framework is fit for purpose.
|
633 |
Systém správy identit pro malé a střední firmy / Identity Management Solution for Small and Medium BusinessesMAXA, Karel January 2014 (has links)
The topic of this master's thesis is development of identity management solution for small and medium business. The thesis is divided into four major parts. The first part contains theoretical background as description of RBAC model or model with relationships between practically used objects (user identity, role, position, permission, account...). Analysis of functioning and needs of targeted organizations was carried out in the second part. The third part describes the design of the developed application. The fourth part discusses actual implementation of the application. The main outcome of the thesis is implemented application that can be deployed at thesis defined organizations. The application includes all the functionality required in the first phase of the project.
|
634 |
Mobile ID in physical access control applicationsSimonetti, Jose Eduardo 10 November 2016 (has links)
Submitted by Daniele Santos (danielesantos.htl@gmail.com) on 2017-02-21T21:04:19Z
No. of bitstreams: 1
Eduardo.pdf: 1544695 bytes, checksum: ad700b85bc86a6f4889a9f52275ab887 (MD5) / Approved for entry into archive by Janete de Oliveira Feitosa (janete.feitosa@fgv.br) on 2017-02-23T17:38:59Z (GMT) No. of bitstreams: 1
Eduardo.pdf: 1544695 bytes, checksum: ad700b85bc86a6f4889a9f52275ab887 (MD5) / Made available in DSpace on 2017-03-02T13:43:19Z (GMT). No. of bitstreams: 1
Eduardo.pdf: 1544695 bytes, checksum: ad700b85bc86a6f4889a9f52275ab887 (MD5)
Previous issue date: 2016-11-10 / Today there exist a myriad of different types of physical access control systems (PACS) that use a smart card or mobile device as a key. The mobile device enabled smart locks, as they are often referred to, operate using either Wi-Fi or Bluetooth. This thesis has explored the use of a third emerging wireless technology called Near Field Communication (NFC) available in mobile devices such as smartphones. Near Field Communication (NFC) technology is a relatively new technology that is on the rise and is included in almost every new mobile device. By leveraging Near Field Communication (NFC) enabled mobile devices, a highly secure access control system can be achieved and developed taking advantage of the computational power of smartphones in comparison to traditional methods the business implications are huge, Several different authentication and encryption protocols, mobile operating systems and Near Field Communication (NFC) modes of operation where analyzed and evaluated. After considerations technical considerations the Secure Remote Password authentication protocol on top of Near Field Communication (NFC) card emulation (CE) scheme with the client application running on smartphones operating system (OS) was selected. This thesis shows that Near Field Communication (NFC) enables a mobile device to act as a key in a secure access control system (PACS) and as the user base for NFC grows larger so will the likelihood that we will come to see more of these types of systems in business and organizations.
|
635 |
Bridging the gap between Privacy by Design and mobile systems by patterns / Modèles pour les environnements de terminaux nomades "Privacy by Design"Sokolova, Karina 27 April 2016 (has links)
De nos jours, les smartphones et les tablettes génèrent, reçoivent, mémorisent et transfèrent vers des serveurs une grande quantité de données en proposant des services aux utilisateurs via des applications mobiles facilement téléchargeables et installables. Le grand nombre de capteurs intégrés dans un smartphone lui permet de collecter de façon continue des informations très précise sur l'utilisateur et son environnement. Cette importante quantité de données privées et professionnelles devient difficile à superviser.L'approche «Privacy by Design», qui inclut sept principes, propose d'intégrer la notion du respect des données privées dès la phase de la conception d’un traitement informatique. En Europe, la directive européenne sur la protection des données privées (Directive 95/46/EC) intègre des notions du «Privacy by Design». La nouvelle loi européenne unifiée (General Data Protection Régulation) renforce la protection et le respect des données privées en prenant en compte les nouvelles technologies et confère au concept de «Privacy by Design» le rang d’une obligation légale dans le monde des services et des applications mobiles.L’objectif de cette thèse est de proposer des solutions pour améliorer la transparence des utilisations des données personnelles mobiles, la visibilité sur les systèmes informatiques, le consentement et la sécurité pour finalement rendre les applications et les systèmes mobiles plus conforme au «Privacy by (re)Design» / Nowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
|
636 |
API de Segurança e Armazenamento de uma Arquitetura Multibiométrica para Controle de Acesso com Autenticação Contínua. / Security and Persistence APIs of a Multi-biometric Access Control Architecture for Continuous Authentication.Oliveira, Adriana Esmeraldo de 16 September 2011 (has links)
Made available in DSpace on 2015-05-14T12:36:30Z (GMT). No. of bitstreams: 1
arquivototal.pdf: 4594295 bytes, checksum: bd4f4df655903b796eb6cf79a5060ded (MD5)
Previous issue date: 2011-09-16 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / A biometric system that employs one single biometric characteristic is constrained. This limitation
can be reduced by fusing the information presented by multiple sources. A system
that consolidates the evidence presented by multiple biometric sources is known as a multibiometric
system.
In such a context, this work proposes the security and persistence APIs of a multi-biometric
architecture, which is capable of using one or more biometric modalities.
In access control applications, a user might be forced to authenticate in order to give an unauthorized
access to a criminal. As an alternative to this problem, the API uses a continuous
authentication process, which verifies if the user identified at the start of the software application
is still able to remain on the system, without human interferences or breaks in the
process.
Much of the literature on biometric system design has focused on system error rates and scaling
equations. However, it is also important to have a solid foundation for future progress as
the processes and systems architecture for the new biometric application are designed.
Hence, the designed architecture made it possible to create a well-defined API for multibiometric
systems, which may help developers to standardize, among other things, their data
structure, in order to enable and facilitate templates fusion and interoperability.
Therefore, the developed security and persistence APIs support a multi-biometric access
control architecture. This architecture is extensible, that is, capable of easily comprising new
biometric characteristics and processes, yet making it possible to use a template security mechanism.
The APIs were designed and implemented. They were demonstrated by a prototype application,
through which it was possible to conduct the test experiments. / Um sistema biométrico que empregue uma única peculiaridade ou traço característico é restrito.
Esta limitação pode ser suavizada pela fusão dos dados apresentados por múltiplas fontes.
Um sistema que consolida a evidência apresentada por múltiplas fontes biométricas é
conhecido como um sistema multibiométrico.
Nesse contexto, este trabalho propõe a interface de aplicação (API) de segurança e armazenamento
de uma arquitetura multibiométrica, com habilidade de empregar uma ou mais modalidades
biométricas.
Em aplicações de controle de acesso, um usuário pode ser coagido a se autenticar para permitir
um acesso indevido. Como alternativa para este problema, a API utiliza um processo de
autenticação contínua, que verifica se o usuário que se identificou no início de uma aplicação
de software ainda está apto a continuar no sistema, sem interferências humanas ou paralisações
do processo.
Grande parte da literatura sobre projeto de sistemas biométricos tem o foco nas taxas de erro
do sistema e na simplificação de equações. No entanto, também é importante que se tenha
uma base sólida para progressos futuros no momento em que os processos e a arquitetura da
nova aplicação biométrica estiverem sendo projetados. Neste sentido, a arquitetura projetada
permitiu a construção de uma API bem definida para sistemas multibiométricos, que deverá
auxiliar os desenvolvedores a padronizar, entre outras coisas, sua estrutura de dados, de forma
a possibilitar e facilitar a fusão de modelos biométricos e a interoperabilidade.
Deste modo, a API de segurança e armazenamento desenvolvida suporta uma arquitetura
multibiométrica de controle de acesso para autenticação contínua extensível, isto é, capaz de
receber novas características e processos biométricos com facilidade, permitindo, ainda, o
uso de um mecanismo de segurança de templates biométricos.
A API foi projetada e implementada. Sua demonstração foi feita através de uma aplicação
protótipo, por meio da qual foi possível realizar os testes.
|
637 |
Approches pour la gestion de configurations de sécurité dans les systèmes d'information distribués / Techniques for security configuration management in distributed information systemsCasalino, Matteo Maria 02 July 2014 (has links)
La sécurité des services informatiques d'aujourd'hui dépend significativement de la bonne configuration des systèmes qui sont de plus en plus distribués. Au même temps, la gestion des configurations de sécurité est encore fortement basée sur des activités humaines, qui sont coûteuses et sujettes à erreurs. Au cours de la dernière décennie, il a été reporté à plusieurs reprises qu'une partie significative des incidents de sécurité et des pertes de données a été causée par des configurations incorrectes des systèmes. Pour résoudre ce problème, plusieurs techniques ont été proposées pour automatiser les tâches de gestion des configurations. Beaucoup d'entre elles mettent l'accent sur les phases de planification et de mise en œuvre, où les exigences et les politiques de sécurité abstraites sont conçues, harmonisées et transformées dans des configurations concrètes. Ces techniques nécessitent souvent d'opérer sur des politiques formelles ou très structurées qui se prêtent à un raisonnement automatisé, mais qui sont rarement disponibles dans la pratique. Cependant, moins d'attention a été consacrée aux phases de gestion de suivi et de changement des configurations, qui complètent les étapes précédentes en détectant et en corrigeant les erreurs afin d'assurer que les changements de configuration n'exposent pas le système à des menaces de sécurité. Les objectifs et les contributions de cette thèse se concentrent sur ce deuxième point de vue, de façon pragmatique sur la base des configurations de sécurité concrètes. En particulier, nous proposons trois contributions visant à analyser et à vérifier des configurations de sécurité / The security of nowadays IT services significantly depends on the correct configuration of increasingly distributed information systems. At the same time, the management of security configurations is still heavily centered on human activities, which are costly and prone to error. Over the last decade it has been repeatedly reported that a significant share of security incidents and data breaches are caused by inaccurate systems configuration. To tackle this problem, several techniques have been proposed to increase the automation in configuration management tasks. Many of them focus on planning and implementation, i.e., the phases where abstract security requirements and policies are elicited, harmonized, de-conflicted and transformed into concrete configurations. As such, these techniques often require formal or highly structured input policies amenable to automated reasoning, which are rarely available in practice. In contrast, less attention has been dedicated to the monitoring and change management phases, which complement the above steps by detecting and remediating configuration errors and by ensuring that configuration changes do not expose the system to security threats. The objectives and contributions of this thesis take the latter perspective and, as such, they pragmatically work on the basis of concrete security configurations. In particular, we propose three contributions that move from more concrete syntax-based configuration analysis towards increasingly abstract semantic reasoning
|
638 |
Predictable and Scalable Medium Access Control for Vehicular Ad Hoc NetworksSjöberg Bilstrup, Katrin January 2009 (has links)
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traffic safety applications over vehicular ad hoc networks (VANETs). The MAC methods are carrier sense multiple access (CSMA), as specified by the leading standard for VANETs IEEE 802.11p, and self-organizing time-division multiple access (STDMA) as used by the leading standard for transponders on ships. All vehicles in traffic safety applications periodically broadcast cooperative awareness messages (CAMs). The CAM based data traffic implies requirements on a predictable, fair and scalable medium access mechanism. The investigated performance measures are channel access delay, number of consecutive packet drops and the distance between concurrently transmitting nodes. Performance is evaluated by computer simulations of a highway scenario in which all vehicles broadcast CAMs with different update rates and packet lengths. The obtained results show that nodes in a CSMA system can experience unbounded channel access delays and further that there is a significant difference between the best case and worst case channel access delay that a node could experience. In addition, with CSMA there is a very high probability that several concurrently transmitting nodes are located close to each other. This occurs when nodes start their listening periods at the same time or when nodes choose the same backoff value, which results in nodes starting to transmit at the same time instant. The CSMA algorithm is therefore both unpredictable and unfair besides the fact that it scales badly for broadcasted CAMs. STDMA, on the other hand, will always grant channel access for all packets before a predetermined time, regardless of the number of competing nodes. Therefore, the STDMA algorithm is predictable and fair. STDMA, using parameter settings that have been adapted to the vehicular environment, is shown to outperform CSMA when considering the performance measure distance between concurrently transmitting nodes. In CSMA the distance between concurrent transmissions is random, whereas STDMA uses the side information from the CAMs to properly schedule concurrent transmissions in space. The price paid for the superior performance of STDMA is the required network synchronization through a global navigation satellite system, e.g., GPS. That aside since STDMA was shown to be scalable, predictable and fair; it is an excellent candidate for use in VANETs when complex communication requirements from traffic safety applications should be met.
|
639 |
Protocolo assíncrono de acesso ao meio iniciado pelo receptor para redes de sensores sem fio / Asynchronous receiver-initiated media access protocol for wireless sensor networksRenato Ferreira Fernandes Junior 29 June 2018 (has links)
A internet das coisas é considerada um novo sistema de comunicação que promete otimizar e melhorar diferentes áreas de aplicação com base em módulos sensores e objetos unicamente interligados através da internet. Em aplicações de redes de sensores sem fio em larga escala, as redes possuem características peculiares, como grande quantidade de módulos sensores de baixa potência, consumo limitado e perdas de comunicação intermitentes. Estas redes precisam operar com protocolos escaláveis e eficientes em termos de consumo de energia. Desta forma, esta tese propõe um protocolo multicanal assíncrono iniciado pelo receptor de acesso ao meio para redes de sensores sem fio de baixa potência para aplicações de internet das coisas. Através de uma comparação com soluções já existentes, o protocolo apresentado procura mitigar a colisão de mensagens e as perdas de energia com ociosidade na espera pela comunicação de um transmissor, através de um mecanismo de reconhecimento inicial eficiente. Adicionalmente, é proposto um diagnóstico efetivo de detecção de falha na comunicação ainda no ciclo de comunicação, de forma a auxiliar a economia de energia. Complementarmente, é proposto um mecanismo multicanal baseado no conhecimento do canal da vizinhança, além de serviços de inicialização e manutenção da rede. Para validação da proposta, o protocolo proposto foi comparado tanto com protocolos assíncronos multicanais iniciado pelo receptor quanto com protocolo síncrono relevantes na literatura científica. Os critérios de avaliação utilizados foram medição do consumo, latência e taxa de entrega da rede em diferentes cenários. Os resultados mostraram que o protocolo proposto minimiza o consumo de energia em relação aos protocolos assíncronos, além de melhorar a comunicação quando comparado aos protocolos analisados. Na comparação com o protocolo síncrono, demonstrou desempenho e consumo compatíveis, quando em período de trabalho menor, e consumo reduzido com períodos de trabalho maiores. / The Internet of Things is considered a new communication system that promises to optimize and improve different application areas. It is based on sensor modules and intelligent objects only interconnected through the internet. In large-scale wireless sensor network applications, networks have own specific characteristics such as many low-power, limited-power sensor modules with intermittent communication losses. These networks need to operate with scalable, energy-efficient protocols. Thus, this thesis proposes an asynchronous multichannel receiver-initiated MAC protocol for low power wireless sensor networks and internet of things applications. Through a comparison with already existing solutions, the proposed protocol tries to mitigate message containment and the effect of idle listening through an efficient initial recognition mechanism. It is also proposed an effective diagnosis of communication failure detection in the communication cycle, which also helps to save energy. In addition, a multichannel mechanism is proposed based on the knowledge of the neighborhood channel in addition to services of initialization and maintenance of the network. To validate the proposed protocol, evaluations were made for the consumption of each node sensor, the network traffic for each link, the latency and the network delivery rate in a web application. Tests were performed using asynchronous multichannel receiver-initiated and synchronous protocols based on literature scientific. The results show that the proposed protocol minimizes the energy consumption in relation to the asynchronous protocols, besides improving the communication when compared to the analyzed protocols. In the comparison with the synchronous protocol the proposed protocol showed performance and consumption compatible, when in a smaller duty cycles, and reduced consumption with longer duty cycles.
|
640 |
Design, analysis and simulations of medium access control protocols for high and low data rate applicationsGoratti, L. (Leonardo) 28 November 2011 (has links)
Abstract
The past two decades have witnessed an unprecedented proliferation of mobile devices equipped with extremely innovative wireless technologies. Short range networks, such as wireless personal area networks (WPANs), wireless sensor networks (WSNs) and wireless body area networks (WBANs) have been defined and researched to deliver high speed home connectivity, environment and health monitoring. This thesis tackles design, analysis and simulation of medium access control (MAC) protocols tailored for short range networks. These have in common the use of battery operated devices but also certain design challenges connected with MAC protocols are common upon selecting the physical layer technology.
Ultra wideband (UWB) technology and 60 GHz technology (which is referred to also as millimeter wave communications) are two valid examples of the wireless revolution of the past decade. Several existing standards, such as IEEE 802.15.3, ECMA-368, IEEE 802.15.4 and its amendment IEEE 802.15.4a, are considered in this thesis for MAC analysis in conjunction with UWB technology. With regard to millimeter wave communications the characteristics of the IEEE 802.15.3c standard are taken into account. Apart for the IEEE 802.15.3c all the MAC protocols have been modeled in the network simulator Opnet.
One contribution of this thesis is to produce an innovative and in-depth analysis of the management aspects (e.g. ECMA-368 distributed beaconing) stemming from the above mentioned standards by means of analytical and simulation models. This study approach allows selecting the MAC features suitable for the applications and the technologies of interest. The key performance metric used to analyze all the protocols is energy efficiency, but also throughput is investigated. Another contribution brought by this thesis consists in the innovative way of studying slotted-based MAC protocols as an integrated concept connected with the type of network, the type of application and the selected physical technologies.
This thesis also shows MAC performance in conjunction with UWB when false alarm, miss-detection and receiver capture (capture is modeled by means of an existing interference model) are taken into consideration. Most of the unrealistic, though common, assumptions in MAC analysis are removed and the performance of selected medical applications is evaluated through Opnet simulations.
The well known binary exponential backoff is analyzed with an innovative though simplified one-dimensional Markov chain approach in the context of directional MAC for 60 GHz communications. As shown in the remainder of this thesis, the simplification introduced does not hinder the accuracy of the results, but rather allows accounting even for a finite number of retransmissions with a simple chain extension. / Tiivistelmä
Kahden viime vuosikymmenen aikana innovatiivisella langattomalla tekniikalla varustettujen viestintälaiteiden määrä on kasvanut räjähdysmäisesti. Lyhyen kantaman verkkoja kuten langattomia henkilökohtaisen alueen verkkoja (WPAN), langattomia anturiverkkoja (WSN) ja langattomia vartaloalueen verkkoja (WBAN) on määritelty ja tutkittu, jotta voitaisiin tuottaa korkeanopeuksisia kotiyhteyksiä sekä välineitä ympäristön ja terveydentilan seurantaan. Tämä väitöskirja käsittelee lyhyen kantaman viestintään suunniteltujen linkinohjauskerroksen MAC-protokollien suunnittelua, analysointia ja simulointia. Näissä kaikissa käytetään akkukäyttöisiä laitteita, mutta myös tietyt MAC-protokollien suunnittelun haasteet ovat tavallisia fyysisen kerroksen teknologiaa valittaessa.
Ultra-laajakaistainen (UWB) teknologia ja 60 GHz teknologia (eli millimetriaallonpituusalueen tietoliikenne) ovat hyviä esimerkkejä kuluneen vuosikymmenen langattomasta vallankumouksesta. Tässä väitöskirjassa huomioidaan UWB teknologiaan liittyvää MAC-kerroksen analyysiä tehtäessä useat olemassa olevat standardit, kuten IEEE 802.15.3, ECMA-368, IEEE 802.15.4 ja sen lisäys IEEE 802.15.4a. Millimetriaallonpituusalueen tietoliikenteessä huomioidaan myös IEEE 802.15.3c standardin erityispiirteet. IEEE 802.15.3c:tä lukuun ottamatta kaikki MAC-protokollat on mallinnettu Opnet verkkosimulaattorilla.
Tämä tutkimus tarjoaa innovatiivisen ja syväluotaavan tutkimuksen näiden standardien pohjalta ja analyyttisten ja simuloitujen mallien avulla kehitetyistä hallinnallisista lähestymistavoista (esim. ECMA-368 hajautettu majakkasignaali). Näiden avulla voidaan valita kohteena oleviin sovelluksiin ja teknologioihin parhaiten soveltuvia MAC-ominaisuuksia. Kaikkien protokollien analysointiin käytetty ensisijainen suorituskykymittari on energiatehokkuus, mutta myös datanopeuksia on tarkasteltu. Tässä tutkimuksessa esitellään myös innovatiivinen tapa tutkia MAC protokollia integroituina konsepteina suhteessa verkon ja sovellusten tyyppiin sekä fyysisen kerroksen teknologiaan.
Lisäksi tämä väitöskirja esittelee MAC suorituskykyä UWB verkossa silloin, kun siinä otetaan huomioon väärät hälytykset, väärä havainnointi ja vastaanottimen signaalinkaappaus (vastaanoton mallintamiseksi käytetään olemassa olevaa interferenssimallia). MAC analyysistä poistetaan useimmat epärealistiset, vaikkakin tavalliset, olettamukset, ja verkkojen suorituskykyä tarkastellaan valittujen kriittisten parametrien monitoroinnissa Opnet-simulaatioiden avulla.
Tunnettua binäärijakoinen eksponentiaalinen perääntyminen -algoritmia analysoidaan innovatiivisella, yksinkertaistetulla yksiulotteisella Markov-ketju -mallilla 60 GHz:n suunta-antenni MAC:n yhteydessä. Kuten tässä tutkimuksessa tullaan osoittamaan, esitelty yksinkertaistus ei rajoita tulosten tarkkuutta, vaan mukaan voidaan lukea jopa rajallinen määrä uudelleenlähetyksiä yksinkertaisen Markovin ketjun laajennuksen avulla.
|
Page generated in 0.0826 seconds