Spelling suggestions: "subject:"local are networks""
121 |
An adaptive wireless LAN MAC scheme to achieve maximum throughput and service differentiationZha, Wei. January 2005 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Electrical and Computer Engineering. / Title from title screen. Includes bibliographical references.
|
122 |
Multi-media presentation system based on a distributed control networkBaily, Albert L. 19 August 1991 (has links)
Control oriented local area networks (COLANs) are being installed in
factories at an increasing rate. Traditionally, process control has
operated with a master scheduler (computer) monitoring a number of points
in a control grid. As the complexity of today's process control needs
grow, the need to process information locally increases. Microcontrollers,
networked with a master scheduler, can collect data from a locus of points
and make decisions as to whether the master needs to be notified or not.
By processing data locally, memory and execution time are freed up for the
master scheduler. Task implementation becomes modular in nature,
resulting in process control software that is easier to write, and
maintain.
This structure is the basis for COLAN V, a low cost, real-time,
distributed control network developed at Oregon State University. COLAN
V was used as the foundation for the creation of a multi-media
presentation system. Six microcontrollers were networked together to
remotely control the operation of projectors, projector screens, and
lighting. Based on the application the master scheduler was replaced by
a tape player. This allowed the storage of the audio part of the
presentation on one track of the tape and the storage of the synchronized
control signals on the other track. This distributed control network
supplied a low cost solution to a need that was not addressed by the
commercial market at any price. / Graduation date: 1992
|
123 |
CSMA with Implicit Scheduling through State-keeping: A Distributed MAC Framework for QoS in Broadcast LANsKangude, Shantanu 13 May 2004 (has links)
Channel access fairness and efficiency in capacity utilization are the two main objectives for Quality of Service (QoS) specific to Medium Access Control (MAC) protocols in computer networks. For bursty and unpredictable traffic in networks, fairness and efficiency involve a mutual tradeoff with the currently popular QoS mechanisms. We propose a QoS MAC framework for carrier sensing multiple access (CSMA) networks, that achieves fairness with improved efficiency through extensive state-keeping based on the MAC evolution. This CSMA with Implicit Scheduling through State-keeping (CSMA/ISS) framework involves the tracking of traffic arrival at active nodes, the nodes that need channel access frequently. It also involves implicit channel access grants to different active nodes according to their estimated queue backlogs and the fair scheduling requirements. These methods save channel capacity that may otherwise be required for disseminating the access requirements of various nodes, and their access rights according to fairness rules. A static, hierarchical, and weighted fair access scheme is designed in CSMA/ISS by allowing repeated rounds of access that are weighted fairly according to requirements. Weighted fairness across classes is achieved by invoking channel access for each traffic class in a round as many times as its weight. Within each class, all active nodes are allowed equal access through in-order channel access based on a looped list of active nodes. Although CSMA/ISS is proposed as a distributed control framework for efficiency, it may also be employed in central control protocols. It may also be adapted to different types of CSMA networks, both wireless and wired, by an appropriate choice of the underlying classical access mechanism. The CSMA/ISS framework was modeled and simulated as a QoS capable MAC protocol for a wired fully connected local network environment. We present the CSMA/ISS framework, the example implementation, and the results of performance evaluation of the example implementation. Significant performance improvements were observed, and the memory and processing trade-off was found to be low to moderate.
|
124 |
Medium Access Control in Wireless Networks with Multipacket Reception and QueueingChen, Guan-Mei 26 July 2005 (has links)
In this thesis, we propose the predictive multicast polling scheme for medium access control in wireless networks with multipacket reception capability. We concentrate on the case in which the packet arrival process is general and the maximum queue size is finite but larger than one. We derive both analytical results and simulation results. We use the theory of discrete-time Markov chain to analyze the evolution of the system state. In addition, we propose to use Markov reward processes to calculate the throughput. Furthermore, we obtain the average system size, the packet blocking probability,
and the average packet delay. The proposed analysis approach is applicable no matter whether perfect state information is available to the controller or not. We also use simulation results to justify the usage of the proposed approach. Our study shows that the system performance can be significantly improved with a few additional buffers in the queues. The proposed medium access control scheme can be used in the single-hop wireless local area networks and the multi-hop wireless mesh networks.
|
125 |
An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANsChen, Yung-Chih 15 August 2009 (has links)
It is necessary to authenticate users when they want to access services in WLANs. Extensible
Authentication Protocol (EAP) is an authentication framework widely used in WLANs. Authentication
mechanisms built on EAP are called EAP methods. The requirements for EAP
methods in WLAN authentication have been defined in RFC 4017. Besides, low computation
cost and forward secrecy, excluded in RFC 4017, are noticeable requirements in WLAN authentication.
However, all EAP methods and authentication schemes designed for WLANs so
far do not satisfy all of the above requirements. Therefore, we will propose an EAP method
which utilizes three factors, stored secrets, passwords, and biometrics, to verify users. Our
proposed method fully satisfies 1) the requirements of RFC 4017, 2) forward secrecy, and
3) lightweight computation. Moreover, the privacy of biometrics is protected against the authentication
server, and the server can flexibly decide whether passwords and biometrics are
verified in each round or not.
|
126 |
Measurement of TOA using frequency domain techniques for indoor geolocationZand, Emad Dolatshahi. January 2003 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: indoor geolocation; TOA. Includes bibliographical references (p. 97).
|
127 |
The design and analysis of nodes in a fiber optic based star network (STARNET) /Tanir, Oryal. January 1985 (has links)
STARNET is a fiber optic based network which facilitates the interconnection of distributed Local Area Networks. Configured as a sixteen pointed star topology with a multiprocessor based controller at the center of the star (named the Central Switch). STARNET is capable of scheduling calls from users connected to User Access Nodes located at the points of the star. Messages are passed from one node to another through the Central Switch via duplex fiber optic lines connecting each node to the center. / This paper presents a multiprocessor based design of the User Access Node. The hardware and software structure is examined in depth, providing solid guidelines for the physical construction of the unit. The performances of statistical STARNET models using parameters obtained from the design (and three different Central Switch models) are plotted and compared for five different examples of external traffic. The model analysis gives an indication of the expected message delays, supporting the feasibility of the design.
|
128 |
Performance analysis of LAN, WAN and WLAN in Eritrea.Kakay, Osman M. O. January 2006 (has links)
The dissertation addresses the communication issues of interconnecting the different government sectors LANs, and access to the global Internet. Network capacities are being purposely overengineered in today's commercial Internet. Any network provider, be it a commercial Internet Service Provider (ISP) or Information Technology Service department at government sector, company or university site, will design network bandwidth resources in such a way that there will be virtually no data loss, even during the worst possible network utilization scenario. Thus, the service delivered by today's end-to-end wide area Internet would be perfect if it wasn't for the inter-domain connections, such as Internet access link to the ISP, or peering points between ISPs. The thesis studies the performance of the network in Eritrea, displaying the problems of Local Area Networks (LANs) and Wide Area Networks (WAN) and suggesting initial solutions and investigating the performance of (WAN) through the measured traffic analysis between Asmara LAN and Massawa LAN, using queuing theory system (M/M/1 and M/M/2) solution. The dissertation also uses OPNET IT Guru simulation software program ·to study the performance of LAN and WLAN in Eritrea. The items studied include traffic, collision, packet loss, and queue delay. Finally in order to follow the current trends, we study the performance ofVOIP links in Eritrean WANs environment, with a focus on five different link capacities: 28 kbps, 33 kbps, 64 kbps, and 128 kbps for voice and 256/512 kbps for voice and data. Using the R value as a measure of mean opinion score (MOS), we determine that the 33 kbps link would be adequate for Eritrean WANs. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2006.
|
129 |
A framework for the development of wide area distributed applicationsTopol, Brad Byer January 1998 (has links)
No description available.
|
130 |
Performance analysis and call control procedures in high-speed multimedia personal wireless communications / Sam (Shaokai) Yu.Yu, Sam Shaokai January 1999 (has links)
Bibliography: leaves 203-219. / 226 leaves : ill. ; 30 cm. / Title page, contents and abstract only. The complete thesis in print form is available from the University Library. / Develops efficient analytical methodologies for multimedia traffic integration and improved design tools to enhance data performance. The call admission control policies proposed are not only able to enhance traffic performance but also maintain communication quality at an acceptable level. In particular, the multiple priority scheme is a promising technique for the control of packet congestion in a high-speed wireless multimedia environment. / Thesis (Ph.D.)--University of Adelaide, Dept. of Electrical and Electronic Engineering, 2000?
|
Page generated in 0.0656 seconds