101 |
Design, implementation och simulering av ett MAC-protokoll för mobila trådlösa sensornätverk / Design, Implementation and Simulation of a MAC-protocol for Mobile Wireless Sensor NetworksÖstlund, Pierre January 2014 (has links)
Trådlösa sensornätverk byggs upp av trådlösa sensorer, som gemensamt arbetar för att lösa en viss uppgift. Ett exempel på en sådan uppgift kan vara insamling av pollennivåer i luften över en stor yta. Sensornoderna vidarebefordrar datan sinsemellan tills den når en datainsamlingsnod någonstans i nätverket där den sedan lagras och efterbehandlas. Generellt gäller att sensornoder är små, billiga, kommunicerar trådlöst och har en väldigt lång livslängd. Traditionellt sett har sen- sornoder också antagits vara statiska (stillastående), vilket medför begränsningar om noderna bärs av exempelvis människor eller monteras på fordon. I detta examensarbete presenteras matmac , ett mac-protokoll som designats för att hantera mobila noder i trådlösa sensornätverk. En referensimplementa- tion av matmac har implementerats i operativsystemet Contiki och utvärderats med varierande konfigurationsparametrar, rörelsehastigheter och dataintensitet i simulatorn Cooja. Resultatet från utvärderingen visar att mekanismerna för mo- bilitetshantering i matmac främjar sensornodernas förmåga att pålitligt överföra data trots att de är mobila.
|
102 |
An Efficient QoS MAC for IEEE 802.11p Over Cognitive Multichannel Vehicular NetworksEl Ajaltouni, Hikmat 22 February 2012 (has links)
One of the most challenging issues facing vehicular networks lies in the design of an
efficient MAC protocol due to mobile nature of nodes, delay constraints for safety applications and interference. In this thesis, I propose an efficient Multichannel QoS Cognitive MAC (MQOG). MQOG assesses the quality of channel prior to transmission employing dynamic channel allocation and negotiation algorithms to achieve significant increase in channel reliability,
throughput and delay constraints while simultaneously addressing Quality of Service.
The uniqueness of MQOG lies in making use of the free unlicensed bands. To consider
fair effective sharing of resources I propose a Mobility Based Dynamic Transmit Opportunity
(MoByToP) while modifying the 802.11e TXOP (Transmit Opportunity). The proposed protocols were implemented in OMNET++ 4.1, and extensive experiments demonstrated a faster and more efficient reception of safety messages compared to existing VANet MAC Protocols. Finally, improvements in delay, packet delivery ratios and throughput were noticed.
|
103 |
Energy-Efficient Battery-Aware MAC protocol for Wireless Sensor NetworksNasrallah, Yamen 19 March 2012 (has links)
Wireless sensor networks suffer from limited power resources. Therefore, managing the energy
constraints and exploring new ways to minimize the power consumption during the operation of
the nodes are critical issues. Conventional MAC protocols deal with this problem without
considering the internal properties of the sensor nodes’ batteries. However, recent studies about
battery modeling and behaviour showed that the pulsed discharge mechanism and the charge
recovery effect may have a significant impact on wireless communication in terms of power
saving. In this thesis we propose two battery-aware MAC protocols that take benefit of these
factors to save more energy and to prolong the lifetime of the nodes/network without affecting
the throughput. In both protocols we measure the remaining battery capacity of the node and use
that measurement in the back-off scheme. The first protocol gives the nodes with higher
remaining battery capacity more priority to access the medium, while the other one provides
more medium access priority to the nodes with lower remaining battery capacity. The objective
is to investigate, through simulations, which protocol reduces the power consumption of the
nodes, improve the lifetime of the network, and compare the results with the CSMA-CA
protocol.
|
104 |
The waves of Manannán : a study of the literary representations of Manannán mac Lir from Immram Brain (c. 700) to Finnegans Wake (1939) /MacQuarrie, Charles William. January 1997 (has links)
Thesis (Ph. D.)--University of Washington, 1997. / Vita. Includes bibliographical references (leaves [356]-388).
|
105 |
Uma Proposta de framework para a geração de protocolos MAC para RSSFSteiner, Rodrigo Vieira January 2013 (has links)
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2013. / Made available in DSpace on 2013-12-05T23:22:33Z (GMT). No. of bitstreams: 1
317555.pdf: 2759939 bytes, checksum: ed32f4aefa0cb15eb6310f54096f6100 (MD5)
Previous issue date: 2013 / Redes de sensores sem fio são altamente dependentes de protocolos de controle de acesso ao meio para fazer uso efetivo dos poucos recursos disponíveis em seus nós sensores. Entretanto a maioria das otimizações propostas nos protocolos existentes focam em segmentos específicos do espaço de projeto. O que é considerado como uma otimização por uma classe de aplicações pode representar uma forte limitação para outras. Um protocolo com o objetivo de cobrir uma ampla fração do universo de aplicações de redes sensores deve apresentar algum mecanismo de configurabilidade ou adaptabilidade. Nesse sentido surgiu o Configurable Medium Access Control (C-MAC) (WANNER; OLIVEIRA; FROHLICH, 2007). O C-MAC funciona como um framework de estratégias de controle de acesso ao meio, as quais podem ser combinadas para produzir protocolos específicos de aplicação. Através desse paradigma, programadores de aplicações podem criar novos serviços de comunicação sob demanda e experimentar diferentes parâmetros de comunicação, coletando métricas para identificar e ajustar o protocolo às suas necessidades. Contudo, a arquitetura original do C-MAC fornece um baixo reuso de seus componentes em software, dificultando e reduzindo sua configurabilidade. Esta dissertação apresenta a proposta, implementação e avaliação de uma nova arquitetura para o framework C-MAC. Através de uma análise das diferentes categorias de protocolos MAC para redes de sensores, foram identificadas características comuns e especificidades desses protocolos que foram consideradas no desenvolvimento do novo C-MAC. Além disso, o que era um único grande componente na arquitetura original, foi separado em diferentes microcomponentes e novos microcomponentes foram incluídos de forma a suportar mais funcionalidades. Dessa forma, a arquitetura proposta possibilita um maior reuso de seus componentes em software, fornecendo maior configurabilidade e, consequentemente, suportando mais aplicações.<br> / Abstract : Wireless sensor networks are highly dependent on medium access controlprotocols to make effective use of the few resources available on sensor nodes.Nevertheless, most of the optimizations proposed by existing protocols focuson specific segments of the design space. What is considered an optimizationby one class of applications can represent a strong limitation for others.A protocol aiming at covering a large fraction of the application universefor sensor networks must feature configuration or adaptation mechanisms.Therefore, the Configurable Medium Access Control (C-MAC) wascreated (WANNER; OLIVEIRA; FROHLICH, 2007). C-MAC is realized asa framework of medium access control strategies that can be combined toproduce application-specific protocols. Through this paradigm, applicationprogrammers can create new communication services on demand and experimentwith different communication parameters, collecting metrics to identifyand adjust the protocol to match their applications? requirements. Nonetheless,C-MAC original architecture provides low reuse of software components,hindering its configurability.This dissertation presents the proposal, implementation, and evaluation ofa new architecture for the framework C-MAC. Through the analysis of thedifferent categories of MAC protocols for sensor networks, common characteristicsand specificities of these protocols were identified and used in thedevelopment of the new C-MAC. Thus, the proposed architecture enables agreater reuse of its software components, providing greater configurabilityand, consequently, supporting a wider range of applications.
|
106 |
Secure MAC protocols for cognitive radio networksAlhakami, Wajdi January 2016 (has links)
With the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats targeting spectrum sensing, spectrum management, spectrum sharing, and spectrum mobility leading to the deterioration of the network performance. Thus, protection and detection security mechanisms are essential to maintaining the CRNs. This thesis presents a novel decentralised CR MAC protocol that successfully utilises the unused portion of the licensed band. The protocol achieves improved performance; communication time and throughput when compared to two benchmark protocols. Less communication time and higher throughput are accomplished by the protocol due to performing fast switching to the selected available data channel for initiating data transmission. The proposed protocol is then extended to two different versions based on two authentication approaches applied to it; one using Digital Signature and another is based on Shared-Key. The two proposed secure protocols address the security requirements in CRNs leading to subsequent secure communication among CUs. The protocols function effectively in providing defence against several attacks related to the MAC layer such as; Spectrum Sensing Data Manipulation/Falsification, Data Tempering and Modification, Jamming attacks, Eavesdropping, Forgery and Fake control information attacks, MAC address spoofing, and unauthorised access attacks. The associated security algorithms ensure the successful secure communication between CUs in a cooperative approach. Moreover, the security protocols are investigated and analysed in terms of security flows by launching unauthorised access and modification attacks on the transmitted information. The testing results demonstrated that two protocols perform successful detection of threats and ensure secure communication in CRNs.
|
107 |
Protocolo MAC efi ciente em energia e livre de colisões para redes de sensores sem fioGuimarães, Vinícius Galvão 05 August 2014 (has links)
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2014. / Submitted by Ana Cristina Barbosa da Silva (annabds@hotmail.com) on 2014-11-27T18:23:10Z
No. of bitstreams: 1
2014_ViníciusGalvaoGuimaraes.pdf: 8615402 bytes, checksum: c2e2c09de27a9a106c552afb6c904ad5 (MD5) / Approved for entry into archive by Raquel Viana(raquelviana@bce.unb.br) on 2014-11-27T18:50:14Z (GMT) No. of bitstreams: 1
2014_ViníciusGalvaoGuimaraes.pdf: 8615402 bytes, checksum: c2e2c09de27a9a106c552afb6c904ad5 (MD5) / Made available in DSpace on 2014-11-27T18:50:14Z (GMT). No. of bitstreams: 1
2014_ViníciusGalvaoGuimaraes.pdf: 8615402 bytes, checksum: c2e2c09de27a9a106c552afb6c904ad5 (MD5) / Este trabalho propõe e desenvolve o DyTEE (do inglês Dynamic Timed Energy Efficient), um novo protocolo de controle de acesso ao meio (MAC) livre de colisões de dados para redes de sensores sem fio, apropriado principalmente a ambientes de automação predial e rural. Este foi baseado em Múltiplo Acesso por Divisão do Tempo (TDMA) com ciclos de ativação e períodos de transmissão dinâmicas, empregando somente a utilização de um canal e sensoriamento da portadora.O novo protocolo foi implementado em módulos reais na plataforma Zigbit da Atmel, utilizando o pacote _IEEE 802.15.4 MAC_ fornecido pelo fabricante. Foi também implementado em simulação, utilizando parâmetros fornecidos pelo autor do S-MAC (plataforma MICA e sistema operacional TinyOS) e os parâmetros obtidos da implementação em Zigbit. Dessa forma, o DyTEEfoi comparado com o S-MAC e o IEEE 802.15.4, onde foram aferidas métricas de vazão, latência,consumo energético e outras.Os resultados dos experimentos sob diferentes parâmetros e topologias mostraram que a nova proposta supera ambos os protocolos comparados. Isto é, em relação ao S-MAC, apresentou aproximadamente um quinto do consumo de energia, bem como melhor latência e vazão aproximadamente até 80% maior. Enquanto que em relação ao IEEE 802.15.4, apresentou também melhores resultados,principalmente em relação ao tempo de vida estimado do módulo real realizando uma tarefa de sensoriamento de temperatura, no qual o DyTEE obteve um ganho de aproximadamente 25,6%a mais de duração do que o IEEE 802.15.4.Concluiu-se que o novo protocolo possui uma boa economia de energia, mantendo bons resultados de latência e vazão, bem como este foi implementado em módulos de baixo poder computacional e restrita memória, ou seja, um protocolo compacto e eficiente. ______________________________________________________________________________ ABSTRACT / This paper proposes develops the DyTEE (Dynamic Energy Efficient Timed), a new protocol for medium access control (MAC) collision-free data for wireless sensor networks, designed for building automation and rural automation environments. It was based on Time Division Multiple Access(TDMA) with activation cycles and dynamics transmission slots, employing the use of only one channel and carrier sensing. The new protocol has been implemented in real modules Zigbit Atmel platform, using the "IEEE 802.15.4 MAC" package provided by the manufacturer. Was also implemented in simulation using parameters provided by the author of the S-MAC (MICA platform and TinyOS operating system) and the parameters obtained in the implementation with Zigbit. Thus, DyTEE wascompared with S-MAC and IEEE 802.15.4, which were measured metrics of throughput, latency,energy consumption and other. The results of experiments under di_erent topologies and parameters have shown that the newproposal outperforms both protocols compared. That is, relative to the S-MAC, DyTEE showedabout one _fths of the energy consumption as well as improved latency and throughput withapproximately 80% greater. While compared to the IEEE 802.15.4, DyTEE also showed better results, especially regarding the estimated life time of the actual module performing a task of sensing temperature, in which the Dy TEE obtained a gain of approximately 25.6% more duration than the IEEE 802.15.4.It was concluded that the new protocol has a good energy saving, while maintaining good throughput and latency results, as well it was implemented in low computational power and limited memory modules, that means, Dy TEE is a compact and efficient protocol.
|
108 |
Performance Models for LTE-Advanced Random AccessJanuary 2014 (has links)
abstract: LTE-Advanced networks employ random access based on preambles
transmitted according to multi-channel slotted Aloha principles. The
random access is controlled through a limit <italic>W</italic> on the number of
transmission attempts and a timeout period for uniform backoff after a
collision. We model the LTE-Advanced random access system by formulating
the equilibrium condition for the ratio of the number of requests
successful within the permitted number of transmission attempts to those
successful in one attempt. We prove that for <italic>W</italic>≤8 there is only one
equilibrium operating point and for <italic>W</italic>≥9 there are three operating
points if the request load ρ is between load boundaries ρ<sub>1</sub>
and ρ<sub>2</sub>. We analytically identify these load boundaries as well as
the corresponding system operating points. We analyze the throughput and
delay of successful requests at the operating points and validate the
analytical results through simulations. Further, we generalize the
results using a steady-state equilibrium based approach and develop
models for single-channel and multi-channel systems, incorporating the
barring probability <italic>P<super>B</super></italic>. Ultimately, we identify the de-correlating
effect of parameters <italic>O, P<super>B</super>,</italic> and <italic>T<sub>o</sub><super>max</super></italic> and introduce the
Poissonization effect due to the backlogged requests in a slot. We
investigate the impact of Poissonization on different traffic and
conclude this thesis. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2014
|
109 |
Análise do problema do Protocolo MAC IEEE 802.11 em redes Ad Hoc MultihopALMEIDA, Adalton de Sena January 2003 (has links)
Made available in DSpace on 2014-06-12T15:58:29Z (GMT). No. of bitstreams: 2
arquivo4635_1.pdf: 928763 bytes, checksum: f0830b47cdbb5936c9f93e74336e98d4 (MD5)
license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5)
Previous issue date: 2003 / O protocolo MAC IEEE 802.11 DFWMAC (Distributed Foundation Wireless Access
Control) foi padronizado para uso em redes locais sem fio e tem sido utilizado para
testar e simular redes locais sem fio ad hoc multihop. Este protocolo tem
apresentado problemas quando trabalhamos com redes ad hoc multihop. Este
problema fica evidente quando submetemos tráfego TCP (Transmission Control
Protocol) entre duas estações. Por tratar-se de um protocolo de controle de acesso
ao meio distribuído, não possuindo um controle central, a decisão de transmissão é
feita pelas próprias estações de acordo com o funcionamento do DFWMAC. Ainda
pelas suas características de funcionamento distribuído, problemas de terminal
escondido e terminal exposto podem ocorrer comprometendo de maneira
significativa o tráfego de conexões TCP. Associado aos problemas de terminal
escondido e terminal exposto , o algoritmo de Backoff Exponencial Binário
(BEB) contribui para que este protocolo não funcione bem em redes ad hoc
multihop.
O resultado da ação de todos estes problemas é a degradação do throughput do
TCP gerando instabilidade e injustiça no acesso ao meio compartilhado. A
instabilidade fica evidente quando a variação do throughput é muito alta em
intervalos de tempo muito curtos. Isto pode ser visto com apenas uma conexão
TCP entre duas estações. Já o problema de injustiça aparece quando submetemos
duas conexões TCP simultâneas, sendo que uma consegue transmitir pacotes de
dados a uma taxa alta, utilizando toda a largura de banda, enquanto a outra
conexão não consegue transmitir nenhum pacote permanecendo com o throughput
zero durante o tempo em que as duas conexões estão ativas.
Este trabalho propõe uma solução para lidar com estes problemas
|
110 |
Enhancing the performance of ad hoc networking by lower layer designProkkola, J. (Jarmo) 25 November 2008 (has links)
Abstract
The research of early ad hoc-like networks, namely multi-hop packet radio networks, was mainly concentrated on lower layers (below network layer). Interestingly, the research of modern ad hoc networks has been mainly restricted to routing protocols. This is understandable, since routing is very challenging in such dynamic networks, but the drawback is that the lower layer models used in the studies are often highly simplified, giving inaccurate or even incorrect results. In addition, modern ad hoc network solutions are usually suboptimal because lower layers, not designed especially for ad hoc networking, are used. Thus, ad hoc networking performance, in general, can be notably enhanced by considering also the design of lower layers. The simple deployment and robustness make wireless ad hoc networks attractive for several applications (e.g., military, public authority, peer-to-peer civilian, and sensor networking), but the performance of the current solutions is typically not adequate.
The focus of this work is on the effects of lower layer functionalities on the performance of ad hoc networks, while also taking into account the effects of upper layers (e.g., the effect of application traffic models). A CDMA (Code Division Multiple Access) based dual channel flat ad hoc network solution, incorporating cross-layering between all three lowest layers, is proposed and analyzed. The main element of this is the Bi-Code Channel Access (BCCA) method, in which a common code channel is used for broadcast information (e.g., route discovery), while a receiver-specific code channel is used for all directed transmissions. In addition, a new MAC (Medium Access Control) solution designed for BCCA is presented. Moreover, a novel network layer spreading code distribution (NSCD) method is presented. The advantage of these methods is that they are designed especially to be used in ad hoc networks.
With an extensive set of case studies, it is shown that the presented methods outperform the typically used ad hoc network solutions (based on IEEE 802.11) in different kind of scenarios, environments, modeling concepts, and with different parameters. Detailed simulations are carried out in order to analyze the effects of different features at the lower layers, finding also interesting phenomena and dependencies between different layers. It is also shown that close attention should be paid to lower layer modeling even though the overall network performance would be in focus. In addition, various interesting features and behavior models regarding ad hoc networking are brought up. / Tiivistelmä
Ensimmäiset tutkimukset rakenteettomista (ad hoc) verkoista esiintyivät nimellä monihyppypakettiradioverkot, ja ne koskivat pääasiassa verkkokerroksen alapuolella olevia tietoliikennekerroksia, mutta nykyiset tutkimukset ovat kuitenkin keskittyneet pääasiassa reititysprotokolliin. Tämä on sikäli ymmärrettävää, että reititys on hyvin haasteellista tämän tyyppisissä dynaamisissa verkoissa, mutta ongelma on, että käytetyt alempien kerrosten mallit ovat usein hyvinkin yksinkertaistettuja, mikä voi johtaa epätarkkoihin tai jopa vääriin tuloksiin. Tämän lisäksi nykyiset ehdotetut rakenteettomien verkkojen ratkaisut ovat usein tehottomia, sillä käytettyjä alempien kerrosten ratkaisuja ei ole tarkoitettu tällaisiin verkkoihin. Niinpä rakenteettomien verkkojen suorituskykyä voidaan parantaa huomattavasti kiinnittämällä huomiota alempien kerrosten suunnitteluun. Verkkojen rakenteettomuus on ajatuksena houkutteleva useissa käyttökohteissa (esimerkiksi sotilasympäristössä, viranomaiskäytössä, käyttäjien välisissä suorissa yhteyksissä ja sensoriverkoissa), mutta suorituskyky ei useinkaan ole riittävällä tasolla käytännön sovelluksiin.
Työssä tutkitaan pääasiassa alempien kerrosten toiminnallisuuden vaikutusta rakenteettomien verkkojen suorituskykyyn ottaen huomioon myös ylemmät kerrokset, kuten sovellustason mallit. Työssä esitellään ja analysoidaan koodijakomonikäyttöön (CDMA, Code Division Multiple Access) perustuva kaksikanavainen tasaisen rakenteettoman verkon ratkaisu, jossa hyödynnetään kaikkien kolmen alimman kerroksen välistä keskinäistä viestintää. Ratkaisun ydin on BCCA-menetelmä (Bi-Code Channel Access), jossa käytetään kahta kanavaa tiedonsiirtoon. Yksi kanava on tarkoitettu kaikille yhteiseksi kontrollikanavaksi (esimerkiksi reitinmuodostus voi käyttää tätä kanavaa), kun taas toinen kanava on käyttäjäkohtainen kanava, jota käytetään suoraan viestittämiseen kyseiselle käyttäjälle (varsinainen data yms.). Tämän lisäksi esitellään myös BCCA-menetelmää varten suunniteltu kanavakontrollimenetelmä sekä verkkotasolla toimiva hajotuskooditiedon jakamiseen tarkoitettu menetelmä. Näiden uusien menetelmien etu on se, että ne on suunniteltu nimenomaan rakenteettomiin verkkoihin.
Kattavan testivalikoiman avulla osoitetaan, että esitetty uusi ratkaisu peittoaa tyypilliset IEEE 802.11 -standardiin pohjautuvat rakenteettomien verkkojen ratkaisut. Testeissä käytetään erityyppisiä verkkorakenteita, ympäristöjä, mallinnusmenetelmiä ja parametreja. Yksityiskohtaisissa simuloinneissa ajetaan eri testitapauksia ja selvitetään, miten alempien kerrosten eri menetelmät missäkin tapauksessa vaikuttavat suorituskykyyn. Alempien kerrosten mallinnuksessa on syytä olla tarkkana, sillä työssä käy ilmi, että mallinnusvirheillä voi olla suurikin vaikutus myös ylempien kerrosten suorituskykyyn. Työ myös paljastaa useita mielenkiintoisia ilmiöitä ja vuorovaikutussuhteita, jotka liittyvät tutkittujen menetelmien ja yleisesti rakenteettomien verkkojen toimintaan.
|
Page generated in 0.0339 seconds