• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 239
  • 57
  • 52
  • 31
  • 24
  • 13
  • 10
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 525
  • 169
  • 139
  • 89
  • 86
  • 84
  • 83
  • 78
  • 77
  • 77
  • 74
  • 51
  • 51
  • 47
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Design, implementation och simulering av ett MAC-protokoll för mobila trådlösa sensornätverk / Design, Implementation and Simulation of a MAC-protocol for Mobile Wireless Sensor Networks

Östlund, Pierre January 2014 (has links)
Trådlösa sensornätverk byggs upp av trådlösa sensorer, som gemensamt arbetar för att lösa en viss uppgift. Ett exempel på en sådan uppgift kan vara insamling av pollennivåer i luften över en stor yta. Sensornoderna vidarebefordrar datan sinsemellan tills den når en datainsamlingsnod någonstans i nätverket där den sedan lagras och efterbehandlas. Generellt gäller att sensornoder är små, billiga, kommunicerar trådlöst och har en väldigt lång livslängd. Traditionellt sett har sen- sornoder också antagits vara statiska (stillastående), vilket medför begränsningar om noderna bärs av exempelvis människor eller monteras på fordon. I detta examensarbete presenteras matmac , ett mac-protokoll som designats för att hantera mobila noder i trådlösa sensornätverk. En referensimplementa- tion av matmac har implementerats i operativsystemet Contiki och utvärderats med varierande konfigurationsparametrar, rörelsehastigheter och dataintensitet i simulatorn Cooja. Resultatet från utvärderingen visar att mekanismerna för mo- bilitetshantering i matmac främjar sensornodernas förmåga att pålitligt överföra data trots att de är mobila.
102

An Efficient QoS MAC for IEEE 802.11p Over Cognitive Multichannel Vehicular Networks

El Ajaltouni, Hikmat 22 February 2012 (has links)
One of the most challenging issues facing vehicular networks lies in the design of an efficient MAC protocol due to mobile nature of nodes, delay constraints for safety applications and interference. In this thesis, I propose an efficient Multichannel QoS Cognitive MAC (MQOG). MQOG assesses the quality of channel prior to transmission employing dynamic channel allocation and negotiation algorithms to achieve significant increase in channel reliability, throughput and delay constraints while simultaneously addressing Quality of Service. The uniqueness of MQOG lies in making use of the free unlicensed bands. To consider fair effective sharing of resources I propose a Mobility Based Dynamic Transmit Opportunity (MoByToP) while modifying the 802.11e TXOP (Transmit Opportunity). The proposed protocols were implemented in OMNET++ 4.1, and extensive experiments demonstrated a faster and more efficient reception of safety messages compared to existing VANet MAC Protocols. Finally, improvements in delay, packet delivery ratios and throughput were noticed.
103

Energy-Efficient Battery-Aware MAC protocol for Wireless Sensor Networks

Nasrallah, Yamen 19 March 2012 (has links)
Wireless sensor networks suffer from limited power resources. Therefore, managing the energy constraints and exploring new ways to minimize the power consumption during the operation of the nodes are critical issues. Conventional MAC protocols deal with this problem without considering the internal properties of the sensor nodes’ batteries. However, recent studies about battery modeling and behaviour showed that the pulsed discharge mechanism and the charge recovery effect may have a significant impact on wireless communication in terms of power saving. In this thesis we propose two battery-aware MAC protocols that take benefit of these factors to save more energy and to prolong the lifetime of the nodes/network without affecting the throughput. In both protocols we measure the remaining battery capacity of the node and use that measurement in the back-off scheme. The first protocol gives the nodes with higher remaining battery capacity more priority to access the medium, while the other one provides more medium access priority to the nodes with lower remaining battery capacity. The objective is to investigate, through simulations, which protocol reduces the power consumption of the nodes, improve the lifetime of the network, and compare the results with the CSMA-CA protocol.
104

The waves of Manannán : a study of the literary representations of Manannán mac Lir from Immram Brain (c. 700) to Finnegans Wake (1939) /

MacQuarrie, Charles William. January 1997 (has links)
Thesis (Ph. D.)--University of Washington, 1997. / Vita. Includes bibliographical references (leaves [356]-388).
105

Uma Proposta de framework para a geração de protocolos MAC para RSSF

Steiner, Rodrigo Vieira January 2013 (has links)
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2013. / Made available in DSpace on 2013-12-05T23:22:33Z (GMT). No. of bitstreams: 1 317555.pdf: 2759939 bytes, checksum: ed32f4aefa0cb15eb6310f54096f6100 (MD5) Previous issue date: 2013 / Redes de sensores sem fio são altamente dependentes de protocolos de controle de acesso ao meio para fazer uso efetivo dos poucos recursos disponíveis em seus nós sensores. Entretanto a maioria das otimizações propostas nos protocolos existentes focam em segmentos específicos do espaço de projeto. O que é considerado como uma otimização por uma classe de aplicações pode representar uma forte limitação para outras. Um protocolo com o objetivo de cobrir uma ampla fração do universo de aplicações de redes sensores deve apresentar algum mecanismo de configurabilidade ou adaptabilidade. Nesse sentido surgiu o Configurable Medium Access Control (C-MAC) (WANNER; OLIVEIRA; FROHLICH, 2007). O C-MAC funciona como um framework de estratégias de controle de acesso ao meio, as quais podem ser combinadas para produzir protocolos específicos de aplicação. Através desse paradigma, programadores de aplicações podem criar novos serviços de comunicação sob demanda e experimentar diferentes parâmetros de comunicação, coletando métricas para identificar e ajustar o protocolo às suas necessidades. Contudo, a arquitetura original do C-MAC fornece um baixo reuso de seus componentes em software, dificultando e reduzindo sua configurabilidade. Esta dissertação apresenta a proposta, implementação e avaliação de uma nova arquitetura para o framework C-MAC. Através de uma análise das diferentes categorias de protocolos MAC para redes de sensores, foram identificadas características comuns e especificidades desses protocolos que foram consideradas no desenvolvimento do novo C-MAC. Além disso, o que era um único grande componente na arquitetura original, foi separado em diferentes microcomponentes e novos microcomponentes foram incluídos de forma a suportar mais funcionalidades. Dessa forma, a arquitetura proposta possibilita um maior reuso de seus componentes em software, fornecendo maior configurabilidade e, consequentemente, suportando mais aplicações.<br> / Abstract : Wireless sensor networks are highly dependent on medium access controlprotocols to make effective use of the few resources available on sensor nodes.Nevertheless, most of the optimizations proposed by existing protocols focuson specific segments of the design space. What is considered an optimizationby one class of applications can represent a strong limitation for others.A protocol aiming at covering a large fraction of the application universefor sensor networks must feature configuration or adaptation mechanisms.Therefore, the Configurable Medium Access Control (C-MAC) wascreated (WANNER; OLIVEIRA; FROHLICH, 2007). C-MAC is realized asa framework of medium access control strategies that can be combined toproduce application-specific protocols. Through this paradigm, applicationprogrammers can create new communication services on demand and experimentwith different communication parameters, collecting metrics to identifyand adjust the protocol to match their applications? requirements. Nonetheless,C-MAC original architecture provides low reuse of software components,hindering its configurability.This dissertation presents the proposal, implementation, and evaluation ofa new architecture for the framework C-MAC. Through the analysis of thedifferent categories of MAC protocols for sensor networks, common characteristicsand specificities of these protocols were identified and used in thedevelopment of the new C-MAC. Thus, the proposed architecture enables agreater reuse of its software components, providing greater configurabilityand, consequently, supporting a wider range of applications.
106

Secure MAC protocols for cognitive radio networks

Alhakami, Wajdi January 2016 (has links)
With the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats targeting spectrum sensing, spectrum management, spectrum sharing, and spectrum mobility leading to the deterioration of the network performance. Thus, protection and detection security mechanisms are essential to maintaining the CRNs. This thesis presents a novel decentralised CR MAC protocol that successfully utilises the unused portion of the licensed band. The protocol achieves improved performance; communication time and throughput when compared to two benchmark protocols. Less communication time and higher throughput are accomplished by the protocol due to performing fast switching to the selected available data channel for initiating data transmission. The proposed protocol is then extended to two different versions based on two authentication approaches applied to it; one using Digital Signature and another is based on Shared-Key. The two proposed secure protocols address the security requirements in CRNs leading to subsequent secure communication among CUs. The protocols function effectively in providing defence against several attacks related to the MAC layer such as; Spectrum Sensing Data Manipulation/Falsification, Data Tempering and Modification, Jamming attacks, Eavesdropping, Forgery and Fake control information attacks, MAC address spoofing, and unauthorised access attacks. The associated security algorithms ensure the successful secure communication between CUs in a cooperative approach. Moreover, the security protocols are investigated and analysed in terms of security flows by launching unauthorised access and modification attacks on the transmitted information. The testing results demonstrated that two protocols perform successful detection of threats and ensure secure communication in CRNs.
107

Protocolo MAC efi ciente em energia e livre de colisões para redes de sensores sem fio

Guimarães, Vinícius Galvão 05 August 2014 (has links)
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2014. / Submitted by Ana Cristina Barbosa da Silva (annabds@hotmail.com) on 2014-11-27T18:23:10Z No. of bitstreams: 1 2014_ViníciusGalvaoGuimaraes.pdf: 8615402 bytes, checksum: c2e2c09de27a9a106c552afb6c904ad5 (MD5) / Approved for entry into archive by Raquel Viana(raquelviana@bce.unb.br) on 2014-11-27T18:50:14Z (GMT) No. of bitstreams: 1 2014_ViníciusGalvaoGuimaraes.pdf: 8615402 bytes, checksum: c2e2c09de27a9a106c552afb6c904ad5 (MD5) / Made available in DSpace on 2014-11-27T18:50:14Z (GMT). No. of bitstreams: 1 2014_ViníciusGalvaoGuimaraes.pdf: 8615402 bytes, checksum: c2e2c09de27a9a106c552afb6c904ad5 (MD5) / Este trabalho propõe e desenvolve o DyTEE (do inglês Dynamic Timed Energy Efficient), um novo protocolo de controle de acesso ao meio (MAC) livre de colisões de dados para redes de sensores sem fio, apropriado principalmente a ambientes de automação predial e rural. Este foi baseado em Múltiplo Acesso por Divisão do Tempo (TDMA) com ciclos de ativação e períodos de transmissão dinâmicas, empregando somente a utilização de um canal e sensoriamento da portadora.O novo protocolo foi implementado em módulos reais na plataforma Zigbit da Atmel, utilizando o pacote _IEEE 802.15.4 MAC_ fornecido pelo fabricante. Foi também implementado em simulação, utilizando parâmetros fornecidos pelo autor do S-MAC (plataforma MICA e sistema operacional TinyOS) e os parâmetros obtidos da implementação em Zigbit. Dessa forma, o DyTEEfoi comparado com o S-MAC e o IEEE 802.15.4, onde foram aferidas métricas de vazão, latência,consumo energético e outras.Os resultados dos experimentos sob diferentes parâmetros e topologias mostraram que a nova proposta supera ambos os protocolos comparados. Isto é, em relação ao S-MAC, apresentou aproximadamente um quinto do consumo de energia, bem como melhor latência e vazão aproximadamente até 80% maior. Enquanto que em relação ao IEEE 802.15.4, apresentou também melhores resultados,principalmente em relação ao tempo de vida estimado do módulo real realizando uma tarefa de sensoriamento de temperatura, no qual o DyTEE obteve um ganho de aproximadamente 25,6%a mais de duração do que o IEEE 802.15.4.Concluiu-se que o novo protocolo possui uma boa economia de energia, mantendo bons resultados de latência e vazão, bem como este foi implementado em módulos de baixo poder computacional e restrita memória, ou seja, um protocolo compacto e eficiente. ______________________________________________________________________________ ABSTRACT / This paper proposes develops the DyTEE (Dynamic Energy Efficient Timed), a new protocol for medium access control (MAC) collision-free data for wireless sensor networks, designed for building automation and rural automation environments. It was based on Time Division Multiple Access(TDMA) with activation cycles and dynamics transmission slots, employing the use of only one channel and carrier sensing. The new protocol has been implemented in real modules Zigbit Atmel platform, using the "IEEE 802.15.4 MAC" package provided by the manufacturer. Was also implemented in simulation using parameters provided by the author of the S-MAC (MICA platform and TinyOS operating system) and the parameters obtained in the implementation with Zigbit. Thus, DyTEE wascompared with S-MAC and IEEE 802.15.4, which were measured metrics of throughput, latency,energy consumption and other. The results of experiments under di_erent topologies and parameters have shown that the newproposal outperforms both protocols compared. That is, relative to the S-MAC, DyTEE showedabout one _fths of the energy consumption as well as improved latency and throughput withapproximately 80% greater. While compared to the IEEE 802.15.4, DyTEE also showed better results, especially regarding the estimated life time of the actual module performing a task of sensing temperature, in which the Dy TEE obtained a gain of approximately 25.6% more duration than the IEEE 802.15.4.It was concluded that the new protocol has a good energy saving, while maintaining good throughput and latency results, as well it was implemented in low computational power and limited memory modules, that means, Dy TEE is a compact and efficient protocol.
108

Performance Models for LTE-Advanced Random Access

January 2014 (has links)
abstract: LTE-Advanced networks employ random access based on preambles transmitted according to multi-channel slotted Aloha principles. The random access is controlled through a limit <italic>W</italic> on the number of transmission attempts and a timeout period for uniform backoff after a collision. We model the LTE-Advanced random access system by formulating the equilibrium condition for the ratio of the number of requests successful within the permitted number of transmission attempts to those successful in one attempt. We prove that for <italic>W</italic>&le;8 there is only one equilibrium operating point and for <italic>W</italic>&ge;9 there are three operating points if the request load &rho; is between load boundaries &rho;<sub>1</sub> and &rho;<sub>2</sub>. We analytically identify these load boundaries as well as the corresponding system operating points. We analyze the throughput and delay of successful requests at the operating points and validate the analytical results through simulations. Further, we generalize the results using a steady-state equilibrium based approach and develop models for single-channel and multi-channel systems, incorporating the barring probability <italic>P<super>B</super></italic>. Ultimately, we identify the de-correlating effect of parameters <italic>O, P<super>B</super>,</italic> and <italic>T<sub>o</sub><super>max</super></italic> and introduce the Poissonization effect due to the backlogged requests in a slot. We investigate the impact of Poissonization on different traffic and conclude this thesis. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2014
109

Análise do problema do Protocolo MAC IEEE 802.11 em redes Ad Hoc Multihop

ALMEIDA, Adalton de Sena January 2003 (has links)
Made available in DSpace on 2014-06-12T15:58:29Z (GMT). No. of bitstreams: 2 arquivo4635_1.pdf: 928763 bytes, checksum: f0830b47cdbb5936c9f93e74336e98d4 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2003 / O protocolo MAC IEEE 802.11 DFWMAC (Distributed Foundation Wireless Access Control) foi padronizado para uso em redes locais sem fio e tem sido utilizado para testar e simular redes locais sem fio ad hoc multihop. Este protocolo tem apresentado problemas quando trabalhamos com redes ad hoc multihop. Este problema fica evidente quando submetemos tráfego TCP (Transmission Control Protocol) entre duas estações. Por tratar-se de um protocolo de controle de acesso ao meio distribuído, não possuindo um controle central, a decisão de transmissão é feita pelas próprias estações de acordo com o funcionamento do DFWMAC. Ainda pelas suas características de funcionamento distribuído, problemas de terminal escondido e terminal exposto podem ocorrer comprometendo de maneira significativa o tráfego de conexões TCP. Associado aos problemas de terminal escondido e terminal exposto , o algoritmo de Backoff Exponencial Binário (BEB) contribui para que este protocolo não funcione bem em redes ad hoc multihop. O resultado da ação de todos estes problemas é a degradação do throughput do TCP gerando instabilidade e injustiça no acesso ao meio compartilhado. A instabilidade fica evidente quando a variação do throughput é muito alta em intervalos de tempo muito curtos. Isto pode ser visto com apenas uma conexão TCP entre duas estações. Já o problema de injustiça aparece quando submetemos duas conexões TCP simultâneas, sendo que uma consegue transmitir pacotes de dados a uma taxa alta, utilizando toda a largura de banda, enquanto a outra conexão não consegue transmitir nenhum pacote permanecendo com o throughput zero durante o tempo em que as duas conexões estão ativas. Este trabalho propõe uma solução para lidar com estes problemas
110

Enhancing the performance of ad hoc networking by lower layer design

Prokkola, J. (Jarmo) 25 November 2008 (has links)
Abstract The research of early ad hoc-like networks, namely multi-hop packet radio networks, was mainly concentrated on lower layers (below network layer). Interestingly, the research of modern ad hoc networks has been mainly restricted to routing protocols. This is understandable, since routing is very challenging in such dynamic networks, but the drawback is that the lower layer models used in the studies are often highly simplified, giving inaccurate or even incorrect results. In addition, modern ad hoc network solutions are usually suboptimal because lower layers, not designed especially for ad hoc networking, are used. Thus, ad hoc networking performance, in general, can be notably enhanced by considering also the design of lower layers. The simple deployment and robustness make wireless ad hoc networks attractive for several applications (e.g., military, public authority, peer-to-peer civilian, and sensor networking), but the performance of the current solutions is typically not adequate. The focus of this work is on the effects of lower layer functionalities on the performance of ad hoc networks, while also taking into account the effects of upper layers (e.g., the effect of application traffic models). A CDMA (Code Division Multiple Access) based dual channel flat ad hoc network solution, incorporating cross-layering between all three lowest layers, is proposed and analyzed. The main element of this is the Bi-Code Channel Access (BCCA) method, in which a common code channel is used for broadcast information (e.g., route discovery), while a receiver-specific code channel is used for all directed transmissions. In addition, a new MAC (Medium Access Control) solution designed for BCCA is presented. Moreover, a novel network layer spreading code distribution (NSCD) method is presented. The advantage of these methods is that they are designed especially to be used in ad hoc networks. With an extensive set of case studies, it is shown that the presented methods outperform the typically used ad hoc network solutions (based on IEEE 802.11) in different kind of scenarios, environments, modeling concepts, and with different parameters. Detailed simulations are carried out in order to analyze the effects of different features at the lower layers, finding also interesting phenomena and dependencies between different layers. It is also shown that close attention should be paid to lower layer modeling even though the overall network performance would be in focus. In addition, various interesting features and behavior models regarding ad hoc networking are brought up. / Tiivistelmä Ensimmäiset tutkimukset rakenteettomista (ad hoc) verkoista esiintyivät nimellä monihyppypakettiradioverkot, ja ne koskivat pääasiassa verkkokerroksen alapuolella olevia tietoliikennekerroksia, mutta nykyiset tutkimukset ovat kuitenkin keskittyneet pääasiassa reititysprotokolliin. Tämä on sikäli ymmärrettävää, että reititys on hyvin haasteellista tämän tyyppisissä dynaamisissa verkoissa, mutta ongelma on, että käytetyt alempien kerrosten mallit ovat usein hyvinkin yksinkertaistettuja, mikä voi johtaa epätarkkoihin tai jopa vääriin tuloksiin. Tämän lisäksi nykyiset ehdotetut rakenteettomien verkkojen ratkaisut ovat usein tehottomia, sillä käytettyjä alempien kerrosten ratkaisuja ei ole tarkoitettu tällaisiin verkkoihin. Niinpä rakenteettomien verkkojen suorituskykyä voidaan parantaa huomattavasti kiinnittämällä huomiota alempien kerrosten suunnitteluun. Verkkojen rakenteettomuus on ajatuksena houkutteleva useissa käyttökohteissa (esimerkiksi sotilasympäristössä, viranomaiskäytössä, käyttäjien välisissä suorissa yhteyksissä ja sensoriverkoissa), mutta suorituskyky ei useinkaan ole riittävällä tasolla käytännön sovelluksiin. Työssä tutkitaan pääasiassa alempien kerrosten toiminnallisuuden vaikutusta rakenteettomien verkkojen suorituskykyyn ottaen huomioon myös ylemmät kerrokset, kuten sovellustason mallit. Työssä esitellään ja analysoidaan koodijakomonikäyttöön (CDMA, Code Division Multiple Access) perustuva kaksikanavainen tasaisen rakenteettoman verkon ratkaisu, jossa hyödynnetään kaikkien kolmen alimman kerroksen välistä keskinäistä viestintää. Ratkaisun ydin on BCCA-menetelmä (Bi-Code Channel Access), jossa käytetään kahta kanavaa tiedonsiirtoon. Yksi kanava on tarkoitettu kaikille yhteiseksi kontrollikanavaksi (esimerkiksi reitinmuodostus voi käyttää tätä kanavaa), kun taas toinen kanava on käyttäjäkohtainen kanava, jota käytetään suoraan viestittämiseen kyseiselle käyttäjälle (varsinainen data yms.). Tämän lisäksi esitellään myös BCCA-menetelmää varten suunniteltu kanavakontrollimenetelmä sekä verkkotasolla toimiva hajotuskooditiedon jakamiseen tarkoitettu menetelmä. Näiden uusien menetelmien etu on se, että ne on suunniteltu nimenomaan rakenteettomiin verkkoihin. Kattavan testivalikoiman avulla osoitetaan, että esitetty uusi ratkaisu peittoaa tyypilliset IEEE 802.11 -standardiin pohjautuvat rakenteettomien verkkojen ratkaisut. Testeissä käytetään erityyppisiä verkkorakenteita, ympäristöjä, mallinnusmenetelmiä ja parametreja. Yksityiskohtaisissa simuloinneissa ajetaan eri testitapauksia ja selvitetään, miten alempien kerrosten eri menetelmät missäkin tapauksessa vaikuttavat suorituskykyyn. Alempien kerrosten mallinnuksessa on syytä olla tarkkana, sillä työssä käy ilmi, että mallinnusvirheillä voi olla suurikin vaikutus myös ylempien kerrosten suorituskykyyn. Työ myös paljastaa useita mielenkiintoisia ilmiöitä ja vuorovaikutussuhteita, jotka liittyvät tutkittujen menetelmien ja yleisesti rakenteettomien verkkojen toimintaan.

Page generated in 0.0339 seconds