• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 239
  • 57
  • 52
  • 31
  • 24
  • 13
  • 10
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 525
  • 169
  • 139
  • 89
  • 86
  • 84
  • 83
  • 78
  • 77
  • 77
  • 74
  • 51
  • 51
  • 47
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
481

Implementation of the IEEE 802.11a MAC layer in C language / Implementering av IEEE 802.11a MAC lagret i programspråket C

Portales, Maria January 2004 (has links)
There are several standards for wireless communication. People that are involved in computers and networking recognize names like Bluetooth, HiperLAN and IEEE 802.11. The last one was standardized in 1997 [2,6]and has begun to reach acceptance as a solid ground for wireless networking. A fundamental part of an IEEE 802.11 node is the Medium Access Controller, or MAC. It establishes and controls communication with other nodes, using a physical layer unit. The work has been carried out as final project at Linkopings Universitet, it has been about the improvement of the functions of MAC layer. I have developed some of the required functions that PUM uses to interact with the MAC layer. Because of that, I have implemented the Reception functions of MAC layer, having the possibility of using short control frames RTS/CTS to minimize collision.
482

Correlation-based Cross-layer Communication in Wireless Sensor Networks

Vuran, Mehmet Can 09 July 2007 (has links)
Wireless sensor networks (WSN) are event based systems that rely on the collective effort of densely deployed sensor nodes continuously observing a physical phenomenon. The spatio-temporal correlation between the sensor observations and the cross-layer design advantages are significant and unique to the design of WSN. Due to the high density in the network topology, sensor observations are highly correlated in the space domain. Furthermore, the nature of the energy-radiating physical phenomenon constitutes the temporal correlation between each consecutive observation of a sensor node. This unique characteristic of WSN can be exploited through a cross-layer design of communication functionalities to improve energy efficiency of the network. In this thesis, several key elements are investigated to capture and exploit the correlation in the WSN for the realization of advanced efficient communication protocols. A theoretical framework is developed to capture the spatial and temporal correlations in WSN and to enable the development of efficient communication protocols. Based on this framework, spatial Correlation-based Collaborative Medium Access Control (CC-MAC) protocol is described, which exploits the spatial correlation in the WSN in order to achieve efficient medium access. Furthermore, the cross-layer module (XLM), which melts common protocol layer functionalities into a cross-layer module for resource-constrained sensor nodes, is developed. The cross-layer analysis of error control in WSN is then presented to enable a comprehensive comparison of error control schemes for WSN. Finally, the cross-layer packet size optimization framework is described.
483

Design and Analysis of Opportunistic MAC Protocols for Cognitive Radio Wireless Networks

Su, Hang 2010 December 1900 (has links)
As more and more wireless applications/services emerge in the market, the already heavily crowded radio spectrum becomes much scarcer. Meanwhile, however,as it is reported in the recent literature, there is a large amount of radio spectrum that is under-utilized. This motivates the concept of cognitive radio wireless networks that allow the unlicensed secondary-users (SUs) to dynamically use the vacant radio spectrum which is not being used by the licensed primary-users (PUs). In this dissertation, we investigate protocol design for both the synchronous and asynchronous cognitive radio networks with emphasis on the medium access control (MAC) layer. We propose various spectrum sharing schemes, opportunistic packet scheduling schemes, and spectrum sensing schemes in the MAC and physical (PHY) layers for different types of cognitive radio networks, allowing the SUs to opportunistically utilize the licensed spectrum while confining the level of interference to the range the PUs can tolerate. First, we propose the cross-layer based multi-channel MAC protocol, which integrates the cooperative spectrum sensing at PHY layer and the interweave-based spectrum access at MAC layer, for the synchronous cognitive radio networks. Second, we propose the channel-hopping based single-transceiver MAC protocol for the hardware-constrained synchronous cognitive radio networks, under which the SUs can identify and exploit the vacant channels by dynamically switching across the licensed channels with their distinct channel-hopping sequences. Third, we propose the opportunistic multi-channel MAC protocol with the two-threshold sequential spectrum sensing algorithm for asynchronous cognitive radio networks. Fourth, by combining the interweave and underlay spectrum sharing modes, we propose the adaptive spectrum sharing scheme for code division multiple access (CDMA) based cognitive MAC in the uplink communications over the asynchronous cognitive radio networks, where the PUs may have different types of channel usage patterns. Finally, we develop a packet scheduling scheme for the PU MAC protocol in the context of time division multiple access (TDMA)-based cognitive radio wireless networks, which is designed to operate friendly towards the SUs in terms of the vacant-channel probability. We also develop various analytical models, including the Markov chain models, M=GY =1 queuing models, cross-layer optimization models, etc., to rigorously analyze the performance of our proposed MAC protocols in terms of aggregate throughput, access delay, and packet drop rate for both the saturation network case and non-saturation network case. In addition, we conducted extensive simulations to validate our analytical models and evaluate our proposed MAC protocols/schemes. Both the numerical and simulation results show that our proposed MAC protocols/schemes can significantly improve the spectrum utilization efficiency of wireless networks.
484

Technical Verification and Validation of ADS-B/VDL Mode 4 for A-SMGCS / Teknisk verifiering och validering av ADS-B/VDL Mode 4 för A-SMGCS

Eriksson, Matts, Lundmark, Jonas January 2002 (has links)
<p>This report is a technical verification and validation of ADS-B (Automatic Dependent Surveillance – Broadcast) over VDL Mode 4 (Very High Frequency Data Link Mode 4) for the use in the surveillance element of an A-SMGCS (Advanced Surface Movement Guidance and Control System). </p><p>The main objective of this report is to examine if ADS-B/VDL Mode 4 fulfils the technical requirements for an implementation at Arlanda airport, Stockholm Sweden. The report also includes a FMECA (Failure Mode, Effects and Criticality Analysis), a theoretical background and methods for monitoring. </p><p>The process of making this report can be divided into three phases: </p><p>1. Preliminary Study. In this phase the requirements were examined and structured. </p><p>2. Verification. In this phase the system performance has been verified both theoretically and by several tests at Arlanda Airport. Simulation results have also been used. </p><p>3. Validation and documentation. The tests and verifications that were performed in phase 2 were validated in the third phase of the project. The final project document was also written in this phase. </p><p>The main conclusion from this analysis is that ADS-B/VDL Mode 4 is well suited for surveillance. ADS-B/VDL Mode 4 has the possibility to fulfil all considered requirements, apart from detecting all obstacles. But if all the requirements are going to be fulfilled depends both on the implementation and the operational environment. </p><p>The results from this verification and validation should be used as the technical subset in a future safety case, both in Sweden and internationally.</p>
485

Proposition d'une nouvelle méthode d'accès déterministe pour un réseau personnel sans fil à fortes contraintes temporelles

Van Den Bossche, Adrien 06 July 2007 (has links) (PDF)
Aujourd'hui, les technologies de réseaux sans fil (WLAN/WPAN) présentes sur le marché sont nombreuses et globalement complémentaires. Cependant, trop peu d'entre elles proposent de réelles garanties sur la remise de messages dans un temps borné alors que ces exigences sont fondamentales dans le cadre d'une utilisation de type industriel. Dans le cadre de nos travaux, nous proposons une nouvelle couche MAC entièrement déterministe pour un réseau sans fil personnel basse consommation (LP-WPAN) IEEE 802.15.4 présentant des garanties sur le plan temporel.<br />Tout d'abord, un état de l'art est effectué sur les principaux réseaux sans fil existants, les mécanismes de gestion de la Qualité de Service et les méthodes d'accès généralement utilisées. Nous présentons ensuite la technologie IEEE 802.15.4/ZigBee sur laquelle sont basés nos travaux. Cette étude approfondie nous a permis d'identifier certaines imperfections au niveau de la méthode d'accès par rapport aux contraintes temporelles. Nous proposons de combler ces lacunes par la création d'une couche MAC entièrement déterministe dont nous présentons les caractéristiques et les nouvelles fonctionnalités. Plusieurs méthodes complémentaires ont été utilisées pour valider nos propositions : Réseaux de Petri, simulation et prototypage réel. Les résultats obtenus et les analyses de ces trois études sont exposés.
486

La théorie des catégories: ses apports mathématiques et ses implications épistémologiques.<br />Un hommage historio-philosophique

Krömer, Ralf 06 May 2004 (has links) (PDF)
La théorie des catégories (TC) vaut tant par ses applications mathématiques que par les débats philosophiques qu'elle suscite. Elle sert à exprimer en topologie algébrique, à déduire en algèbre homologique et, en tant qu'alternative à la théorie des ensembles, à construire des objets en géométrie algébrique dans la conception de Grothendieck. Des sources non publiées montrent que Grothendieck quitta le groupe Bourbaki à l'issue d'un débat sur la TC relevant en partie de l'épistémologie, notamment quant à la réalisation ensembliste des constructions catégorielles. Nous soutenons que la TC est fondamentale, car elle traite d'opérations typiques de la mathématique de structures : d'après notre position pragmatique, la justification de la connaissance mathématique ne se fait pas par la réduction à des objets de base mais plutôt, à chaque niveau, par rapport au sens commun technique (les théories de niveau ultérieur ont pour objets les théories des objets originaux).
487

On spectrum sensing, resource allocation, and medium access control in cognitive radio networks

Karaputugala Gamacharige, Madushan Thilina 12 1900 (has links)
The cognitive radio-based wireless networks have been proposed as a promising technology to improve the utilization of the radio spectrum through opportunistic spectrum access. In this context, the cognitive radios opportunistically access the spectrum which is licensed to primary users when the primary user transmission is detected to be absent. For opportunistic spectrum access, the cognitive radios should sense the radio environment and allocate the spectrum and power based on the sensing results. To this end, in this thesis, I develop a novel cooperative spectrum sensing scheme for cognitive radio networks (CRNs) based on machine learning techniques which are used for pattern classification. In this regard, unsupervised and supervised learning-based classification techniques are implemented for cooperative spectrum sensing. Secondly, I propose a novel joint channel and power allocation scheme for downlink transmission in cellular CRNs. I formulate the downlink resource allocation problem as a generalized spectral-footprint minimization problem. The channel assignment problem for secondary users is solved by applying a modified Hungarian algorithm while the power allocation subproblem is solved by using Lagrangian technique. Specifically, I propose a low-complexity modified Hungarian algorithm for subchannel allocation which exploits the local information in the cost matrix. Finally, I propose a novel dynamic common control channel-based medium access control (MAC) protocol for CRNs. Specifically, unlike the traditional dedicated control channel-based MAC protocols, the proposed MAC protocol eliminates the requirement of a dedicated channel for control information exchange. / October 2015
488

Reliable and time-constrained communication in wireless sensor networks

Yang, Fei 25 March 2011 (has links) (PDF)
Wireless Sensor Networks (WSNs) are composed of a large number of battery-powered sensor nodes that have the ability to sense the physical environment, compute the obtained information and communicate using the radio interfaces. Because sensor nodes are generally deployed on a large and wild area, they are powered by embedded battery. And it is difficult to change or recharge the battery, thus to reduce the energy consumption when sensors and protocols are designed is very important and can extend the lifetime of WSNs. So sensor nodes transmit packets with a lower transmission power (e.g. OdBm). With this transmission power, a packet can only be transmitted dozens of meters away. Therefore, when a sensor detects an event, a packet is sent in a multi-hop, ad-hoc manner (without fixed infrastructure and each sensor is able to relay the packet) to the sink (specific node which gathers information and reacts to the network situation). In this thesis, we first give an elaborate state of the art of WSNs. Then the impacts of duty-cycle and unreliable links or the performances of routing layer are analyzed. Based on the analytical results, we then propose three new simple yet effective methods to construct virtual coordinates under unreliable links in WSNs. By further taking the duty-cycle and real-time constraints into consideration we propose two cross-layer forwarding protocols which can have a greater delivery ratio and satisfy the deadline requirements. In order to have protocols for the WSNs that have dynamic topology, we then propose a robust forwarding protocol which can adapt its parameters when the topology changes. At last, we conclude this thesis and give some perspectives.
489

On Design and Analysis of Energy Efficient Wireless Networks with QoS

Vankayala, Satya Kumar January 2017 (has links) (PDF)
We consider optimal power allocation policies for a single server, multiuser wireless communication system. The transmission channel may experience multipath fading. We obtain very efficient, low computational complexity algorithms which minimize power and ensure stability of the data queues. We also obtain policies when the users may have mean delay constraints. If the power required is a linear function of rate then we exploit linearity and obtain linear programs with low complexity. We also provide closed-form optimal power policies when there is a hard deadline delay constraint. Later on, we also extend single hop results to multihop networks. First we consider the case, when the transmission rate is a linear function of power. We provide low complexity algorithms for joint routing, scheduling and power control which ensure stability of the queues, certain minimum rates, end-to-end hard deadlines, and/or upper bounds on the end-to-end mean delays. Further we extend these results to the multihop networks where the power is a general monotonically increasing function of rate. For our algorithms, we also provide rates of convergence to the stationary distributions for the queue length process and also approximate end-to-end mean delays. Finally, we provide computationally efficient algorithms that minimize the total power when there is a end-to-end hard deadline delay constraint.
490

Predictable and Scalable Medium Access Control for Vehicular Ad Hoc Networks

Sjöberg Bilstrup, Katrin January 2009 (has links)
This licentiate thesis work investigates two medium access control (MAC) methods, when used in traffic safety applications over vehicular ad hoc networks (VANETs). The MAC methods are carrier sense multiple access (CSMA), as specified by the leading standard for VANETs IEEE 802.11p, and self-organizing time-division multiple access (STDMA) as used by the leading standard for transponders on ships. All vehicles in traffic safety applications periodically broadcast cooperative awareness messages (CAMs). The CAM based data traffic implies requirements on a predictable, fair and scalable medium access mechanism. The investigated performance measures are channel access delay, number of consecutive packet drops and the distance between concurrently transmitting nodes. Performance is evaluated by computer simulations of a highway scenario in which all vehicles broadcast CAMs with different update rates and packet lengths. The obtained results show that nodes in a CSMA system can experience unbounded channel access delays and further that there is a significant difference between the best case and worst case channel access delay that a node could experience. In addition, with CSMA there is a very high probability that several concurrently transmitting nodes are located close to each other. This occurs when nodes start their listening periods at the same time or when nodes choose the same backoff value, which results in nodes starting to transmit at the same time instant. The CSMA algorithm is therefore both unpredictable and unfair besides the fact that it scales badly for broadcasted CAMs. STDMA, on the other hand, will always grant channel access for all packets before a predetermined time, regardless of the number of competing nodes. Therefore, the STDMA algorithm is predictable and fair. STDMA, using parameter settings that have been adapted to the vehicular environment, is shown to outperform CSMA when considering the performance measure distance between concurrently transmitting nodes. In CSMA the distance between concurrent transmissions is random, whereas STDMA uses the side information from the CAMs to properly schedule concurrent transmissions in space. The price paid for the superior performance of STDMA is the required network synchronization through a global navigation satellite system, e.g., GPS. That aside since STDMA was shown to be scalable, predictable and fair; it is an excellent candidate for use in VANETs when complex communication requirements from traffic safety applications should be met.

Page generated in 0.0449 seconds