• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 9
  • 7
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 41
  • 41
  • 16
  • 13
  • 12
  • 11
  • 10
  • 9
  • 8
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Lokalizační protokol pro WSN s podporou mobility uzlů / Localization protocol for WSN with support of node mobility

Votava, Martin January 2010 (has links)
Work is focused on wireless sensor networks.The main theme is the mobility and localization in these networks. This work describes different methods and capabilities of mobile and localization schemes. This work describes a new localization protocol for wireless sensor networks. Finally, there is included a new protocol in the simulation at Network Simulator 2 and evaluate the results obtained.
32

Návrh laboratorních úloh v simulačním prostředí NS3 / Creation of laboratory exercises in the NS3 enviroment

Štefančík, Matej January 2015 (has links)
Diploma thesis provides an introduction to the ns-3 network simulator. It describes the basic abstactions and components of the instrument. This work further discusses the theory, which was applied during simulation creation. The concept of unicast, the issue of IP addressing and routing in networks are specificaly analyzed. The practical part is focused on the creation of four laboratory tasks within the scope of Advanced Communication Techniques. The first task is dedicated to the the issue of static unicast routing in the network. It clarifies the impact of metrics on the process of routing. The following task compares the different types of ICMPv4 and ICMPv6 messages. The third task discusses additional functions of the ICMPv6. Specifically, it focuses on five different types of ICMPv6 messages defined by NDP (Neighbor Discovery Protocol) and their role in the network traffic. The last task focuses on ensuring the quality of services (QoS) in wireless networks, by setting priorities and thereby dividing the traffic into different classes. Attention is focused on parameters such as throughput, delay and jitter.
33

Analýza a predikce datového provozu v mobilní ad hoc síti / Analysis and prediction of data traffic in mobile ad hoc network

Konečný, Daniel January 2014 (has links)
The diploma thesis „Analysis and prediction of data traffic in mobile Ad Hoc network“ focuses on the radio propagation models of services in MANET (Mobile Ad-hoc) networks. It describes MANET networks and covers the theoretical analysis of routing protocols, radio wave propagation and propagation models of simulation enviroment NS-3 (Network Simulator 3). Furthermore, there is processed the creation process of model MANET networks with the routing protocol AODV (Ad Hoc On Demand Distance Vector) in the simulation environment NS-3. For analysis purposes there were implemented new functions to capture value of SNR (Signal to Noise Ratio) and throughtput. For this reason a physical layer of one of NS-3 model was modified. As an result there is a simulation build that compared several number of propagaion models.
34

Modelování propagace signálu bezdrátových sítí LTE a WiFi uvnitř budov / Modeling of Signal Propagation in Wireless LTE and WiFi Networks in Indoor Deployment

Olbert, Jaroslav January 2017 (has links)
Masters thessis deals with the problematics of wireless signal propagation modeling inside buildings. The theoretical part of this thessis describes principles and methods of electromagnetic waves spreading in open areas and in indoor deployment. There are also described methods used for calculating the path of signal propagation ray-launching and ray-tracing. This part also includes description of an algorithm and equations used for simulating 5GHz WiFi signal propagation inside the Department of telecommunications corridors. Second part of this thessis includes a description of a NS-3 module mmWave, which was used for simulations of IEEE 802.11ad (WiGig) standard. There are also results of these simulations and their detailed description. At the end of this thessis comparison of these results with values gained by real environment measurements can be found.
35

Analysis of the IEEE 802.15.4a ultra wideband physical layer through wireless sensor network simulations in OMNET++

Alberts, Marthinus 10 March 2011 (has links)
Wireless Sensor Networks are the main representative of pervasive computing in large-scale physical environments. These networks consist of a large number of small, wireless devices embedded in the physical world to be used for surveillance, environmental monitoring or other data capture, processing and transfer applications. Ultra wideband has emerged as one of the newest and most promising concepts for wireless technology. Considering all its advantages it seems a likely communication technology candidate for future wireless sensor networks. This paper considers the viability of ultra wideband technology in wireless sensor networks by employing an IEEE 802.15.4a low-rate ultra wideband physical layer model in the OMNET++ simulation environment. An elaborate investigation into the inner workings of the IEEE 802.15.4a UWB physical layer is performed. Simulation experiments are used to provide a detailed analysis of the performance of the IEEE 802.15.4a UWB physical layer over several communication distances. A proposal for a cognitive, adaptive communication approach to optimize for speed and distance is also presented. AFRIKAANS : Draadlose Sensor Netwerke is die hoof verteenwoordiger vir deurdringende rekenarisering in groot skaal fisiese omgewings. Hierdie tipe netwerke bestaan uit ’n groot aantal klein, draadlose apparate wat in die fisiese wêreld ingesluit word vir die doel van bewaking, omgewings monitering en vele ander data opvang, verwerk en oordrag applikasies. Ultra wyeband het opgestaan as een van die nuutste en mees belowend konsepte vir draadlose kommunikasie tegnologie. As al die voordele van dié kommunikasie tegnologie in ag geneem word, blyk dit om ’n baie goeie kandidaat te wees vir gebruik in toekomstige draadlose sensor netwerke. Hierdie verhandeling oorweeg die vatbaarheid van die gebruik van die ultra wyeband tegnologie in draadlose sensor netwerke deur ’n IEEE 802.15.4a lae-tempo ultra wyeband fisiese laag model in die OMNET++ simulasie omgewing toe te pas. ’n Breedvoerige ondersoek word geloots om die fyn binneste werking van die IEEE 802.15.4a UWB fisiese laag te verstaan. Simulasie eksperimente word gebruik om ’n meer gedetaileerde analiese omtrent die werkverrigting van die IEEE 802.15.4a UWB fisiese laag te verkry oor verskillende kommunikasie afstande. ’n Voorstel vir ’n omgewings bewuste, aanpasbare kommunikasie tegniek word bespreek met die doel om die spoed en afstand van kommunikasie te optimiseer. / Dissertation (MEng)--University of Pretoria, 2011. / Electrical, Electronic and Computer Engineering / unrestricted
36

Power-Aware adaptive techniques for wireless sensor networks / Power-Aware techniques adaptatives pour la gestion de l'énergie dans les réseaux de capteurs sans fil

Alam, Muhammad Mahtab 26 February 2013 (has links)
Les Réseaux de capteurs sans fil (WSN) sont une technologie émergente avec des applications potentielles dans divers domaines de la vie quotidienne, tels que la surveillance structurelle et environnementale, la médecine, la surveillance militaire, les explorations robotisées, etc. Les nœuds de capteurs doivent fonctionner pendant une longue période avec des batteries capacité limitée, par conséquent le facteur plus important dans les WSN est la consommation d'énergie. Dans cette thèse, nous proposons des techniques d'optimisation algorithmiques dynamiques, et adaptative pour la réduction de l'énergie. Tout d'abord, un modèle énergétique précis est présenté. Ce modèle repose sur des mesures réelles de courant consommé pour différents scénarios qui peuvent se produire lors de la communication entre les nœud. Il en est conclu que la couche MAC joue un rôle essentiel dans la réduction de l'énergie consommée. Ensuite, un protocole MAC dynamique est présenté. Il adapte de manière dynamique l’intervalle de réveil des nœuds de capteurs à partir d’une estimation du trafic. L’algorithme adaptatif modélisé de façon heuristique pour comprendre le comportement de convergence des paramètres algorithmiques. Le protocole est appliqué sur des réseaux de capteurs corporels et il surclasse les autres protocoles MAC en termes de latence ainsi que de consommation d'énergie ce qui permet donc d'augmenter la durée de vie de trois à six fois. Enfin, une technique basée sur l’optimisation adaptative de la puissance d'émission radio est appliquée sur des canaux variant dans le temps. La puissance de sortie est réglée dynamiquement au meilleur niveau de puissance selon l’état du canal, ce qui diminue la consommation d’un facteur deux. / Wireless Sensor Networks (WSN) are a fast emerging technology with potential applications in various domains of daily-life, such as structural and environmental monitoring, medicine, military surveillance, robotic explorations etc. WSN devices are required to operate for a long time with limited battery capacity, therefore, the most important constraint in WSN is energy consumption. In this thesis, we propose algorithmic-level dynamic and adaptive optimization techniques for energy reduction in WSN. First, an accurate energy model is presented. This model relies on real-time power measurements of various scenarios that can occur during communication between sensor nodes. It is concluded that MAC layer plays a pivotal role for energy reduction. Then, a traffic-aware dynamic MAC protocol is presented which dynamically adapts the wake-up schedule of sensor nodes through traffic estimation. An adaptive algorithm is designed for this purpose that is heuristically modeled to understand the convergence behavior of algorithmic parameters. The proposed protocol is applied to body area networks and it outperforms other low-power MAC protocols in terms of latency as well as energy consumption and consequently increases the lifetime from three to six times. Finally, an SNR-based adaptive transmit power optimization technique is applied under time-varying channels. The output power is dynamically tuned to best power level under slow varying channel, which results in an average gain by two times.
37

Contribución a la mejora de las prestaciones en redes de acceso inalámbricas no convencionales

Agüero Calvo, Ramón 11 March 2008 (has links)
La presencia de topologías multi-salto en comunicaciones inalámbricas de todo tipo es cada vez más apreciable, esperándose además que esta tendencia se mantenga en un futuro cercano. A pesar de que inicialmente fueran concebidos para solventar la falta de infraestructura subyacente en ciertos escenarios concretos, estos despliegues han acaparado el interés de diferentes actores del ámbito de las comunicaciones (incluyendo los operadores), con lo que es razonable pensar que su relevancia irá creciendo paulatinamente. De hecho, existen diversas iniciativas en algunos foros de estandarización que de alguna manera corroboran este hecho. Hay que tener en cuenta, por otro lado, otros factores adicionales (como la eclosión que se ha producido en el campo de las redes de sensores inalámbricos) que seguramente fomentarán el uso de estas topologías.A pesar de la creciente actividad en el ámbito de los despliegues multi-salto, sigue siendo necesario establecer, de manera cuantitativa, cuáles son sus posibles beneficios, tanto para los usuarios finales de los sistemas de comunicación, como para los operadores, especialmente teniendo en cuenta el elevado grado de heterogeneidad que también caracterizará las redes inalámbricas.Por otro lado, en lo que se refiere a los algoritmos y protocolos a ser empleados sobre este tipo de topologías, y a pesar de la intensa labor de investigación que sobre ellos se ha realizado recientemente, queda aún un número relevante de aspectos a analizar. En primer lugar, el mero hecho de que sus requerimientos y retos iniciales hayan variado de manera sustancial puede, y debe, influenciar sus principios básicos. Además, es necesario acometer verificaciones de los mismos sobre plataformas reales y, así mismo, asegurar que las evaluaciones que se realicen con técnicas de simulación utilicen modelos reales que permitan reflejar de manera fidedigna las condiciones que se dan en la realidad.Esta Tesis afronta, en primer lugar, la evaluación cuantitativa de la mejora que es posible alcanzar al utilizar topologías inalámbricas multi-salto para extender despliegues de red más tradicionales. Un primer aspecto que es razonable considerar es la ampliación de la cobertura que se consigue; en este caso se ha realizado un análisis que sigue un doble enfoque, analítico y mediante técnicas de simulación, para determinar es la ganancia que se logra. Se ha partido de dos modelos de red complementarios entre sí, asumiendo en el primero de ellos una falta total de planificación previa, mientras que en el segundo se utiliza un emplazamiento óptimo de los elementos de conexión a la red. Se ha comprobado que, a pesar de sus características claramente antagónicas, los resultados obtenidos con ambos escenarios son similares entre sí. Además, se concluye que, a pesar de que la ampliación de la cobertura que se alcanza es muy relevante, es posible establecer un límite razonable para el número máximo de saltos a emplear, ya que la mejoría adicional al incrementar la longitud de la ruta deja de ser apreciable a partir del mismo. Este aspecto se podría aprovechar para influir en el diseño de las técnicas de encaminamiento a emplear sobre este tipo de topologías.Se analizan también otras mejoras adicionales, utilizando un escenario en el que predomina sobremanera la heterogeneidad de los elementos de conexión a la red, e integrando las extensiones multi-salto con un algoritmo de selección de acceso genérico, que permite modular el peso que tienen las diferentes entidades (tanto el terminal de usuario como la propia red), así como diversos parámetros y restricciones a considerar, a la hora de determinar la alternativa de conexión óptima. Se comprueba que, tanto para los usuarios, gracias a la mejora de la calidad del servicio que perciben, como para la red, que incrementa el tráfico que es capaz de cursar, el uso de comunicaciones multi-salto puede resultar altamente atractivo.En segundo lugar, también se afronta la mejora de las técnicas de encaminamiento que tradicionalmente se emplean sobre las redes multi-salto, basadas en minimizar el número de saltos entre los dos extremos de la comunicación. Para ello, y utilizando el paradigma de Cross-Layer Optimisation, se propone una versión mejorada del protocolo DSR, denominada SADSR, que emplea la información relativa a la calidad de los enlaces subyacentes para modular el algoritmo de selección de ruta. Destacar que se acomete una verificación experimental de dicha propuesta, contestando, de este modo, a una de las reivindicaciones más importantes en este campo. Los resultados obtenidos permiten inferir que las prestaciones de la propuesta realizada en el marco de esta Tesis son superiores a los de la versión original del DSR.A pesar del evidente valor que las validaciones empíricas aportan, tienen la limitación de que es complicado establecer topologías con un número elevado de nodos, o acometer experimentos con una pauta repetitiva para determinar un comportamiento promedio. Es por ello que también se acomete un análisis mediante técnicas de simulación, en el que se compara SADSR con la versión original del DSR, así como con otras propuestas que han acaparado el interés por parte de la comunidad científica. Los resultados que se derivan a raíz de la evaluación llevada a cabo no hacen sino corroborar lo que ya adelanta la verificación experimental, ya que las prestaciones del SADSR son muy superiores a las del resto de alternativas analizadas.Para llevar a cabo el análisis anterior es fundamental el uso de un modelo de canal que refleje, con el mayor grado de exactitud posible, un comportamiento realista. Para ello, en la Tesis se afronta el diseño, implementación y posterior integración en la plataforma Network Simulator de BEAR, un modelo de canal basado en filtrado auto-regresivo, que se caracteriza principalmente por emular la aparición de errores a ráfagas que se observa en entornos reales. En ese sentido, se parte de un extenso conjunto de medidas que permite corroborar el correcto funcionamiento de la propuesta. / The presence of multi-hop topologies within all types of wireless communications is becoming more and more common, and this tendency is expected to be maintained in the near future. Although they were originally conceived to compensate the lack of subjacent infrastructure in certain scenarios, these deployments have attracted the interest of different actors in the wireless communications value chain (including network operators) and thus it is logical to think that their relevance will gradually increase. In fact, there already exist some standardization initiatives which corroborate this point to some extent. Furthermore, other additional factors, such as the rapid growth which has been seen in wireless sensor technologies, also strengthen the use of these topologies..In spite of the growing activity in the multi-hop deployment field, it is still necessary to establish, in a quantitative way, their potential benefits, both for the end-users of the communication systems, as well as for the operators, considering, in addition, the high degree of heterogeneity which will characterize wireless networks in the future.On the other hand, as far as algorithms and protocols to be used over this type of topology are concerned, and despite the intense research which has been conducted into them, there is still a large number of issues to be tackled. First, the simple fact that their initial requirements and challenges have been modified can, and must, influence their basic principles. In addition, it becomes necessary to address their validation on real platforms and, on the other hand, to ensure that simulation-based evaluations of their performance make use of realistic models which accurately reflect the conditions which are observed in real scenarios.This dissertation tackles, on the one hand, the quantitative evaluation of the improvements which are achievable when using multi-hop topologies to extend legacy network deployments. One first aspect which is logical to consider is the increase in the coverage which is brought about. In this sense, a two-fold approach has been followed, employing both an analytical as well as a simulation-based analysis, to establish what the gain is. Two network models have been used, being complementary to each other; the first one assumes a complete lack of network planning for the deployment of the access elements, while the second one assumes an optimum distribution of them. Although their characteristics are completely different, the results are somehow similar for both cases. Furthermore, it can be concluded that, despite the coverage extension which can be obtained, it is indeed possible to establish a reasonable limit on the maximum number of hops to be used, since the improvement becomes less relevant for higher values. This aspect could influence the design of routing techniques to be used over this type of topology.Furthermore, other additional benefits have been also analyzed, using a network deployment in which the presence of heterogeneity (multi-access) is evident. The multi-hop extensions have been integrated within a generic access selection algorithm which enables the modification of the weights which are assigned to the different entities (both the end-user terminals and the network) as well as to the set of parameters and constraints to be considered when selecting the most appropriate access alternative. It is concluded that for both the end-users, who improve their perception of the quality of service, and the network, which is able to increase the overall amount of traffic possible to be handled, multi-hop extensions are certainly beneficial.In addition, the dissertation also tackles the improvement of the routing techniques which are traditionally employed over multi-hop networks, which are based on minimizing the number of hops between the two sides of the communication. To accomplish this, and using the Cross-Layer Optimisation paradigm, an improved version of the DSR protocol is proposed, namely SADSR. It uses information about the subjacent link qualities to modulate the route selection algorithm. It is worth highlighting that a fully empirical (on a real platform) validation has been conducted, addressing one of the most pressing demands within this field. The results obtained allow us to infer that the proposal made in the framework of this dissertation is clearly outperforming the original DSR version.Although the added value provided by empirical validations is unquestionable, they also have some limitations. First, they normally do not favour the establishment of large topologies, or to undertake repetitive experiments aimed at finding an average behaviour. In this sense, a simulation-based analysis is also used so as to compare the SADSR with the original DSR version as well as with other proposals which have recently attracted interest from the scientific community. The results obtained by the validation carried out on a real platform are confirmed, since the performance brought about by the SADSR is somewhat higher than that of the other strategies.In order to perform the previous analysis the use of a realistic channel model, able to capture with a high degree of accuracy the behaviour exhibited on real platforms, is mandatory. To fulfil this requirement, the dissertation also tackles the design, implementation, and integration within the Network Simulator platform of BEAR, a channel model based on auto-regressive filtering. It is mainly characterized by being able to emulate the bursty presence of errors which is observed over real channels. The design is based on an extensive set of measurements which is used to assess the validity of the proposal.
38

Evaluation of the influence of channel conditions on Car2X Communication

Minack, Enrico 14 November 2005 (has links)
The C2X Communication is of high interest to the automotive industry. Ongoing research on this topic mainly bases on the simulation of Vehicular Ad Hoc Networks. In order to estimate the necessary level of simulation details their impact on the results needs to be examined. This thesis focuses on different channel models as the freespace, shadowing, and Ricean model, along with varying parameters. For these simulations the network simulator ns-2 is extended to provide IEEE 802.11p compliance. However, the WAVE mode is not considered since it is still under development and not finally approved. Besides a more sophisticated packet error model than the existing implementation, as well as a link adaptation algorithm, is added. In this thesis several simulations examine specific details of wireless communication systems such as fairness of multiple access, interferences, throughput, and variability. Furthermore, the simulation points out some unexpected phenomena as starving nodes and saturation effects in multi hop networks. Those led to the conclusion that the IEEE 802.11 draft amendment does not solve known problems of the original IEEE 802.11 standard.
39

Securing data dissemination in vehicular ad hoc networks

Aldabbas, Hamza January 2012 (has links)
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging, particularly in military applications where controlling the dissemination of messages is essential. This thesis therefore provides a review of the issue of security in VANET and MANET; it also surveys existing solutions for dissemination control. It highlights a particular area not adequately addressed until now: controlling information flow in VANETs. This thesis contributes a policy-based framework to control the dissemination of messages communicated between nodes in order to ensure that message remains confidential not only during transmission, but also after it has been communicated to another peer, and to keep the message contents private to an originator-defined subset of nodes in the VANET. This thesis presents a novel framework to control data dissemination in vehicle ad hoc networks in which policies are attached to messages as they are sent between peers. This is done by automatically attaching policies along with messages to specify how the information can be used by the receiver, so as to prevent disclosure of the messages other than consistent with the requirements of the originator. These requirements are represented as a set of policy rules that explicitly instructs recipients how the information contained in messages can be disseminated to other nodes in order to avoid unintended disclosure. This thesis describes the data dissemination policy language used in this work; and further describes the policy rules in order to be a suitable and understandable language for the framework to ensure the confidentiality requirement of the originator. This thesis also contributes a policy conflict resolution that allows the originator to be asked for up-to-date policies and preferences. The framework was evaluated using the Network Simulator (NS-2) to provide and check whether the privacy and confidentiality of the originators’ messages were met. A policy-based agent protocol and a new packet structure were implemented in this work to manage and enforce the policies attached to packets at every node in the VANET. Some case studies are presented in this thesis to show how data dissemination can be controlled based on the policy of the originator. The results of these case studies show the feasibility of our research to control the data dissemination between nodes in VANETs. NS-2 is also used to test the performance of the proposed policy-based agent protocol and demonstrate its effectiveness using various network performance metrics (average delay and overhead).
40

Nova estrat?gia de desfragmenta??o de canais para redes ?pticas el?sticas / A New elastic optical network defragmentation of channels strategy

F?vero, Ricardo Vicente 13 November 2015 (has links)
Made available in DSpace on 2016-04-04T18:31:45Z (GMT). No. of bitstreams: 1 RICARDO VICENTE FAVERO.pdf: 1635235 bytes, checksum: d51f441103ff9f2ad94576b0bdd11b9f (MD5) Previous issue date: 2015-11-13 / The wavelength division multiplexing (WDM) optical network accommodates traffic load in 100, 50 and 25 GHz fixed-grid channel. This fixed-grid condition limits the number of lightpath for each optical fiber (80 channels in c-band) and doesn t allow bit rates with bandwidth over 50 GHz. To improve these factors, the flexibly grid elastic optical network (EON) was proposed, aiming accommodate adequately bit rates demand by customers. This proposal allows efficiency bandwidth and also expands bit rates supported by network. The EON bandwidth efficiency is obtained by routing and spectrum assignment (RSA) algorithm which acts to maximize the bandwidth utilization. Even with RSA, EON still show fragmentation rates substantial. In this context, this work proposes a new elastic optical network defragmentation strategy. This defragmentation strategy selects the lightpaths from the most fragmented link. The defragmentation process is based on RSA (DF-RSA). The DF-RSA determines the new position to reallocate the connection selected and performs. Using computer simulation of EON operation, were submitted several bit rates demands with different modulations format and traffic load between 45 and 100 erlang. Two simulation scenarios were proposed. The first one, compare the performance of RSA algorithm first-fit (FF) with and without defragmentation. It was considered as defragmentation process beginning point (trigger), the number of release connections. This scenario had until 48% of relative gain on minimizing blocking probability. The second scenario compared the performance of the follows RSA algorithms: FF, Maximize Path Spectrum Consecutiveness (MPSC) and Fragmentation Aware (FA). The FF was evaluated with and without defragmentation process and the others just with defragmentation process. The trigger employed was eventual connection blocked. The second scenario reached over the 80% blocking probability relative gain in 50 erlang traffic load. We conclude that the new elastic optical network defragmentation offers substantial gain bandwidth utilization and consequently blocking probability reduction. / As redes ?pticas de multiplexa??o por divis?o de comprimento de onda (WDM) acomodam o tr?fego em canais fixos de 100, 50 e 25 GHz. Esta condi??o de grade fixa limita o n?mero de conex?es por fibra ?ptica (80 canais na banda C), e n?o permite taxas de transmiss?o com ocupa??o espectral acima de 50 GHz. Para melhorar estes fatores, foram propostas as redes ?pticas el?sticas (EON) com canais flex?veis, visando acomodar adequadamente as taxas de transmiss?o demandas pelos usu?rios. Esta proposta possibilita maior efici?ncia espectral e tamb?m amplia as taxas de transmiss?o suportadas pela rede. A efici?ncia espectral nas EONs ? obtida com os algoritmos de roteamento e atribui??o espectral (Routing and Spectrum Assignment, RSA), que atuam para maximizar seu uso espectral. Mesmo com o uso de RSAs, as EONs ainda apresentam ?ndices de fragmenta??o consider?veis. Neste contexto, este trabalho prop?e uma nova estrat?gia de desfragmenta??o espectral para EONs. Esta proposta de desfragmenta??o seleciona as conex?es do enlace mais fragmentado, para o processo de desfragmenta??o. A desfragmenta??o baseia seu processo de realoca??o de conex?es por RSA, denominado DF-RSA. O DF-RSA determina a nova posi??o e realiza a realoca??o das conex?es. Com o uso de simula??o computacional da opera??o de funcionamento da EON, foram submetidas v?rias demandas de taxas de transmiss?o com diferentes modula??es e cargas de tr?fego entre 45 e 100 erlang. Foram propostos dois cen?rios de simula??o. No primeiro, foi comparado o desempenho do algoritmo RSA First-Fit (FF) com e sem o processo de desfragmenta??o. Considerou-se como ponto de inicio das desfragmenta??es (gatilho), o n?mero de conex?es liberadas da rede. Neste cen?rio obteve-se at? 48% de ganho relativo na minimiza??o da probabilidade de bloqueio. No segundo cen?rio, foram comparados os desempenhos dos seguintes algoritmos RSAs: FF, Maximize Path Spectrum Consecutiveness (MPSC) e Fragmentation Aware (FA). O FF foi avaliado com e sem desfragmenta??o e os demais somente com desfragmenta??o. Empregou-se como gatilho o eventual bloqueio de conex?o. O segundo cen?rio alcan?ou mais de 80% de ganho relativo de probabilidade de bloqueio para carga de tr?fego de 50 erlang. Conclui-se que a nova estrat?gia de desfragmenta??o para EONs oferece ganhos consider?veis na utiliza??o espectral e, consequentemente, redu??o na probabilidade de bloqueio.

Page generated in 0.0806 seconds