• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 1
  • 1
  • 1
  • Tagged with
  • 18
  • 18
  • 7
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Analysis of Internal RF Interferences in Mobile

Balkorkian, Sevag, Hao, Zhang January 2005 (has links)
Nowadays, mobile phones have greater functionality; a camera, color LCD screen, wireless LAN, Bluetooth, IrDA and others. In the near future wider variety of new functionalities will be added, from high quality voice, high definition video to high data rate wireless channels. As consumer electronics integrate greater functionality and high operating frequencies, their emissions will exceed the specified limits, most of these emissions will be a result of the internal interferences in the mobile phone. Moreover higher operating frequencies will be required to improve the quality of these functionalities, something that will make it more difficult to control these interferences. Internal or external sources of electromagnetic interference can degrade the performance of sensitive analog/digital circuits inside the mobile phone. Moreover the electronic device must satisfy a host of global regulations that limit it’s susceptibility to these interferences, as well as the interference emitted by the device itself. Therefore designing a new electronic device to perform new and exciting functions will not be a pleasant task if it can not meet certain specifications and function as required to adhere to certain global regulations. This thesis project investigates the sources of interference inside a mobile phone; mainly the electromagnetic interferences and its effect on the radio transceiver focusing on the GSM receiver sensitivity. This report is a result of intensive research, an investigation of possible sources of interference, also actual measurements were performed; RSSI, OTA and sniffing measurements; to identify the physical sources of interferences, and their effect on the receiver sensitivity. Finally solutions were recommended and implemented to suppress the interferences due to different sources, mainly through filtering, shielding or proper grounding of signals and components/subsystems in the mobile phone.
12

Over-The-Air update techniques and how to evaluate them : A comparison of Over-The-Air updates for type ESP-32

Palm, Simon, Bui, Ryan January 2022 (has links)
The Internet of Things (IoT) is a concept where sensors combined with microcontrollers enhance our everyday life. In the year 2050, there will be around 30 billion connected IoT systems, for developing this large amount of systems and maintaining them there will be a need to use over-the-air updates (OTA). With the increasing growth of IoT systems, there will also rise more OTA update solutions as tools for maintaining and enhancing IoT systems. In this bachelor's degree project, evaluations and comparisons of different OTA update techniques supporting microcontrollers of the type ESP32 are done by using controlled experiments. This study focuses on testing the update procedure with experiments that test OTA update deployment time and update rollback functionality.
13

An analysis of the effect of compression on FOTA through BLE

Arab, Mohammed Yazan, Arnoldsson, Markus January 2022 (has links)
This paper studies the effects of the Firmware Over-The-Air update process done through Bluetooth Low Energy using a compression-based update solution compared to a non-compressed update solution.   The method that is used in this study is an experimental method using a Nordic semiconductor board as an IoT device. To this, a firmware was sent Over-The-Air and energy consumption along with time was measured using a measuring tool. The firmware was sent compressed and uncompressed. The compression algorithm that was used in the experiment was LZ4. Different sizes of firmware were tested and decompressed through the update process, and by using the measuring tool, the time taken, and average current were measured to get the results of the study.    The result of this study is that time taken increases as firmware gets larger on both compressed and non-compressed firmware, and the increase in firmware file sizes had no effect on the average current. At the same time, including decompression into the FOTA solution increases the average current and time taken, which led to the conclusion that a compressed FOTA update has a higher total time and average current on the hardware setup tested on. It was also concluded that an embedded system with a faster processor, in conjunction with a higher compression ratio, would be needed to reach a threshold value where a compression based FOTA process is preferable.
14

Návrh systému pro vzdálený upgrade firmwaru pro uzly bezdrátové senzorové sítě / Over the Air Firmware Upgrade for Wireless Sensor Networks

Minár, Tomáš January 2014 (has links)
This diploma thesis is dedicated to one of the problems in wireless sensor networks – over the air upgrade (OTAU) of nodes. The requirements for upgrade and possible ways how to transfer new firmware image to nodes are stated in the first chapter. The second chapter is focused on solving the problem of firmware dissemination to whole network based on analysis of known protocols. The practical part of this thesis deals with OTAU design and implementation in Lightweight Mesh software stack from Atmel. Proposed system was tested on deRFnode platform with plugged in deRFmega128 module. The upgrade process of designed system is evaluated on test network in last part. Practical test results are compared with OTAU solution for BitCloud.
15

PAN-Analys av IKEA TRÅDFRI. : En fördjupning av säkerhetsrisker kopplade till OTA-uppdateringar inom IKEA TRÅDFRI:s PAN.

Jönsson, Linus, Schenström, Oscar January 2020 (has links)
Purpose – The purpose of this study is to elaborate security risks with OTA updates within TRÅDFRI:s PAN. To ensure that today’s IoT devices maintains a high and robust standard to protect end-user’s integrity. Method – To answer the questions and to provide research-based evidence the study was carried out as a case study and two methods were applied in the study. An initial literature review in which the Zigbee protocol and it´s process for certification as well as OTA updates was studied. The literature review was followed by a qualitative experiment with focus on how IKEA implemented the PAN-security in practice. Findings – The findings show reduced security within the TRÅDFRI:s PAN when a third party device performs the OTA update. The experiments also questions parts of the certificate issued by Zigbee Alliance. Implications - Due to the increasing popularity of IoT devices, requirements are increasing from a data security perspective. The data security perspective is more important than ever and take up significantly more space during the development process as well as during the life cycle. This study discusses the OTA updates impact on integrity as well as how an established IoT company, such as IKEA, has implemented this necessary feature to maintain its products during the products life cycle. Limitations – Data gathered from the experiment was limited to TRÅDFRI E27 LED Bulb and therefore the result cannot be seen as a generalization of all TRÅDFRI products.
16

Improving the Robustness of Over-the-Air Synchronization for 5G Networks in a Multipath Environment / Förbättring av robustheten av trådlös synkronisering för 5G-nätverk i en flervägsmiljö

Erninger, Anders January 2023 (has links)
Synchronization between base stations is a fundamental part of any operating telecommunication system. With 5G and future generations of mobile networks, the data speeds are getting higher, which creates the need for fast and accurate synchronization. In wireless systems, the transmitted signals are affected by the environment. Both moving and stationary objects can cause a transmitted signal to be scattered or reflected, causing the receiver to receive multiple instances of one signal. If a synchronization signal is transmitted from one base station and received in multiple instances by another, it is hard for the receiving base station to know which of the received instances that should be used for calculating the synchronization error between the base stations. In this thesis, multiple different algorithms for selecting a synchronization signal pair between two base stations to be used for calculating time alignment error have been tested. The results have been evaluated based on their accuracy of selecting a correct matching signal pair. It is shown that the proposed algorithms in this thesis all perform significantly better than the method currently in use. Further, the advantages and disadvantages of each of the new algorithms are discussed, and finally new concepts for future studies are suggested. / Synkronisering mellan basstationer är en fundamental del av ett fungerande telekommunikationssystem. Med 5G och framtida generationer av mobila nätverk så ökas datahastigheter, vilket skapar behovet av en snabb och precis synkronisering. I trådlösa system påverkas skickade signaler av dess omgivning. Både stationära och icke-stationära objekt i omgivningen kan splittra eller reflektera signaler, vilket ger upphov till en flervägskanal. Detta gör att en mottagare kan ta emot flera instanser av en skickad signal. Om en synkroniseringssignal skickas från en basstation via en flervägskanal till en mottagande basstation, så kommer mottagaren att ta emot flera instanser av den skickade signalen vid olika tidpunkter. Det kan då vara svårt för mottagaren att avgöra vilken av de mottagna signalerna som ska användas vid beräkning av tidsfelet mellan basstationerna. I detta examensarbete testas ett flertal olika algoritmer för att välja vilket synkroniseringssignalpar som ska användas vid beräkning av tidsfelet mellan två basstationer. Resultatet utvärderas baserat på hur hög precision algoritmen har i att välja ett korrekt matchat synkroniseringssignalpar. Resultatet visar att de algoritmer som presenteras i denna uppsats presterar märkbart bättre än den algoritm som används i systemen just nu. Vidare diskuteras fördelar och nackdelar med de olika algoritmerna och förslag på vidareutveckling av algoritmerna läggs fram.
17

Υλοποίηση της βαθμίδας middleware σε wireless sensor networks με έμφαση στον ασύρματο προγραμματισμό των motes / Implementation of middleware layer in wireless sensor networks laying emphasis on wireless programming of motes

Βασιλόπουλος, Βασίλειος 08 July 2011 (has links)
Τα ασύρματα δίκτυα αισθητήρων αποτελούν μία πρωτοποριακή τεχνολογία που ήρθε στο προσκήνιο πριν από μία περίπου δεκαετία. Η καινοτομία της τεχνολογίας αυτής έγκειται στη συνεργασία μεγάλου αριθμού κόμβων περιορισμένων πόρων χαμηλής κατανάλωσης ισχύος σε μία μόνο εφαρμογή. Η εργασία αυτή ασχολείται με θέματα ενδιάμεσου λογισμικού σε ασύρματα δίκτυα αισθητήρων. Συγκεκριμένα, μελετάται το πρωτόκολλο Deluge που αποτελεί τη βασική επιλογή για ασύρματο προγραμματισμό δικτύων αισθητήρων που «τρέχουν» το λειτουργικό σύστημα πραγματικού χρόνου TinyOS. Παρέχοντας έναν αξιόπιστο και αποδοτικό μηχανισμό διάδοσης δεδομένων μέσω της δυαδικής εικόνας του κώδικα, το Deluge κατέχει ρόλο-κλειδί στη βαθμίδα ενδιάμεσου λογισμικού των ασύρματων δικτύων αισθητήρων. Η μελέτη και κατανόηση του πρωτοκόλλου αυτού επέτρεψε την υλοποίηση σε nesC ενός απλούστερου πρωτοκόλλου που αξιοποιεί τα βασικά χαρακτηριστικά του μηχανισμού μετάδοσης δεδομένων του Deluge. Σε συνέχεια αυτής της υλοποίησης, αξιολογήθηκε εκ νέου η διαδικασία μετάδοσης πραγματοποιώντας δοκιμές τόσο σε πραγματικές τοπολογίες κόμβων αισθητήρων (motes) που υποστηρίζουν το πρότυπο ασύρματης επικοινωνίας IEEE 802.15.4 όσο και σε περιβάλλον προσομοίωσης (TOSSIM). Τα προκύπτοντα αποτελέσματα επιβεβαιώνουν την αποδοτική μετάδοση δεδομένων σε δίκτυα αισθητήρων αξιοποιώντας το πρωτόκολλο Deluge. Η παρούσα εργασία αποτελείται από έξι κεφάλαια. Το πρώτο κεφάλαιο παρέχει πληροφορίες για το γνωστικό αντικείμενο της εργασίας. Στο δεύτερο κεφάλαιο παρουσιάζεται μία μελέτη στην ερευνητική περιοχή των ασύρματων δικτύων αισθητήρων και στο τρίτο κεφάλαιο εξετάζονται τα βασικά χαρακτηριστικά ενός κόμβου αισθητήρων που υποστηρίζει το πρότυπο IEEE 802.15.4. Στο τέταρτο κεφάλαιο παρουσιάζεται η έννοια του ασύρματου προγραμματισμού στα δίκτυα αισθητήρων και μελετάται εκτενώς το πρωτόκολλο Deluge. Στο πέμπτο κεφάλαιο περιγράφεται η υλοποίηση που έλαβε χώρα και η αξιολόγηση αυτής με τους μηχανισμούς που αναφέρθηκαν παραπάνω. Τέλος, στο έκτο κεφάλαιο παρατίθενται τα συμπεράσματα που εξήχθησαν από την εκπόνηση της εν λόγω εργασίας και δίνονται ορισμένες κατευθύνσεις για μελλοντική ενασχόληση με το Deluge και με το ενδιάμεσο λογισμικό στα δίκτυα αισθητήρων γενικότερα. / Wireless sensor networks (WSNs) emerged about a decade ago, representing a new class of computing with large numbers of resource-constrained computing nodes cooperating on a single application. This thesis deals with middleware issues in wireless sensor networks. Specifically, we study Deluge that suggests the de facto over-the-air programming protocol for WSNs working under TinyOS. Providing a reliable and efficient data dissemination mechanism via the binary image of the program code, Deluge plays a key role in the middleware layer of WSNs. Gaining insight into Deluge, we implemented in the nesC programming language a simplified protocol that incorporates the main features of Deluge data dissemination mechanism. This implementation allowed us to evaluate further the propagation procedure of Deluge using a two-mechanism evaluation framework. Carrying out experiments both in real-world deployments being compatible with IEEE 802.15.4 radio and in a simulation environment (TOSSIM), we verified the efficient data propagation in WSNs, using Deluge. This dissertation follows a structure of six chapters. In the first chapter, we give a piece of information about the subject field of this thesis. In the second chapter, we present an overall survey of the research area of WSNs and in the third chapter we examine the basic features of a sensor node (mote) whose wireless communication is based on an IEEE 802.15.4 compliant radio. In the fourth chapter, we discuss network programming in WSNs and we analyze the data dissemination mechanism of Deluge. In the fifth chapter, we discuss our implementation and its evaluation. Finally, in the sixth chapter, we conclude the thesis emphasizing the experience derived from that and we give some directions for future work with Deluge and middleware in WSNs generally.
18

Time synchronization error detection in a radio access network / Tidssynkroniseringsfel upptäckt i ett radioåtkomstnätverk

Madana, Moulika January 2023 (has links)
Time synchronization is a process of ensuring all the time difference between the clocks of network components(like base stations, boundary clocks, grandmasters, etc.) in the mobile network is zero or negligible. It is one of the important factors responsible for ensuring effective communication between two user-equipments in a mobile network. Nevertheless, the presence of asymmetries can lead to faults, making the detection of these errors indispensable, especially in technologies demanding ultra-low latency, such as 5G technology. Developing methods to ensure time-synchronized mobile networks, would not only improve the network performance, and contribute towards cost-effective telecommunication infrastructure. A rulebased simulator to simulate the mobile network was built, using the rules provided by the domain experts, in order to generate more data for further studies. The possibility of using Reinforcement Learning to perform fault detection in the mobile network was explored. In addition to the simulator dataset, an unlabelled customer dataset, which consists of time error differences between the base stations, and additional features for each of its network components was provided. Classification algorithms to label the customer dataset were designed, and a comparative analysis of each of them has been presented. Mathematical algorithm and Graph Neural Network models were built to detect error, for both the simulator and customer dataset, for the faulty node detection task. The approach of using a Mathematical algorithm and Graph Neural Network architectures provided an accuracy of 95% for potential fault node detection. The feature importance of the additional features of the network components was analyzed using the best Graph Neural Network model which was used to train for the node classification task (to classify the base stations as faulty and non-faulty). Additionally, an attempt was made to predict the individual time error value for each of the links using Graph Neural Network, however, it failed potentially due to the presence of fewer features to train from. / Tidssynkronisering är en process för att säkerställa att all tidsskillnad mellan klockorna för nätverkskomponenter (som basstationer, gränsklockor, stormästare, etc.) i mobilnätet är noll eller försumbar. Det är en av de viktiga faktorerna som är ansvariga för att säkerställa effektiv kommunikation mellan två användarutrustningar i ett mobilnät. Icke desto mindre kan närvaron av asymmetrier leda till fel, vilket gör upptäckten av dessa fel oumbärlig, särskilt i tekniker som kräver ultralåg latens, som 5G-teknik. En regelbaserad simulator för att simulera mobilnätet byggdes, med hjälp av reglerna från domänexperterna, för att generera mer data för vidare studier. Möjligheten att använda RL för att utföra feldetektering i mobilnätet undersöktes. Utöver simulatordataset tillhandahölls en omärkt kunddatauppsättning, som består av tidsfelsskillnader mellan basstationerna och ytterligare funktioner för var och en av dess nätverkskomponenter. Klassificeringsalgoritmer för att märka kunddataset utformades, och en jämförande analys av var och en av dem har presenterats. Matematisk algoritm och GNN-modeller byggdes för att upptäcka fel, för både simulatorn och kunddatauppsättningen, för uppgiften att detektera felaktig nod. Metoden att använda en matematisk algoritm och GNN-arkitekturer gav en noggrannhet på 95% för potentiell felnoddetektering. Funktionens betydelse för de ytterligare funktionerna hos nätverkskomponenterna analyserades med den bästa GNN-modellen som användes för att träna för nodklassificeringsuppgiften (för att klassificera basstationerna som felaktiga och icke-felaktiga). Dessutom gjordes ett försök att förutsäga det individuella tidsfelsvärdet för var och en av länkarna med GNN, men det misslyckades potentiellt på grund av närvaron av färre funktioner att träna från.

Page generated in 0.0661 seconds