Dissertationen zum Thema „Virtualisation des réseaux sans fil“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Virtualisation des réseaux sans fil" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Khan, Imran. „Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks“. Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019/document.
Der volle Inhalt der QuelleWireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
Baron, Benjamin. „Transport intermodal de données massives pour le délestage des réseaux d'infrastructure“. Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066454.
Der volle Inhalt der QuelleIn this thesis, we exploit the daily mobility of vehicles to create an alternative transmission medium. Our objective is to draw on the many vehicular trips taken by cars or public transports to overcome the limitations of conventional data networks such as the Internet. In the first part, we take advantage of the bandwidth resulting from the mobility of vehicles equipped with storage capabilities to offload large amounts of delay-tolerant traffic from the Internet. Data is transloaded to data storage devices we refer to as offloading spots, located where vehicles stop often and long enough to transfer large amounts of data. Those devices act as data relays, i.e., they store data it is until loaded on and carried by a vehicle to the next offloading spot where it can be dropped off for later pick-up and delivery by another vehicle. We further extend the concept of offloading spots according to two directions in the context of vehicular cloud services. In the first extension, we exploit the storage capabilities of the offloading spots to design a cloud-like storage and sharing system for vehicle passengers. In the second extension, we dematerialize the offloading spots into pre-defined areas with high densities of vehicles that meet long enough to transfer large amounts of data. The performance evaluation of the various works conducted in this thesis shows that everyday mobility of entities surrounding us enables innovative services with limited reliance on conventional data networks
Khan, Imran. „Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks“. Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019.
Der volle Inhalt der QuelleWireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
Baron, Benjamin. „Transport intermodal de données massives pour le délestage des réseaux d'infrastructure“. Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066454/document.
Der volle Inhalt der QuelleIn this thesis, we exploit the daily mobility of vehicles to create an alternative transmission medium. Our objective is to draw on the many vehicular trips taken by cars or public transports to overcome the limitations of conventional data networks such as the Internet. In the first part, we take advantage of the bandwidth resulting from the mobility of vehicles equipped with storage capabilities to offload large amounts of delay-tolerant traffic from the Internet. Data is transloaded to data storage devices we refer to as offloading spots, located where vehicles stop often and long enough to transfer large amounts of data. Those devices act as data relays, i.e., they store data it is until loaded on and carried by a vehicle to the next offloading spot where it can be dropped off for later pick-up and delivery by another vehicle. We further extend the concept of offloading spots according to two directions in the context of vehicular cloud services. In the first extension, we exploit the storage capabilities of the offloading spots to design a cloud-like storage and sharing system for vehicle passengers. In the second extension, we dematerialize the offloading spots into pre-defined areas with high densities of vehicles that meet long enough to transfer large amounts of data. The performance evaluation of the various works conducted in this thesis shows that everyday mobility of entities surrounding us enables innovative services with limited reliance on conventional data networks
Chang, Chia-Yu. „Cloudification and Slicing in 5G Radio Access Network“. Electronic Thesis or Diss., Sorbonne université, 2018. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2018SORUS293.pdf.
Der volle Inhalt der QuelleOver the past few decades, the continuing growth of network statistics requires a constantly evolving technology. Therefore, a natural question arises in our minds: what will 5G be? To answer this question, the 5G architecture must be designed with a certain level of flexibility through the integration of softwarization and virtualization principles. Therefore, we can see that 5G will provide a paradigm shift beyond radio access technology in order to establish an agile and sophisticated communication system. The network can be used efficiently and independently by creating multiple logically separated spaces, called network slices. In addition, each logical network can deploy its network functions in a flexible cloud environment. To this end, the goal of this thesis is to study these two techniques: (a) Cloud-RAN and (b) RAN splitting. In the first part, our focus is on the C-RAN concept, in which monolithic base stations are replaced by (1) distributed radio elements and (2) centralized pools for baseband processing units. The C-RAN notion is still confronted with stringent capacity and latency requirements of the fronthaul interface that connects the distributed remote radio unit to the centralized baseband processing unit. In the second part, we focus on RAN cutting not only to allow different levels of isolation and sharing at each slice of network, but also to customize the control plane, user plane and control logic. Therefore, we provide a flexible runtime environment for the "RAN Runtime" slicing system to host service instances on each of the underlying RAN modules
Luu, Quang Trung. „Dynamic Control and Optimization of Wireless Virtual Networks“. Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG039.
Der volle Inhalt der QuelleNetwork slicing is a key enabler for 5G networks. With network slicing, Mobile Network Operators (MNO) create various slices for Service Providers (SP) to accommodate customized services. As network slices are operated on a common network infrastructure owned by some Infrastructure Provider (InP), efficiently sharing the resources across various slices is very important. In this thesis, taking the InP perspective, we propose several methods for provisioning resources for network slices. Previous best-effort approaches deploy the various Service Function Chains (SFCs) of a given slice sequentially in the infrastructure network. In this thesis, we provision aggregate resources to accommodate slice demands. Once provisioning is successful, the SFCs of the slice are ensured to get enough resources to be properly operated. This facilitates the satisfaction of the slice quality of service requirements. The proposed provisioning solutions also yield a reduction of the computational resources needed to deploy the SFCs
Slimani, Hicham. „Protocoles coopératifs pour réseaux sans fil“. Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/10309/1/slimani.pdf.
Der volle Inhalt der QuelleKelif, Jean-Marc. „Modèles fluides de réseaux sans fil“. Paris, ENST, 2008. https://pastel.hal.science/pastel-00004761.
Der volle Inhalt der QuelleKamel, Sarah. „Sécurité pour les réseaux sans fil“. Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0011/document.
Der volle Inhalt der QuelleToday, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario
Kamel, Sarah. „Sécurité pour les réseaux sans fil“. Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0011.
Der volle Inhalt der QuelleToday, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario
Nepomuceno, Napoleao. „Optimisation dans des réseaux backhaul sans fil“. Phd thesis, Université de Nice Sophia-Antipolis, 2010. http://tel.archives-ouvertes.fr/tel-00593412.
Der volle Inhalt der QuelleDarche, Davy. „Architecture de coopération de réseaux sans fil“. Phd thesis, Université Henri Poincaré - Nancy I, 2006. http://tel.archives-ouvertes.fr/tel-00126535.
Der volle Inhalt der QuelleNous avons réalisé un état de l'art, mettant en exergue les insuffisances des solutions actuelles, et nous permettant de définir les modes de coopération de
réseaux. Nous proposons ici une nouvelle architecture protocolaire reposant sur les protocoles IPv6 et SCTP, et intégrant une entité de gestion des différents réseaux afin d'obtenir une coopération de réseaux optimisée pour un service donné. A travers une expérimentation et diverses simulations, nous avons pu évaluer, par partie, les performances du modèle proposé.
Bekkaoui, Otmane. „Réseaux de capteurs d'hydrogène passifs sans fil“. Thèse, Université du Québec à Trois-Rivières, 2013. http://depot-e.uqtr.ca/6139/1/030426241.pdf.
Der volle Inhalt der QuelleLe, Ngoc Khuyen. „Homologie simpliciale appliquée aux réseaux sans fil“. Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0039/document.
Der volle Inhalt der QuelleSimplicial homology is a useful tool to access important information about the topology of wireless networks such as : coverage and connectivity. In this thesis, we model the wireless network as a random deployment of cells. Firstly, we introduce an algorithm to construct the Cech complex, which describes exactly the topology of the network. Then, the Cech complex is used in further applications. The first application is to save transmission power for wireless networks. This application not only maximizes the coverage of the network but also minimizes its transmission power. At the same time, the coverage and the transmission power are optimized. The second application is to balance the traffic load in wireless networks. This application controls the transmission power of each cell in the network, always under the coverage constraint. With the controlled transmission power, the users are redirected to connect to the lower traffic load cells. Consequentially, the balanced traffic load is obtained for the network
Le, Ngoc Khuyen. „Homologie simpliciale appliquée aux réseaux sans fil“. Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0039.
Der volle Inhalt der QuelleSimplicial homology is a useful tool to access important information about the topology of wireless networks such as : coverage and connectivity. In this thesis, we model the wireless network as a random deployment of cells. Firstly, we introduce an algorithm to construct the Cech complex, which describes exactly the topology of the network. Then, the Cech complex is used in further applications. The first application is to save transmission power for wireless networks. This application not only maximizes the coverage of the network but also minimizes its transmission power. At the same time, the coverage and the transmission power are optimized. The second application is to balance the traffic load in wireless networks. This application controls the transmission power of each cell in the network, always under the coverage constraint. With the controlled transmission power, the users are redirected to connect to the lower traffic load cells. Consequentially, the balanced traffic load is obtained for the network
Salhab, Nazih. „Resource provisioning and dynamic optimization of Network Slices in an SDN/NFV environment“. Thesis, Paris Est, 2020. http://www.theses.fr/2020PESC2019.
Der volle Inhalt der QuelleTo address the enhanced mobile broadband, massive and critical communications for the Internet of things, Fifth Generation (5G) of mobile communications is being deployed, nowadays, relying on multiple enablers, namely: Cloud Radio Access Network (C-RAN), Software-Defined Networking (SDN) and Network Function Virtualization (NFV).C-RAN decomposes the new generation Node-B into: i) Remote Radio Head (RRH), ii) Digital Unit (DU), and iii) Central Unit (CU), also known as Cloud or Collaborative Unit.DUs and CUs are the two blocks that implement the former 4G Baseband Unit (BBU) while leveraging eight options of functional splits of the front-haul for a fine-tuned performance. The RRH implements the radio frequency outdoor circuitry. SDN allows programming network's behavior by decoupling the control plane from the user plane and centralizing the flow management in a dedicated controller node. NFV, on the other hand, uses virtualization technology to run Virtualized Network Functions (VNFs) on commodity servers. SDN and NFV allow the partitioning of the C-RAN, transport and core networks as network slices defined as isolated and virtual end-to-end networks tailored to fulfill diverse requirements requested by a particular application. The main objective of this thesis is to develop resource-provisioning algorithms (Central Processing Unit (CPU), memory, energy, and spectrum) for 5G networks while guaranteeing optimal provisioning of VNFs for a cloud-based infrastructure. To achieve this ultimate goal, we address the optimization of both resources and infrastructure within three network domains: 5G Core Network (5GC), C-RAN and the SDN controllers. We, first formulate the 5GC offloading problem as a constrained-optimization to meet multiple objectives (virtualization cost, processing power and network load) by making optimal decisions with minimum latency. We optimize the usage of the network infrastructure in terms of computing capabilities, power consumption, and bitrate, while meeting the needs per slice (latency, reliability, efficiency, etc.). Knowing that the infrastructure is subject to frequent and massive events such as the arrival/departure of users/devices, continuous network evolution (reconfigurations, and inevitable failures), we propose a dynamic optimization using Branch, Cut and Price, while discussing objectives effects on multiple metrics.Our second contribution consists of optimizing the C-RAN by proposing a dynamic mapping of RRHs to BBUs (DUs and CUs). On first hand, we propose clustering the RRHs in an aim to optimize the downlink throughput. On second hand, we propose the prediction of the Power Headroom (PHR), to optimize the throughput on the uplink.We formulate our RRHs clustering problem as k-dimensional multiple Knapsacks and the prediction of PHR using different Machine Learning (ML) approaches to minimize the interference and maximize the throughput.Finally, we address the orchestration of 5G network slices through the software defined C-RAN controller using ML-based approaches, for all of: classification of performance requirements, forecasting of slicing ratios, admission controlling, scheduling and adaptive resource management.Based on extensive evaluations conducted in our 5G experimental prototype based on OpenAirInterface, and using an integrated performance management stack, we show that our proposals outperform the prominent related strategies in terms of optimization speed, computing cost, and achieved throughput
Malik, Salman. „Evaluation et Optimisation des Réseaux Sans Fil Denses“. Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00719083.
Der volle Inhalt der QuelleWeis, Frédéric. „Exploitation d'approches système dans les réseaux sans fil“. Habilitation à diriger des recherches, Université Rennes 1, 2012. http://tel.archives-ouvertes.fr/tel-00790484.
Der volle Inhalt der QuelleHatefi, Atoosa. „Codage distribué pour les réseaux coopératifs sans fil“. Phd thesis, Supélec, 2012. http://tel.archives-ouvertes.fr/tel-00829100.
Der volle Inhalt der QuelleMezni, Anis. „Ordonnancement des réseaux de capteurs sans fil embarqués“. Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI030.
Der volle Inhalt der QuelleWireless Sensor networks are attracted many activities of research and development during the last decade. Yet, the distributed behavior of a WSN remains centered on two main objectives: sensing and routing. This thesis advocates the introduction of an additional feature, which can be considered interesting from a functional point of view and potentially from the power consumption one: starting from a designer-specified requirement, implement a multiple level synergy between (groups of) nodes, based on adequate interaction. This is achieved by automatic generation and distribution of correct-by-construction code, relying on the Supervisory Control Theory. The Discrete Controller Synthesis (DCS) technique is an application of this theoretic framework. In this thesis, we show how DCS can be used for WSN. Thus, its potential is at two levels. The intra-cluster scheduling of a redundant group of sensors with specifications expressing the mutual exclusion during the activation of a sensor within a cluster, essential to save the energy within the network and then a multicriteria automatic generation of an optimal routing functionality. Specifically, an optimal path should have both a minimal length and go through nodes having maximal residual energy. The cited formal tools lean on a modelling approach based on communicating finite state machines (CFSM). The scientific challenges are generally related to the nature of the WSN as well as to its size. The DCS can only generates a monoblock controllers, while the WSN’s behavior is essentially distributed. The issue is how to distribute a global controller, who appears in the form of a logical constraint expressed on the global state of the network, into local controllers while adding the necessary synchronization to guarantee a distributed functioning equivalent to the initially generated controller
Al, Hanbali Ahmad. „Évaluation des performances des réseaux sans-fil mobiles“. Nice, 2006. http://www.theses.fr/2006NICE4058.
Der volle Inhalt der QuelleThis thesis deals with the mobility impact on the performance of mobile ad hoc network (MANET). It contains two parts. The first part surveys the TCP protocol over MANET. The main conclusion is that mobility degrades the TCP performance. Since it induces frequent route failures and extended network partitions. These implications were the motivation in the second part to introduce and evaluate new transmission schemes that rely on the mobility to improve the capacity of MANET. More precisely, in the absence of a direct route between two nodes the rest of the nodes in the network can serve as the relay nodes. In the beginning, the focus was on the performance of the relay nodes (throughput and relay buffer size) using a detailed queueing analysis. One of the main results was that random mobility models that have uniform stationary distribution of nodes location achieve the lowest throughput of relaying. Next, in order to optimize the performance of the two-hop relay protocol, especially the delivery delay of packets, we evaluated the multicopy extension under the assumption that the lifetime of the packets is limited. The performance results (delivery delay, round trip time, consumed energy) were derived using the theory of absorbing Markov chains and the fluid approximations. These results were exploited to optimize the total energy consumed subject to a constraint on the delivery delay
Jacquot, Aurélien. „Supervision de réseaux d'objets intelligents communicants sans fil“. Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2010. http://tel.archives-ouvertes.fr/tel-00719350.
Der volle Inhalt der QuelleUntz, Vincent. „Les réseaux sans fil spontanés pour l'Internet Ambiant“. Phd thesis, Grenoble INPG, 2007. http://tel.archives-ouvertes.fr/tel-00195037.
Der volle Inhalt der QuelleJacquot, Aurélien. „Supervision de réseaux d'objets intelligents communicants sans fil“. Phd thesis, Clermont-Ferrand 2, 2010. http://www.theses.fr/2010CLF22019.
Der volle Inhalt der QuelleUntz, Vincent. „Les réseaux sans fil spontanés pour l'Internet Ambiant“. Phd thesis, Grenoble INPG, 2007. http://www.theses.fr/2007INPG0182.
Der volle Inhalt der QuelleThis thesis proposes a new interconnection architecture for spontaneous edge networks. A spontaneous edge network is made of several networks based on various technologies, which appear like only one local and autonomous network to the user. The democratization of wireless technologies, and especially of 802. 11, has enabled the rise of such networks. While the IP philosophy states that all packets are independent, we stress the importance of the concept of connection and the need to maintain established connections. To this end, we propose a 2. 5 layer, between the MAC and IP layers, using MPLS paths to convey data. Coupled with a reactive routing, this connection-oriented architecture at the 2. 5 layer presents several benefits. Our proposal has been implemented in a prototype called Lilith
Combes, Richard. „Mécanismes auto-organisants dans les réseaux sans fil“. Paris 6, 2013. http://www.theses.fr/2013PA066028.
Der volle Inhalt der QuelleIn this thesis we study the design, modeling and performance evaluation of mechanisms which can manage wireless networks autonomously (self-organizing mechanisms). We recall the technological context, and the required mathematical tools are introduced concisely: queuing theory, point processes, information theory, stochastic approximation, Markov decisions processes and reinforcement learning. In the first part, we study opportunistic scheduling. We are interested in their performance evaluation and their use to perform coverage-capacity optimization. Physical layer phenomena such as channel fading, interference, receiver structure and practical modulation and coding schemes are taken into account. In the second part, an algorithm for automatic load balancing is presented. The dynamical arrivals and departures of users are taken into account. For stationary traffic, the convergence of the mechanism to the optimal configuration is shown using stochastic approximation theorems. For non-stationary traffic, numerical experiments suggest that the mechanism is able to adapt itself to daily traffic patterns. In the third part, we study relay-enhanced networks. Based on a queuing analysis, a simple formula for network dimensioning is given. It is valid for the most general traffic model (stationary ergodic input). The load balancing mechanism is extended to relay-enhanced networks. A dynamical load balancing algorithm based on reinforcement is studied
Bramas, Quentin. „Réseaux de capteurs sans fil efficaces en énergie“. Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066309/document.
Der volle Inhalt der QuelleA wireless sensor network is an ad-hoc network connecting small devices equipped with sensors. Such networks are self-organized and independent of any infrastructure. The deployment of a WSN is possible in areas inaccessible to humans, or for applications with a long lifetime requirement. Indeed, devices in a wireless sensor network are usually battery-powered, tolerate failure, and may use their own communication protocols, allowing them to optimize the energy consumption. The main application of WSNs it to sense the environment at different locations and aggregate all the data to a specific node that logs it and can send alerts if necessary. This task of data aggregation is performed regularly, making it the most energy consuming. As reducing the energy consumed by sensor is the leading challenge to ensure sustainable applications, we tackle in this thesis the problem of aggregating efficiently the data of the network. Then, we study lifetime evaluation techniques and apply it to benchmark existing energy-centric protocols
Bramas, Quentin. „Réseaux de capteurs sans fil efficaces en énergie“. Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066309.
Der volle Inhalt der QuelleA wireless sensor network is an ad-hoc network connecting small devices equipped with sensors. Such networks are self-organized and independent of any infrastructure. The deployment of a WSN is possible in areas inaccessible to humans, or for applications with a long lifetime requirement. Indeed, devices in a wireless sensor network are usually battery-powered, tolerate failure, and may use their own communication protocols, allowing them to optimize the energy consumption. The main application of WSNs it to sense the environment at different locations and aggregate all the data to a specific node that logs it and can send alerts if necessary. This task of data aggregation is performed regularly, making it the most energy consuming. As reducing the energy consumed by sensor is the leading challenge to ensure sustainable applications, we tackle in this thesis the problem of aggregating efficiently the data of the network. Then, we study lifetime evaluation techniques and apply it to benchmark existing energy-centric protocols
Esteves, José Jurandir Alves. „Optimization of network slice placement in distributed large-scale infrastructures : from heuristics to controlled deep reinforcement learning“. Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS325.
Der volle Inhalt der QuelleThis PhD thesis investigates how to optimize Network Slice Placement in distributed large-scale infrastructures focusing on online heuristic and Deep Reinforcement Learning (DRL) based approaches. First, we rely on Integer Linear Programming (ILP) to propose a data model for enabling on-Edge and on-Network Slice Placement. In contrary to most studies related to placement in the NFV context, the proposed ILP model considers complex Network Slice topologies and pays special attention to the geographic location of Network Slice Users and its impact on the End-to-End (E2E) latency. Extensive numerical experiments show the relevance of taking into account the user location constraints. Then, we rely on an approach called the “Power of Two Choices"(P2C) to propose an online heuristic algorithm for the problem which is adapted to support placement on large-scale distributed infrastructures while integrating Edge-specific constraints. The evaluation results show the good performance of the heuristic that solves the problem in few seconds under a large-scale scenario. The heuristic also improves the acceptance ratio of Network Slice Placement Requests when compared against a deterministic online ILP-based solution. Finally, we investigate the use of ML methods, more specifically DRL, for increasing scalability and automation of Network Slice Placement considering a multi-objective optimization approach to the problem. We first propose a DRL algorithm for Network Slice Placement which relies on the Advantage Actor Critic algorithm for fast learning, and Graph Convolutional Networks for feature extraction automation. Then, we propose an approach we call Heuristically Assisted Deep Reinforcement Learning (HA-DRL), which uses heuristics to control the learning and execution of the DRL agent. We evaluate this solution trough simulations under stationary, cycle-stationary and non-stationary network load conditions. The evaluation results show that heuristic control is an efficient way of speeding up the learning process of DRL, achieving a substantial gain in resource utilization, reducing performance degradation, and is more reliable under unpredictable changes in network load than non-controlled DRL algorithms
Mabrouki, Issam. „Marches aléatoires dans les réseaux de capteurs sans-fil“. Télécom Bretagne, 2008. http://www.theses.fr/2008TELB0081.
Der volle Inhalt der QuelleBenamrouche, Bilal. „Efficacité énergétique des architectures de communication sans fil IR-UWB pour les réseaux de capteurs sans fil“. Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0023/document.
Der volle Inhalt der QuelleThis Ph.D. Subject proposes the design of a new generation of wireless sensor networks (WSN) based on impulse radio ultra-wide band (IR-UWB), reconfigurable upon the application, reliable and ultra-low power. Applications like structure health monitoring of aerospace structures or portable smart sensing systems for human protection can be targeted. These industrial applications impose very demanding specifications for the wireless communication protocol (in some cases, new services are needed like: localization, clock synchronization, real-time transmission, etc) on one side, and for the circuit design, on the other side, as the ultra-low power circuits are needed. Energy efficiency is the major driver in today development of the wireless sensor networks. We chose impulse radio ultra-wideband (IR-UWB) technique for our developments. IR-UWB is a very promising technique able to respond to the wireless communication protocol constraints and to energy efficiency constraints.! The objective of this Ph.D. will be to design an ultra-low power IR-UWB transceiver. IR-UWB signal processing techniques has to be study and innovator solution has to be proposed for the implementation of the IR-UWB transceiver. The first prototype will be developed on FPGA boards (and/or USRP boards) and the final IR-UWB transceiver will be an ASIC in CMOS technology. The design of an ultra-low power consumption of the CMOS transceiver will be a major concern. Modern ultra-low power circuit techniques from the nanometrics CMOS design kits will be used. MAC layer adapted to the demands of the application and working on IR-UWB physical layer will be also studied and designed. A microprocessor integration on the chip for power management of the different parts (sensor, communication, computing, energy harvesting) of the system can also be studied. This work will be based on the previous research results obtained in our team in the case of static WSN. This work will take plac! e in the highly stimulating and competitive environment of a E! uropean project
La, Chi-Anh. „Réplication de contenu dans les réseaux sans fil mobiles“. Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00545009.
Der volle Inhalt der QuelleJaffrès-Runser, Katia. „Méthodologies pour la planification de réseaux locaux sans-fil“. Phd thesis, INSA de Lyon, 2005. http://tel.archives-ouvertes.fr/tel-00406342.
Der volle Inhalt der QuelleLa seconde partie se concentre sur le problème de planification wLAN. Des critères de couverture radio, de minimisation des interférences, d'optimisation de la bande passante et d'amélioration des services de localisation ont été proposés. Deux heuristiques de recherche basées sur une approche Tabou ont été développées : une heuristique mono-objectif et une heuristique multiobjectifs. Ces travaux ont mis en évidence les avantages d'une recherche multiobjectifs car elle permet d'obtenir plusieurs solutions appartenant au front de Pareto de l'espace des fonctions associées au problème traité. Chaque solution représente alors un compromis différent entre les critères du problème à résoudre. Le choix de la solution à déployer se fait à posteriori dans l'ensemble limité des \textit{bonnes} solutions.
Aad, Imad. „Qualité de service dans les réseaux locaux sans-fil“. Phd thesis, Université Joseph Fourier (Grenoble), 2002. http://tel.archives-ouvertes.fr/tel-00406507.
Der volle Inhalt der Quelle- Différentiation de service : Le protocole IEEE 802.11 actuel n'a aucun support de la QoS. Ainsi, tous les terminaux partagent équitablement le débit disponible. Nous proposons des mécanismes de différentiation de services au niveau MAC. Nous développons et simulons plusieurs mécanismes de différentiation pour IEEE 802.11.
- Environnements bruités : IEEE 802.11 utilise des fenêtres de contention pour résoudre l'accès multiple des terminaux au canal. Un terminal double la taille de sa fenêtre de contention à chaque perte de paquet.
Cette stratégie diminue les collisions au canal, mais augmente le surcoût des paquets, diminuant ainsi le débit. Cependant, les pertes peuvent également être dues à du bruit sur le canal. L'augmentation de la fenêtre de contention peut alors être très néfaste en termes de performance. Il convient d'augmenter la fenêtre de contention uniquement si la perte à été produite par une collision. Nous proposons une stratégie d'adaptation de la fenêtre de contention qui varie selon l'estimation de la cause de perte des paquets.
- Environnements congestionnés : Après chaque bonne transmission de paquet, IEEE 802.11 remet la taille de la fenêtre de contention à zéro. Cependant, dans un environnement congestionné la charge sur le canal varie lentement, et un terminal risque d'avoir le même taux de collisions et de retransmissions. Nous proposons un mécanisme basé sur une réduction de la taille de la fenêtre de contention plus lente, pouvant mieux éviter les collisions et les retransmissions. Ceci présente un gain considérable en terme de débits et de consommation d'énergie.
- Réseaux ad-hoc: Dans un réseau ad-hoc les paquets sont routés suivant des chemins multi-saut. Ainsi le routage est coopératif entre les différents nœuds, et le débit utile moyen disponible à chaque nœud dépend du nombre total des nœuds, des interférences et des collisions. Nous proposons un mécanisme de contrôle de débits aux sources, basé sur l'estimation des débits et des délais, pouvant optimiser les débits utiles ainsi que la consommation d'énergie.
Issoufou, Tiado Mahamadou. „Modèles et mécanismes multiniveaux pour les réseaux sans fil“. Phd thesis, Toulouse, INPT, 2006. http://oatao.univ-toulouse.fr/7445/1/issoufoutiado.pdf.
Der volle Inhalt der QuelleRamassamy, Cédric. „Analyse des protocoles des réseaux de capteurs sans-fil“. Thesis, Antilles-Guyane, 2012. http://www.theses.fr/2012AGUY0586/document.
Der volle Inhalt der QuelleWireless sensor networks is one of the hotest research topic in the last few years. This technology can be applied for different fields such as environment, industry, trading, medicine, military etc. Wireless sensor networks are hard to conceive because they require a lot of energy and because each of its component may have an influence on the lifetime of the whole system. What we suggest is a tool allowing to choose the correct and optimal parameters for the reliability of the applications.In this thesis, we focused on two major problems : firstly, a classification of the parameters for a tool allowing to make decisions about the configuration of a wireless sensors network, and secondly, a tool testing the compliance of the system with a real environment. The document is divided into two parts : the first part states the different protocols that exist, and the second part describes our contributions to those topics.In the first contribution, we analyzed how influential the radio cover and the network topology are on the network performances. Then, we deduced from the study of the loss rate and of the level of energy, the reliability of the application. Next, we suggested a study leading to a classification for our decision making tool. For this classification, we studied various parameters related to the MAC layer, the Physical layer, the network layer, the application layer the number of nodes involved in the network.In the second contribution, we adopted a pragmatic approach so we could test the conformity of a wireless sensors network in a real environment. In order to test its conformity in a real environment, we suggested a structured test execution on a real wireless sensor network. This task has been suggested in order to check the conformance level of the network while it was working
Makkaoui, Leila. „Compression d'images dans les réseaux de capteurs sans fil“. Phd thesis, Université de Lorraine, 2012. http://tel.archives-ouvertes.fr/tel-00795503.
Der volle Inhalt der QuelleDu, Wan. „Modélisation et simulation de réseaux de capteurs sans fil“. Phd thesis, Ecole Centrale de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00690466.
Der volle Inhalt der QuelleAlbu, Roxana. „Architecture de communication pour les réseaux d'instrumentation sans fil“. Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2011. http://tel.archives-ouvertes.fr/tel-00619443.
Der volle Inhalt der QuelleHelluy-Lafont, Étienne. „Sécurité et détection d'intrusion dans les réseaux sans fil“. Thesis, Lille, 2021. http://www.theses.fr/2021LILUI017.
Der volle Inhalt der QuelleThis thesis focuses on the security of wireless communications, as used on devices such as mobile phones, laptops, or connected devices that make up the Internet of Things. Nowadays, wireless communications are carried out using integrated components (modem), which can themselves be the target of attacks. Indeed, these modems contain Closed Source software, that are poorly audited, and may have flaws. During this thesis, we pursued two complementary approaches that aim to address the problem of wireless modems security. The first is to detect attacks in order to mitigate the risks posed by vulnerabilities ; the second is to identify and correct these vulnerabilities in order to eliminate the risks. Wireless modems pose particular constraints for Intrusion Detection Systems (IDS). In fact, if the modem is at risk of being compromised, the operating system (OS) cannot trust the information it is sending back : the modem is unreliable. This makes it difficult to detect wireless attacks from the OS, as it has no reliable source of information on whichto base detection. In this context, it is preferable to perform intrusion detection at the network level, by directly capturing the signals exchanged wirelessly. However, it is not always easy to recover the signals of interest. Today’s equipment supports a multitude of different communication standards. This heterogeneity represents a challenge for capture solutions. In addition, some protocols do not lend themselves well to passive capture of their exchanges, and are sometimes even specifically designed to prevent it. Finally, data is usually encrypted, which is an additional obstacle for intrusion detection systems. Software Defined Radio (SDR) can partly meet the challenges posed by this diversity. They consist of a hardware part, but above all of software, which can be adapted to receive signals of any standard - within the limits of the material. In this thesis, we present a SDR specifically designed to allow the capture and analysis of a given frequency band, in order to identify and label the signals present. It is an elementary building block for building wireless intrusion detection systems. In addition, software radio processes signals in terms of their physical representation. This allows them to collect additional information, which would not have been accessible if a conventional modem had been used to capture the signals. In this thesis, we describe methods to identify the model of a Bluetooth device by analysing the physical representation of the packets it transmits. In the second part of this thesis, we analysed the firmware of several Bluetooth modems, in order to identify vulnerabilities that would allow remote control. This allowed us to discover several exploitable vulnerabilities in widely used modems. Finally, we developeda free and open-source Bluetooth modem that allows interaction with real-world modems to facilitate research and development on their security
Runser, Katia. „Méthodologies pour la planification de réseaux locaux sans-fil“. Lyon, INSA, 2005. http://theses.insa-lyon.fr/publication/2005ISAL0078/these.pdf.
Der volle Inhalt der QuelleThis PhD study was undertaken in the field of wireless local area networks. The objective is to propose an automatic planning strategy which seeks one or more configurations of the access points (APs) to guarantee a given quality of service. The quality of such a strategy depends mainly on the propagation prediction model used. The first part of this work was thus devoted to the development and validation of an original propagation prediction model : the adaptive Multi-Resolution Fourier Domain ParFlow (MRFDPF) model. The definition of a calibration stage enabled us to define adequate parameter settings of the model for standard buildings, guaranteeing a mean squared error of less than 5 dB. The second part of this work concentrates on the wLAN planning problem. Criteria of radio coverage, interference minimization, bandwidth optimization and improvement of localization services were proposed. Two optimization heuristics based on a Tabu algorithm were developed : a mono-objective and a multiobjective one. This work highlighted the advantages of the multiobjective approach because it makes it possible to obtain several solutions each one representing a different trade-off between the optimized criteria. In fact, the mono-objective heuristic gives only one choice to the deployment engineer and if this solution doesn’t suits him, the whole research has to be run again with other criteria weightings. With the multiobjective approach, the choice of the solution to be deployed is done a-posteriori in a set of good solutions
Nassiri, Mohammad. „Amélioration des performances MAC dans les réseaux sans-fil“. Grenoble INPG, 2008. http://www.theses.fr/2008INPG0131.
Der volle Inhalt der QuelleLn this thesis, we study the important performance problems that arise at the MAC layer in 802. 11 wireless networks when they are used in the context of ad hoc or multi-hop. We proposed severa 1 mechanisms to overcome these performance issues. First, we enhance performance of a single wireless cell byaccommodating severa 1 classes of services. Our mechanism is a prioritized access method that supports both proportional throughput allocation and absolute priority. Second, we propose an efficient localized way to solve the problem of blocked stations in large-scale wireless networks. Finally, we propose a more global approach that combines topology constrajnts and a MAC layer mechanism to improve the performance of wireless ad hoc or mesh networks in terms of throughput and fairness. We use simulation to evaluate our proposais and also compare them with sorne state-of-the-art solutions
Chelius, Guillaume. „Architectures et communications dans les réseaux spontanés sans-fil“. Lyon, INSA, 2004. http://theses.insa-lyon.fr/publication/2004ISAL0024/these.pdf.
Der volle Inhalt der QuelleThis PhD addresses several issues bound to ad hoc and sensor networks. We first define the notion of ad hoc architecture before describing our two proposals, Ana4 and Ana6. These architectures are notably used to evaluate and optimize unicast routing in wireless hybrid networks, i. E. , the rnerging of a wireless infrastructure network and ad hoc connectivity. Then we study ad hoc multicast routing. After having presented NP-completeness results for both ad hoc multicast and broadcast problems, we describe our ad hoc multicast routing protocol DMZ (Dense Multicast Zone). DMZ uses tree and mesh structures to create robust diffusion structures and rely on the notion of dense zones. Fin ally, we address the issue of energy consumption in sensor networks. Using a new analytical model, we derive upper and lower bounds for the minimum energy broadcast and covering problems
Djouama, Amir. „Contrôle de topologie ambiant dans les réseaux sans fil“. Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0019.
Der volle Inhalt der QuelleWith the evolution of the wireless communication systems and the increasing control of complexity in the material, it becomes possible to conceive network architectures dynamicaly controlable and equiped with a capacity of ambient decision. Within the framework of the thesis we propose to study and optimize the control of a network made up of mobile nodes wich communicate without infrastructure. Two levels of control will be considered, one being at the level of the lower layers while the other adresses the aspects relating to the higher layers. The dynamic control on the level of the lower layers relates to two aspects : 1- The adaptation of the topology of the network and the routing to the requests coming from the lower layers. 2- Optimization inter-layer (cross-layer) in order to use as well as possible the resources of the network and in particular the radio. The dynamic control on the level of the higher layer relates to the discovery and the adaptation of the application to the services of communications offered by the lower layers. In a second step, we study the admission control. We propose to study the local parameters of each node, wich are interesting for the continuity of sessions. An approach for admission control is given which interact lifetime of nodes and their point of attachment
La, Chi Anh. „Réplication de contenu dans les réseaux sans fil mobiles“. Paris, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00545009.
Der volle Inhalt der QuelleThe growth of mobile devices and network-based services nowadays has raised a timely question on how to efficiently distribute the data items to mobile users. Network applications need data as an input to process and provide information to users. Consequently, data traffic exerted by mobile devices fetching content is a drainage of mobile operators’ network resources. Mobile users are now coping with the congestion at network gateways and due to the unpredictability of human mobility, mobile service providers cannot sufficiently provision infrastructures for their customers. Content replication in this context has been proved as a good solution to enhance network performance and scalability. In this thesis, we tackle the issues of content replication in heterogeneous mobile networks. Such scheme requires us to solve two basic questions: where and how many replicas should be placed in the system. We study the solution through the lenses of facility location theory and design a distributed mechanism that reduces content access latency and avoids congestion at mobile gateways. Additionally, we consider the resource constraints of mobile devices and introduce a P2P cache-and-forward mechanism for load balancing purpose. We evaluate our mechanisms against realistic human mobility models. Finally, to address rational users who may behave selfishly in replicating content, we derive a cost model and study content replication scheme using tools akin to game theory. Based on the theoretical findings, our future work is to develop the strategies to be implemented in a practical network setting
Albu, Roxana. „Architecture de communication pour les réseaux d’instrumentation sans fil“. Thesis, Toulouse, INPT, 2011. http://www.theses.fr/2011INPT0045/document.
Der volle Inhalt der QuelleResearches in the field of sensor networks show the variety and vastness of applications in which these types of systems are used. One of their main features is the large number (up to hundreds of elements) of sensors that must be distributed in different environments. Another concern consists in making routing decisions in order to reduce the energy consumption. Depending on the application requirements, ensuring synchronous network functionality is currently a challenge. The issue addressed in this thesis is to develop an architecture for smart objects using low-power antennas for structural heald monitoring. Integrating a multidisciplinary approach, this architecture includes services from the MAC layer to those of the highest level. In summary, we will develop an autonomous system ofi sensors, for acquisition and information processing, which communicate via a wireless network. The main problems are: the control of topology, the timing accuracy and the energy consumption
Kodjo, Alvinice. „Dimensionnement et optimisation des réseaux de collecte sans fil“. Thesis, Nice, 2014. http://www.theses.fr/2014NICE4140/document.
Der volle Inhalt der QuelleThe main work of this thesis focuses on the wireless backhaul networks. We studied different optimization problems in such networks that represent real challenges for industrial sector.The first issue addressed focuses on the capacity allocation on the links at minimum cost. It was solved by a linear programming approach with column generation. Our method solves the problems on large size networks. We then studied the problem of network infrastructure sharing between virtual operators. The objective is to maximize the revenue of the operator of the physical infrastructure while satisfying the quality of service constraints of virtual operators customers of the network. In this context, we proposed a robust model using mixed integer linear programming. In the following problem, we proposed a robust energy-aware routing solution for the network operators to reduce their energy consumption. Our solution was formulated using a mixed integer linear program. We also proposed heuristics to find efficient solutions for large networks. The last work of this thesis focuses on cognitive radio networks and more specifi- cally on the problem of bandwidth sharing. We formalized it using a linear program with a different approach to robust optimization. We based our solution on the 2-stage linear robust method
Sambou, Bafing Cyprien. „Systèmes communicants sans fil pour les réseaux avioniques embarqués“. Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0040/document.
Der volle Inhalt der QuelleThe object of our works concerns at the suggestion of hybrid architecture IEEE 802.11e / AFDX (Avionics Full Duplex switched ethernet) and the study of techniques allowing the interconnection of a wired avionic network AFDX and a wireless network IEEE802.11e for applications of maintenance the ground
Boughanmi, Najet. „Conception conjointe des systèmes contrôlés en réseaux sans fil“. Thesis, Vandoeuvre-les-Nancy, INPL, 2011. http://www.theses.fr/2011INPL021N/document.
Der volle Inhalt der QuelleIn this thesis, we study wireless networked control systems (WNCS) which use the IEEE 802.15.4 technology. The first objective is to study the pertinence of the use of the IEEE 802.15.4 for the WNCS, then to propose and evaluate QoS management mechanisms which guarantee the Quality of Service (QoS) offered by network to the controlled system. We analyse the use of the guaranteed temporel slots (GTS) for WNCS and in which conditions it is possible. We propose QoS management mechanisms with priority for both the beacon enabled mode and the non-beacon enabled mode of the IEEE 802.15.4 protocol. These proposals are validated through simulations and partially with analytical approach. The second objective is to design the WNCS so that the QoS offered by the network is adated online depending on the Quality of Control (QoC) on the controlled system. We propose QoS online adaptation protocols which take as parameter the QoC of the system. These protocols are validated through simulations and a realistic implementation of them is proposed
Ghorbel, Asma. „Limites Fondamentales De Stockage Dans Les Réseaux Sans Fil“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLC031/document.
Der volle Inhalt der QuelleCaching, i.e. storing popular contents at caches available at end users, has received a significant interest as a technique to reduce the peak traffic in wireless networks. In particular, coded caching proposed by Maddah-Ali and Niesen has been considered as a promising approach to achieve a constant delivery time as the dimension grows. However, several limitations prevent its applications in practical wireless systems. Throughout the thesis, we address the limitations of classical coded caching in various wireless channels. Then, we propose novel delivery schemes that exploit opportunistically the underlying wireless channels while preserving partly the promising gain of coded caching. In the first part of the thesis, we study the achievable rate region of the erasure broadcast channel with cache and state feedback. We propose an achievable schemeand prove its optimality for special cases of interest. These results are generalized to the multi-antenna broadcast channel with state feedback. In the second part, we study the content delivery over asymmetric block-fading broadcast channels, where the channel quality varies across users and time. Assuming that user requests arrive dynamically, we design an online scheme based on queuing structure and prove that it maximizes the alpha-fair utility among all schemes restricted to decentralized placement. In the last part, we study opportunistic scheduling over the asymmetric fading broadcast channel and aim to design a scalable delivery scheme while ensuring fairness among users. We propose a simple threshold-based scheduling policy of linear complexity that requires only a one-bit feedback from each user