Dissertations / Theses on the topic 'Communications opportunistes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Communications opportunistes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Shikfa, Abdullatif. "Sécurité des communications opportunistes." Paris, Télécom ParisTech, 2010. http://www.theses.fr/2010ENST0045.
Full textIn this thesis, we investigate security in opportunistic communications. This new communication paradigm involves storing and carrying messages in addition to forwarding and impacts all security aspects of communication. Indeed, nodes’ high mobility implies that security solutions should be dynamic and local. Furthermore, delay tolerance, which is one of the main characteristics of opportunistic networks, has a strong impact from a security perspective as it amounts to the infeasibility of interactive protocols. Moreover, radically new forwarding strategies have been proposed to enable communication in opportunistic networks: parting from traditional network addresses, these enriched forwarding strategies use information such as context of a node or content of a message to take forwarding decisions. Context or content are sensitive information that users might not want to reveal to others in order to preserve their privacy, hence these information should be carefully handled to ensure their secrecy. The conflicting requirements between security and forwarding motivate the need for new security mechanisms that enable computation on encrypted data. After analyzing the security challenges in opportunistic communications, we propose a complete security framework for context-based communication. This framework features not only data confidentiality and user privacy, but also computation assurance, which provides resilience against malicious entities aiming at disrupting or subverting the communication. We also propose a privacy-preserving content-based protocol which relies on multiple encryption layers, and an associated local and topology-dependent key management solution
Koteich, Jana. "Routage opportuniste tenant compte du contexte dans les réseaux sans fil." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILB018.
Full textToday, sharing data and digital content is essential across various applications, particularly in health, education, and agriculture. Traditional wired networks and wireless networks are the two main modes of communication, with the latter presenting more challenges due to the absence of a guided physical path.Opportunistic routing emerges as a promising solution in regions lacking communication infrastructure, especially in Least Developed Countries.In this thesis, we propose an alternative solution to infrastructure-based approaches for delivering data independently of any existing operated infrastructure. This solution relies on low-cost communication and storage devices that can embed different communication technologies, resulting in a global privacy-preserving data-sharing system based on natural crowd mobility. To achieve this, we analyze crowd mobility patterns to assign a delivery probability for a message based on its mobility pattern. First, we generated the PILOT dataset, a privacy-preserving data collection of wireless communication Technologies. The dataset consists of four types of jointly collected information in different mobility contexts. It includes three wireless communication technologies: WiFi probe responses, BLE (Bluetooth Low Energy) beacons, and LoRa (Long Range Radio) packets, as well as additional information on acceleration, roll, and pitch, all collected simultaneously. The dataset was collected over approximately 90 hours, with a size of 200 MB, using FiPy devices from Pycom. We provided the keys to reproduce such data collection and shared the datasets already collected on GitHub. After generating the dataset, we processed the collected traces of WiFi and BLE to generate a classification model that can estimate the real-life situation of a device. The first created model, called the B-model, aims to identify whether a device is stationary or mobile. Subsequently, a complementary model, the M-model, was created to determine a more precise real-life situation of the device, such as being at home, in the office, on a bus, train, etc. Finally, we exploited the collected dataset and the trained machine learning models todesign a routing protocol by setting delivery probabilities conditioned by the determined context of the device. We are testing and validating our approach using the ONE simulator, which is designed for an opportunistic network environment
Benchi, Abdulkader. "Middleware Systems for Opportunistic Computing in Challenged Wireless Networks." Thesis, Lorient, 2015. http://www.theses.fr/2015LORIS372/document.
Full textOpportunistic networks (OppNets) constitute an appealing solution to complement fixed network infrastructures –or make up for the lack thereof– in challenged areas. Researches in the last few years have mostly addressed the problem of supporting networking in OppNets, yet this can only be a first step towards getting real benefit from these networks. Opportunistic computing goes beyond the concept of opportunistic networking, and provides a new paradigm to enable collaborative computing tasks in such environments. In the realm of opportunistic computing, properly designing, implementing and deploying distributed applications are important tasks. An OppNet-dedicated application must be able to operate and maintain an acceptable level of service while addressing the many problems that can occur in these networks, such as disconnections, partitioning, long transmission delays, transmission failures, resource constraints, frequent changes in topology, and heterogeneous devices. Much of the complexity and cost of building OppNet-dedicated applications can be alleviated by the use of high-level programming models. Such models can be supported by middleware systems capable of transparently addressing all the above-mentioned problems. The work reported in this dissertation focused on providing insight into the fundamental problems posed by OppNets, so as to analyze and solve the problems faced by application developers while dealing with these environments. The research focused on identifying well-known high-level programming models that can be satisfactorily implemented for OppNets, and that can prove useful for application developers. In order to demonstrate the feasibility of application development for OppNets, while assessing the benefits brought about by carefully designed middleware systems, a couple of such systems have been designed, implemented, and evaluated as part of this work. These middleware systems respectively support distributed messaging (through message queues and topics), the tuple-space model, and consensus solving in OppNets. They are supplemented with fully-functional implementations, that can be used in real settings, and that are all distributed under the terms of the GNU General Public License (GPL). Real-life experiments and simulations have been realized so as to evaluate the effectiveness and efficiency of these systems in real conditions
Belouanas, Salah-Eddine. "Dissémination de contenus populaires et tolérants au délai dans les réseaux cellulaires." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066230/document.
Full textCellular resources are valuable and must be saved whenever possible. In this thesis, we address the problem of content dissemination within an overloaded cellular network. Firstly, we propose SCoD (Scheduled Content Delivery), a purely cellular dissemination strategy that exploits the mobility of users and their delay tolerance in order to postpone transmissions. SCoD waits for users to gather around a minimum number of access points so that the total number of transmissions is reduced. To trigger transmissions, SCoD relies on different decision functions which launch, if necessary, a multicast transmission. The second part of this thesis deals with the same problem of saving cellular resources, but from another angle. We use D2D (Device-to-Device) communications with multicast to mitigate the traffic load on the infrastructure. We study the benefits of opportunistic communications in the context of a content distribution service based on user subscriptions. We present our results in two ways. First, we illustrate the benefits of D2D communications in a content dissemination process where the cost of opportunistic transmission is negligible compared to that of cellular transmission. Then, we consider the case where users must be compensated for their participation in the dissemination process. Therefore, there is a tradeoff to be found, we thus provide guidelines in this direction and show the variation of such a tradeoff as a function of several network parameters
Belouanas, Salah-Eddine. "Dissémination de contenus populaires et tolérants au délai dans les réseaux cellulaires." Electronic Thesis or Diss., Paris 6, 2017. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2017PA066230.pdf.
Full textCellular resources are valuable and must be saved whenever possible. In this thesis, we address the problem of content dissemination within an overloaded cellular network. Firstly, we propose SCoD (Scheduled Content Delivery), a purely cellular dissemination strategy that exploits the mobility of users and their delay tolerance in order to postpone transmissions. SCoD waits for users to gather around a minimum number of access points so that the total number of transmissions is reduced. To trigger transmissions, SCoD relies on different decision functions which launch, if necessary, a multicast transmission. The second part of this thesis deals with the same problem of saving cellular resources, but from another angle. We use D2D (Device-to-Device) communications with multicast to mitigate the traffic load on the infrastructure. We study the benefits of opportunistic communications in the context of a content distribution service based on user subscriptions. We present our results in two ways. First, we illustrate the benefits of D2D communications in a content dissemination process where the cost of opportunistic transmission is negligible compared to that of cellular transmission. Then, we consider the case where users must be compensated for their participation in the dissemination process. Therefore, there is a tradeoff to be found, we thus provide guidelines in this direction and show the variation of such a tradeoff as a function of several network parameters
Gorbil, Gokce. "Opportunistic communications for emergency support." Thesis, Imperial College London, 2013. http://hdl.handle.net/10044/1/14674.
Full textTo, Toan. "Distributed opportunistic scheduling algorithms for wireless communications." Thesis, Swansea University, 2012. https://cronfa.swan.ac.uk/Record/cronfa42588.
Full textBjurefors, Fredrik. "Measurements in opportunistic networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-227626.
Full textWISENET
Kouyoumdjieva, Sylvia T. "System Design for Opportunistic Networks." Doctoral thesis, KTH, Kommunikationsnät, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176479.
Full textQC 20151120
Dillon, PJ. "Enabling tetherless care with context-awareness and opportunistic communication." Thesis, University of Pittsburgh, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3690742.
Full textTetherless care is a novel healthcare delivery paradigm that enables an interaction between caregivers and patients beyond the confines of traditional points of care. This thesis presents a synthesis of recent advances in wearable, ubiquitous sensing; mobile computing; wireless networks; and health information technology into a cohesive framework that enables and supports the tetherless care concept. Tetherless care is formally defined and modeled in a higher order logical framework. The model distills three relations between several classes in the model’s domain of discourse. A prototype implementation is developed and evaluated to capture and represent the logical classes of tetherless care and provide the development infrastructure upon which the relational logic outlined by the model can be implemented. An algorithm is presented and evaluated to support the delivery of traffic between mobile devices and servers despite intermittent connectivity given the changing urgency of the patient’s situation. And an example tetherless care application is presented, developed for the framework, and compared with its deployment on a similar platform. Results show that contemporary mobile devices supply sufficient power to support 24 hours of operation and that, at least, some patient environments provide sufficient opportunities for connectivity to reliably meet the demands of some tetherless care applications, ultimately leading to a conclusion of proof-of-concept for tetherless care.
Eltayeb, Mohammed. "Opportunistic Scheduling with Limited Feedback in Wireless Communication Networks." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1414874159.
Full textKhan, Sardar Kashif Ashraf. "Message forwarding techniques in Bluetooth enabled opportunistic communication environment." Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/17327/.
Full textKurth, Mathias. "Contention techniques for opportunistic communication in wireless mesh networks." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2012. http://dx.doi.org/10.18452/16458.
Full textIn the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY technologies rely on multi-user communication, so that the established abstraction of the network stack does not work well for WMNs. The scheduling problem in WMNs is inherent complex. Surprisingly, carrier sense multiple access (CSMA) in WMNs is asymptotically utility-optimal even though it has a low computational complexity and does not involve message exchange. Hence, the question arises whether CSMA and the underlying concept of contention allows for the assimilation of advanced PHY technologies into WMNs. In this thesis, we design and evaluate contention protocols based on CSMA for opportunistic communication in WMNs. Opportunistic communication is a technique that relies on multi-user diversity in order to exploit the inherent characteristics of the wireless channel. In particular, we consider opportunistic routing (OR) and opportunistic scheduling (OS) in memoryless and slow fading channels, respectively. We present models for congestion control, routing and contention-based opportunistic communication in WMNs in order to maximize both throughput and fairness of elastic unicast traffic flows. At the instance of IEEE 802.11, we illustrate how the cross-layer algorithms can be implemented within a network simulator prototype. Our evaluation results lead to the conclusion that contention-based opportunistic communication is feasible. Furthermore, the proposed protocols increase both throughput and fairness in comparison to state-of-the-art approaches like DCF, DSR, ExOR, RBAR and ETT.
Perez-Ramirez, Javier. "An Opportunistic Relaying Scheme for Optimal Communications and Source Localization." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581448.
Full textThe selection of relay nodes (RNs) for optimal communication and source location estimation is studied. The RNs are randomly placed at fixed and known locations over a geographical area. A mobile source senses and collects data at various locations over the area and transmits the data to a destination node with the help of the RNs. The destination node not only needs to collect the sensed data but also the location of the source where the data is collected. Hence, both high quality data collection and the correct location of the source are needed. Using the measured distances between the relays and the source, the destination estimates the location of the source. The selected RNs must be optimal for joint communication and source location estimation. We show in this paper how this joint optimization can be achieved. For practical decentralized selection, an opportunistic RN selection algorithm is used. Bit error rate performance as well as mean squared error in location estimation are presented and compared to the optimal relay selection results.
Huang, Wen, and 黄文. "Opportunistic scheduling in wireless data networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45895235.
Full textNasif, Ahmed O. "Opportunistic spectrum access using localization techniques." Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/4572.
Full textVita: p. 146. Thesis director: Brian L. Mark. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Title from PDF t.p. (viewed Oct. 11, 2009). Includes bibliographical references (p. 138-145). Also issued in print.
Cao, Yaofu. "Modélisation du contexte social : application aux réseaux opportunistes." Thesis, Troyes, 2017. http://www.theses.fr/2017TROY0002/document.
Full textThis thesis deals with the dynamic adaptation of context-aware applications using information related to the social environment of users to enrich the service rendered by the applications. To achieve this goal our contribution mobilizes multidimensional modeling of the different levels of social contexts, especially the weight of the relationship between the actors. Particularly, we synthesize not only social contexts related to familiarity but also social contexts reasoned from the similarity of static and dynamic communities. Two models based on respectively graphs and ontologies are proposed in order to satisfy the heterogeneity of the social networks in real life. We use the actual data gathered on online social networking services for conducting experiments and the results are analyzed by checking the effectiveness of the models. In parallel we consider the point of view of the application, and we present two algorithms using social contexts to improve the strategy of transmission of data in the opportunistic network, particularly countermeasure against selfish nodes. The simulations of real scenarios confirm the advantages of introducing social contexts in terms of success rate and delay of transmission. We carry out a comparison with other popular transmission algorithms in the literature
Butt, M. Majid. "On the Near-Far Gain in Opportunistic and Cooperative Multiuser Communications." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-12009.
Full textCross Layer Optimization of Wireless Sensor Networks
Kathiravelu, Thabotharan. "Towards content distribution in opportunistic networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-85837.
Full textRajaei, Aydin. "Efficient and flexible geocasting for opportunistic networks." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/66039/.
Full textChen, Yuan. "Opportunistic Overlays: Efficient Content Delivery in Mobile Environments." Diss., Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-04082005-002659/unrestricted/chen%5Fyuan%5F200505%5Fphd.pdf.
Full textRiley, George, Committee Member ; Zhou, Dong, Committee Member ; Pu, Calton, Committee Member ; Ahamad, Mustaque, Committee Member ; Schwan, Karsten, Committee Chair. Vita. Includes bibliographical references.
Loke, Yong. "Sensor synchronization, geolocation and wireless communication in a shipboard opportunistic array." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FLoke.pdf.
Full textScone, Sion. "Opportunistic communication schemes for unmanned vehicles in urban search and rescue." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/7269.
Full textAlmeida, Rodrigo Coelho. "A multi-technology network for environmental data gathering through opportunistic communication." Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/23783.
Full textO conceito de Smart City surge da combinação do paradigma de Internet of Things (IoT) sobre contextos urbanos aliado à exploração de soluções de Tecnologias de Informação e Comunicação (TIC). O típico cenário de Smart City tem de lidar com desafios, tais como as elevadas quantidades de sensores e geradores de dados, dos quais alguns são colocados em dispositivos de grande mobilidade, visando a recolha e geração de todo o tipo de informações e levando ao aumento do número de dispositivos comunicantes. Esta dissertação foca o desenvolvimento e implementação de uma plataforma heterogénea de sonorização ambiental com o objectivo de servir de infraestrutura para aplicações no âmbito das Smart Cities. Esta pretende tirar proveito da utilização de múltiplas tecnologias de comunicação, nomeadamente tecnologias de longo e curto alcance. Para al em disto, visto que a plataforma visa ambientes urbanos, esta tira proveito de uma rede oportunista e tolerante a atrasos, Delay Tolerant Network (DTN), através de entidades m oveis que circulam pela cidade, nomeadamente bicicletas. Assim sendo, esta dissertação propõe: (1) o desenho e desenvolvimento da rede e dos seus constituintes; (2) uma extensão a um protocolo de controlo de acesso ao meio, Medium Access Control (MAC), para a tecnologia LoRa com o objectivo de o dotar compatível para ambientes de gateways múltiplas; (3) novas estratégias de encaminhamento para a rede tolerante a atrasos, tendo em consideração a topologia e as características apresentadas por esta. As avaliações realizadas permitiram concluir que o protocolo MAC para LoRa em ambientes de gateways múltiplas proposto contribui para um aumento da escalabilidade da rede, bem como para uma melhoria do seu desempenho. Relativamente às estratégias de encaminhamento propostas para a DTN, os testes realizados permitiram avaliar o impacto que cada estratégia tem sobre o comportamento da rede, nomeadamente a taxa de entrega dos pacotes de dados, a sobrecarga da rede, o número de pacotes transmitidos, entre outros. Com estes resultados foi possível perceber as in- suficiências que as funcionalidades propostas têm sobre a solução geral, e identificar as caraterísticas necessárias de uma solução escalável para a recolha de dados massivos num ambiente de IoT.
The Smart City concept is the combination of the Internet of Things (IoT) paradigm under an urban context with the exploitation of Information and Communication Technologies (ICT) solutions. The typical Smart City scenario has to deal with an extensive amount of sensors and data generators, some of them placed in high mobile devices, deployed to collect and generate all type of information which will increase the number of communicating machines. This dissertation focuses on the development and implementation of a heterogeneous environmental sensing platform to serve as an infrastructure for Smart City applications. It aims to take advantage of the use of multiple communication technologies, namely long and short range. Being within an urban environment, the platform bene ts from an opportunistic and Delay Tolerant Network (DTN) through mobile entities that travel over the city, such as bicycles. Therefore, this dissertation proposes: (1) the design and development of the network and its elements; (2) an extension to a LoRa Medium Access Control (MAC) protocol in order to endow it with capabilities to operate in multi-gateway environments; and lastly, (3) new forwarding strategies for the opportunistic network that takes into consideration the network topology. The performed evaluations showed that the proposed multi-gateway LoRa MAC protocol contributes to increase the LoRa network scalability, as well as its performance. The performed tests to the proposed DTN forwarding strategies evaluate the impact of each strategy on the network behavior, namely the delivery ratio, network overhead, number of transmitted packets, among others. As a result, it is possible to perceive which are the in- uences introduced by the proposed functionalities on the overall solution, and identify the characteristics of a scalable solution to collect massive data in an IoT environment.
Trotta, Angelo <1985>. "Next-Generation Public Safety Systems Based on Autonomous Vehicles and Opportunistic Communications." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amsdottorato.unibo.it/8065/1/TesiDottoratoAngeloTrottaFinal.pdf.
Full textKlaghstan, Merza. "Multimedia data dissemination in opportunistic systems." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEI125/document.
Full textOpportunistic networks are human-centric mobile ad-hoc networks, in which neither the topology nor the participating nodes are known in advance. Routing is dynamically planned following the store-carry-and-forward paradigm, which takes advantage of people mobility. This widens the range of communication and supports indirect end-to-end data delivery. But due to individuals’ mobility, OppNets are characterized by frequent communication disruptions and uncertain data delivery. Hence, these networks are mostly used for exchanging small messages like disaster alarms or traffic notifications. Other scenarios that require the exchange of larger data are still challenging due to the characteristics of this kind of networks. However, there are still multimedia sharing scenarios where a user might need switching to an ad-hoc alternative. Examples are the cases of 1) absence of infrastructural networks in far rural areas, 2) high costs due limited data volumes or 3) undesirable censorship by third parties while exchanging sensitive content. Consequently, we target in this thesis a video dissemination scheme in OppNets. For the video delivery problem in the sparse opportunistic networks, we propose a solution that encloses three contributions. The first one is given by granulating the videos at the source node into smaller parts, and associating them with unequal redundancy degrees. This is technically based on using the Scalable Video Coding (SVC), which encodes a video into several layers of unequal importance for viewing the content at different quality levels. Layers are routed using the Spray-and-Wait routing protocol, with different redundancy factors for the different layers depending on their importance degree. In this context as well, a video viewing QoE metric is proposed, which takes the values of the perceived video quality, delivery delay and network overhead into consideration, and on a scalable basis. Second, we take advantage of the small units of the Network Abstraction Layer (NAL), which compose SVC layers. NAL units are packetized together under specific size constraints to optimize granularity. Packets sizes are tuned in an adaptive way, with regard to the dynamic network conditions. Each node is enabled to record a history of environmental information regarding the contacts and forwarding opportunities, and use this history to predict future opportunities and optimize the sizes accordingly. Lastly, the receiver node is pushed into action by reacting to missing data parts in a composite backward loss concealment mechanism. So, the receiver asks first for the missing data from other nodes in the network in the form of request-response. Then, since the transmission is concerned with video content, video frame loss error concealment techniques are also exploited at the receiver side. Consequently, we propose to combine the two techniques in the loss concealment mechanism, which is enabled then to react to missing data parts
Martin-Guillerez, Damien Banâtre Michel. "Mécanismes de prise de points de reprise opportunistes pour robots mobiles autonomes." Rennes : [s.n.], 2009. ftp://ftp.irisa.fr/techreports/theses/2009/martin-guillerez.pdf.
Full textErpek, Tugba. "Location-based propagation modeling for opportunistic spectrum access in wireless networks." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2934.
Full textTitle from PDF t.p. (viewed Jan. 17, 2008). Thesis director: Brian L. Mark Submitted in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering. Vita: p. 60. Includes bibliographical references (p. 58-59). Also available in print.
Ullah, Kifayat. "On the use of opportunistic vehicular communication for roadside services advertisement and discovery." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-27102016-142325/.
Full textVehicular Ad hoc Network (VANET) é um tipo especial de Mobile Ad hoc Network (MANET) e é uma tecnologia chave para apoiar os Sistemas Inteligentes de Transporte (ITSs). Ela desempenha um papel importante na implantação em grande escala das aplicações do tipo safety e non-safety. Dentre as aplicações non-safety, uma área importante e desafiadora é descoberta e divulgação de informação sobre serviços. Neste trabalho, nós adotamos a estratégia de beaconing e as comunicações veiculares oportunistas para resolver o problema da descoberta e divulgação de serviços ao longo de rodovias. Nossa abordagem oferece várias vantagens em relação aos métodos tradicionais usando painéis, painéis eletrônicos digitais e outdoors, por exemplo. Baixo custo, atinge um grande número de clientes em tempo real, maior controle sobre a campanha de propaganda, atualização dinâmica de conteúdo e descoberta de serviços antes de alcançar a região de negócio são algumas delas. Para a divulgação de serviços ao longo de rodovias, seguimos a estratégia de publicidade push-based e usamos somente comunicações do tipo Infrastructure-to-Vehicle (I2V). Por outro lado, para a descoberta destes serviços pelos motoristas, utilizamos a estratégia de publicidade pull-based e comunicações oportunistas do tipo Vehicle-to-Vehicle (V2V). A fim de contribuir para a campanha de propagandas, foi utilizado o mecanismo store-carry-and-response. Nossa primeira contribuição é o Extended Opportunistic Service Discovery Protocol (EOSDP). O EOSDP implementa e estende a versão original do Opportunistic Service Discovery Protocol (OSDP) via experimentos por simulação. Nós utilizamos os simuladores Simulation of Urban Mobility (SUMO), Objective Modular Network Testbed in C++ (OMNET++) e o Vehicles in network simulation (Veins). Nossa segunda contribuição é o Service Advertisement Protocol (SADP). SADP é um protocolo leve baseado na estratégia de beaconing para divulgação de serviços em VANETs. Ele não requer conexão com a Internet para anunciar os serviços nas margens das rodovias. Além disso, a modelagem do SADP é baseada no padrão de protocolos VANETs. O desempenho do SADP foi avaliado em um cenário de rodovia congestionada, com velocidades variáveis dos veículos e sob diferentes frequências de comunicação broadcast. Por fim, apresentamos o nosso último protocolo chamado Commercial Services Discovery Protocol (CSDP). Como o protocolo anterior, o CSDP é um protocolo leve para descoberta de serviços baseado em beaconing para VANETs. O CSDP depende somente de comunicações V2V oportunistas para a descoberta de serviços ao longo de rodovias. O protocolo foi implementado no cenário de uma rodovia congestionada e avaliado com um extenso conjunto de experimentos de simulação, sob diferentes parâmetros como, por exemplo, Query Interval (QI), Query Attempts (QA) e Time to Live (TTL).
Martin-Guillerez, Damien. "Mécanismes de prise de points de reprise opportunistes pour robots mobiles autonomes." Rennes 1, 2009. ftp://ftp.irisa.fr/techreports/theses/2009/martin-guillerez.pdf.
Full textFailures of mobile computing devices can lead to severe data loss. Collaborative robotic systems, designed to work in total autonomy, are sensitive to these failures. Usual methods relying on remote backup can no longer be used in a context of high mobility. Short-range communication media can be used to overcome data failure through opportunistic communications for data backup. When two devices enter their respective communication range, they can initiate an ephemeral data exchange. To overcome the lack of global network coverage in those system, we propose a backup system based on opportunistic communications to reduce the costs induced by failures inside a swarm of autonomous mobile robots
Dunat, Jean-Christophe. "Allocation opportuniste de spectre pour les radios cognitives." Phd thesis, Paris : École nationale supérieure des télécommunications, 2006. http://catalogue.bnf.fr/ark:/12148/cb40978484c.
Full textMartínez-Vidal, Rubén. "Architectures for aeronautical opportunistic networking." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/319697.
Full textEn los últimos años, el campo de las comunicaciones aeronáuticas ha experimentado un incremento masivo de los intercambios de datos entre plataformas terrestres, aéreas y satelitales. Los métodos de comunicación aeronáuticos convencionales han demostrado no ser suficientes para manejar esta demanda creciente. Como resultado, los sistemas aeronáuticos han tendido hacia el uso de comunicaciones vía satélite, que aunque efectivas, suponen un reto económico tanto en su instalación como en su uso. En respuesta a este problema, el trabajo académico en esta área ha propuesto el uso de alternativas basadas en redes de comunicación en la forma de redes aeronáuticas ad-hoc. Estas redes usan alcances de comunicación inmensos y trabajan bajo la premisa de las Redes Ad-Hoc Móviles (MANETs) requiriendo la existencia de conectividad extremo a extremo para su correcto funcionamiento. Las redes aeronáuticas tienen una topología extremadamente variable juntamente con enlaces de comunicación poco fiables. Con estas propiedades en mente, creemos que asumir conectividad de red es una elección desafortunada. Por tanto, en esta tesis intentamos solucionar estos retos utilizando un enfoque diferente. Específicamente, intentaremos establecer una red de aviones sin asumir garantías de conectividad, enlaces de radio cortos y utilizando tan solo los encuentros esporádicos entre nodos para realizar intercambio de datos. Este enfoque oportunista ofrece una alternativa más barata que aquellas basadas en enlaces de radio de largo alcance o en comunicaciones vía satélite. Los fundamentos de esta propuesta se basan en las redes oportunistas, y eventualmente se unen con la tendencia actual de utilizar enlaces vía satélite, para ofrecer una nueva arquitectura de red que reduce ampliamente los costes de comunicación y equipamiento. Las principales contribuciones de esta tesis son las siguientes. Por un lado, el uso de un modelo de movilidad preciso describiendo patrones aeronáuticos basados en información y horarios de vuelo reales. Además, este trabajo utiliza un modelo minucioso para describir las capacidades de red de los nodos incluyendo la representación completa de todas las capas de red. Estas características realistas son muy importantes para asegurar el correcto despliegue en redes reales. Por otro lado, esta tesis ofrece una serie de garantías en la calidad de servicio que son difíciles de obtener en redes oportunistas. Hasta donde sabemos esta tesis representa el primer estudio detallado de una red aeronáutica a gran escala utilizando comunicaciones oportunistas.
In recent years, the aeronautical communications field has experienced increased demand for data exchanges between terrestrial, aerial and satellite platforms. Conventional aeronautical communications have proven to fall short on handling this growing demand. As a result, aeronautical systems have moved towards the use of satellite-based communications, and while effective, their deployment and later use poses an economical challenge. To deal with this problem, academic work on the topic has proposed the use of networking alternatives in the form of Aeronautical Ad-hoc Networks. These networks use large radio communication ranges and work on the premises of Mobile Ad-Hoc Networks (MANET), requiring end-to-end connectivity to function properly. Aeronautical networks have an extremely varying topology coupled with a frequently unreliable communication channel. With this in mind, we think that assuming full network connectivity is a problematic choice. Therefore, in this thesis we will approach those problems using a different method. Specifically, we will strive to establish a network of aircraft assuming no guarantees for connectivity, limited radio ranges, and relying solely on the sporadic encounters between nodes to perform data exchanges. This opportunistic approach offers a cheaper solution than those based on long-range radio links or satellite communications. The foundation of this proposal lies in opportunistic networks, and eventually merges with the current communication trend based on satellite links, to provide a new network infrastructure that greatly minimizes communication costs and equipment expenditure. The main contributions of this thesis are as follows. On one hand, the use of an accurate mobility model describing aeronautical patterns by considering on flight route and scheduling information of real flights. Additionally, this work provided accurate modeling of the network capabilities of each node including the complete representation of all layers of the network stack. These realistic features are of severe importance to ensure successful deployment in real networks. On the other hand, this thesis provides Quality of Service assurances that are hard to achieve in opportunistic networking. To the best of our knowledge, this thesis represents the first in-depth analysis of a realistic large-scale aeronautical opportunistic network.
Tsokalo, Ievgenii [Verfasser], Ralf [Gutachter] Lehnert, and Lutz [Gutachter] Lampe. "Opportunistic Routing with Network Coding in Powerline Communications / Ievgenii Tsokalo ; Gutachter: Ralf Lehnert, Lutz Lampe." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2018. http://d-nb.info/1226811167/34.
Full textDe, Sousa Chaves Fabiano. "Controle de potência oportunista e equalização robusta em redes de comunicação sem fio : enfoques via controle automático e teoria dos jogos." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2010. http://tel.archives-ouvertes.fr/tel-00618079.
Full textWang, Yufeng. "Opportunistic Scheduling and Cooperative Relaying in Wireless Networks." Scholar Commons, 2012. http://scholarcommons.usf.edu/etd/4416.
Full textKurth, Mathias [Verfasser], Jens-Peter [Akademischer Betreuer] Redlich, Adam [Akademischer Betreuer] Wolisz, and Mesut [Akademischer Betreuer] Güne¸s. "Contention techniques for opportunistic communication in wireless mesh networks : a cross-layer perspective on opportunistic routing and opportunistic scheduling under carrier sensing multiple access / Mathias Kurth. Gutachter: Jens-Peter Redlich ; Adam Wolisz ; Mesut Güne¸s." Berlin : Humboldt Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2012. http://d-nb.info/1019790008/34.
Full textBhadane, Kunal. "A Cognitive Radio Application through Opportunistic Spectrum Access." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc984265/.
Full textKailas, Aravind. "Toward perpetual wireless networks: opportunistic large arrays with transmission thresholds and energy harvesting." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34720.
Full textAzeem, Muhammad Moazam. "Erasure Correcting Codes for Opportunistic Spectrum Access (OSA)." Electronic Thesis or Diss., Paris, CNAM, 2014. http://www.theses.fr/2014CNAM1002.
Full textThe emergence of new devices especially the smartphones and tablets having a lot of new applications have rocketed the wireless traffic in recent years and this is the cause of main surge in the demand of radio spectrum. There is a need of either more spectrum or to use existing spectrum more efficiently due to dramatic increase in the demand of limited spectrum. Among the new dynamic access schemes designed to use the spectrum more efficiently opportunistic spectrum access (OSA) is currently addressed when one or more secondary users (SU) are allowed to access the channel when the PU is not transmitting. The erasure correcting codes are therefore envisioned to recover the lost data due to sensing impairments. We define the parameter efficiency of SU and optimize it in-terms of spectrum utilization keeping into account sensing impairments, code parameters and the activity of PU. Finally, the spectrum access for multiple secondary users is addressed when there is no primary and each user has equal right to access the channel. The interesting scenarios are Cognitive radio networks and WiFi where 802.11 protocol gives the specification for MAC layer. The throughput curvesachieved by retransmission and using various erasure correcting codes are compared. This modification in MAC layer will reduce the long waiting time to access the channel, as the number of users are increased
Silva, Rodrigo. "ITS-based decision making mechanism for opportunistic networking in heterogeneous network environment." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0174.
Full textDemand from different actors for extended connectivity where vehicles can exchange data with other devices have pushed vehicle manufacturers to invest in embedded solutions, which paves the way towards Cooperative Intelligent Transportation Systems (C-ITS). Cooperative vehicles enable the development of an ecosystem of services around them. Due to the heterogeneousness of such services and their specific requirements, for ubiquitous connectivity it is necessary to combine existing wireless technologies, providing applications with a communication architecture that hides such underlying access technologies specificities. Moreover, due to vehicles’ high velocity it is needed a Decision Maker (DM) mechanism capable to take into account the short-term prevision about network environment in order to better manage all flow communications. Based on the Intelligent Transportation Systems (ITS) architecture proposed by International Organization for Standardization (ISO), we proposed the Ant-based Decision Maker for Opportunistic Networking (AD4ON), a modular decision maker mechanism capable to choose the best available access network for each data flow in an heterogeneous and dynamic network environment. The proposed mechanism manages requirements and preferences from different actors, taking into account the short-term prevision about the network environment. Simulations have demonstrated that the AD4ON outperforms current benchmark algorithms, by increasing decision’s stability, reducing the “ping-pong” effect and maximizing flow’s satisfaction. Moreover, we demonstrate that taking into account the short-term prevision, the AD4ON can optimize the algorithm reaction time
Sammarco, Matteo. "Dissémination multi-contenus opportuniste : monitorage passif et adaptation aux conditions du réseau." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066573/document.
Full textThe market penetration of mobile devices has experienced an impressive growth. Smartphones, tablets, and laptops have become both producers and consumers of user-generated contents. They also motivate novel communication paradigms such as the possibility to establish, in an opportunistic fashion, direct device-to-device links whenever two mobile nodes enter within the wireless range of each other. In this thesis, we consider the case of opportunistic dissemination of multiple large contents from an experimental point of view. This implies revisiting, among others, the common assumption that contacts have enough capacity to transfer any amount of data.In the first part of this thesis, we start from an Android implementation of EPICS, a network protocol designed for exchanging large contents in opportunistic networks, on off-the-shelf devices. After an deep analysis of application-level logs and captured wireless traces we found out limitations and uncovered improving possibilities. We then propose DAD, a new content dissemination protocol that adaptively sends bursts of data instead of the per-fragment transmission strategy of EPICS.The second part of this thesis deals with the scalability of legacy WLAN monitoring systems. We propose two original approaches. With the first one, based on trace similarity and community detection algorithms, we are able to identify how many monitor we need in a target area and where to place them. The second approach in based on collaborative measurements. In this case we face the risk of biased measures due attacks of malicious users generating adulterated traces. We then propose a method to detect such malicious behaviors
Sammarco, Matteo. "Dissémination multi-contenus opportuniste : monitorage passif et adaptation aux conditions du réseau." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066573.
Full textThe market penetration of mobile devices has experienced an impressive growth. Smartphones, tablets, and laptops have become both producers and consumers of user-generated contents. They also motivate novel communication paradigms such as the possibility to establish, in an opportunistic fashion, direct device-to-device links whenever two mobile nodes enter within the wireless range of each other. In this thesis, we consider the case of opportunistic dissemination of multiple large contents from an experimental point of view. This implies revisiting, among others, the common assumption that contacts have enough capacity to transfer any amount of data.In the first part of this thesis, we start from an Android implementation of EPICS, a network protocol designed for exchanging large contents in opportunistic networks, on off-the-shelf devices. After an deep analysis of application-level logs and captured wireless traces we found out limitations and uncovered improving possibilities. We then propose DAD, a new content dissemination protocol that adaptively sends bursts of data instead of the per-fragment transmission strategy of EPICS.The second part of this thesis deals with the scalability of legacy WLAN monitoring systems. We propose two original approaches. With the first one, based on trace similarity and community detection algorithms, we are able to identify how many monitor we need in a target area and where to place them. The second approach in based on collaborative measurements. In this case we face the risk of biased measures due attacks of malicious users generating adulterated traces. We then propose a method to detect such malicious behaviors
Shatila, Hazem Sarwat. "Adaptive Radio Resource Management in Cognitive Radio Communications using Fuzzy Reasoning." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/26618.
Full textPh. D.
Bolas, Eduardo José Ludovico. "Broadband VHF maritime communications based on cognitive radio." Doctoral thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/16285.
Full textTraditionally, maritime business is associated to transportation, which represents about 90% of global trade, and fishery, but new activities at sea, opened up by technological innovations, are transforming economical context of maritime services and resources. In the future, the massive use of technology to support endurance and ranging of maritime operations, namely in intelligent transport systems and autonomous vehicles areas, would lead to federations of maritime based embedded computing devices. Nevertheless, existing systems are not prepared to support such paradigm change. Currently, stovepiped systems rely on narrowband communications systems, where voice and low data rate are the most common used services, and specific broadband applications, such as Internet access, are supported by satellite communications (SATCOM). Unfortunately, UMTS/LTE networks do not provide consistent solutions, due their limited sea coverage, so there is a need for an additional capacity that can provide acceptable performances at low cost, which might act as a complement or even an alternative to satellite. We propose a Cognitive Radio based Broadband VHF (CR-B-VHF) communications solution to provide appropriate connectivity to support current information exchange requirements and enable future developments on maritime services and applications, thus avoiding SATCOM inconveniences. This CR-BVHF network would operate in a context of spectrum scarcity, within hierarchical spectrum access model, and use cognitive radio based concepts to implement a dynamic system that can activate and deactivated subcarriers, according to spectrum opportunities, ensuring an adequate interference level at incumbent's live services. The main contribution of this thesis work is the proposed CR-B-VHF framework and the demonstration of its suitability, feasibility and deployability. The presented relevancy analysis provides an overview of the state of the art on maritime business and its associated support communications and information systems, and prospects future requirements and applications for low-cost broadband access. The developed solutions for detection and exploitation of multiple non-contiguous narrowband spectrum opportunities in maritime VHF band, within a hierarchical spectrum access context, and their envisage performances, provide good indications regarding attainability of opportunistic BVHF systems and their future deployment. Finally, the discussion on regulatory and standardization issues intend to contribute for a shared problem solving, providing an end user perspective of hierarchical spectrum access. Despite the fact that technical aspects are nor the main issues on opportunistic systems deployment, novel proposed Spectrum Coherences Detector and its experimental demonstrated performances might be an important enabler and an additional argument to convince maritime communications stakeholders.
Tradicionalmente, a economia do mar está associada ao transporte marítimo, que representa cerca de 90% do comércio mundial, e à pesca, mas as novas atividades associadas à inovação tecnológica estão a transformar o contexto económico dos serviços e aplicações marítimas. No futuro, a utilização massiva de tecnologia no suporte às atividades desenvolvidas no mar, nomeadamente em transportes marítimos inteligentes e sistemas autónomos, conduzirá a uma federação de sistemas marítimos integrados. Contudo, as comunicações marítimas existentes não estão preparadas para dar suporte a esta alteração de paradigma. Atualmente, os sistemas dedicados baseiam-se em comunicações de banda estreita, onde a telefonia e a transmissão de dados de baixo débito são os serviços mais comuns, e aplicações de banda larga específicas, como o acesso a Internet, são disponibilizados através de comunicações por satélite (SATCOM). Infelizmente, as redes UMTS/LTE não providenciam soluções consistentes, devido à fraca cobertura sobre o mar. Por conseguinte, existe uma clara necessidade de capacidade adicional que possa disponibilizar desempenhos adequados a baixo custo e que possa constituir um complemento, ou mesmo uma alternativa, ao satélite. Nesta tese é proposta uma solução de comunicações de banda larga em VHF, baseada em rádio cognitivo (CR-B-VHF), que permite disponibilizar uma adequada conectividade de suporte aos requisitos atuais de troca de informação e a futuros desenvolvimentos nos serviços e aplicações marítimas, evitando as desvantagens da utilização do satélite. Esta rede foi concebida para operar num contexto de escassez de espectro, assumindo um modelo de acesso hierárquico, e utiliza conceitos de rádio cognitivo para implementar um sistema dinâmico que possa ativar e desativar sub-portadoras, de acordo com as oportunidades para transmitir, garantindo um adequado nível de interferência com os serviços dos incumbentes. O principal contributo deste trabalho é a proposta de um conceito de CR-B-VHF e a demonstração da sua adequabilidade, exequibilidade e aceitabilidade. A análise de relevância apresentada, proporciona uma perspetiva do estado da arte das atividades marítimas associadas à economia do mar e dos sistemas de informação e comunicação que lhes dão suporte, bem como uma perspetiva dos requisitos futuros e as aplicações para acessos de banda larga a baixo custo. As soluções desenvolvidas para a deteção e exploração de múltiplas e nãocontíguas oportunidades de banda estreita na banda marítima de VHF, e as suas previsíveis prestações, abrem boas perspetivas relativamente ao potencial dos sistemas oportunísticos na banda de VHF e a sua futura implementação. Finalmente, é apresentada uma discussão sobre questões regulatórias e de normalização, cujo objetivo é contribuir para a solução do problema da utilização partilhada do espectro, providenciando uma perspetiva de utilizador final, num modelo de acesso hierárquico ao espectro.
Moradinia, Pourya, and Imal Sakhi. "Mobile Opportunistic Services for Experience Sharing : Via a NetInf Android Application." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104297.
Full textInformation-Centric Networking (ICN) är ett nytt forskningsområde för att bygga en ny nätverksarkitektur mer passande för dagens och framtida nätverk. MOSES projektet är en del av denna utveckling och arbetar med utveckling och demonstration av Network of Information (NetInf) protokollet, som är en implementering av ICN konceptet. Detta examensarbete är en del av MOSES (Mobile Opportunistic Services for Experience Sharing) projektet som syftar till att bistå MOSES projektet med demonstrationen av "mobile opportunistic sharing" konceptet som bygger på NetInf protokollet. Att demonstrera MOSES konceptet i praktiken krävs djupt förståelse om nätverk, lokalisering, transport och spridning av digitalt data i en "ad hoc" och infrastruktur miljö. Genomförandet av denna implementering kräver en analys av tidigare arbete, utveckling av nya funktioner och slutligen analys av genomförda experiment och resultaten. Detta examensarbete har utformat, genomfört och utvärderat en Android applikation inom ramen för MOSES med hjälp av tidigare utvecklat NetInf Android bibliotek. Denna prototyp används för att visa hur mobila Android användare opportunistiskt kan dela och sprida innehåll baserat på deras plats med hjälp av MOSES/ICN konceptet. Funktionaliteten och effektiviteten av prototypen byggd under detta examensarbete har analyserats och utvärderats genom att utföra en serie kontrollerade experiment under ledning av MOSES forskare. Resultaten av dessa kontrollerade experiment har gett insikt åt MOSES forskare samt utforskat konceptet att använda ICN (NetInf) för opportunistisk distribution av innehåll. Experimentens resultat syftar till att hjälpa MOSES forskare att utöka och vidareutveckla prototypen och de involverade algoritmer för att skapa en fullt fungerande mobil applikation för "experience sharing services" anpassad för stora evenemang.
Murugesan, Sugumar. "Opportunistic Scheduling Using Channel Memory in Markov-modeled Wireless Networks." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1282065836.
Full textHaillot, Julien. "Définition et validation d'un modèle de communication supportant la communication basée contenus dans les réseaux mobiles ad hoc discontinus." Phd thesis, Université de Bretagne Sud, 2010. http://tel.archives-ouvertes.fr/tel-00599669.
Full textWang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective." Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.
Full textGungor, Onur. "INFORMATION THEORY ENABLED SECURE WIRELESS COMMUNICATION, KEY GENERATION AND AUTHENTICATION." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406298547.
Full textThanayankizil, Lakshmi. "Opportunistic large array (OLA)-based routing for sensor and adhoc wireless networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50374.
Full text