Dissertations / Theses on the topic 'CSMA'

To see the other types of publications on this topic, follow the link: CSMA.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'CSMA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Castiel, Eyal. "Study of QB-CSMA algorithms." Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0038.

Full text
Abstract:
La performance des réseaux sans fil où les utilisateurs partagent l'air comme moyen de communication est fortement limitée par le phénomène d'interférence électromagnétique. En effet, deux utilisateurs proches qui communiquent sur la même fréquence verront leurs ondes interférer, ce qui peut entraîner la perte de l'information transmise. Ainsi, il est indispensable de mettre en place des protocoles d'accès visant à limiter l'interférence en choisissant de manière efficace les utilisateurs autorisés à émettre à chaque instant. D'un point de vue scientifique, il s'agit d'un problème difficile qui a attiré l'attention de la communauté en informatique et probabilités appliquées depuis plus de 30 ans. Récemment, une nouvelle classe de protocoles d'accès - appelés protocoles CSMA adaptatifs - a émergé, et semble très prometteuse : par exemple, il a été montré que ces nouveaux protocoles possèdent une propriété très attrayante de stabilité maximale. Le but de ce projet est d'approfondir la connaissance que l'on a des protocoles CSMA adaptatifs dits QB (pour l'anglais "Queue-Based") qui à ce jour est encore extrêmement limitée. Concernant ces protocoles, le but de ce projet est de prouver des résultats théoriques permettant de comprendre le compromis réalisable entre débit et délai. Modèle probabiliste - d'un point de vue technique, il s'agit d'étudier le modèle suivant: chaque utilisateur du réseau est représenté par le nœud d'un graphe G, appelé graphe d'interférence, et tel que deux voisins du graphe ne peuvent être actifs simultanément. Des paquets à transmettre arrivent à chaque nœud au cours du temps, et le but est de choisir quels nœuds sont actifs à un moment donné. Le protocole CSMA-QB répond à cette question de la manière suivante : lorsqu'un nœud est actif, il se désactive à taux constant et lorsqu'il est inactif et qu'aucun de ses voisins ne le bloquent, alors il s'active à un taux qui dépend du nombre de paquets en attente de transmission via une fonction ψ appelée fonction d'activation. Le but général de la thèse est de comprendre l'influence de la topologie de G et du choix de ψ sur la performance du protocole. Pour cela, il s'agira d'étudier le temps de mélange de la dynamique de Glauber ainsi qu'un phénomène classique en théorie des probabilités, appelé phénomène de moyennisation stochastique, qui permettent une compréhension fine du comportement dynamique du réseau
Performance of wireless networks, in which users share the air as support for their communications is strongly limited by electromagnetic interference. That is, two users close to each other trying to send a message on the same frequency will experience interference between their messages, eventually leading to the loss of some information. It is then crucial to develop medium access protocols aiming to limit the occurrence of such a phenomena by choosing in an effective (and distributed) manner which station is allowed to transmit. From a scientific point of view, it is a difficult issue which has had some attention from the community in the field of computer science and applied probability in the past 30 years. Recently, a new class of medium access protocols - called adaptive CSMA - emerged and seem quite promising: for example, it has been shown that they exhibit a desirable property: throughput optimality (maximum stability). The goal of this project is to increase the knowledge we have the adaptive CSMA (or CSMA QB, for Queue Based) which is to this day quite limited (notably in the expected waiting time of a request arriving in the system, called delay). Our goal will be to prove theoric results to enhance our understanding of the throughput/delay trade-off
APA, Harvard, Vancouver, ISO, and other styles
2

JAIN, NITIN. "MULTICHANNEL CSMA PROTOCOLS FOR AD HOC NETWORKS." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin995471534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsertou, Athanasia. "Modelling interference in a CSMA/CA wireless network." Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/14589.

Full text
Abstract:
Initially, a systematic characterisation of all the possible ways in which two communicating pairs of nodes can interfere with each other is made. Using this as a building block and assuming independence of the stations, an estimate for the network throughput can be derived. The latter proves to be quite accurate for symmetric networks and manages to follow the performance trends in an arbitrary network. Following this, a more detailed Markovian-based mathematical model is proposed for the analysis of the hidden node case. This approach does not rely on common assumptions, such as renewal theory and node synchronisation, and is highly accurate, independently of the system parameters, unlike prior methods. Moreover, the usual decoupling approximation is not adopted; on the contrary, a joint view of the competing stations is taken into consideration. The model is firstly developed based on the assumption that the network stations employ a constant contention window for their backoff process. However, later in the thesis this assumption is relaxed, and performance curves are derived for the case when the stations employ the Binary Exponential Backoff Scheme, as is the case in practice. The Markovian state space is kept relatively small by employing an iterative technique that computes the unknown distributions. The adoption of this technique makes the analysis computationally efficient.
APA, Harvard, Vancouver, ISO, and other styles
4

Forss, Jonas. "Real-Time Communication over Broadcast Networks." Thesis, University of Skövde, Department of Computer Science, 1999. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-308.

Full text
Abstract:

Today the utilization of all kind of multimedia services in networks increases and due to this demand for real-time communication gets higher for every day. One of the most common protocols used today is Ethernet. It is of interest to find real-time protocols that are useful together with already existing protocols since it is expensive to rebuild the network infrastructure. Several new protocols have been proposed to solve the upcoming problems.

The objective of this project is to make an inventory and a comparison between Ethernet and these new protocols. During this project four different protocols capability to fulfill the demands for real-time communication have been studied and compared with Ethernet. Three of the protocols are built on the same basic technique as Ethernet and these are PCSMA, CSMA-DCR and DOD-CSMA-CD. The fourth protocol is ATM and it transmits in a different way over communication networks.

The analysis of this project is pointing out advantages, similarities and differences between the protocols from a real-time perspective. All four protocols are more suitable for real-time requirements than Ethernet.

APA, Harvard, Vancouver, ISO, and other styles
5

Ching, Kai-Sang. "Priority CSMA schemes for integrated voice and data transmission." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/28372.

Full text
Abstract:
Priority schemes employing the inherent properties of carrier-sense multiple-access (CSMA) schemes are investigated and then applied to the integrated transmission of voice and data. A priority scheme composed of 1-persistent and non-persistent CSMA protocols is proposed. The throughput and delay characteristics of this protocol are evaluated by mathematical analysis and simulation, respectively. The approach of throughput analysis is further extended to another more general case, p-persistent CSMA with two persistency factors, the throughput performance of which had not been analyzed before. Simulations are carried out to study the delay characteristics of this protocol. After careful consideration of the features of the priority schemes studied, two protocols are proposed for integrated voice and data transmission. While their ultimate purpose is for integrated services, they have different application. One of them is applied to local area network; the other is suitable for packet radio network. The distinctive features of the former are simplicity and flexibility. The latter is different from other studies in that collision detection is not required, and that it has small mean and variance of voice packet delay. Performance characteristics of both of these protocols are examined by simulations under various system parameter values.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
6

Ramesh, Chithrupa, Henrik Sandberg, and Karl Henrik Johansson. "Stability analysis of multiple state-based schedulers with CSMA." KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-111461.

Full text
Abstract:
In this paper, we identify sufficient conditions for Lyapunov Mean Square Stability (LMSS) of a contention-based network of first-order systems, with state-based schedulers. The stability analysis helps us to choose policies for adapting the scheduler threshold to the delay from the network and scheduler. We show that three scheduling laws can result in LMSS: constant-probability laws and additively increasing or decreasing probability laws. Our results counter the notions that increasing probability scheduling laws alone can guarantee stability of the closed-loop system, or that decreasing probability scheduling laws are required to mitigate congestion in the network.

QC 20130116

APA, Harvard, Vancouver, ISO, and other styles
7

Horton, Remy A. "Distributed and deterministically maintained transmission alignment in csma protocols." Thesis, University of Bristol, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.549440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weitzen, Christopher James. "Service differentiation using managed sleep in CSMA/CA networks." Winston-Salem, NC : Wake Forest University, 2009. http://dspace.zsr.wfu.edu/jspui/handle/10339/44746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Medapalli, Kameswara Rao. "Design, analysis and optimization of CSMA/CA based wireless networks /." May be available electronically:, 2006. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mulligan, Jeanette. "A Performance Analysis of a CSMA Multihop Packet Radio Network." Thesis, Virginia Tech, 1997. http://hdl.handle.net/10919/36779.

Full text
Abstract:
In a packet radio network, multiple terminals broadcast information over a shared communications medium. Messages are transmitted from a source terminal to a destination terminal over multiple relays or hops. The actions of one terminal in the network directly affect the actions of other terminals within its range.

The analysis of packet radio networks is complex because system performance depends on the topology of the terminals in the network along with the random access protocol used. Researchers have been unable to model a packet radio network in its most general form. In this project, a model is developed for specific topologies of a packet radio network with a given random access protocol.

The sponsor of this project has developed a packet radio network for an indoor wireless alarm system. At the start of the project, the effect of message collisions on system performance was unknown. As a result of this research, a collision model for the network has been developed for topologies of four, five, and six alarm units. The model has been validated with actual system testing. Furthermore, the effects of indoor propagation on system performance have been studied. The results of this work have led to the development of an installation plan for the indoor wireless alarm system.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
11

Li, Jing. "OFDM and p-Persistent CSMA/CD-based Indoor PLC Networks." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1234896618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kaynia, Mariam. "Performance Analysis of ALOHA and CSMA in Spatially Distributed Wireless Networks." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9580.

Full text
Abstract:

In this thesis the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main measurement metric used is probability of outage, a metric that is referred to in most of the related research done in this field, but has not been treated in detail thus far. Some of the research done on other performance metrics such as transmission capacity, throughput, bit error rate, spatial reuse and delay are also noted and described briefly in this report. In our system model, users/packets arrive randomly in space and time according to a Poisson point process, and are thereby transmitted to their intended destinations using a fully distributed MAC protocol (either ALOHA or CSMA). Our model allows simultaneous transmissions between many transmitter-receiver pairs in the network. An SINR-based model is considered, and a packet transmission is encountered as successful if the received SINR is above a predetermined threshold value for the entire duration of the packet. Accurate bounds on the probability of outage, which is a function of the density of transmissions, are developed for both MAC protocols. The methods used to reach the obtained analytical results are presented in detail, and the analytical results are shown to follow the simulation results tightly. We also present the methods that were used to find expressions for the outage probability, which turned out to not be as successful as desired in terms of following the simulation results tightly for all densities. Furthermore, the derived bounds for the probability of outage are used to determine the performance advantage that CSMA provides over ALOHA and also to gain insight into the design of general MAC protocols for ad hoc networks. Our final comparison results show that CSMA performs better than unslotted ALOHA, and worse than slotted ALOHA in terms of probability of outage.

APA, Harvard, Vancouver, ISO, and other styles
13

Plönnigs, Jörn. "Control network performance engineering qualitätsorientierter Entwurf von CSMA-Netzwerken der Automation." Dresden Vogt, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=3009957&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yuxiang, Yang, Dang Xiaoyu, and Zhou Tingxian. "PROPOSAL OF POLLED-CSMA PROTOCOL FOR AN AD HOC SCADA SYSTEM." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/606484.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California
In this paper we introduce an ad hoc distributed supervisory control and data acquisition (SCADA) system, which covers two types of traffic, a small number of slave stations with stream traffic and much larger number of slave stations with burst traffic. To improve the system’s real-time transmission and channel allocation efficiency, a MAC scheme, named Polled-CSMA, is designed by integrating the merits of polling and CSMA protocols. Extensive analysis shows that this MAC protocol meets the system’s QOS requirements.
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Tao. "Characterization of the fundamental properties of wireless CSMA multi-hop networks." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/12416.

Full text
Abstract:
A wireless multi-hop network consists of a group of decentralized and self-organized wireless devices that collaborate to complete their tasks in a distributed way. Data packets are forwarded collaboratively hop-by-hop from source nodes to their respective destination nodes with other nodes acting as intermediate relays. Existing and future applications in wireless multi-hop networks will greatly benefit from better understanding of the fundamental properties of such networks. In this thesis we explore two fundamental properties of distributed wireless CSMA multi-hop networks, connectivity and capacity. A network is connected if and only if there is at least one (multi-hop) path between any pair of nodes. We investigate the critical transmission power for asymptotic connectivity in large wireless CSMA multi-hop networks under the SINR model. The critical transmission power is the minimum transmission power each node needs to transmit to guarantee that the resulting network is connected aas. Both upper bound and lower bound of the critical transmission power are obtained analytically. The two bounds are tight and differ by a constant factor only. Next we shift focus to the capacity property. First, we develop a distributed routing algorithm where each node makes routing decisions based on local information only. This is compatible with the distributed nature of large wireless CSMA multi-hop networks. Second, we show that by carefully choosing controllable parameters of the CSMA protocols, together with the routing algorithm, a distributed CSMA network can achieve the order-optimal throughput scaling law. Scaling laws are only up to order and most network design choices have a significant effect on the constants preceding the order while not affecting the scaling law. Therefore we further to analyze the pre-constant by giving an upper and a lower bound of throughput. The tightness of the bounds is validated using simulations.
APA, Harvard, Vancouver, ISO, and other styles
16

Mawlawi, Baher. "Random access for dense networks : Design and Analysis of Multiband CSMA/CA." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0112/document.

Full text
Abstract:
Les protocoles de communications à accès aléatoires sont des candidats prometteurs pour les futurs systèmes de communications sans fil dédiés aux applications machine à machine (M2M). Ces méthodes d’accès sont généralement basées sur des techniques d'accès aléatoires mettant en œuvre des concepts simples de sondage de canal et de report de la transmission pour réduire les collisions, tout en évitant l'utilisation d'ordonnanceurs complexes. Parmi les différents protocoles, Carrier sense multiple access/collision avoidance with a Request-To-Send/Clear-To-Send (CSMA/CA-RTS/CTS) est un protocole qui pourrait être adopté pour les scénarios de M2M. Cette approche est efficace pour éviter les collisions entre les paquets de données. Cependant dans le cas d’un réseau très dense, les performances sont dégradées à cause de la forte probabilité de collisions. Pour atténuer cet effet, les collisions entre les messages de contrôles RTS doivent être réduites. Cette thèse propose de résoudre ce problème en divisant le canal commun en sous-canaux pour transmettre les messages de contrôle de demande d’accès au canal ; le canal commun est utilisé dans son ensemble pour la transmission de données. L’ajout d’un degré de liberté pour le message de demande d’accès permet de réduire la probabilité de collision, et donc d’améliorer les performances du système notamment dans des scénarios avec des nombres importants de nœuds souhaitant communiquer. Dans ce travail, nous dérivons ainsi une solution complète de méthode d’accès en s'appuyant sur le CSMA / CA - RTS / CTS et en multiplexant une configuration multi-canal pour les messages RTS et un canal unique pour la transmission de données. Une version améliorée, basée sur l'ordonnancement des utilisateurs, est également étudiée. Un modèle analytique a été développé, analysé et validé par simulations. Celui-ci est une extension du modèle Bianchi. Les performances en termes de débit saturé, de temps de transmission et de la probabilité de rejet de paquets sont discutées. Enfin, les impacts liés à la prise en compte d’une couche physique de type multi porteuses sont discutés dans le dernier chapitre
Opportunistic protocols are promising candidates for future wireless systems dedicated to machine to machine (M2M) communication. Such protocols are usually based on a random access with simple techniques of medium sensing and deferring to reduce collisions while avoiding the use of complex schedulers. Among different protocols, Carrier sense multiple access/collision avoidance with a Request-To-Send/Clear-To-Send (CSMA/CA-RTS/CTS) is an opportunistic protocol which could be adopted for M2M scenarios. Such approach is efficient to avoid collisions between data packets but in a very dense network, the random access used to send the RTS suffers itself from a high probability of collision which degrades the performance. In order to mitigate this effect, RTS collisions should be reduced. This thesis proposes to address this issue by splitting the common channel in sub-channels for transmitting the RTS messages. While the common channel is used as a whole for data transmission. Multiple nodes can then contend in time and frequency for these RTS sub-channels, thereby reducing RTS collisions and increasing overall efficiency. In this work, we thus derive a complete protocol solution relying on CSMA/CA - RTS/CTS multiplexing a multi-channel configuration for RTS messages and a unique channel for data transmission. An enhanced version based on users scheduling is integrated as well. In this thesis, the proposed protocol is investigated from a joint PHY-MAC point of view. This strategy is shown to provide better system performance particularly for loaded networks. An accurate analytical model derived as a straightforward extension of the Bianchi model is analyzed and validated by simulations. Performance in terms of saturation throughput, transmission delay and packet drop probability is discussed
APA, Harvard, Vancouver, ISO, and other styles
17

Lofcali, Mehmet N. "A specification of a CSMA/CD protocol using systems of communicating machines." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

VASQUES, Thiago Lara. "Estimação de vazão baseada em modelagem e simulação do controle de acesso ao meio em redes PLC." Universidade Federal de Goiás, 2010. http://repositorio.bc.ufg.br/tede/handle/tde/959.

Full text
Abstract:
Made available in DSpace on 2014-07-29T15:08:15Z (GMT). No. of bitstreams: 1 Dissertacao Thiago Lara Vasques.pdf: 2258919 bytes, checksum: bdbbde461e7636388d4795c9556eb77f (MD5) Previous issue date: 2010-08-18
We carried out a study on throughput estimation based on analysis and modeling of the medium access control in HomePlug 1.0 standard based PLC networks. The data communication using electrical energy wires has advantages such as presenting characteristics of ubiquity due to the existent infrastructure, but faces significant obstacles as fading and noise. The main standard of this kind of home network is the HomePlug, which defines a protocol based on the method of multiple access with collision avoidance (CSMA/CA). The HomePlug adds to the CSMA/CA a technique called deferral counter (DC) that adapts the contention of the nodes in accessing the medium according to network load. The objective of this work is todo a comparative study of the throughput, which is the ratio of the packet payload, i.e., the amount of data that is inserted into the body of the datagram, and the frame transmission time. To this end, we evaluate what is the theoretical maximum throughput of the PLC channel, we developed a simulator for the CSMA/CA and we propose a simple probabilistic model to describe the throughput on the network PLC. Finally, we make a comparison between the results obtained with the simulator and the probabilistic model to those observed from a real PLC network, proving that the results of the theoretical maximum throughput and the simulation results are close and that the probability model becomes a tool for calculating throughput in PLC networks.
Neste trabalho, realizou-se um estudo sobre estimação da vazão baseada na análise e modelagem do controle de acesso ao meio em redes PLC padrão HomePlug 1.0. A comunicação de dados através do canal elétrico tem vantagens como apresentar as características de ubiquidade e da infra-estrutura pré-existente, porém enfrenta obstáculos importantes como a atenuação e o ruído. O principal padrão desse tipo de rede domiciliar é o HomePlug, que define um protocolo baseado no método de acesso múltiplo com prevenção de colisões (CSMA/CA). O HomePlug associa ao CSMA/CA uma técnica chamada de contador de adiamentos (DC) que adapta a contenção dos nós no acesso ao meio de acordo com a carga da rede. O objetivo deste trabalho é realizar um estudo comparativo da vazão, que é a razão entre carga útil do pacote, ou seja, a quantidade de dados que preenchem o corpo do datagrama, e o tempo de transmissão do quadro. Para isso, avaliou-se qual é a vazão máxima teórica do canal PLC, desenvolveu-se um simulador para o protocolo CSMA/CA e foi proposto um modelo probabilístico simples para descrever a vazão na rede PLC. Foi realizada uma comparação entre os resultados obtidos com o simulador e o modelo probabilístico com os dados observados em uma rede PLC real, comprovando que os resultados da vazão máxima teórica e os resultados da simulação são próximos e que o modelo probabilístico passa a ser uma ferramenta para cálculo de vazão em redes PLC.
APA, Harvard, Vancouver, ISO, and other styles
19

Corneliussen, Jon Even. "The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9911.

Full text
Abstract:

In this thesis the optimal transmission rate in ad hoc wireless networks is analyzed. The performance metric used in the analysis is probability of outage. In our system model, users/packets arrive randomly in space and time according to a Poisson point process, and are thereby transmitted to their intended destinations using either ALOHA or CSMA as the MAC protocol. Our model is based on an SINR requirement, i.e., the received SINR must be above some predetermined threshold value, for the whole duration of a packet, in order for the transmission to be considered successful. If this is not the case an outage has occurred. In order to analyze how the transmission rate affects the probability of outage, we assume packets of K bits, and let the packet duration, T, vary. The nodes in the network then transmit packets with a requested transmission rate of Rreq=K/T bits per second. We incorporate transmission rate into already existing lower bounds on the probability of outage of ALOHA and CSMA, and use these expressions to find the optimal packet duration that minimizes the probability of outage. For the ALOHA protocol, we derive an analytic expression for the optimal spectral efficiency of the network as a function of path loss, which is used to find the optimal packet duration Topt . For the CSMA protocol, the optimal packet duration is observed through simulations. We find that in order to minimize the probability of outage in our network, we should choose our system parameters such that our requested transmission rate divided by system bandwidth is equal to the optimal spectral efficiency of our network.

APA, Harvard, Vancouver, ISO, and other styles
20

Ishigaki, Masahiro. "Studies on Modeling and Performance Analysis of Communication Systems with Improved CSMA/CD." 京都大学 (Kyoto University), 2001. http://hdl.handle.net/2433/150263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lopes, Luis Filipe Amaral. "Esquemas de controlo de acesso ao meio para sistemas CSMA/CA p-persistente." Master's thesis, FCT - UNL, 2009. http://hdl.handle.net/10362/2534.

Full text
Abstract:
Dissertação apresentada para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores, pela Universidade Nova de Lisboa, Faculdade de Ciências e Tecnologia
Este trabalho descreve os passos iniciais no sentido de caracterizar formalmente os protocolos de acesso ao meio baseados em heurísticas propostos para redes ad hoc sem os. Este método, denominado método de análise de heurísticas de acesso ao meio, permite caracterizar a função de utilidade de acesso ao meio de um nó, a qual está relacionada com o seu débito útil, tal como é provado experimentalmente neste trabalho. O método é particularmente vantajoso como uma ferramenta de comparação entre protocolos, pois permite efectuar uma rápida análise comparativa do débito útil para os diferentes protocolos em análise. O método foi validado com protocolos existentes e com um protocolo baseado em heurísticas proposto nesta dissertação. Para provar a viabilidade do método de análise de heurísticas, validaram-se os resultados obtidos com o mesmo com diversas simulações. Neste trabalho é proposto um segundo protocolo de acesso ao meio baseado em heurísticas, desenvolvido com o objectivo de maximizar o débito útil da rede e, simultaneamente, a justiça de acesso ao meio. Este protocolo utiliza um mecanismo inovador na gestão da janela de contenção, que também realiza a distribuição de acesso ao meio através das tramas de acknowledge. No m comparam-se os resultados obtidos por este protocolo e os resultados obtidos pelos protocolos analisados, incluindo a norma IEEE 802.11. Nesta comparação, conclui-se que o protocolo proposto neste trabalho exibe o melhor compromisso entre o débito útil e a justiça de acesso ao meio, em relação aos protocolos estudados.
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Quan. "Multi-band OFDM and p-Persistent CSMA/CD-based Indoor Power Line Communication (PLC) Systems." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1265984789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Jongdae. "Performance enhancement of CSMA/CA in powerline communications under heavy traffic and hidden node conditions." [Gainesville, Fla.] : University of Florida, 2008. http://purl.fcla.edu/fcla/etd/UFE0022857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Navalekar, Abhijit C. "Distributed Digital Radios for Land Mobile Radio Applications." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/4.

Full text
Abstract:
The main objective of this dissertation is to develop the second generation of Distributed Digital Radio (DDR) technology. A DDR II modem provides an integrated voice/data service platform, higher data rates and better throughput performance as compared to a DDR I modem. In order to improve the physical layer performance of DDR modems an analytical framework is first developed to model the Bit Error Rate (BER) performance of Orthogonal Frequency Division Multiplexing over Frequency Modulation (OFDM/FM) systems. The use of OFDM provides a spectrally efficient method of transmitting data over LMR channels. However, the high Peak-to-Average (PAR) of OFDM signals results in either a low Signal-to-Noise Ratio (SNR) at FM receiver or a high non-linear distortion of baseband signal in the FM transmitter. This dissertation presents an analytical framework to highlight the impact of high PAR of OFDM signal on OFDM/FM systems. A novel technique for reduction of PAR of OFDM called Linear Scaling Technique (LST) is developed. The use of LST mitigates the signal distortion occurring in OFDM over FM systems. Another important factor which affects the throughput of LMR networks is the Push-to-Talk (PTT) delay. A PTT delay refers to the delay between the instant when a PTT switch on a conventional LMR radio is keyed/unkeyed and a response is observed at the radio output. It can be separated into a Receive-To-Transmit Switch Interval (RTSI) or a Transmit-To-Receive Switch Interval (TRSI). This dissertation presents the typical RTSI delay values, distributions and their impact on throughput performance of LMR networks. An analytical model is developed to highlight the asymmetric throughput problem and the unintentional denial of service (UDOS) occurring in heterogeneous LMR networks consisting of radios with different PTT delay profiles. This information will be useful in performance and capacity planning of LMR networks in future.
APA, Harvard, Vancouver, ISO, and other styles
25

Kangude, Shantanu. "CSMA with Implicit Scheduling through State-keeping: A Distributed MAC Framework for QoS in Broadcast LANs." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-05132004-132109/unrestricted/kangude%5Fshantanu%5F200407%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2005. Directed by John Copeland.
Copeland, John, Committee Chair ; Owen, Henry, Committee Member ; Sivakumar, Raghupathy, Committee Member ; Lanterman, Aaron, Committee Member ; Dos Santos, Andre, Committee Member. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
26

Abukharis, Salim H. S. "Accurate cross-layer modelling and evaluation of IEEE 802.11e using a differentiated p-persistent CSMA protocol." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4793/.

Full text
Abstract:
With the extensive deployment of 802.11 wireless local area networks (WLANs) and the need for better quality of service (QoS), the 802.11e MAC with service differentiation was developed. In practical WLAN deployments, the capture effect has been shown to enhence the throughput performance of the network. Analysing the effect of fading and near–far effect on the performance of 802.11 is a fundamental consideration in practical situations since the wireless channels are error-prone. Developing an accurate closed form solution of the throughput/delay is a crucial task for the network planning and design. This thesis develops a physical/medium-access-control (PHY/MAC) cross-layer model to characterise the throughput and delay performance of WLANs in error-prone wireless environments. The developed model incorporates the capture effect and channel errors from the PHY-layer perspective, while from the MAC perspective the approach considers the QoS differentiated p-persistent CSMA protocol. This research develops PHY/MAC models that accurately calculate the saturated and non-saturated throughput/delay of p-persistent CSMA protocol with multiple traffic types which can be used to model 802.11e. The developed model expresses the saturated and non-saturated throughput/delay as a function of the number of terminals, packet error rates and capture threshold. The work shows that the PHY layer effects have a significant impact on the throughput/delay performance of WLANs and their dimensioning. The anomaly effect also has a significant impact on performance of 802.11 WLANs which affects the calculation of the network capacity during the network planning phase. This research develops an adaptive QoS differentiated p-persistent CSMA protocol with multirate capability that can be used to resolve the performance anomaly of 802.11 DCF and 802.11e EDCA. The developed models can be applied to the QoS differentiated systems such as 802.11e EDCA with significantly less complexity than Markovian models. The adaptive protocol improves the network capacity which leads to more efficient network deployments in terms of capacity, spectral efficiency and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
27

Yipeng, Wang. "Implementation of the WirelessHART MAC Layer in the OPNET Simulator." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19912.

Full text
Abstract:
Industrial wireless sensor network (IWSN) is an application area of WSN used in industrial process monitoring and control with strict time and reliability requirement. WirelessHART standard is the first international standard for IWSN approved by International Electrotechnical Commission (IEC). This is worthwhile to implement this standard on simulator platform. Based on the study of WirelessHART standard, this thesis set up a primary implementation of the MAC layer of WirelessHART standard. To our best knowledge, this is the first comprehensive implementation of WirelessHART using OPNET simulator. The implementation has been evaluated rational. And some improvement of current implementation and standard have also been proposed and implemented. Flexible dedicated slot assignment has also been proposed to reduce the packet loss rate caused by influences of the physical channel.
APA, Harvard, Vancouver, ISO, and other styles
28

Moslehi, Farhood. "Simulation of the MAC Portion of IEEE 802.11 and Bursts of Errors for Wireless Data Networks." Thesis, Virginia Tech, 1997. http://hdl.handle.net/10919/36936.

Full text
Abstract:
The focus of this research is to investigate the effects of bursts of errors and packet collisions on the performance of the medium access control (MAC) portion of the IEEE 802.11 wireless local area network (LAN) protocol.An important ingredient in rapid expansion of wireless networks is the seamless transition between wired and wireless systems. The IEEE standards group in charge of developing the widely used IEEE 802.3 LAN standard has developed the IEEE 802.11 wireless LAN standard. IEEE 802.11 remains hidden from the upper levels of the network, thus allowing a seamless transition between networks. The foundation protocol for the IEEE 802.11 standard, known as Distributed Foundation Wireless Medium Access Control (DFWMAC), operates at the MAC level of the Data Link Layer. The protocol bases its access control mechanism on a principle called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which is an adaptation of the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol used by IEEE 802.3 standard. The collision avoidance scheme in CSMA/CA allows data packets to be transferred via the wireless medium with lower probability of packet collision. In a slotted multi-access wireless system, performance parameters are affected by the bit error rates on the communication channel. These errors occur as a result of noise introduced by the radio channel or data packet collisions. Collisions occur when two or more stations select the same time slot to transmit their data, thus causing corruption in data packets. In this research, a simulation model coded in Microsoft's Visual Basic programming environment is utilized to investigate the effects of bit errors and packet collisions on performance in CSMA/CA. Performance parameters used in this study include throughput, medium utilization, collisions and station data queue lengths. In the simulation model, error bursts in the communication channel are modeled using a simple Gilbert model with two states, good (G) and bad (B). State G is error free, thus errors can only occur while the model is in state B. Collisions are simulated by two or more stations starting to transmit data packets in the same time slot. Therefore, as the number of stations increases, more and more stations compete for the medium, resulting in an increase in the number of collisions. Collisions are also increased by the amount of traffic that each station introduces into the system. Station load is defined here as the number of data packets per unit time that are released by the higher network protocol layers.The results in Chapter 5 demonstrate that higher network throughput can be achieved when the aggregate load on the network is distributed. For example, 30 stations offering 20 kilobits per second (kbps) of load for a total of 600 kpbs, results in a network throughput of 585 kbps. However, three stations offering 200 kbps of load for a total of 600 kbps offered load, results in a network throughput of 486 kbps. The distributed load is serviced at a 17 percent higher rate. However, once the network becomes saturated at above 40 stations for this model, collisions will more than offset the performance gains produced by the distribution of load.Furthermore, reducing the packet size by 50 percent under an approximately 19.5 percent packet error rate results in a 12 percent gain in throughput. This is primarily due to higher utilization of the network by shorter packets. However, as the packet error rate is reduced, the performance gap between the two packet sizes is reduced. Once the errors are removed completely from the communications channel, the longer packets produce a higher throughput than the shorter packets.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
29

CHEN, YUNLI. "PERFORMANCE ANALYSIS AND ENHANCEMENT OF MAC PROTOCOLS FOR IEEE 802.11 WLANS." University of Cincinnati / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1098856121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cawood, Andrew Dudley. "Adaptation, optimisation and simulation of the CSMA/CA protocol for a low earth orbit satellite UHF link." Thesis, Link to the online version, 2006. http://hdl.handle.net/10019/1608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wu, Jingqi. "Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/885.

Full text
Abstract:
Generally, collisions between packets are undesired in wireless networks. We design this scheme, Cooperative Jamming in Wireless Networks (CJWN), to make use of collision to protect secret DATA packets from being sniffed by a nearby eavesdropper. We are intending to greatly increase the Packet Error Rate (PER) at the eavesdropper when the PER at the receiver is maintained at an acceptable level. This scheme is not intended to completely take the place of various encryption/decryption schemes which are working based on successfully received packets. Adding CJWN to the popular CSMA/CA adopted in IEEE 802.11 will add more security even the key for encryption/decryption is already exposed. Because the overhead of CJWN is very big, we do not suggest using it on every transmission. When some secret packets have a high requirement of confidentiality, CJWN is worth trying at the cost of throughput performance and power.
APA, Harvard, Vancouver, ISO, and other styles
32

Yang, Zhenxiang. "Entwicklung eines Verfahrens zur Emulation der Medienzugriffssteuerung in Wireless LAN." [S.l. : s.n.], 2004. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11482123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Tang, Yong. "Performance Study for Co-existing Wi-Fi and ZigBee Systems and Design of Interoperability Techniques." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23169.

Full text
Abstract:
Wireless local area networks (WLANs) and wireless sensor networks (WSNs) technologies have been comprehensively developed and deployed during recent years. Since commercial WLAN and WSN products share the same free of license frequency band, the low power, low rate ZigBee based WSNs are vulnerable to the interference from Wi-Fi WLANs. Therefore, it is important to evaluate the performance of ZigBee WSNs that are subjected to interference generated by collocated Wi-Fi WLANs and to design effective counter-measuring techniques should performance improvement is needed. In this research, a versatile testbed for conducting various experiments is established and the ZigBee system’s performance with different clear channel assessment (CCA) modes and energy detection (ED) thresholds are evaluated through extensive experimental measurements in the testbed. It can be concluded from the results that CCA has significant impact on ZigBee’s performance. An existing theoretical analysis approach that is based on the collision time model between ZigBee and Wi-Fi packets is suitably modified to provide analytical evaluation means of the cases we examined. In order to mitigate the interference from the collocated Wi-Fi system, a novel and effective interference-aware adaptive CCA (IAACCA) scheme is proposed and implemented as firmware flashed into Crossbow motes. Experiments confirmed the ability of IAACCA to countermeasure effectively interference generated by Wi-Fi and thus improve the performance of ZigBee WSNs. Finally, a thorough statistical analysis is performed to understand the factors impacting the performance of ZigBee system and is used to further verify our experimental methods.
APA, Harvard, Vancouver, ISO, and other styles
34

Haque, Syed E. "Efficient GTS Allocation Schemes for IEEE 802.15.4." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cs_theses/75.

Full text
Abstract:
IEEE 802.15.4 is a standard defined for wireless sensor network applications with limited power and relaxed throughput needs. The devices transmit data during two periods: Contention Access Period (CAP) by accessing the channel using CSMA/CA and Contention Free Period (CFP), which consists of Guaranteed Time Slots (GTS) allocated to individual devices by the network coordinator. The GTS is used by devices for cyclic data transmission and the coordinator can allocate GTS to a maximum of only seven devices. In this work, we have proposed two algorithms for an efficient GTS allocation. The first algorithm is focused on improving the bandwidth utilization of devices, while the second algorithm uses traffic arrival information of devices to allow sharing of GTS slots between more than seven devices. The proposed schemes were tested through simulations and the results show that the new GTS allocation schemes perform better than the original IEEE 802.15.4 standard.
APA, Harvard, Vancouver, ISO, and other styles
35

Kumar, Nishant. "MAC and Physical Layer Design for Ultra-Wideband Communications." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9934.

Full text
Abstract:
Ultra-Wideband has recently gained great interest for high-speed short-range communications (e.g. home networking applications) as well as low-speed long-range communications (e.g. sensor network applications). Two flavors of UWB have recently emerged as strong contenders for the technology. One is based on Impulse Radio techniques extended to direct sequence spread spectrum. The other technique is based on Orthogonal Frequency Division Multiplexing. Both schemes are analyzed in this thesis and modifications are proposed to increase the performance of each system. For both schemes, the issue of simultaneously operating users has been investigated. Current MAC design for UWB has relied heavily on existing MAC architectures in order to maintain backward compatibility. It remains to be seen if the existing MACs adequately support the UWB PHY (Physical) layer for the applications envisioned for UWB. Thus, in this work we propose a new MAC scheme for an Impulse Radio based UWB PHY, which is based on a CDMA approach using a code-broker in a piconet architecture. The performance of the proposed scheme is compared with the traditional CSMA scheme as well as the receiver-based code assignment scheme. A new scheme is proposed to increase the overall performance of the Multiband-OFDM system. Two schemes proposed to increase the performance of the system in the presence of simultaneously operating piconets (namely Half Pulse Repetition Frequency and Time spreading) are studied. The advantages/disadvantages of both of the schemes are discussed.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
36

Polumuru, Pushpa. "Networking of UAVs Using 802.11s." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505276/.

Full text
Abstract:
The thesis simulates the problem of network connectivity that occurs due to the dynamic nature of a network during flight. Nine nodes are provided with initial positions and are flown based on the path provided by leader-follower control algorithm using the server-client model. The application layer provides a point to point connection between the server and client and by using socket programming in the transport layer, a server and clients are established. Each node performs a neighbor discovery to discover its neighbors in the data link layer and physical layer performs the CSMA/CA using RTS/CTS. Finally, multi hop routing is achieved in network layer. Each client connects with server at dedicated interval to share each other location and then moves to next location. This process is continued over a period of several iterations until the relative distance is achieved. The constraints and limitations of the technology are network connectivity is lack of flexibility for random location of nodes, links established with a distant node having single neighbor is unstable. Performance of a system decreases with increase in number of nodes.
APA, Harvard, Vancouver, ISO, and other styles
37

Ganesh, Rajaganesh 1987. "SQ-CSMA : universally lowering the delay of queue-based CSMA/CA." Thesis, 2010. http://hdl.handle.net/2152/26517.

Full text
Abstract:
Recent works show that, by incorporating queue length information, CSMA/CA multiple access protocols can achieve maximum throughput in general ad-hoc wireless networks. In all of these protocols, the aggressiveness with which a link attempts to grab the channel is governed solely by its own queue, and is independent of the queues of other interfering links. While this independence allows for minimal control signaling, it results in schedules that change very slowly. This causes starvation and delays - especially at moderate to high loads. In this work we add a very small amount of signaling - an occasional few bits between interfering links. These bits allow us a new functionality: switching - a link can now turn off its interfering links with a certain probability. The challenge is ensuring maximum throughput and lower delay via the use of this new functionality. We develop a new protocol - Switch-enabled Queue-based CSMA (SQ-CSMA) - that uses switching to achieve both of these objectives. This simple additional functionality, and our protocol to leverage it, can be “added on'' to every existing CSMA/CA protocol that uses queue lengths. Interestingly, we see that in every case it has a significant positive impact on delay, universally furthering the performance of existing protocols.
text
APA, Harvard, Vancouver, ISO, and other styles
38

Boyana, Murat A. "Pseudo-Bayesian stability of CSMA and CSMA/CD local area networks." Thesis, 1988. http://hdl.handle.net/10945/23371.

Full text
Abstract:
Approved for public release; distribution is unlimited.
This thesis investigates the stability of the random multiaccess protocols, slotted CSMA and slotted CSMA/CD, utilizing one power level and two power levels to create beneficial power capture effect. Use of more than two equally spaced power levels provides no significant improvement in the throughput achievable when realistic capture thresholds are considered. The investigation centers on a technique known as pseudo-Bayesian stability. Another task of this thesis is to stabilize multichannel slotted CSMA and slotted CSMA/CD with pseudo-Bayesian technique. The multichannel slotted CSMA and slotted CSMA/CD show a large improvement in throughput over a traditional single channel with a combined bit rate.
http://archive.org/details/pseudobayesianst00boya
Lieutenant Junior Grade, Turkish Navy
APA, Harvard, Vancouver, ISO, and other styles
39

何明耀. "A study on the interconnection of CSMA and CSMA/CD networks." Thesis, 1990. http://ndltd.ncl.edu.tw/handle/96988024342183460636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

"TCP Reno over adaptive CSMA." 2010. http://library.cuhk.edu.hk/record=b5894411.

Full text
Abstract:
Chen, Wei.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2010.
Includes bibliographical references (leaves 64-67).
Abstracts in English and Chinese.
Dedication --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Contributions --- p.2
Chapter 1.3 --- Thesis Organization --- p.3
Chapter 2 --- Related Work --- p.4
Chapter 2.1 --- Previous Work on Rate Control and link Scheduling in Wireless Networks --- p.4
Chapter 2.2 --- Previous Work on Multi-connection TCP --- p.6
Chapter 2.3 --- Previous Work on AQM --- p.6
Chapter 3 --- Problem Settings --- p.7
Chapter 3.1 --- Network Modeling --- p.7
Chapter 3.2 --- Capacity Region of Wireless Networks and Throughput-optimal Scheduling --- p.9
Chapter 3.3 --- Throughput-optimality of A-CSMA --- p.10
Chapter 3.4 --- TCP Reno Congestion Control Modeling --- p.11
Chapter 4 --- Starvation of TCP Reno over L-CSMA and A-CSMA --- p.13
Chapter 4.1 --- TCP Reno Starves over L-CSMA --- p.13
Chapter 4.2 --- TCP Reno Starves over A-CSMA --- p.15
Chapter 4.2.1 --- Simulations --- p.15
Chapter 4.2.2 --- Observations and Explanations --- p.17
Chapter 5 --- Analysis and Our Proposed Solution --- p.19
Chapter 5.1 --- Proposed Solution: Multi-connection TCP Reno Scheme --- p.19
Chapter 5.2 --- Implementation --- p.25
Chapter 5.3 --- Discussion --- p.28
Chapter 5.3.1 --- Achieve Arbitrary Utility --- p.28
Chapter 5.3.2 --- Extension to Networks with Both Wired and Wireless Links --- p.28
Chapter 5.3.3 --- Impact of ACK Traffic --- p.30
Chapter 5.3.4 --- Tradeoff between performance and overhead --- p.31
Chapter 5.3.5 --- Overhead of Multi-connection TCP --- p.32
Chapter 6 --- Simulations --- p.37
Chapter 6.1 --- Single-hop Wireless Networks Scenario --- p.38
Chapter 6.1.1 --- Fairness and Throughput --- p.38
Chapter 6.1.2 --- Impact of Measuring Queue Length in Number of Bytes for n-ACK --- p.42
Chapter 6.1.3 --- Impact of Dummy Packets --- p.43
Chapter 6.1.4 --- Impact of Product k2β --- p.45
Chapter 6.1.5 --- Effects of Parameterβ --- p.47
Chapter 6.1.6 --- Effects of Parameter k --- p.49
Chapter 6.1.7 --- Overhead of n-ACK Solution --- p.50
Chapter 6.2 --- Multihop Wireless Networks Scenario --- p.52
Chapter 6.3 --- Multihop Networks with Wireless and Wired Links Scenario --- p.53
Chapter 7 --- Conclusions and Future Work --- p.56
Chapter 7.1 --- Conclusions --- p.56
Chapter 7.2 --- Future Work --- p.57
Chapter A --- Explanation to Starvation of TCP Reno over A-CSMA --- p.58
Chapter B --- TCP Reno over A-CSMA with AQM --- p.60
Chapter B.1 --- TCP Reno starves --- p.60
Chapter B.2 --- Explanation --- p.61
Bibliography --- p.64
APA, Harvard, Vancouver, ISO, and other styles
41

Moraes, Ricardo Alexandre Reinaldo de. "Supporting Real-Time Communication in CSMA-Based Networks : the VTP-CSMA Virtual Token Passing Approach." Doctoral thesis, 2007. http://hdl.handle.net/10216/11298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Moraes, Ricardo Alexandre Reinaldo de. "Supporting Real-Time Communication in CSMA-Based Networks : the VTP-CSMA Virtual Token Passing Approach." Tese, 2007. http://hdl.handle.net/10216/11298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Phung, Van Phuc Trach. "Throughput analysis of CSMA/CF systems." Thesis, 1987. http://spectrum.library.concordia.ca/5426/1/ML50103.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tzung-HanTu and 塗宗翰. "CSMA/CA-RBTv : An Enhanced Collision Avoidance CSMA/CA-based Media Access Protocol over the M2M Communication Environment." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/35qrjy.

Full text
Abstract:
碩士
國立成功大學
資訊工程學系
103
Machine-to-Machine (M2M) communication is a machine-independent communication paradigm that can facilitate wired and wireless communications without the need for human intervention. However, as the number of network devices increases, the occurrence of collisions rises, which results in the efficiency of the MAC layer protocol being degraded and the power consumption being increased. To resolve this problem, this thesis proposes an enhanced IEEE 802.11 CSMA/CA media access scheme designated as CSMA/CA-RBTv, in which RBT denotes the Registered Backoff Time and v denotes vector. In the proposed CSMA/CA-RBTv, when a mobile node transmits data to the AP, it attaches a random number called the RBT, which denotes the next time slot the mobile node would like to transmit its next data packet, to the packet. Once the AP receives the packet, it extracts the RBT and adds it to a Registered-Time-Slot-List (RTSL) used to conduct channel access scheduling. Before transmitting the ACK packet to the mobile node, the AP (1) selects the node with the smallest RBT from the RTSL list as the next one to access the wireless channel and (2) uses RTSL to make a bit vector marking which time slots have been registered/reserved for data transmission, i.e., channel access. Finally, the AP appends the aforementioned two pieces of channel access information to the ACK packet. Since the ACK packet is transmitted in a broadcast manner, all of the mobile nodes which overhear the transmission know which node has the next right to access the channel and which time slots are still available for channel access. Consequently, the occurrence of collisions can be reduced, which also results in decreasing power consuming. The simulation results show that the proposed CSMA/CA-RBTv scheme results in a significant improvement in both the transmission performance and the energy efficiency of the M2M network as the number of mobile nodes increases.
APA, Harvard, Vancouver, ISO, and other styles
45

Gurusamy, Vijay. "Service differentiation using p-persistent CSMA/CA." 2005. http://digital.library.okstate.edu/etd/umi-okstate-1629.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

"Performance and control of CSMA wireless networks." Thesis, 2010. http://library.cuhk.edu.hk/record=b6075260.

Full text
Abstract:
Motivated by the fact that the contention graph associated with ICN is a Markov random field (MRF) with respect to the probability distribution of its system states, and that the belief propagation algorithm (BP) is an efficient way to solve "inference" problems in graphical models such as MRF, we study how to apply BP algorithms to the analysis and control of CSMA wireless networks. We investigate three applications: (1) computation of link throughputs given link access intensities; (2) computation of link access intensities required to meet target link throughputs; and (3) optimization of network utility via the control of link access intensities. We show that BP solves the three problems with exact results in tree networks and has manageable computation errors in a network with loopy contention graph. In particular, we show how a generalized version of BP, GBP, can be designed to solve the three problems above with higher accuracy. Importantly, we show how the BP and GBP algorithms can be implemented in a distributed manner, making them useful in practical CSMA network operation.
The above studies focus on computation and control of "equilibrium" link throughputs. Besides throughputs, an important performance measure in CSMA networks is the propensity for starvation. In this thesis, we show that links in CSMA wireless networks are particularly susceptible to "temporal" starvation. Specifically, certain links may have good equilibrium throughputs, yet they can still receive no throughput for extended periods from time to time. We develop a "trap theory" to analyze temporal throughput fluctuations. The trap theory serves two functions. First, it allows us to derive new mathematical results that shed light on the transient behavior of CSMA networks. Second, we can develop automated analytical tools for computing the "degrees of starvation" for CSMA networks to aid network design. We believe that the ability to identify and characterize temporal starvation as established in this thesis will serve as an important first step toward the design of effective remedies for it.
This thesis investigates the performance and control of CSMA wireless networks. To this end, an analytical model of CSMA wireless networks that captures the essence of their operation is important. We propose an Ideal CSMA Network (ICN) model to characterize the dynamic of the interactions and dependency of links in CSMA wireless networks. This model allows us to address various issues related to performance and control of CSMA networks.
We show that the throughput distributions of links in ICN can be computed from a continuous-time Markov chain and are insensitive to the distributions of the transmission time (packet duration) and the backoff countdown time in the CSMA MAC protocol given the ratio of their means rho, referred to as the access intensity. An outcome of the ICN model is a Back-of-the-Envelope (BoE) approximate computation method that allows us to bypass complicated stochastic analysis to compute link throughputs in many network configurations quickly. The BoE computation method emerges from ICN in the limit rho → infinity. Our results indicate that BoE is a good approximation technique for modest-size networks such as those typically seen in 802.11 deployments. Beyond serving as the foundation for BoE, the theoretical framework of ICN is also a foundation for understanding and optimization of large CSMA networks.
Kai, Caihong.
Adviser: Soung Chang Liew.
Source: Dissertation Abstracts International, Volume: 73-03, Section: B, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2010.
Includes bibliographical references (leaves 180-183).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.
APA, Harvard, Vancouver, ISO, and other styles
47

Lu, Wei, and 盧. 瑋. "Performance Evaluation of CSMA/CA on CC2530." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/q2fthj.

Full text
Abstract:
碩士
國立暨南國際大學
電機工程學系
103
Wireless networks are widely popular in modern. The collision occurring is one of the reasons affecting the transmission efficiency. To mitigate the collision issue, the carrier sensing multiple access with collision avoidance (CSMA/CA) protocol is widely applied in wireless networks. IEEE 802.11 DCF protocol and IEEE 802.15.4 CSMA/CA protocol are the most well-known CSMA/CA based protocols. The primary difference between them is how carrier sensing is performed. Stations continuously sense the medium before transmissions in an IEEE 802.11 network, while stations in an IEEE 802.15.4 network only sense once after backoff operation. The thesis is mainly about software architecture design of the IEEE 802.11 DCF protocol on an IEEE 802.15.4 transceiver. Experiment results show that, without continuously sensing, the transmission failure probability of IEEE 802.15.4 CSMA/CA increases dramatically with the network size. Consequently, the IEEE 802.11 DCF protocol provides better performance in the packet loss probability and throughput than IEEE 802.15.4 CSMA/CA does.
APA, Harvard, Vancouver, ISO, and other styles
48

ZENG, ZHONG-YONG, and 曾中庸. "Performance analysis of buffered csma relative protocols." Thesis, 1992. http://ndltd.ncl.edu.tw/handle/53081972897279159827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Jhuang, Yong-Yi, and 莊詠驛. "Implementation of CSMA/CA Protocol on CC2530." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/37595940265865814246.

Full text
Abstract:
碩士
國立暨南國際大學
電機工程學系
101
In IEEE 802.15.4 networks, routers cannot enter sleep mode to reduce power consumption and runs out of battery power quickly. In addition, the implementation of CSMA/CA protocol in IEEE 802.15.4 is different from that in IEEE 802.11. Because a node does not perform channel sensing during backoff, a collision may occurs when a node transmit a packet. As a result, IEEE 802.15.4 is unsuitable for wireless sensor networks (WSN). In this thesis, we design and implement the CSMA / CA protocol based on IEEE 802.11 by TI CC2530 for wireless sensor networks. For hardware-related programming, we have implemented the RF driver, the MAC Timer driver, the interrupt service routines, the channel sensing mechanism, and the two-way handshaking CSMA/CA protocol. A prototype platform was built and packets are successfully delivered between multiple nodes. In the future, the platform can be extended to a complete media access control (MAC) layer suitable for wireless sensor networks, such as the well-know S-MAC.
APA, Harvard, Vancouver, ISO, and other styles
50

"Markov modulated CSMA protocols with backoff scheduling algorithms." Thesis, 2011. http://library.cuhk.edu.hk/record=b6075338.

Full text
Abstract:
Furthermore, we show that geometric retransmission algorithm is intrinsically unstable for large population sizes. On the other hand, exponential backoff algorithm is more robust and scalable. Even for infinity population sizes, the stable throughput and bounded delay region still exists under certain conditions.
In the light of the concern, we propose a queueing model of the general CSMA protocol with probability-based backoff scheduling algorithm. The input buffer of each node is modeled as a Geo/G/1 queue, in which the service time distribution of each individual head-of-line (HOL) packet can be described by a Markov chain. By means of this queueing model, we can obtain the characteristic equation of throughput, the packet queueing delay as well as the stable conditions with admissible input traffic. We also specify stable throughput and bounded delay regions with respect to the retransmission factor and input rate.
Last but not least, the proposed queueing model can be systematically generalized to investigate various types of MAC protocols, such as ALOHA, CSMA protocols, IEEE 802.11 protocols. Specifically, we illustrate the methodology by full analyses of the non-persistent CSMA and 1-persistent CSMA protocols in this thesis.
Medium Access Control (MAC) protocols have been continuously updated to keep up with the emerging new services and QoS requirements. Despite of the rapid changes of MAC protocols, a comprehensive performance analysis of any MAC protocol remains an open issue for over several decades.
Most of existing analysis of MAC protocols focused on the network throughput and packet access delay under the assumption that the network is saturated which is not realistic. We know very little about the stability of MAC protocol under the normal network operation for lack of a systematic model that can be adaptively applied to various MAC protocols with different service requirements and backoff scheduling algorithms.
Other than the probability-based backoff algorithm, this thesis also includes the study of window-based backoff algorithm. It is shown that the probability-based and window-based backoff algorithms are equivalent to each other. Moreover, we find that the characteristic equation of network throughput is invariant to backoff scheduling algorithms.
Wong, Pui King.
Adviser: Tony T. Lee.
Source: Dissertation Abstracts International, Volume: 73-06, Section: B, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 125-133).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography