Dissertations / Theses on the topic 'Mobile networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Mobile networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cheng, Jerry. "Collaborative network security for heterogeneous mobile networks." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132471&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textGlidden, Todd P. "Privacy for mobile networks via network virtualization." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FGlidden.pdf.
Full textThesis Advisor(s): Singh, Gurminder ; Gibson, John. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Privacy, mobile networks, first responders, mobile file sharing, data dissemination. Includes bibliographical references (p. 47-49). Also available in print.
Suárez, Trujillo Luis Carlos. "Securing network slices in 5th generation mobile networks." Thesis, Brest, 2020. http://www.theses.fr/2020BRES0050.
Full textNetwork slicing is a cornerstone in the conception and deployment of enriched communication services for the new use cases envisioned and supported by the new 5G architecture.This document makes emphasis on the challenge of the network slicing isolation and security management according to policy. First, a novel access control model was created, that secures the interactions between network functions that reside inside the 5G system. Then, the management of the interactions between network slices was addressed. We coin the concept of network slice chains, which are conceived after security constraint validation according to policy. Lastly, a method to quantify isolation was developed, permitting to find out how well isolated a communication service is, which is offered via network slices. This enables network operators and customers to measure the isolation level and improve the configuration of the network slices so the isolation level can be enhanced. These components establish a solid framework that contributes to secure, vertically, the communication services of a 5G network and assess how secure they are with respect to their interactions and isolation
Moessner, K. "Reconfigurable mobile communication networks." Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/844245/.
Full textDengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.
Full textCullen, Cionaith. "Network and signalling aspects of satellite personal communication networks." Thesis, University of Surrey, 1995. http://epubs.surrey.ac.uk/842984/.
Full textTrullols, Cruces Oscar. "Information dissemination in mobile networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/276176.
Full textZincir, Ibrahim. "Behavioural profiling in mobile networks." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/884.
Full textHuang, E. "Rethinking mobile ad hoc networks." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604708.
Full textAssasa, Hany. "Service Mobility in Mobile Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166540.
Full textHaghnegahdar, Alireza. "Interference in wireless mobile networks." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/46713.
Full textGudapati, Supriya. "Securing mobile ad hoc networks." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604882.
Full textWireless sensor networks has been growing rapidly over the past few decades. Due to their flexibility, wireless sensor networks have been in practice in many areas. Unlike other network architectures, Mobile Ad hoc networks (MANETs) have no central architecture; every node is free to work both as a transmitter and receiver and it depends on neighboring nodes to send relay messages. Due to their advantages, MANETs are used in many different applications like health care and military. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this report, we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. In the simulation we compare the differences within the Enhanced Adaptive Acknowledgment (EAACK) before and after introducing the Hybrid cryptography approach.
Erramilli, Vijay. "Forewarding in Mobile Opportunistic Networks." Boston University Computer Science Department, 2009. https://hdl.handle.net/2144/1722.
Full textThomson Research, Paris; National Science Foundation (CCR-0325701, ANI-0322990); HAGGLE FET Project; Erramilli family.
Al-Bayatti, Ali Hilal. "Security management for mobile ad hoc network of networks (MANoN)." Thesis, De Montfort University, 2009. http://hdl.handle.net/2086/2417.
Full textWang, Hao. "Performance modelling of network management schemes for mobile wireless networks." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/13192.
Full textJeoun, Kristina S. "The tactical network operations communication coordinator in mobile UAV networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FJeoun.pdf.
Full textHo, Yao Hua. "Connectionless approach--a localized scheme to mobile ad hoc networks." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002742.
Full textShankaran, Rajan, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security issues in mobile IP and mobile ad hoc networks." THESIS_CSTE_CIT_Shankaran_R.xml, 2004. http://handle.uws.edu.au:8081/1959.7/585.
Full textDoctor of Philosophy (PhD)
Cherriman, Peter John. "Mobile video networking." Thesis, University of Southampton, 1998. https://eprints.soton.ac.uk/251962/.
Full textChochlidakis, Georgios. "Mobility-aware virtual network embedding techniques for next-generation mobile networks." Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/mobilityaware-virtual-network-embedding-techniques-for-nextgeneration-mobile-networks(174e714f-2a4a-447a-bcd5-d526170377fd).html.
Full textDharne, Avinash Gopal. "Issues in autonomous mobile sensor networks." [College Station, Tex. : Texas A&M University, 2007. http://hdl.handle.net/1969.1/ETD-TAMU-1343.
Full textKobosko, Kristoffer, and Henrik Wallentin. "Mobile Groups in Ad-hoc Networks." Thesis, Uppsala University, Department of Information Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-108036.
Full textMost current research on Mobile Ad-hoc NETworks (MANETs) concerns one ad-hocnetwork at a time. A common topic is how to handle the merging of new nodesappearing in range of an existing MANET into a new, larger network. CurrentMANET implementations do not define the handling of policies for controllingmembership or routing messages, neither do they support policy-based inter-MANETrouting.
In this thesis, we present an implementation of Mobile Group Protocol (MGP) whichenhances the reactive routing protocol AODV with an administrative framework inwhich Mobile Ad-hoc NETwork (MANET) policies are defined. Such policies are usedto control membership and signaling in a MANET. We define new roles for theMANET members such as nodes, leaders and gateways. We discuss the messageexchange taking place during forming of Mobile Groups (MGs) and study the theparticular implementation by simulating a group of simple MGP scenarios usingNetwork Simulator 2 (NS-2).
We conclude our work by discussing the using of MGP as a base for an inter-MANETrouting protocol providing policy-based routing in MANETs.
Karaminas, Panagiotis D. "Array processing in mobile radio networks." Thesis, Imperial College London, 2001. http://hdl.handle.net/10044/1/11483.
Full textBiswas, Subir Kumar. "Handling realtime traffic in mobile networks." Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320943.
Full textGiortzis, Athanasios. "Channel assignment in mobile radio networks." Thesis, Imperial College London, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266017.
Full textKong, Chenguang, and 孔臣光. "Collaborative streaming in mobile social networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47849897.
Full textpublished_or_final_version
Computer Science
Master
Master of Philosophy
Fabri, S. N. "Multimedia communications over mobile packet networks." Thesis, University of Surrey, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343461.
Full textPanaousis, Emmanouil A. "Security for mobile ad-hoc networks." Thesis, Kingston University, 2012. http://eprints.kingston.ac.uk/23989/.
Full textJiang, Menglan. "Traffic management in heterogeneous mobile networks." Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/traffic-management-in-heterogeneous-mobile-networks(42f0075f-9433-4593-adf1-9401f7e8276a).html.
Full textToh, Chai-Keong. "Protocol aspects of mobile radio networks." Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/273055.
Full textPietiläinen, Anna-Kaisa. "Opportunistic mobile social networks at work." Paris 6, 2010. http://www.theses.fr/2010PA066587.
Full textWatson, Simon Andrew. "Mobile platforms for underwater sensor networks." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/mobile-platforms-for-underwater-sensor-networks(00f93130-f9d6-4479-80ab-58a0c60327c0).html.
Full textMa, Wenchao. "Mobility management for wireless mobile networks." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0001252.
Full textXu, Ji. "Data caching in wireless mobile networks /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20XU.
Full textIncludes bibliographical references (leaves 57-60). Also available in electronic version. Access restricted to campus users.
Kumar, Kavitha. "Intrusion Detection in Mobile Adhoc Networks." Connect to full text in OhioLINK ETD Center, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1260232844.
Full textTypescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
Mosko, Marc Elliott. "Routing in mobile ad hoc networks /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2004. http://uclibs.org/PID/11984.
Full textShigueta, Roni. "Channel Allocation in Mobile Wireless Networks." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLX037/document.
Full textThe intensive use of mobile data services has increasingly increased resource consumption over wireless networks. The main resource used for wireless communication is the frequency spectrum. As data traffic rises sharply, new bands of the frequency spectrum are not available in the same proportion, making the frequency spectrum increasingly scarce and saturated. Several proposals have been presented to optimize frequency channel allocation in order to mitigate interference between nearby links that are transmitting data. Many of them use a single criterion and does not consider the user behavior to guide the channel allocation process. Users have routine cycles and social behavior. They routinary move to work, to school, use their mobile devices generating data traffic, and they meet with friends forming clusters. These characteristics can be explored to optimize the channel allocation process.This thesis presents a channel allocation strategy for wireless networks based on user behavior. Our main contribution is to consider some characteristics of the user behavior, such as mobility, traffic, and popularity in the channel allocation process. In this way, we prioritize the channel allocation for the nodes that will remain in the network in a future time window, with higher traffic in the network, and with more popularity. We adopt a distributed approach that allows limiting the number of messages exchanged in the network while quickly responding to changes in the network topology. In our performance evaluation, we consider scenarios in ad hoc and vehicular networks, and we use some synthetic mobility models, such as SLAW and Manhattan grid, and the traces dataset of Cologne city. In the scenarios, we compare our mechanism with different types of approaches: i.e., a centralized (named TABU), a random (named RANDOM), a with largest spectral distance (named LD), and a with single channel (named SC). We evaluate metrics such as aggregated throughput, packet delivery rate, and end-to-end delay. Simulations considering ad hoc scenario with unicast routing show that our strategy presents improvements in terms of throughput at the order of 14.81% than RANDOM and 16.28% than LD channel allocation. In vehicular scenario, our strategy shows gains of packet delivery rate at the order of 11.65% and 17.18% when compared to RANDOM and SC methods, respectively. In both scenarios, the performance of our strategy is close to the upper bound search of the TABU centralized approach, but with lower overhead
Tin, Yiu Shing (Terry). "Secure key establishment for mobile networks." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16035/1/Yiu_Shing_Tin_Thesis.pdf.
Full textTin, Yiu Shing (Terry). "Secure Key Establishment for Mobile Networks." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16035/.
Full textKobo, Hlabishi. "Situation-aware routing for wireless mesh networks with mobile nodes." Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6647_1370594682.
Full textZhao, Xiaogeng. "An adaptive approach for optimized opportunistic routing over Delay Tolerant Mobile Ad hoc Networks." Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1004822.
Full textRogers, Paul Edward. "On robustness in high load mobile ad hoc networks." Diss., Online access via UMI:, 2005.
Find full textPedersen, Finn. "Exploring Mobile TV in Sweden using Value Networks." Thesis, University of Gävle, Department of Business Administration and Economics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-4046.
Full textMobile TV is an application which has not yet been much described in academic literature. But the media and telecommunications industries are busy with Mobile TV deployment, motivated by for example decrease in revenues from existing products. This study should be seen as an exploratory study in the academia, aiming at a context for the experiences from exploratory work in the industry.
The study of the status of the application Mobile TV focused on legislation, spectra, content and terminals. These areas are of great interest for the telecom and the media industries, and their interests were described with regards to Mobile TV. Large structures like local legislation, spectral resource management on EU level and charging for content becomes visible and are discussed. On a lower level, two differences between the industries were high-lighted. One is the way revenue is collected for content, and the other is information sharing about the Consumers preferences. Overcoming these differences would ease collaboration. Another business topic for the two industries is the relation between the SIM card (which manifest the subscription) and the charging for content.A value network model which satisfies the legal, technical and business requirements is presented. In particular, a new role as Content Site Provider is identified. Since the interviewees suggested a future hybrid solution, both Mobile TV via streaming and via broadcast are included in the model.It is concluded that the telecom industry had all the means and incentive to create Mobile TV. It is also concluded that the process of digitalization is an ongoing process which continues to have an impact on the two industries, in that different offerings can be bundled together. One possible scenario is an Internet-like evolution of the mobile Internet, the Consumers will learn to find the applications closer to the source. This would make a broadcast solution less likely. The higher cost for over-the-air transmission is one obstacle for this scenario, but it might vanish with next generation mobile networks.
Kuhr, Mark Gregory Hamilton John A. "An adaptive jam-resistant cross-layer protocol for mobile ad-hoc networks In noisy environments." Auburn, Ala., 2009. http://hdl.handle.net/10415/1611.
Full textBaig, Adeel Computer Science & Engineering Faculty of Engineering UNSW. "Improving throughput and fairness of on-board mobile networks." Awarded by:University of New South Wales. School of Computer Science & Engineering, 2007. http://handle.unsw.edu.au/1959.4/28247.
Full textSousa, Ângelo Miguel Raposo Almeida e. "Forecasting key performance indicator of mobile networks: application to mobile cellular networks." Master's thesis, 2019. http://hdl.handle.net/10773/29563.
Full textO aumento do tráfego de dados no mundo, aumentou a necessidade dos operadores de redes móveis terem um maior cuidado a planear e gerir as suas infraestruturas. Este trabalho explora o desempenho de vários modelos estatísticos de previsão aplicados a tráfego de voz e de dados. Os dados têm origem numa rede móvel Europeia. Relativamente aos modelos preditivos, foram aplicados modelos clássicos como alisamento exponencial, Holt-Winters, ARIMA, Random-Walk; bem como duas propostas de modelos mais recentes. Em suma, esta dissertação mostra o desempenho de alguns modelos estatísticos clássicos, e como estes se comparam a modelos recentemente propostos. Também mostra que operadores de redes podem usar métodos preditivos estatísticos para tentar obter informações de como a sua rede pode reagir no futuro, dando assim informações valiosas para que estes efetuem uma melhor gestão da sua rede.
Mestrado em Engenharia Eletrónica e Telecomunicações
Chang-Jung, Kao, and 高長榮. "TCP in Mobile Networks." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/29675103936203373345.
Full text國立臺灣大學
電機工程學研究所
90
Advent technology of mobile computing devices has accelerated the development of wireless networks in recent years. To date, mobile devices, such as notebooks, mobile phones, and PDAs, can connect to the Internet via specific wireless network system nowadays. However, due to the feature of mobility in the mobile devices, there are different characteristics compared with the wired one, such as higher bit error rate in the wireless link and temporary data disconnection due to handoff between base stations. In wireless environments, the protocols designed for wired network might degrade their performance due to the effects mentioned above. Thus, the issues of TCP in mobile networks will be studied in this thesis. TCP had been designed in wired networks to provide reliable and ordered data transmission service. However, TCP degrades its performance due to the features of high bit error rate and mobility when being adopted in mobile devices. Consequently, this thesis attempts to propose a solution to the problems. The main contribution of this thesis is to propose a new sender-side TCP extension mechanism to solve the inefficient bandwidth utilization resulting from handoff. In addition, we also simulate the performance of the proposed mechanism. The results prove the enhancement of bandwidth efficiency by adopting the proposed mechanism in TCP sender.
Lu, Chang-che, and 呂長哲. "Location-based Network Management System for Heterogeneous Mobile Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/35186404723344553357.
Full text國立中央大學
資訊工程研究所
95
With the improvement of society, the technology of internet is growing constantly. New wireless internet agreement like IEEE 802.11 (Wi-Fi) 、 IEEE 802.16 (WiMAX) and 3GPP (3rd Generation Partnership Project) provide internet users have different options for different broadband, different internet field and different prices. Many different wireless internet form an internet environment. We called it Heterogeneous wireless network environment. With new internet agreement getting mature, a variety of broadband wireless equipment is developed. To administer heterogeneous wireless network is becoming a significant issue when we face so many internet equipment at the same time. Traditional internet administration should be improved to manage heterogeneous wireless network environment. The most important problem in the administration of heterogeneous wireless network is how to administer many wireless networks at the same time. And it’s quite difficult to let internet administration center know the status of each wireless internet correctly and fast. Therefore, the essay offers a management system which applied to Heterogeneous wireless network. (Heterogeneous Mobile Network Management System,call the HMNMS). The system uses separated construction to set up a HMNMS on every different mobile wireless network. Every HMNMS will be able to share the information of Mobile Network with neighboring HMNMS. To measure intensity of message for bigger shooting range base with the location of smaller shooting range base. Making good use of several interfaces to decrease unnecessary cost on measurement. The system not only offers a convenient monitoring and manages wireless network equipment under Heterogeneous Mobile Network, but also analyze covering range of base through the intensity of message of the users and the location of users. With proper adjustment and the setting up of base location, to create the environment that internet exists everywhere.
Maji, A. "Load Balancing in Wireless Mobile Ad Hoc Networks." Thesis, 2010. http://ethesis.nitrkl.ac.in/1679/1/LOAD_BALANCING__(2).pdf.
Full textDolev, Shlomi, Seth Gilbert, Nancy A. Lynch, Elad Schiller, Alex A. Shvarstman, and Jennifer Welch. "Virtual Mobile Nodes for Mobile Ad Hoc Networks." 2004. http://hdl.handle.net/1721.1/30450.
Full text