Dissertations / Theses on the topic 'Modbus TCP communication protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Modbus TCP communication protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Záviš, Jan. "Model křižovatky s průmyslovou komunikací." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442438.
Full textOtčenášek, Martin. "Distribuované řídící systémy a jejich využití v praxi." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217601.
Full textRamalata, Mulalo Phillip. "Development and implementation of a modbus based wireless air protocol." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49910.
Full textENGLISH ABSTRACT: The recent performance improvements of wireless communication systems are presenting possibilites for the use of wireless networks for industrial applications, which typically impose severe restrictions in terms of response time and flexibility. Traditionally most of the industrial protocols employ cable connections, which have limitations in terms of flexibility and development oportunities. The industrial protocol used for this project, is the Modbus protocol. This protocol is developed and implemented on a wireless environment by using data radio modems. The Modbus protocol is a master/slave protocol which provides an industry standard for industrial data transfer. A Modbus driver is designed for radio networks, so that it can function with different PLCs and SCADA packages, supporting Modbus protocol. This enables control and monitoring to be excercised over a long distance, and enables control equipment to be placed as required and not with particular wiring restrictions.
AFRIKAANSE OPSOMMING: Die onlangse verbetering in radiokommunikasiestelsels bied moontlikhede vir die gebruik van radionetwerke vir industriële toepassings, wat gewoonlik streng beperkings plaas in terme van responstyd en buigbaarheid. Tradisioneel is meeste van die industriële protokolle kabelgebaseer, wat redelik onaanpasbaar is. Die Modbus protokol is as basis in hierdie projek gebruik. Dit is 'n meester/slaaf industriestandaard, wat hier aangepas is vir toepassings met radiomodems. Die Modbus drywer is ontwerp om funksioneel te wees met 'n verskeidenheid van PLC's en SCADA pakette, wat die Modbus protokolondersteun. Dit stel beheer- en meetaksies in staat oor lang afstande en laat relatief vrye plasing toe van toerusting sonder bedradingsbeperkings.
Šoustar, Jiří. "Modul rozhraní Ethernet pro platformu FITkit." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235428.
Full textLai, Chengdi, and 赖成迪. "Congestion control for transmission control protocol (TCP) in wirelessnetworks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47102445.
Full textpublished_or_final_version
Electrical and Electronic Engineering
Master
Master of Philosophy
Mouton, A. J. J., C. J. Smith, and G. E. Smith. "An efficient communication interface and protocol for motor protection relays." Journal for New Generation Sciences, Vol 7, Issue 1: Central University of Technology, Free State, Bloemfontein, 2009. http://hdl.handle.net/11462/524.
Full textA company in South Africa is a three-phase induction motor protection relay manufacturer. The function of the protection relay is to capture running data, to provide protection against possible damage, to control an electric motor and to communicate this data to the System Control and Data Acquisition (SCADA) system in a control room. In the case of remote sites e.g. a pump station, the protection relays are used as standalone units. The protection relays are equipped with communication facilities to be used in an instrumentation environment. If a trip occurs or settings need to be changed a technician has to visit the remote site and address the problem. The ideal cost and time effective solution is to perform these tasks remotely via a reliable wireless network. A study was conducted to ascertain the viability of using the standard GSM cellular networks in South Africa to effectively control electric motors and to communicate with the Motor Protection Relays (MPRs) controlling the electric motors in order to determine the status of a motor, settings of the motor, trips that occurred and time of occurrence. It was shown that a node controller could be used to store all the data from various electric motors at a single location. It was also shown that the data from the different electric motors could be analysed at the node controller and that communication can then be initiated from the controller to a responsible person via the GSM network. It was further illustrated that, by making use of the GSM networks in South Africa together with the short message service (SMS), communication and control can be effectively established. SMSs proved to be a reliable means of communication between cellular phones, an embedded network and MPRs. It was shown that software protocols, although slower in communication speed, proved to be reliable and effective for the purpose of transferring information between the node controller and the motor protection relays connected to the electric motors.
Gupta, Pawan Kumar. "Throughput Enhancement of TCP over Wireless Links." Thesis, Indian Institute of Science, 2002. http://hdl.handle.net/2005/48.
Full textYuen, Kwan Hung. "TCP performance over satellite networks /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20YUEN.
Full textIncludes bibliographical references (leaves 68-71). Also available in electronic version. Access restricted to campus users.
Li, Zhi. "TCP adaptation schemes in heterogeneous and ad hoc wireless networks." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32037326.
Full textLi, Zhi, and 李志. "TCP adaptation schemes in heterogeneous and ad hoc wireless networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32037326.
Full textPyk, Axel. "Multipath TCP : Performance in a LTE Environment." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-129123.
Full textJayananthan, Aiyathurai. "TCP performance enhancement over wireless networks." Thesis, University of Canterbury. Electrical and Computer Engineering, 2007. http://hdl.handle.net/10092/1229.
Full textKlimov, Illia, and Oryna Podoba. "Improvement of the Architecture and Communication Protocol of a Sensor-based IT System." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-31121.
Full textEmulator for complex sensor-based IT system
Chen, Qizhong. "Identifying and analyzing sources of overhead in the TCP/IP communication protocol over a local area network." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-12052009-020017/.
Full textProtopopov, Boris Vladimirovich. "Effects of communication protocol stack offload on parallel performance in clusters." Diss., Mississippi State : Mississippi State University, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-06272003-120226/unrestricted/etd%5Fbprotopopov%5F070903.pdf.
Full textScofield, Dan. "Hop-by-hop transport control for multi-hop wireless networks /." Diss., CLICK HERE for online access, 2007. http://contentdm.lib.byu.edu/ETD/image/etd1812.pdf.
Full textAnantharaman, Vaidyanathan. "Reliable transport over multihop wireless Ad Hoc Networks." Thesis, Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15427.
Full textAlazemi, Hamed M. K. "Modeling and analysis of stochastic self-similar processes and TCP/IP congestion control in high-speed computer communication networks /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/6000.
Full textTian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.
Full textRahme, Sandy. "Détection et estimation d'anomalies dans un réseau de communication." Phd thesis, Université Paul Sabatier - Toulouse III, 2011. http://tel.archives-ouvertes.fr/tel-00667420.
Full textArgyriou, Antonios D. "Transport Layer Optimizations for Heterogeneous Wireless Multimedia Networks." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7466.
Full textZhu, Jing. "Layer 2 (LL/MAC) performance analysis and improvement of wireless heterogeneous networks /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/5950.
Full textPilo-Pais, Albuja Pablo Andres 1987. "Avaliação de desempenho do protocolo TCP-NACK em canais com desvanecimento Rayleigh." [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/258817.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-26T13:55:04Z (GMT). No. of bitstreams: 1 Pilo-PaisAlbuja_PabloAndres_M.pdf: 1954449 bytes, checksum: e3d003c58a69987d3faeca15cf23928f (MD5) Previous issue date: 2015
Resumo: Os enlaces sem fio são propensos a gerar mais erros e perdas de segmentos devido à natureza do desvanecimento neste canal de comunicação. A falta de um mecanismo no protocolo TCP Reno que permita distinguir as perdas por erros aleatórios das perdas por congestionamento, resulta na redução da vazão de dados e um desempenho inferior ao esperado. A fim de melhorar o desempenho do protocolo TCP sobre redes sem fio, uma variante do protocolo TCP que utiliza uma confirmação negativa, NACK, foi proposta previamente em [1] para informar ao transmissor acerca do recebimento de um segmento com erro para sua retransmissão instantânea sem reduzir a janela de congestionamento. Na presente dissertação será avaliado o desempenho do algoritmo TCP-NACK sobre um cenário de provas com desvanecimento Rayleigh. Os resultados mostram que o protocolo TCP-NACK possui melhor desempenho em relação ao protocolo TCP em enlaces sem fio
Abstract: Wireless links are prone to generate more errors and segments loss due to the fading nature of the communication channel. The lack of a mechanism in TCP Reno to distinguish random errors from congestion losses, results in throughput reduction and performance lower than expected. In order to improve TCP over wireless networks, a negative acknowledgment, NACK, was earlier proposed in [1] to inform the transmitter about the reception of a segment with error for its retransmission without reducing the congestion window. In this thesis we are going to evaluate the TCP-NACK algorithm over a scenario with Rayleigh fading. The results show that TCP-NACK has better performance over TCP Reno in wireless links
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Mirza, Aamir Mehmood, and Mohtashim Khan. "Ethernet Network Functionality Testing." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3720.
Full textEthernet functionality testing as a generic term used for checking connectivity,throughput and capability to transfer packets over the network. Especially in the packet-switchenvironment, Ethernet testing has become an essential part for deploying a reliable network.Over a long distance Ethernet testing parameter for analyzing network performance must havetwo devices attached and synchronized.
Saab Microwave Systems is among the leading suppliers of radar systems developing groundbased,naval and air-borne radar systems. To ensure the correct functionality, the developerwants to verify the performance of computer network and looking for a suitable solution.
A software application is required to verify and test the functionality of the Ethernet network andto verify the functionality and performance of the TCP/IP stack of newly added node. Theprograms shall be easily ported to different operating systems and must not depend on specificproduct properties.A software application, “NetBurst”, is developed for Ethernet functionality testing. Theapplication is vendor and platform independent.
Mackie, David Sean. "Extending the reach of personal area networks by transporting Bluetooth communications over IP networks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006551.
Full textTibor, Sakal. "Metoda za povezivanje mernog sistema i računarapomoću konverzije podataka iz I2S u TCP/IP protokol." Phd thesis, Univerzitet u Novom Sadu, Tehnički fakultet Mihajlo Pupin u Zrenjaninu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=103839&source=NDLTD&language=en.
Full textThis doctoral thesis presents the research work carried out in order to solve a practical problem, the realization of a connection between a medical measuring device and a personal computer. The result of the research is a general method that provides efficient data conversion from the I2S protocol to the TCP/IP protocol.
Bamdé, Aurélien. "Essai d'une théorie sur l'architecture normative du réseau Internet." Thesis, Paris 2, 2013. http://www.theses.fr/2013PA020036.
Full textComplex is undoubtedly the adjective that best summarises the issue of the normative architecture of the Internet network. This issue is complex for two reasons. The first one results from the identification of the rules that make up this architecture and the second one from their purpose. First of all, the identification of the rules proves to be an extremely complex matter, since this concept of the rule is not so easy to define, as it refers to such a wide range of realities. After establishing the existence of the rules which set the behaviour of network builders, it is necessary to raise the question of the the nature of the rules. Here again, solving this issue is not as easy as it seems. In fact, in literature there is no universal way to distinguish the various types of rules. Secondly, the rules that compose the normative architecture of the internet aim at organising the digital society. Yet, this is a complex system. If one accepts the idea, one has to correlatively claim that the rule-complying scheme that enables such a system to be controlled is very different from that which rules more common rules for us, such as the rules of law. While the former is underpinned by a self organising mechanism, the creation of the latter stems from an act of willing. The difference between both schemes is significant: in the first case spontaneity controls the setting up of rules of conduct, while in the second case reason does. The opposition between these two normative schemes can be found in the digital universe too. It is conveyed by the existing competition between the digital and the legal orders. That is why the normative architecture of the Internet network will be described through the competition between these two normative systems
Baig, Adeel Computer Science & Engineering Faculty of Engineering UNSW. "Improving throughput and fairness of on-board mobile networks." Awarded by:University of New South Wales. School of Computer Science & Engineering, 2007. http://handle.unsw.edu.au/1959.4/28247.
Full textGarcia, Cristiane Silva. "Ajuste baseado em dados de controladores : o método VRFT embarcado em um aplicativo móvel." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/163773.
Full textThe Virtual Reference Feedback Tuning (VRFT) method is a data-driven method employed to tune the parameters of a controller. An advantage of this method lies in the fact that it does not need a detailed knowledge of the process model. This work presents the development of an Android application which employs the VRFT method and a newly developed recursive version of it to tune a PID controller based upon the data collected from an experiment conducted on the process. The experiment can be set up, started, monitored, and stopped from inside the mobile application. To communicate with the controller a Bluetooth-Modbus gateway and an application layer protocol, designed over the Bluetooth serial communication service, are employed, both newly developed. Finally, the entire solution is verified in two steps: first some experiments were conducted on a simulated process, then another experiment was conducted to tune a real commercial controller, both showing good results.
Velayutham, Aravind Murugesan. "Transport Protocols for Next Generation Wireless Data Networks." Thesis, Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6957.
Full textOliveira, Carlos Henrique Rodrigues de. "Analise de desempenho dos sistemas moveis celulares 2G, 2,5G e 3G." [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260571.
Full textTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-05T14:02:39Z (GMT). No. of bitstreams: 1 Oliveira_CarlosHenriqueRodriguesde_D.pdf: 6124095 bytes, checksum: d981e4a9e163dc0b358b20c451c92109 (MD5) Previous issue date: 2005
Resumo: Este trabalho de tese estuda e analisa o desempenho dos sistemas móveis celulares GSM de segunda geração (2G), GPRS de segunda geração intermediária (2,5G) e CDMA2000 de terceira geração (3G). Na primeira parte deste trabalho de tese são avaliadas estratégias de compartilhamento dos canais de comunicação utilizados pelos sistemas GSM e GPRS, em busca daquela que resulte no menor impacto na qualidade dos serviços prestados por ambas as redes. Para esta avaliação, e como contribuição deste trabalho de tese, são desenvolvidos algoritmos aplicados em um simulador de eventos discretos desenvolvido em linguagem de programação C/C++. Os resultados das simulações mostram que a reserva de canais exclusivos ao sistema GPRS apresenta degradação na qualidade de serviço prestado pelo sistema GSM e que a melhor estratégia de compartilhamento é utilizar os canais de comunicação para o sistema GPRS nos momentos em que estes canais não são usados pelo sistema GSM. Na segunda parte deste trabalho de tese são feitas análises de desempenho dos sistemas móveis celulares de terceira geração, CDMA2000 lxRTT e CDMA2000 lxEVDO, baseadas na qualidade do serviço prestado por estas redes operando com várias aplicações simultâneas fim-a-fim entre cliente e servidor. Técnicas de detecção multiusuário e de antenas adaptativas são utilizadas na recepção destas aplicações e é avaliada a nova qualidade de serviço. Para estas análises de desempenho e como contribuição deste trabalho de tese, modelos de simulação são desenvolvidos utilizando a ferramenta OPNET. As redes CDMA2000 lxRTT e lxEVDO apresentam bom desempenho, analisado pelo parâmetro atraso da qualidade de serviço, na passagem de tráfego das aplicações HTTP, E-mail, VoIP, FTP, Telnet e Acesso a Banco de Dados. O desempenho da rede CDMA2000 lxEVDO melhora tanto com detecção multiusuário como com antenas adaptativas em relação ao receptor rake
Abstract: This thesis work studies and analyzes the performance of cellular mobile systems GSM of second generation (2G), GPRS of second intermediate generation (2,5G) and CDMA2000 of third generation (3G). In the first part of this thesis work, sharing strategies of communication channels used by GSM and GPRS systems are evaluated to find the one that results in the lowest impact in the quality of services supported by both networks. To this evaluation, and as contribution of this thesis work, algorithms applied in a discrete-event simulator developed in C/C++ programming language are developed. The simulation results show that the reserve of exclusive channels to the GPRS system presents degradation in the quality of service given for GSM system and that the better sharing strategy is to use the communication channels for the GPRS system whenever these channels are not used by the GSM system. In the second part of this thesis work, performance analyses of the third generation cellular mobile systems, CDMA2000 lxRTT and CDMA2000 lxEVDO, based on the quality of service supported by these networks operating with several end-to-end simultaneous applications between client and server are made. Multiuser detection and adaptive antennas techniques are used in the reception of these applications and the new quality of service is evaluated. For these performance analyses, and as contribution of this thesis work, simulation models are developed using the OPNET tool. The CDMA2000 lxRTT and lxEVDO networks present good performance analyzed through the delay parameter of quality of service running HTTP, E-mail, VolP, FTP, Telnet and Data Base Access applications. The CDMA2000 lxEVDO network performance improves using either multiuser detection or adaptive antennas when compared with rake receiver
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
Adams, Richelle Vive-Anne. "Infinitesimal Perturbation Analysis for Active Queue Management." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19844.
Full textOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textCesário, Júnior José Maria 1979. "Um medidor de energia elétrica integrado em redes de comunicações." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/267697.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Tecnologia
Made available in DSpace on 2018-08-24T09:10:01Z (GMT). No. of bitstreams: 1 CesarioJunior_JoseMaria_M.pdf: 2596300 bytes, checksum: 6b11eb547957a0632bbc647946da04ce (MD5) Previous issue date: 2014
Resumo: A crescente evolução mundial dos sistemas de medição inteligentes, a liberação de regulamentações Brasileiras, incentivando a adoção de sistemas de medição de energia elétrica inteligentes, direcionaram a presente dissertação a propor um sistema composto de um equipamento eletrônico para medição, em tempo real, das grandezas de corrente, tensão e calcular a energia consumida e terá canais de comunicação com as tecnologias Wi-Fi, GSM/GPRS e GPS. As informações sobre consumo serão disponibilizadas para os usuários finais com o objetivo de mudar o padrão de consumo de energia elétrica, ou até reduzi-lo, através da conscientização e disponibilização das informações de consumo em tempo real
Abstract: The growing worldwide trend of smart metering systems, the release of Brazilian regulations, encouraging the adoption of smart electricity metering systems, guided this dissertation to propose a system composed of an electronic device for measuring, in real time, the magnitudes of current, voltage and calculate the consumed power and will have communication channels based on Wi-Fi, GSM /GPRS and GPS technologies. The consumption information will be made available to end users with the goal of changing the electricity consumption pattern, or even reduce it, through awareness and provision of consumer information in real time
Mestrado
Tecnologia e Inovação
Mestre em Tecnologia
Dolphine, Tiago Marchetti. "Plataforma de serviços de infra-estrutura para arquiteturas de mobilidade." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/258965.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-14T03:43:39Z (GMT). No. of bitstreams: 1 Dolphine_TiagoMarchetti_M.pdf: 1822376 bytes, checksum: 5425d1b4cf2ca6a35df00dc7dc511d69 (MD5) Previous issue date: 2009
Resumo: Arquiteturas de micromobilidade vêm sendo propostas para atender ao crescente interesse por tecnologias de mobilidade IP. MPA (Mobility Plane Architecture), desenvolvida na FEEC/Unicamp, é uma solução de micromobilidade baseada em tunelamento de pacotes que emprega apenas protocolos bem estabelecidos. Quando estudou-se aplicações para melhoria de desempenho em handover e engenharia de tráfego na arquitetura MPA, verificou-se que estas aplicações necessitavam serviços comuns. Este trabalho descreve a plataforma MIS (Mobility Infrastructure Services) que fornece um conjunto de serviços para suporte ás funcionalidades básicas comuns de aplicações de gerência de rede, engenharia de tráfego e gerência de mobilidade. A plataforma proposta facilita o desenvolvimento de tais aplicações compartilhando soluções às necessidades encontradas na arquitetura de micromobilidade MPA e outras arquiteturas similares. São apresentados o projeto, implementação e testes da plataforma, juntamente com dois estudos de casos em gerência de mobilidade e engenharia de tráfego. Palavras-chave: redes IP móveis, micromobilidade, gerência de rede, engenharia de tráfego
Abstract: Micro-mobility architectures have been proposed to meet the growing interest in technologies supporting mobility in IP networks. MPA (Mobility Plane Architecture), developed at the FEEC/Unicamp, is a micro-mobility solution based on tunneling of packets that employs only well standardized protocols. When applications for supporting seamless handover and traffic engineering in MPA started to be designed, it was noticed that these applications demand a set of common services. This dissertation presents the MIS (Mobility Infrastructure Services) platform which provides a set of services that meet the common basic features demanded by applications of network management, traffic engineering and mobility management. The proposed platform facilitates the development of these applications when they are targeted to MPA and other micro-mobility architectures. This dissertation reports the design, implementation, ant test of the MIS platform, along with two case studies in mobility management and traffic engineering. Keywords: IP mobile networks, micro-mobility, network management, traffic engineering
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
Nunes, Fábio Pessoa. "Arquitetura de mobilidade IPv6 entre cidades digitais = Mobile IPv6 architecture between digital cities." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259452.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-21T21:10:42Z (GMT). No. of bitstreams: 1 Nunes_FabioPessoa_M.pdf: 6956532 bytes, checksum: 55194ac0a721f75279923f8424903edc (MD5) Previous issue date: 2012
Resumo: O resumo poderá ser visualizado no texto completo da tese digital
Abstract: The abstract is available with the full electronic document
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Wang, Lan. "Performance modeling of congestion control and resource allocation under heterogeneous network traffic : modeling and analysis of active queue management mechanism in the presence of poisson and bursty traffic arrival processes." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4455.
Full text"TCP Reno over adaptive CSMA." 2010. http://library.cuhk.edu.hk/record=b5894411.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2010.
Includes bibliographical references (leaves 64-67).
Abstracts in English and Chinese.
Dedication --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Contributions --- p.2
Chapter 1.3 --- Thesis Organization --- p.3
Chapter 2 --- Related Work --- p.4
Chapter 2.1 --- Previous Work on Rate Control and link Scheduling in Wireless Networks --- p.4
Chapter 2.2 --- Previous Work on Multi-connection TCP --- p.6
Chapter 2.3 --- Previous Work on AQM --- p.6
Chapter 3 --- Problem Settings --- p.7
Chapter 3.1 --- Network Modeling --- p.7
Chapter 3.2 --- Capacity Region of Wireless Networks and Throughput-optimal Scheduling --- p.9
Chapter 3.3 --- Throughput-optimality of A-CSMA --- p.10
Chapter 3.4 --- TCP Reno Congestion Control Modeling --- p.11
Chapter 4 --- Starvation of TCP Reno over L-CSMA and A-CSMA --- p.13
Chapter 4.1 --- TCP Reno Starves over L-CSMA --- p.13
Chapter 4.2 --- TCP Reno Starves over A-CSMA --- p.15
Chapter 4.2.1 --- Simulations --- p.15
Chapter 4.2.2 --- Observations and Explanations --- p.17
Chapter 5 --- Analysis and Our Proposed Solution --- p.19
Chapter 5.1 --- Proposed Solution: Multi-connection TCP Reno Scheme --- p.19
Chapter 5.2 --- Implementation --- p.25
Chapter 5.3 --- Discussion --- p.28
Chapter 5.3.1 --- Achieve Arbitrary Utility --- p.28
Chapter 5.3.2 --- Extension to Networks with Both Wired and Wireless Links --- p.28
Chapter 5.3.3 --- Impact of ACK Traffic --- p.30
Chapter 5.3.4 --- Tradeoff between performance and overhead --- p.31
Chapter 5.3.5 --- Overhead of Multi-connection TCP --- p.32
Chapter 6 --- Simulations --- p.37
Chapter 6.1 --- Single-hop Wireless Networks Scenario --- p.38
Chapter 6.1.1 --- Fairness and Throughput --- p.38
Chapter 6.1.2 --- Impact of Measuring Queue Length in Number of Bytes for n-ACK --- p.42
Chapter 6.1.3 --- Impact of Dummy Packets --- p.43
Chapter 6.1.4 --- Impact of Product k2β --- p.45
Chapter 6.1.5 --- Effects of Parameterβ --- p.47
Chapter 6.1.6 --- Effects of Parameter k --- p.49
Chapter 6.1.7 --- Overhead of n-ACK Solution --- p.50
Chapter 6.2 --- Multihop Wireless Networks Scenario --- p.52
Chapter 6.3 --- Multihop Networks with Wireless and Wired Links Scenario --- p.53
Chapter 7 --- Conclusions and Future Work --- p.56
Chapter 7.1 --- Conclusions --- p.56
Chapter 7.2 --- Future Work --- p.57
Chapter A --- Explanation to Starvation of TCP Reno over A-CSMA --- p.58
Chapter B --- TCP Reno over A-CSMA with AQM --- p.60
Chapter B.1 --- TCP Reno starves --- p.60
Chapter B.2 --- Explanation --- p.61
Bibliography --- p.64
"Transport layer optimization for mobile data networks." 2010. http://library.cuhk.edu.hk/record=b5894706.
Full text"September 2010."
Thesis (M.Phil.)--Chinese University of Hong Kong, 2010.
Includes bibliographical references (p. 53-55).
Abstracts in English and Chinese.
Acknowledgements --- p.ii
Abstract --- p.iii
摘要 --- p.iv
Contents --- p.v
Chapter Chapter 1 --- INTRODUCTION --- p.1
Chapter Chapter 2 --- BACKGROUND AND RELATED WORK --- p.4
Chapter 2.1 --- Sender-receiver-based approaches --- p.4
Chapter 2.2 --- Sender-based approaches --- p.5
Chapter 2.3 --- Receiver-based approaches --- p.6
Chapter Chapter 3 --- TCP FLOW CONTROL REVISITED --- p.8
Chapter Chapter 4 --- OPPORTUNISTIC TRANSMISSION --- p.12
Chapter 4.1 --- Link bandwidth estimation --- p.16
Chapter 4.2 --- Reception rate estimation --- p.18
Chapter 4.3 --- Transmission scheduling --- p.19
Chapter 4.4 --- Performance --- p.21
Chapter Chapter 5 --- Local Retransmission --- p.23
Chapter 5.1 --- The blackout period --- p.24
Chapter 5.2 --- Proactive retransmission --- p.28
Chapter 5.3 --- Performance --- p.30
Chapter Chapter 6 --- Loss Event Suppression --- p.31
Chapter 6.1 --- RTT modulation --- p.32
Chapter 6.2 --- Performance --- p.35
Chapter Chapter 7 --- Fairness --- p.37
Chapter 7.1 --- Packet forwarding --- p.37
Chapter 7.2 --- Non-uniform bandwidth allocation --- p.41
Chapter Chapter 8 --- EXPERIMENTS --- p.43
Chapter 8.1 --- Experiment setup --- p.43
Chapter 8.2 --- Packet loss --- p.44
Chapter 8.3 --- Unaccelerated TCP throughput --- p.45
Chapter 8.4 --- Accelerated TCP throughput --- p.46
Chapter 8.5 --- Fairness --- p.47
Chapter 8.6 --- Mobile handset performance --- p.47
Chapter Chapter 9 --- FUTURE WORK --- p.49
Chapter 9.1 --- Dynamic AWnd control --- p.49
Chapter 9.2 --- Split-TCP --- p.50
Chapter 9.3 --- Dynamic resource allocation --- p.50
Chapter 9.4 --- Sender-based acceleration --- p.51
Chapter Chapter 10 --- CONCLUSION --- p.52
BIBLIOGRAPHY --- p.53
Anand, Kunde. "Providing QoS To Real-time And Data Applications In 3G Wireless Systems." Thesis, 2008. http://hdl.handle.net/2005/795.
Full textHuang, Xiao-Zhen, and 黃筱真. "Honeypot-based Intrusion Detection Method Using LSTM for Modbus TCP Protocol." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394041%22.&searchmode=basic.
Full text國立中興大學
資訊科學與工程學系所
107
Industrial Control Systems (ICS) are often used in critical infrastructures such as energy, water resources, chemical, manufacturing, and transportation. With the development of information communication technologies, ICS faces more and more cyber-attack risks. Intrusion Detection System (IDS) is a commonly used approach to improve the security of ICS, and honeypot techniques are very useful in collecting hacker behavior data in ICS. In this thesis, a honeypot-based intrusion detection method using Long Short- Term Memory (LSTM) neural network for Modbus TCP protocol is proposed. Honeypot is a technique that is used to capture malicious data by pretending the real system. Honeypots can be classified into either low-interaction honeypots or high-interaction honeypots. Low-interaction honeypot is easy to develop and deploy, but it is easy to be recognized by hacker or by ICS search engine like Shodan. On the other hand, high-interaction honeypot is more difficult to be recognized because it provides more complicated features of devices with high interaction capabilities. Physical honeypot is regarded as an implementation of high-interaction honeypot by using real device to lure hackers. In this thesis, we build a Modbus TCP physical honeypot to capture malicious data. In the proposed intrusion detection model, both normal and malicious data are used in training. In the preprocessing phase, the log data are transformed from packets into session data. Because the network packets in ICS network have strong temporal relationship, LSTM neural network and ensemble method are used to improve the performance of the proposed intrusion detection method. The experimental results show that the accuracy for detecting Modbus TCP attacks is about 92%.
ChenTzu-Kao and 高振哲. "Adaptive TCP protocol for wireless communication systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/a72fm9.
Full text國立交通大學
電子工程系所
92
Supporting heterogeneous services are mandatory for 3G and beyond wireless systems. Using the wireline data transmission protocol might not be suitable for wireless systems. In this thesis, we will identify potential TCP performance problems in wireless environment where the transmission bandwidth is varied and errors are bursty. An Adaptive Timer-based control algorithm is proposed to improve the TCP performance in wireless communication systems.
Wang, Pin-Han, and 王品翰. "An Intrusion Detection Method Based on Log Sequence Clustering of Honeypot for Modbus TCP Protocol." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/972urv.
Full text國立中興大學
資訊科學與工程學系
106
Modbus TCP protocol is a famous and widely used industrial communication protocol for industrial control systems (ICSs). With the increasing number of attacks on ICSs, the protection of industrial network has become an important issue. For preventing ICSs from being hacked, one of efficient way is developing intrusion detection methods for Modbus TCP. In this thesis, we consider three problems of the intrusion detection methods: (1) Intrusion detection methods for Modbus TCP should detect attack behaviors with sequential feature. (2) They should detect as much as possible attacks, even including unexpected ones. (3) They should provide clear representation for detected Modbus TCP attacks. For solving these problems, we propose an intrusion detection method using honeypot for Modbus TCP protocol. In the proposed method, the log file of a honeypot on Modbus TCP protocol consists of Modbus TCP instruction sequences communicated between the honeypot and other nodes. Due to the characteristics of honeypot systems, all of the recorded sequences can be treated as attack behaviors. The proposed method then analyzes the log sequences in the following steps: (1) A similarity function based on longest common subsequence is defined for log sequences. (2) A hierarchical clustering method is then applied to cluster the log sequences. (3) For each cluster, it will extract representative instruction sequence to represent the type of attacks. (4) Finally, the proposed method will generate the flow graph (FG) to show the interaction flow for each representative attacks. The proposed method provides deep analysis for detecting Modbus TCP attacks and unexpected ones. It also uses FGs to visualize the attack behaviors. The proposed method was implemented using the open-source honeypot called Conpot to collect attack behaviors on Modbus. The experimental results revealed that the proposed method has 88% accuracy for identifying attack behaviors, and can detect unexpected ones at 92% true positive and 0% false positive rates.
Jaya, Ali, and 王慶吉. "Study of a Configurable Wireless Sensor Module Using Modbus TCP Protocol and User Defined Environment Development." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/70749254256265291149.
Full text國立臺灣科技大學
自動化及控制研究所
104
Traditional sensors using analogue output are still used in many industry applications. The variety output such as ampere and voltage communication make sensors need some device to make a smart sensors. To bridge the technology between the traditional sensors and the smart sensors, a configurable wireless sensor platform is proposed in this study. This study will focus on for sensors with voltage output, and modification output from current to voltage. Universal sensors can be applied because service in android for user configuration in the smartphone will give opportunity to attach many type sensors. Modbus TCP using wireless media communication which has IEEE802.11 standard will be used for communicate between smart sensors and smartphone. By applying this method, a traditional sensor acts as though smart sensor which has capability of “plug and play” and connects to the network. The System provides user defined environment which may accommodate user’s need for flexible application. Main functions are for data acquisition to monitor, to record and to report physical properties through a smartphone with android system. Several analog output such as THS24 humidity sensor and LM35 temperature sensor were used for measuring in lab room, data can be displayed and can be transferred through email for further analysis.
HSIAO, TZU-CHIEH, and 蕭子傑. "The Study of Heartbeat Monitoring and Warning System Based on Modbus Communication Protocol." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ccn294.
Full text國立臺北教育大學
資訊科學系碩士班
107
The field of physiological information collection is an important indicator in Medical Sciences .Among them ,obtaining physiological signals recording , calculating and even alerting is one of the major themes that technology assisted in medical sciences .The purpose of how to get physiological signals is to use the sensing elements to convert the signals into common electrical signals .Cause of these signal which are easy to be measure , track and log can help bioinformatics and family medicine .In the existing literatures , researches and the development of instruments , there are lots of cases that scholars have proposed that the theory records such physiological information into electrical signals , but such of tracking and control these of important parts are regularly be ignored . Asthe process of the wafer is improved , so that sensor chip being tiny enable to be carried around . As long as they have such instruments , lots of physiological information can be obtained, add the alert system and control system , let the system be a precision instrument which track our body information and alarm if needs . In addition , in the experiments we designed and implemented , using the industry’s open andrigorous Modbus communication protocol , the best of it’s feature is that each package will be calculated by cyclic redundancy after transmission , improving the correctness of data and reducing the incidence of wrong alarms , while supporting wired and wireless transmission formats , the protocol makes the system more widely used . This experiment will use the Modbus protocol for data transmission and using photoplethysmography to tracing heartbeat and alarm accidents by system.
HUANG, WEI-CHENG, and 黃韋程. "Design of Renewable Energy Management System Based on DNP3.0 and Modbus Communication Protocol." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/76930524970897389529.
Full text國立高雄應用科技大學
電機工程系博碩士班
105
In order to improve renewable energy utilization and maintain power supply quality in distribution system, this paper investigates the principle of renewable energy regulation and replaces the traditional inverter by the smart inverter which has voltage control strategies for solar photovoltaic (PV) systems. The smart inverters can enhance the renewable energy grid capacity and power quality effectively. The study proposes a communication unit to convert data between Distributed Network Protocol (DNP3.0) and Modbus protocol for developing a communication bridge between PV systems and Taipower. The communication unit is integrated in the renewable energy management system (REMS) for supervisory control and data acquisition (SCADA).The REMS executes remote control of PV inverters to prevent the overvoltage problem. Several PV systems in Yunlin District of Taipower are selected for practical tests to verify the effectiveness of the proposed system.
"TCP performance over mobile data networks." 2013. http://library.cuhk.edu.hk/record=b5549819.
Full textThe number of Internet users which are connected via mobile networks such as 3G and LTE has increased dramatically in recent years. It is well-known that wireless networks in general, and mobile data networks in particular, exhibit characteristics that are very different from their wired counterparts. Nevertheless, the fundamental building block of most Internet applications, namely the Transmission Control Protocol (TCP), is still largely rooted in wired networks. This dissertation investigate the performance of TCP over modern mobile data networks through extensive measurements and experiments carried out in multiple production data networks, ranging from 3G, HSPA, to the latest LTE networks. Despite the rapid increases in mobile network bandwidth, our measurements consistently reveal that existing TCP implementations perform sub-optimally in practice, failing to utilize the abundant bandwidth available in high-speed mobile networks. This work tackles the performance limitations of TCP using a novel approach - transparent protocol optimization, to significantly improve TCP’s throughput performance using on-the-fly protocol optimization carried out by an intermediate network device in-between the TCP end-hosts. Specifically, this work develops (i) a novel opportunistic transmission algorithm to overcome the TCP’s flow control bottleneck; (ii) a transmission rate control algorithm to tackle TCP’s congestion control bottleneck; (iii) a new opportunistic retransmission algorithm to improve TCP’s performance during packet loss recovery; (iv) a stochastic model to quantify the impact of TCP throughput performance on mobile network capacity; and (v) a new queue length estimation algorithm which opens a new avenue for congestion control and network monitoring. In addition, the proposed protocol optimization techniques have been fully implemented into a mobile accelerator device which has been successfully field trialed in three different production 3G/LTE mobile networks, consistently increasing TCP’s throughput by 48% to 163%. In contrast to inventing a new transport protocol or modifying an existing TCP implementation, the proposed approach does not require any modification to the existing TCP implementation at the client/server hosts, does not require any reconfiguration of the server or client, and hence can be deployed readily in today’s 3G and 4G mobile networks, raising the throughput performance of all existing network applications running atop TCP.
Detailed summary in vernacular field only.
Liu, Ke.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2013.
Includes bibliographical references (leaves 166-174).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts also in Chinese.
Abstract --- p.2
Acknowledgement --- p.6
Chapter 1 --- p.1
Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Contributions --- p.3
Chapter 1.3 --- Structure of the Thesis --- p.6
Chapter 2 --- p.9
Flow and Congestion Control --- p.9
Chapter 2.1 --- TCP Performance Bottlenecks --- p.9
Chapter 2.2 --- Background and related works --- p.16
Chapter 2.3 --- Transparent Protocol Optimization --- p.20
Chapter 2.3.1 --- Opportunistic Transmission --- p.20
Chapter 2.3.2 --- Transmission Rate Control --- p.22
Chapter 2.3.3 --- Lost Packet Recovery --- p.27
Chapter 2.4 --- Modeling and Analysis --- p.28
Chapter 2.4.1 --- Background and Assumptions --- p.28
Chapter 2.4.2 --- Queue Length at the Radio Interface --- p.31
Chapter 2.4.3 --- Queue Length Bounds --- p.38
Chapter 2.4.4 --- Guaranteeing Full Bandwidth Utilization --- p.45
Chapter 2.4.5 --- Link Buffer Size Requirement --- p.47
Chapter 2.5 --- Performance Evaluation --- p.53
Chapter 2.5.1 --- Parameter Tuning --- p.53
Chapter 2.5.2 --- Bandwidth Efficiency --- p.56
Chapter 3 --- p.62
Packet Loss Recovery --- p.62
Chapter 3.1 --- Introduction --- p.62
Chapter 3.2 --- TCP Loss Recovery Revisited --- p.64
Chapter 3.2.1 --- Standard TCP Loss Recovery Algorithm --- p.64
Chapter 3.2.2 --- Loss Recovery Algorithm in Linux --- p.66
Chapter 3.2.3 --- Loss Recovery Algorithm in A-TCP --- p.67
Chapter 3.3 --- Efficiency of TCP Loss Recovery Algorithms --- p.68
Chapter 3.3.1 --- Standard TCP Loss Recovery Algorithm --- p.70
Chapter 3.3.2 --- TCP Loss Recovery in Linux --- p.72
Chapter 3.3.3 --- Loss Recovery Algorithm Used in A-TCP --- p.72
Chapter 3.3.4 --- Discussions --- p.73
Chapter 3.4 --- Opportunistic Retransmission --- p.74
Chapter 3.4.1 --- Applications and Performance Analysis --- p.76
Chapter 3.4.2 --- Bandwidth Utilization During Loss Recovery --- p.78
Chapter 3.5 --- Experimental Results --- p.81
Chapter 3.5.1 --- Model Validation --- p.85
Chapter 3.5.2 --- Impact of Loss Recovery Phase on TCP Throughput --- p.85
Chapter 3.5.3 --- A-TCP with Opportunistic Retransmission --- p.86
Chapter 3.6 --- Summary --- p.87
Chapter 4 --- p.89
Impact on Mobile Network Capacity --- p.89
Chapter 4.1 --- Introduction --- p.89
Chapter 4.2 --- Background and Related Work --- p.91
Chapter 4.2.1 --- TCP Performance over Mobile Data Networks --- p.91
Chapter 4.2.2 --- Modeling of Mobile Data Networks --- p.92
Chapter 4.3 --- System Model --- p.94
Chapter 4.3.1 --- Mobile Cell Bandwidth Allocation --- p.95
Chapter 4.3.2 --- Markov Chain Model --- p.96
Chapter 4.3.3 --- Performance Metric for Mobile Internet --- p.98
Chapter 4.3.4 --- Protocol-limited Capacity Loss --- p.100
Chapter 4.3.5 --- Channel-limited Capacity Loss --- p.101
Chapter 4.4 --- Performance Evaluation --- p.102
Chapter 4.4.1 --- Service Response Time --- p.103
Chapter 4.4.2 --- Network Capacity Loss --- p.105
Chapter 5 --- p.114
Mobile Link Queue Length Estimation --- p.114
Chapter 5.1 --- Introduction --- p.115
Chapter 5.2 --- Sum-of-Delay (SoD) algorithm Revisited --- p.117
Chapter 5.2.1 --- Queue Length and Link Buffer Size Estimation --- p.117
Chapter 5.2.2 --- A Bound on Estimation Error --- p.120
Chapter 5.2.3 --- Impact of Uplink Delay Variations --- p.122
Chapter 5.3 --- Uplink Delay Variation Compensation --- p.127
Chapter 5.3.1 --- Exploiting the TCP Timestamp Option --- p.127
Chapter 5.3.2 --- TCP Timestamp Granularity --- p.130
Chapter 5.4 --- Performance Evaluation --- p.131
Chapter 5.4.1 --- Link buffer size estimation under uplink delay variations --- p.132
Chapter 5.4.2 --- Queue length estimation under uplink delay variations --- p.136
Chapter 5.5 --- Summary --- p.136
Chapter 6 --- p.139
Summary and Future Works --- p.139
Chapter 6.1 --- Transparent Protocol Optimization --- p.139
Chapter 6.2 --- Cross-Layer Modeling and Optimization of Mobile Networks --- p.141
Chapter Appendix A. --- Derivation of Equations (2.24) and (2.25) --- p.143
Chapter Appendix B. --- Proof of Theorem 2.1 --- p.145
Chapter Appendix C. --- for Proof of Theorem 2.2 --- p.147
Chapter Appendix D. --- for Proof of Theorem 2.3 --- p.150
Chapter Appendix E. --- for Proof of Theorem 2.4 --- p.151
Chapter Appendix F. --- for Proof of Theorem 2.5 --- p.152
Chapter Appendix G. --- for Proof of Theorem 2.6 --- p.153
Chapter Appendix H. --- for Proof of Theorem 2.7 --- p.156
Chapter Appendix I. --- for Proof of Theorem 2.8 --- p.157
Chapter Appendix J. --- for Proof of Theorem 3.2 --- p.161
Chapter Appendix K. --- for Theorem 3.4 --- p.163
Chapter Appendix H. --- for Theorem 3.5 --- p.164
Bibliography --- p.166
Chang, Bo-Hsiu, and 張博修. "Analysis of Packet Signal with TCP Protocol and Network Simulator in Wireless Communication." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/46864241470734109978.
Full text中原大學
電機工程研究所
92
This thesis investigates the problem of analysis of package signal with TCP (Transport Control Protocol) protocol and network simulator for wireless communication. Via analyzing properties of wireless packages and modifying the existent TCP protocol, an attempt to improve the efficiency of package transaction is proposed by the authors. The simulation results based on NS-2 (Network Simulator version 2) tells us that the designed goals can be reached by this proposal. There are three steps in our proposal. At first, the difference between wired and wireless packet transaction is analyzed. The basic concept we obtain is that when packet delayed occurs, the control stratagem used in wired transmission is not suitable for the case of wireless transmission. Hence, another difference stratagem for wireless communication is proposed. Then, based on the result of the first step, the TCP protocol of wired transmission will be modified to adapt the case of wireless transmission. Finally, the application software named “Network Simulator” is used to simulate the new scheme our proposal. The result shows that the modified scheme from wired TCP can perform well in the packet transmission of wireless communication. There are two significant contributions to the study of how to improve TCP performance in the wireless communication in our proposal as follows: (1) In the wireless network, when the transmission quality of signals , by cutting the package into smaller size appropriate, it can really increase the successful probability of transmission. (2) By applying the technique of to distinguish the case of network congestion or network disconnection the working efficiency of traditional TCP can be enhance in our proposal. The simulation results show that our proposed mechanisms achieve better performance than the existent wired protocol. It is believed that the results of our study in this thesis will be probably practical and efficient on applications of the TCP.
"SACK TCPVENO: an enhanced version of SACK TCP." 2001. http://library.cuhk.edu.hk/record=b5890850.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2001.
Includes bibliographical references (leaves 74-76).
Abstracts in English and Chinese.
Chapter Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Overview --- p.1
Chapter 1.2 --- Motivation and Proposed Solution --- p.2
Chapter 1.3 --- Organization of the Thesis --- p.4
Chapter Chapter 2 --- Background --- p.5
Chapter 2.1 --- Basics of Transmission Control Protocol --- p.5
Chapter 2.1.1 --- Slow Start and Congestion Avoidance --- p.5
Chapter 2.1.2 --- Fast Retransmit and Fast Recovery --- p.7
Chapter 2.2 --- SACK TCP Mechanism --- p.8
Chapter 2.2.1 --- SACK-permitted Option during Three-way Handshake --- p.8
Chapter 2.2.2 --- SACK blocks in SACK Option --- p.9
Chapter 2.2.3 --- Interpreting the SACK Option using Scoreboard --- p.10
Chapter 2.2.4 --- Retransmission Strategy --- p.11
Chapter 2.3 --- TCP Veno Mechanism --- p.13
Chapter 2.3.1 --- Refined Additive Increase --- p.13
Chapter 2.3.2 --- Refined Multiplicative Decrease --- p.14
Chapter Chapter 3 --- SACK TCPVeno --- p.16
Chapter 3.1 --- Distinguishing between Types of Packet Loss --- p.17
Chapter 3.2 --- Refined Multiplicative Decrease --- p.21
Chapter 3.2.1 --- Algorithm --- p.21
Chapter 3.2.2 --- Recovery in Consecutive packet Losses --- p.22
Chapter 3.2.3 --- Recovering Multiple Packet Losses within a Single Window --- p.26
Chapter 3.3 --- Refined Additive Increase --- p.37
Chapter 3.3.1 --- Algorithm --- p.37
Chapter 3.3.2 --- Advantages --- p.40
Chapter 3.4 --- Other Issues --- p.43
Chapter 3.4.1 --- Two Side Modifications --- p.43
Chapter Chapter 4 --- Experiments --- p.44
Chapter 4.1 --- The Network Scenario --- p.44
Chapter 4.1.1 --- Dummynet --- p.45
Chapter 4.2 --- Experiment Results --- p.47
Chapter 4.2.1 --- Single Connection --- p.47
Chapter 4.2.1.1 --- Congestion Window Evolution --- p.47
Chapter 4.2.1.2 --- Sending Rate and Throughput Evolution --- p.49
Chapter 4.2.1.2.1 --- Impact of Packet Loss Rate Due to Lossy Link --- p.49
Chapter 4.2.1.2.2 --- Impact of Buffering --- p.52
Chapter 4.2.1.2.3 --- Impact of Propagation Delay --- p.57
Chapter 4.2.2 --- Multiple Connections --- p.62
Chapter 4.2.2.1 --- Fairness --- p.62
Chapter 4.2.2.2 --- Compatibility --- p.67
Chapter Chapter 5 --- Conclusion --- p.72
Bibliography --- p.74
Rambim, Dorothy Apondi. "Transmission control protocol (TCP) and medium access control (MAC) cross-layer enchancement in wireless." Thesis, 2011. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000384.
Full textWidespread deployment of wireless local area networks (WLANs) and a gradual increase in streaming applications have brought about a demand for improved Quality of Service (QoS) in wireless networks. The IEEE 802.11e standard was proposed to provide QoS mechanisms for assigning high priority to delay-sensitive applications. However, Internet traffic is still dominated by TCP based applications, and the negative effects of the IEEE 802.11e service differentiation scheme on TCP performance in the presence of high priority traffic are becoming a challenging issue. TCP has been found to perform poorly in wireless networks, including IEEE 802.11e; more applications with higher QoS demands use UDP in the transport layer than TCP. Therefore, the QoS of low priority traffic in 802.11e is not guaranteed in networks highly loaded with high priority traffic. This is aggravated by the class differentiation introduced in current QoS protocols, which results in TCP applications being starved during high traffic load. The motivation of this work is to enhance the interaction between the TCP and MAC protocols in order to improve TCP performance in WLANs.