Tesis sobre el tema "Distributed network with mesh topology"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Distributed network with mesh topology".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
MUBEEN, SAAD. "EVALUATION OF SOURCE ROUTING FOR MESH TOPOLOGY NETWORK ON CHIP PLATFORMS". Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-9591.
Texto completoNetwork on Chip is a scalable and flexible communication infrastructure for the design of core based System on Chip. Communication performance of a NoC depends heavily on the routing algorithm. Deterministic and adaptive distributed routing algorithms have been advocated in all the current NoC architectural proposals. In this thesis we make a case for the use of source routing for NoCs, especially for regular topologies like mesh. The advantages of source routing include in-order packet delivery; faster and simpler router design; and possibility of mixing non-minimal paths in a mainly minimal routing. We propose a method to compute paths for various communications in such a way that traffic congestion is avoided while ensuring deadlock free routing. We also propose an efficient scheme to encode the paths.
We developed a tool in Matlab that computes paths for source routing for both general and application specific communications. Depending upon the type of traffic, this tool computes paths for source routing by selecting best routing algorithm out of many routing algorithms. The tool uses a constructive path improvement algorithm to compute paths that give more uniform link load distribution. It also generates different types of traffics. We also developed a simulator capable of simulating source routing for mesh topology NoC. The experiments and simulations which we performed were successful and the results show that the advantages of source routing especially lower packet latency more than compensate its disadvantages. The results also demonstrate that source routing can be a good routing candidate for practical core based SoCs design using network on chip communication infrastructure.
Quan, Yongyun. "Topology-based Device Self-identification in Wireless Mesh Networks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261147.
Texto completoI samband med Internet of Things (IoT) är igångkörning processen att säkert lägga till en ny enhet i ett nätverk. Den täcker många olika uppgifter, inklusive fysisk distribution av enheter och konfigurering av parametrar. Det är nätverksinstallatörer som måste manuellt beställa varje enhet en efter en med hjälp av installationsverktyg. I praktiken är den första uppgiften för en nätverksinstallatör att korrekt identifiera varje enhet innan den konfigureras med lämpliga parametrar. Att identifiera varje enhet speciellt i ett stort nätverk är en mycket tidskrävande process. Detta är också känt som identifieringsproblemet. Detta projekt kommer att ta itu med problemet.En nyhetsidentifieringsmetod presenteras i avhandlingen och det finns ingen mänsklig intervention involverad i identifieringsprocessen. Enheter försöker identifiera sig baserat på fördefinierade regler och information. Tillvägagångssättet kallas därför enhetens självidentifiering och det implementeras i två olika algoritmer, en är centraliserad enhetens självidentifiering och den andra är distribuerad enhetens självidentifiering. Kort sagt, endast en enhet deltar i enhetsidentifieringsprocessen i centraliserat tillvägagångssätt, och i distribuerad motsvarighet är varje enhet en del av identifieringsprocessen.Resultaten av implementationerna visar potentialen för det nya sättet att identifiera enheter i IoT. Enheter i både centraliserat tillvägagångssätt och distribuerat tillvägagångssätt kan identifiera sig med den information som krävs för nätverket. En detaljerad diskussion om de två föreslagna algoritmerna och nätverksinformationen presenteras i avhandlingen.
Champenois, Florient. "Configuration et analyse temporelle de réseaux avioniques à sauts multiples". Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT036.
Texto completoIn the field of embedded real times critical networks, the current trend is to increase requirements in terms of embeddability and bandwidth, in order to meet the new challenges posed by autonomous vehicles and drones. To meet these needs, Safran is establishing a new certifiable model of a distributed network based on a mesh topology. This thesis is taking place within this project, in order to propose a set of methods and tools to meet these needs and thus improve embedded critical networks.With this objective in view, the thesis consisted, firstly, of presenting a range of improvements to Safran's new network model by incorporating multi-path redundancy in place of the multi-plane redundancy currently used in aeronautics to satisfy fault tolerance constraints. The thesis also led to the adoption of several measures to improve others networks capabilities.Secondly, the work also focused on the implementation of a method for calculating a pessimistic worst-case transmission time bound. The presence of cycles of dependencies between data flows within these networks impedes the vast majority of current computation methods to converge on a result. Part of the work has therefore consisted in producing an adaptation of the trajectory approach that can address such networks, while offering optimizations to improve scaling.The final part of the work involved implementing a methodology to produce network configurations that satisfy constraints in terms of fault tolerance, transmission time, and embeddability. This method, which is based on a multi-criteria genetic algorithm, also enables the configuration produced to be optimized as a function of several criteria in order to offer a more than satisfactory result.Finally, the approaches presented in this thesis are tested using a complete set of experiments, allowing us to conclude that it is pertinent
Scheidemantel, Austin, Ibrahim Alnasser, Benjamin Carpenter, Paul Frost, Shivhan Nettles y Chelsie Morales. "Situational Wireless Awareness Network". International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604295.
Texto completoThe purpose of this paper is to explain the process to implementing a wireless sensor network in order to improve situational awareness in a dense urban environment. Utilizing a system of wireless nodes with Global Positioning System (GPS) and heart rate sensors, a system was created that was able to give both position and general health conditions. By linking the nodes in a mesh network line of sight barriers were overcome to allow for operation even in an environment full of obstruction.
Mudali, Pragasen. "Topology control for wireless mesh networks and its effect on network performance". Thesis, University of Zululand, 2017. http://hdl.handle.net/10530/1565.
Texto completoInfrastructureWireless Mesh Networks (I-WMNs) are increasingly used to provide network connectivity and Internet access to previously under-served areas in the developing world. It is common for some of these deployments to be battery-powered due to a lack of electrical infrastructure in the targeted areas. Thus, the energy-efficiency of these networks gains additional importance. Topology Control (TC) has been previously reported to improve the energy-efficiency and network performance of wireless ad-hoc networks, including I-WMNs. However,simulation-based studies have been relied upon to reach these conclusions and the study of TC prototypes applicable to I-WMNs has largely been limited to design issues. Thus, the study of the efficacy of TC prototypes as a mechanism for improving energy-fficiency and network performance remains an open issue. The thesis addresses this knowledge gap by studying the dynamic, run-time behaviours and the network topologies created by two standards-compatible TC prototypes. This study provides unique insight into how the prototypes consume computational resources, maintain network connectivity, produce cumulative transceiver power savings and affect the workings of the routing protocol being employed. This study also documents the topology instability caused by transceiver power oscillations produced by the PlainTC prototype. A context-based solution to reduce transceiver power oscillations and the subsequent topology instability is proposed. This solution applies the Principal Component Analysis statistical method to historical network data in order to derive the weights associated with each of the identified context variables. A threshold value is defined that only permits a node to adjust its transceiver power output if the observed change in a node’s context exceeds the threshold. The threshold mechanism is incorporated into the PlainTC+ prototype and is shown to reduce topology instability whilst improving network performance when compared to PlainTC.The results obtained in this study suggest that I-WMN topologies formed by TC are able to closely match the performance of networks that do not employ TC. However, this study shows that TC negatively affects the energy efficiency of the network despite achieving cumulative transceiver power savings.
Dharmaraj, Anusha. "Distributed Topology-based Resource Allocation for a Femtocell-based Cellular Network". University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1439281440.
Texto completoKobo, Hlabishi. "Situation-aware routing for wireless mesh networks with mobile nodes". Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6647_1370594682.
Texto completoCastmo, Thomas. "Analysis of a wireless mesh network : investigating technologies and building prototypes for a distributed radio network /". Göteborg : IT University of Göteborg, 2005. http://www.ituniv.se/w/index.php?option=com_itu_thesis&Itemid=319.
Texto completoKomali, Ramakant S. "Game-Theoretic Analysis of Topology Control". Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/28358.
Texto completoPh. D.
Simmons, Randall J. Curran Christopher C. "Mesh networks within a distributed operations framework utilizing IP based radios". Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FSimmons.pdf.
Texto completoThesis Advisor(s): Bordetsky, Alex. "September 2007." Description based on title screen as viewed on Oct. 22, 2007. Includes bibliographical references (p. 93-95). Also available in print.
Matos, Ricardo Jorge Magalhães de. "Context-based wireless mesh networks". Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12450.
Texto completoIn the modern society, new devices, applications and technologies, with sophisticated capabilities, are converging in the same network infrastructure. Users are also increasingly demanding in personal preferences and expectations, desiring Internet connectivity anytime and everywhere. These aspects have triggered many research efforts, since the current Internet is reaching a breaking point trying to provide enough flexibility for users and profits for operators, while dealing with the complex requirements raised by the recent evolution. Fully aligned with the future Internet research, many solutions have been proposed to enhance the current Internet-based architectures and protocols, in order to become context-aware, that is, to be dynamically adapted to the change of the information characterizing any network entity. In this sense, the presented Thesis proposes a new architecture that allows to create several networks with different characteristics according to their context, on the top of a single Wireless Mesh Network (WMN), which infrastructure and protocols are very flexible and self-adaptable. More specifically, this Thesis models the context of users, which can span from their security, cost and mobility preferences, devices’ capabilities or services’ quality requirements, in order to turn a WMN into a set of logical networks. Each logical network is configured to meet a set of user context needs (for instance, support of high mobility and low security). To implement this user-centric architecture, this Thesis uses the network virtualization, which has often been advocated as a mean to deploy independent network architectures and services towards the future Internet, while allowing a dynamic resource management. This way, network virtualization can allow a flexible and programmable configuration of a WMN, in order to be shared by multiple logical networks (or virtual networks - VNs). Moreover, the high level of isolation introduced by network virtualization can be used to differentiate the protocols and mechanisms of each context-aware VN. This architecture raises several challenges to control and manage the VNs on-demand, in response to user and WMN dynamics. In this context, we target the mechanisms to: (i) discover and select the VN to assign to an user; (ii) create, adapt and remove the VN topologies and routes. We also explore how the rate of variation of the user context requirements can be considered to improve the performance and reduce the complexity of the VN control and management. Finally, due to the scalability limitations of centralized control solutions, we propose a mechanism to distribute the control functionalities along the architectural entities, which can cooperate to control and manage the VNs in a distributed way.
Na sociedade actual, novos dispositivos, aplicações e tecnologias, com capacidades sofisticadas, estão a convergir na mesma infra-estrutura de rede. Os utilizadores são também cada vez mais exigentes nas suas preferências e expectativas pessoais, desejando conetividade `a Internet em qualquer hora e lugar. Estes aspectos têm desencadeado muitos esforços de investigação, dado que a Internet atual está a atingir um ponto de rutura ao tentar promover flexibilidade para os utilizadores e lucros para os operadores, enquanto lida com as exigências complexas associadas `a recente evolução. Em sintonia com a linha de investigação para a Internet do futuro, muitas soluções têm sido propostas para melhorar as arquiteturas e protocolos da Internet atual, de forma a torná-los sensíveis ao contexto, isto é, adaptá-los dinamicamente `a alteração da informação que caracteriza qualquer entidade de rede. Neste sentido, a presente Tese propõe uma nova arquitetura que permite criar várias redes com diferentes características de acordo com o contexto das mesmas, sobre uma única rede em malha sem fios (WMN), cuja infra-estructura e protocolos são muito flexíveis e auto-adaptáveis. Mais especificamente, esta Tese modela o contexto dos utilizadores, que pode abranger as suas preferências de segurança, custo e mobilidade, capacidades dos seus dispositivos ou requisitos de qualidade dos seus serviços, de forma a transformar uma WMN num conjunto de redes lógicas. Cada rede lógica ´e configurada para satisfazer um conjunto de necessidades de contexto do utilizador (como exemplo, suporte de mobilidade elevada e de baixa seguran¸ca). Para implementar esta arquitetura centrada no utilizador, esta Tese utiliza a virtualização de redes, que tem muitas vezes sido defendida como um meio para implementar arquiteturas e serviços de rede de uma forma independente, enquanto permite uma gestão dinâmica dos recursos. Desta forma, a virtualização de redes pode permitir uma configuração flexível e programável de uma WMN, a fim de ser partilhada por várias redes lógicas (ou redes virtuais - VNs). Além disso, o grau de isolamento introduzido pela virtualização de redes pode ser utilizado para diferenciar os protocolos e mecanismos de cada VN baseada em contexto. Esta arquitetura levanta vários desafios para controlar e gerir as VNs em tempo real, e em resposta `a dinâmica dos utilizadores e da WMN. Neste contexto, abordamos os mecanismos para: (i) descobrir e selecionar a VN a atribuir a um utilizador; (ii) criar, adaptar e remover as topologias e rotas das VNs. Também exploramos a possibilidade de considerar a taxa de variação dos requisitos de contexto dos utilizadores de forma a melhorar o desempenho e reduzir a complexidade do controlo e gestão das VNs. Finalmente, devido ´as limitações de escalabilidade das soluções de controlo centralizadas, propomos um mecanismo para distribuir as funcionalidades de controlo ao longo das entidades da arquitectura, que podem cooperar para controlar e gerir as VNs de uma forma distribuída.
Gkantsidis, Christos. "Algorithmic performance of large-scale distributed networks a spectral method approach /". Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-12062005-141254/.
Texto completoMihail, Milena, Committee Chair ; Ammar, Mostafa, Committee Member ; Dovrolis, Constantinos, Committee Member ; Faloutsos, Michalis, Committee Member ; Zegura, Ellen, Committee Member.
Davis, Joseph A. Sr. "An analysis of network and sensor performance within IEEE 802.x wireless MESH networks in the Tactical Network Topology (TNT)". Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2297.
Texto completoThe objective of this research is to analyze the network performance and sensor functionality, efficacy and usability of IEEE 802.x wireless MESH networks within a DoD Tactical network environment. Multiple sensor configurations operating with wireless MESH network technologies will be researched and analyzed for performance in expeditionary environment situations. Specifically, this thesis will attempt establish the foundation for the development of wireless MESH "network health" models by examining the performance of sensors operating within a MESH network and define which network performance metrics equate to good quality of service. This research will experiment with different application, sensor, and network configurations of currently available COTS components, such as, voice, video and data hardware. This thesis will lay the groundwork for wireless network MESH predictability, which will enable the optimal use of sensors within a tactical network environment.
Lieutenant Commander, United States Navy
Davis, Joseph A. "An analysis of network and sensor performance within IEEE 802.x wireless MESH networks in the Tactical Network Topology (TNT) /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDavis.pdf.
Texto completoThesis Advisor(s): Alexander Bordetsky. Includes bibliographical references (p. 49-50). Also available online.
Haq, Muhammad. "Implementation and performance analysis of star-based mesh network". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-14876.
Texto completoAbbas, Waseem. "Network-centric methods for heterogeneous multiagent systems". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50400.
Texto completoGrobler, Magdalena Johanna. "Using topological information in opportunistic network coding / by Magdalena Johanna (Leenta) Grobler". Thesis, North-West University, 2008. http://hdl.handle.net/10394/2639.
Texto completoNiklasson, Johan y Oskar Hahr. "Topology optimization for distributed consensus in multi-agent networks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259352.
Texto completoDistribuerade nätverk bestående av flera agenter som har som uppgift att tillsammans nå gemensamma resultat har blivit allt mer populärt. Ett sådant användningsområde är hur drönare kan användas för att observera och upptäcka skogsbränder över en given yta. I en sådan tillämpning är det av stor vikt att drönarnätverket kan kommunicera och kongruera över värden nätverket delar med varandra. Dessa värden kan representera händelser som nätverket har som uppgift att upptäcka eller en riktning för drönarna att flyga i. Det är inte alltid garanterat att det finns en central kommunikationscentral för sådana nätverk, utan blir beroende på att kommunicera med varandra för att utbyta och kongruera över värden. Den här rapporten fokuserar på en avgränsad del av det ovanstående problemet som kallas för distribuerat konsensusvärde (eng. distributed averaging). Rapporten undersöker hur ett sådant nätverks konvergeringsförmåga, totala energikostnad samt täckning påverkas när fler drönare tillförs till nätverket. När arbetsytan var satt till statisk storlek visade resultaten att den tillförda energikostnaden per drönare var högre för små nätverk än för större nätverk. Det visades också att hastigheten som nätverket når ett kongruerande värde inte nödvändigtvis påverkas av storleken av nätverket. När arbetsytan ökade i takt med storleken på nätverket observerades däremot motsatt effekt för energikostnad och hastigheten för att nå ett konsensusvärde.
Kuo, Victor. "Enabling Parallel Wireless Communication in Mobile Robot Teams". Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/9410.
Texto completoSHAH, PAYAL D. "DISTRIBUTED HEBBIAN INFERENCE OF ENVIRONMENT STRUCTURE IN SELF-ORGANIZED SENSOR NETWORKS". University of Cincinnati / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1177083367.
Texto completoKarapetsas, Konstantinos. "Building a simulation toolkit for wireless mesh clusters and evaluating the suitability of different families of ad hoc protocols for the Tactical Network Topology". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://handle.dtic.mil/100.2/ADA432399.
Texto completoThesis Advisor(s): Alexander Bordetsky, Gilbert M. Lundy. Includes bibliographical references (p. 69-75). Also available online.
Goga, Eda. "Progettazione ed analisi di algoritmi di mobilità controllata per reti mesh aeree con vincoli di copertura e persistenza". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016.
Buscar texto completoMilicic, Gregory J. "Analysis of hardware requirements for airborne tactical mesh networking nodes". Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2218.
Texto completoWireless mesh mobile ad hoc networks (MANETs) provide the military with the opportunity to spread information superiority to the tactical battlespace in support of network-centric warfare (NCW). These mesh networks provide the tactical networking framework for providing improved situational awareness through ubiquitous sharing of information including remote sensor and targeting data. The Naval Postgraduate School's Tactical Network Topology (TNT) project sponsored by US Special Operations Command seeks to adapt commercial off the shelf (COTS) information technology for use in military operational environments. These TNT experiments rely on a variety of airborne nodes including tethered balloon and UAVs such as the Tern to provide reachback from nodes on the ground to the Tactical Operations Center (TOC) as well as to simulate the information and traffic streams expected from UAVs conducting surveillance missions and fixed persistent sensor nodes. Airborne mesh nodes have unique requirements that can be implemented with COTS technology including single board computers and compact flash.
Lieutenant, United States Navy
Merugu, Shashidhar. "Network Design and Routing in Peer-to-Peer and Mobile Ad Hoc Networks". Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7219.
Texto completoWANG, HONGHAO. "An Efficient and Secure Overlay Network for General Peer-to-Peer Systems". University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204080675.
Texto completoMechtri, Marouen. "Virtual networked infrastructure provisioning in distributed cloud environments". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0028/document.
Texto completoCloud computing emerged as a new paradigm for on-demand provisioning of IT resources and for infrastructure externalization and is rapidly and fundamentally revolutionizing the way IT is delivered and managed. The resulting incremental Cloud adoption is fostering to some extent cloud providers cooperation and increasing the needs of tenants and the complexity of their demands. Tenants need to network their distributed and geographically spread cloud resources and services. They also want to easily accomplish their deployments and instantiations across heterogeneous cloud platforms. Traditional cloud providers focus on compute resources provisioning and offer mostly virtual machines to tenants and cloud services consumers who actually expect full-fledged (complete) networking of their virtual and dedicated resources. They not only want to control and manage their applications but also control connectivity to easily deploy complex network functions and services in their dedicated virtual infrastructures. The needs of users are thus growing beyond the simple provisioning of virtual machines to the acquisition of complex, flexible, elastic and intelligent virtual resources and services. The goal of this thesis is to enable the provisioning and instantiation of this type of more complex resources while empowering tenants with control and management capabilities and to enable the convergence of cloud and network services. To reach these goals, the thesis proposes mapping algorithms for optimized in-data center and in-network resources hosting according to the tenants' virtual infrastructures requests. In parallel to the apparition of cloud services, traditional networks are being extended and enhanced with software networks relying on the virtualization of network resources and functions especially through network resources and functions virtualization. Software Defined Networks are especially relevant as they decouple network control and data forwarding and provide the needed network programmability and system and network management capabilities. In such a context, the first part proposes optimal (exact) and heuristic placement algorithms to find the best mapping between the tenants' requests and the hosting infrastructures while respecting the objectives expressed in the demands. This includes localization constraints to place some of the virtual resources and services in the same host and to distribute other resources in distinct hosts. The proposed algorithms achieve simultaneous node (host) and link (connection) mappings. A heuristic algorithm is proposed to address the poor scalability and high complexity of the exact solution(s). The heuristic scales much better and is several orders of magnitude more efficient in terms of convergence time towards near optimal and optimal solutions. This is achieved by reducing complexity of the mapping process using topological patterns to map virtual graph requests to physical graphs representing respectively the tenants' requests and the providers' physical infrastructures. The proposed approach relies on graph decomposition into topology patterns and bipartite graphs matching techniques. The third part propose an open source Cloud Networking framework to achieve cloud and network resources provisioning and instantiation in order to respectively host and activate the tenants' virtual resources and services. This framework enables and facilitates dynamic networking of distributed cloud services and applications. This solution relies on a Cloud Network Gateway Manager and gateways to establish dynamic connectivity between cloud and network resources. The CNG-Manager provides the application networking control and supports the deployment of the needed underlying network functions in the tenant desired infrastructure (or slice since the physical infrastructure is shared by multiple tenants with each tenant receiving a dedicated and isolated portion/share of the physical resources)
LUZURIAGA, QUICHIMBO JORGE ELOY. "Managing Mobility for Distributed Smart Cities Services". Doctoral thesis, Universitat Politècnica de València, 2017. http://hdl.handle.net/10251/84744.
Texto completoInternet de las cosas (IoT) se refiere a la idea de interconectar sensores, actuadores, dispositivos físicos, vehículos, edificios y cualquier elemento dotado de la electrónica, así como del software y de la conectividad de red que los hace capaces de intercambiar datos para proporcionar servicios altamente efectivos. En esta tesis nos centramos en temas relacionados con la comunicación de sistemas IoT, específicamente en situaciones de movilidad y en los problemas que esto conlleva. Con este fin ofrecemos diferentes soluciones que alivian su impacto y garantizan la entrega de información en estas situaciones. El contexto de referencia es una ciudad inteligente donde varios dispositivos móviles participan de forma colaborativa enviando periódicamente información desde sus sensores hacia servicios ubicados en plataformas en la nube (cloud computing) donde mediante el uso de virtualización, la información está protegida garantizando su seguridad y privacidad. Las soluciones propuestas en esta tesis se enfocan en probar sobre una pequeña infraestructura un prototipo que abarca e integra diferentes tecnologías y estándares para resolver eficientemente los problemas previamente identificados. Hemos enfocado nuestro esfuerzo en el uso de dispositivos sobre escenarios reales con dos de las redes más extendidas en todo el mundo: WiFi y enlaces 802.15.4. Nos enfocamos en protocolos que ofrecen el paradigma productor/consumidor como el protocolo avanzado de colas de mensajes (AMQP) y particularmente el protocolo de transporte de mensajes telemétricos (MQTT), observamos su comportamiento a través de experimentos en laboratorio y en pruebas al aire libre, repitiendo las pruebas con diferentes tamaños de mensajes y diferente periodicidad entre mensajes. Para modelar las diferentes posibles aplicaciones de la propuesta, se tomaron en consideración varias cuestiones planteadas por la movilidad, resultando en un modelo para dimensionar eficientemente el número de fuentes para un nodo móvil y para calcular el tamaño requerido del buffer, en función del número de fuentes y del tamaño de los mensajes. Proponemos un mecanismo adaptado al protocolo MQTT que evita la pérdida de datos en clientes móviles, basado en un buffer intermedio entre la producción y publicación de mensajes que, en conjunto con el uso de una alternativa al gestor de conexiones inalámbricas "Network Manager", en ciertos contextos mejora el establecimiento de las conexiones. Para la evaluación de esta propuesta se presenta un estudio detallado de un nodo móvil que se mueve en un escenario real al aire libre, donde estudiamos el comportamiento del jitter y la transmisión de mensajes. Además, hemos utilizado emuladores de redes IoT para estudiar y determinar los efectos sobre la probabilidad de entrega de mensajes, cuando se agregan tanto publicadores como suscriptores a diferentes escenarios. Finalmente, se presenta una solución totalmente orientada a entornos con dispositivos de recursos limitados que combina los protocolos MQTT con redes tolerantes a retardos (DTN) para garantizar la entrega de información. La ventaja de las soluciones que proponemos reside en el hecho de que los sistemas IoT se vuelven resilientes a la movilidad y a los cambios de punto de acceso, permitiendo así que los desarrolladores creen fácilmente aplicaciones y servicios IoT evitando considerar estos problema. Otra ventaja de nuestras soluciones es que no necesitan soporte adicional de la red como sucede con protocolos como MobileIP o el protocolo que separa el identificador del localizador (LISP). Se destaca cómo hemos mejorado las soluciones existentes hasta el momento de la escritura de esta disertación, y se identifican futuras líneas de actuación que no han sido contempladas.
Internet de les coses (IoT) es refereix a la idea d'interconnectar sensors, actuadors, dispositius físics, vehicles, edificis i qualsevol element dotat de l'electrònica, així com del programari i de la connectivitat de xarxa que els fa capaces d'intercanviar dades per proporcionar serveis altament efectius. En aquesta tesi ens centrem en temes relacionats amb la comunicació de sistemes IoT, específicament en situacions de mobilitat i en els problemes que això comporta. A aquest efecte oferim diferents solucions que alleugeren el seu impacte i garanteixen el lliurament d'informació en aquestes situacions. El context de referència és una ciutat intel·ligent on diversos dispositius mòbils participen de forma col·laborativa enviant periòdicament informació des dels seus sensors cap a serveis situats en plataformes en el núvol (cloud computing) on mitjançant l'ús de virtualització, la informació està protegida garantint la seva seguretat i privadesa. Les solucions proposades en aquesta tesi s'enfoquen a provar sobre una xicoteta infraestructura un prototip que abasta i integra diferents tecnologies i estàndards per a resoldre eficientment els problemes prèviament identificats. Hem enfocat el nostre esforç en l'ús de dispositius sobre escenaris reals amb dos de les xarxes més esteses a tot el món: WiFi i enllaços 802.15.4. Ens enfoquem en protocols que ofereixen el paradigma productor/consumidor com el protocol avançat de cues de missatges (AMQP) i particularment el protocol de transport de missatges telemètrics (MQTT), observem el seu comportament a través d'experiments en laboratori i en proves a l'aire lliure, repetint les proves amb diferents grandàries de missatges i diferent periodicitat entre missatges. Per a modelar les diferents possibles aplicacions de la proposta, es van prendre en consideració diverses qüestions plantejades per la mobilitat, resultant en un model per a dimensionar eficientment el nombre de fonts per a un node mòbil i per a calcular la grandària requerida del buffer, en funció del nombre de fonts i de la grandària dels missatges. Proposem un mecanisme adaptat al protocol MQTT que evita la pèrdua de dades per a clients mòbils, basat en un buffer intermedi entre la producció i publicació de missatges que en conjunt amb l'ús d'una alternativa al gestor de connexions sense fils "Network Manager'', en certs contextos millora l'establiment de les connexions. Per a l'avaluació d'aquesta proposta es presenta un estudi detallat d'un node mòbil que es mou en un escenari real a l'aire lliure, on estudiem el comportament del jitter i la transmissió de missatges. A més, hem utilitzat emuladors de xarxes IoT per a estudiar i determinar els efectes sobre la probabilitat de lliurament de missatges, quan s'agreguen tant publicadors com subscriptors a diferents escenaris. Finalment, es presenta una solució totalment orientada a entorns amb dispositius de recursos limitats que combina els protocols MQTT amb xarxes tolerants a retards (DTN) per a garantir el lliurament d'informació. L'avantatge de les solucions que proposem resideix en el fet que els sistemes IoT es tornen resilients a la mobilitat i als canvis de punt d'accés, permetent així que els desenvolupadors creuen fàcilment aplicacions i serveis IoT evitant considerar aquests problema. Un altre avantatge de les nostres solucions és que no necessiten suport addicional de la xarxa com succeeix amb protocols com MobileIP o el protocol que separa l'identificador del localitzador (LISP). Es destaca com hem millorat les solucions existents fins al moment de l'escriptura d'aquesta dissertació, i s'identifican futures línies d'actuació que no han sigut contemplades.
Luzuriaga Quichimbo, JE. (2017). Managing Mobility for Distributed Smart Cities Services [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/84744
TESIS
Ghasemi, Saeed y Moussa Haisam El-hajj. "Fair Medium Access Control Mechanism Reducing Throughput Degradation in IEEE 802.11s Wireless Mesh Networks". Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20052.
Texto completoThis thesis rapport deals with the performance issues of the newly standardized Wireless mesh protocol (IEEE 802.11s). In this thesis, we work on improving the conditions that results in throughput degradation in a chain of nodes topology. The mesh standard is very promising with many advantages for both IoT systems and home wireless networks.We work on the issue of unfairness when CSMA/CA is applied, which causes throughput degradation due to packet loss and indicates starvation. We analyze the implication of the Collision Avoidance (CA) mechanism and propose a replacement for the CA that is both fair and able to maintain collision avoidance. We implement this in a simulator and the result shows significantly higher end-to-end throughput compared to the original CSMA/CA and no packet loss due to buffer overflow.
Mechtri, Marouen. "Virtual networked infrastructure provisioning in distributed cloud environments". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0028.
Texto completoCloud computing emerged as a new paradigm for on-demand provisioning of IT resources and for infrastructure externalization and is rapidly and fundamentally revolutionizing the way IT is delivered and managed. The resulting incremental Cloud adoption is fostering to some extent cloud providers cooperation and increasing the needs of tenants and the complexity of their demands. Tenants need to network their distributed and geographically spread cloud resources and services. They also want to easily accomplish their deployments and instantiations across heterogeneous cloud platforms. Traditional cloud providers focus on compute resources provisioning and offer mostly virtual machines to tenants and cloud services consumers who actually expect full-fledged (complete) networking of their virtual and dedicated resources. They not only want to control and manage their applications but also control connectivity to easily deploy complex network functions and services in their dedicated virtual infrastructures. The needs of users are thus growing beyond the simple provisioning of virtual machines to the acquisition of complex, flexible, elastic and intelligent virtual resources and services. The goal of this thesis is to enable the provisioning and instantiation of this type of more complex resources while empowering tenants with control and management capabilities and to enable the convergence of cloud and network services. To reach these goals, the thesis proposes mapping algorithms for optimized in-data center and in-network resources hosting according to the tenants' virtual infrastructures requests. In parallel to the apparition of cloud services, traditional networks are being extended and enhanced with software networks relying on the virtualization of network resources and functions especially through network resources and functions virtualization. Software Defined Networks are especially relevant as they decouple network control and data forwarding and provide the needed network programmability and system and network management capabilities. In such a context, the first part proposes optimal (exact) and heuristic placement algorithms to find the best mapping between the tenants' requests and the hosting infrastructures while respecting the objectives expressed in the demands. This includes localization constraints to place some of the virtual resources and services in the same host and to distribute other resources in distinct hosts. The proposed algorithms achieve simultaneous node (host) and link (connection) mappings. A heuristic algorithm is proposed to address the poor scalability and high complexity of the exact solution(s). The heuristic scales much better and is several orders of magnitude more efficient in terms of convergence time towards near optimal and optimal solutions. This is achieved by reducing complexity of the mapping process using topological patterns to map virtual graph requests to physical graphs representing respectively the tenants' requests and the providers' physical infrastructures. The proposed approach relies on graph decomposition into topology patterns and bipartite graphs matching techniques. The third part propose an open source Cloud Networking framework to achieve cloud and network resources provisioning and instantiation in order to respectively host and activate the tenants' virtual resources and services. This framework enables and facilitates dynamic networking of distributed cloud services and applications. This solution relies on a Cloud Network Gateway Manager and gateways to establish dynamic connectivity between cloud and network resources. The CNG-Manager provides the application networking control and supports the deployment of the needed underlying network functions in the tenant desired infrastructure (or slice since the physical infrastructure is shared by multiple tenants with each tenant receiving a dedicated and isolated portion/share of the physical resources)
Shankar, Arun. "Optimal jammer placement to interdict wireless network services". Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483583.
Texto completoThesis Advisor(s): Alderson, David ; Zhou, Hong. "June 2008." Description based on title screen as viewed on August 22, 2008. Includes bibliographical references (p. 39-40). Also available in print.
Raška, Martin. "Mobile IP v sítích MANET". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218096.
Texto completoKhoumsi, Khalid. "Optimisation des performances dans les réseaux de communication des machines parallèles à passage de messages". Grenoble INPG, 1996. http://www.theses.fr/1996INPG0202.
Texto completoFriend, Daniel. "Cognitive Networks: Foundations to Applications". Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/26449.
Texto completoPh. D.
Sieklik, Ivan. "Thread Smart Home Model". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316420.
Texto completoHanaf, Anas. "Algorithmes distribués de consensus de moyenne et leurs applications dans la détection des trous de couverture dans un réseau de capteurs". Thesis, Reims, 2016. http://www.theses.fr/2016REIMS018/document.
Texto completoDistributed consensus algorithms are iterative algorithms of low complexity where neighboring sensors interact with each other to reach an agreement without coordinating unit. As the nodes in a wireless sensor network have limited computing power and limited battery, these distributed algorithms must reach a consensus in a short time and with little message exchange. The first part of this thesis is based on the study and comparison of different consensus algorithms synchronously and asynchronously in terms of convergence speed and communication rates. The second part of our work concerns the application of these consensus algorithms to the problem of detecting coverage holes in wireless sensor networks.This coverage problem also provides the context for the continuation of our work. This problem is described as how a region of interest is monitored by sensors. Different geometrical approaches have been proposed but are limited by the need to know exactly the position of the sensors; but this information may not be available if the locating devices such as GPS are not on the sensors. From the mathematical tool called algebraic topology, we have developed a distributed algorithm of coverage hole detection searching a harmonic function of a network, that is to say canceling the operator of the 1-dimensional Laplacian. This harmonic function is connected to the homology group H1 which identifies the coverage holes. Once a harmonic function obtained, detection of the holes is realized by a simple random walk in the network
Igugu, Onajite Johnson. "LAPSync : a Location-Aware Protocol for Remote File Synchronization". Thesis, Högskolan Väst, Institutionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-4460.
Texto completoKlopson, Jadon E. y Stephen V. Burdian. "Collaborative applications used in a wireless environment at sea for use in Coast Guard Law Enforcement and Homeland Security missions". Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2311.
Texto completoThis thesis analyzes the potential impact of incorporating wireless technologies, specifically an 802.11 mesh layer architecture and 802.16 Orthogonal Frequency Division Multiplexing, in order to effectively and more efficiently transmit data and create a symbiotic operational picture between Coast Guard Cutters, their boarding teams, Coast Guard Operation Centers, and various external agencies. Two distinct collaborative software programs, Groove Virtual Office and the Naval Postgraduate School's Situational Awareness Agent, are utilized over the Tactical Mesh and OFDM network configurations to improve the Common Operating Picture of involved units within a marine environment to evaluate their potential impact for the Coast Guard. This is being done to increase the effectiveness and efficiency of Coast Guard units while they carry out their Law Enforcement and Homeland Security Missions. Through multiple field experiments, including Tactical Network Topology and nuclear component sensing with Lawrence Livermore National Laboratory, we utilize commercial off the shelf (COTS) equipment and software to evaluate their impact on these missions.
Lieutenant Commander, United States Coast Guard
Lieutenant, United States Coast Guard
Moscu, Mircea. "Inférence distribuée de topologie de graphe à partir de flots de données". Thesis, Université Côte d'Azur, 2020. http://www.theses.fr/2020COAZ4081.
Texto completoThe second decade of the current millennium can be summarized in one short phrase: the advent of data. There has been a surge in the number of data sources: from audio-video streaming, social networks and the Internet of Things, to smartwatches, industrial equipment and personal vehicles, just to name a few. More often than not, these sources form networks in order to exchange information. As a direct consequence, the field of Graph Signal Processing has been thriving and evolving. Its aim: process and make sense of all the surrounding data deluge.In this context, the main goal of this thesis is developing methods and algorithms capable of using data streams, in a distributed fashion, in order to infer the underlying networks that link these streams. Then, these estimated network topologies can be used with tools developed for Graph Signal Processing in order to process and analyze data supported by graphs. After a brief introduction followed by motivating examples, we first develop and propose an online, distributed and adaptive algorithm for graph topology inference for data streams which are linearly dependent. An analysis of the method ensues, in order to establish relations between performance and the input parameters of the algorithm. We then run a set of experiments in order to validate the analysis, as well as compare its performance with that of another proposed method of the literature.The next contribution is in the shape of an algorithm endowed with the same online, distributed and adaptive capacities, but adapted to inferring links between data that interact non-linearly. As such, we propose a simple yet effective additive model which makes use of the reproducing kernel machinery in order to model said nonlinearities. The results if its analysis are convincing, while experiments ran on biomedical data yield estimated networks which exhibit behavior predicted by medical literature.Finally, a third algorithm proposition is made, which aims to improve the nonlinear model by allowing it to escape the constraints induced by additivity. As such, the newly proposed model is as general as possible, and makes use of a natural and intuitive manner of imposing link sparsity, based on the concept of partial derivatives. We analyze this proposed algorithm as well, in order to establish stability conditions and relations between its parameters and its performance. A set of experiments are ran, showcasing how the general model is able to better capture nonlinear links in the data, while the estimated networks behave coherently with previous estimates
Saha, Subrata. "Routing in distributed wireless mesh network". 2008. http://hdl.handle.net/1993/21052.
Texto completo劉新玫. "Distributed AAA on Wireless Mesh Network". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/91507178787697334682.
Texto completo國立交通大學
資訊工程系所
93
This thesis base on the mobility of wireless network, and the restriction of wired network, we combine wireless ad hoc network, wireless mesh network (WMN), and wired network to generate a new architecture. This thesis solve the problem of wireless devices signals decay with the distance, and provide a secure authentication way. We use fixed node of WMN to help other movable nodes exchange information with AAA servers to do authentication, authorization, and accounting. In order to save the packet transferring on wireless network, we distributed AAA servers on WMN. Using (n,k) threshold secret sharing to do separate private key, and proactive secret sharing to update it. Moreover, this may avoid being attack. After mobile nodes authenticated, AAA servers issue a short-lived certificate for it to access services or communicate with other mobile nodes. Finally, we compare the advantage and disadvantage with distributed and centralized AAA server on WMN.
Fang, Ren Wei y 方任瑋. "Interference-Aware Topology Control in Wireless Mesh Network". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/92121569258070970173.
Texto completo國立政治大學
資訊科學學系
96
In wireless mesh networks, such as WLAN (IEEE 802.11s), WMAN (IEEE 802.16), etc., each node should forward packets of neighboring nodes toward gateway using multi-hop routing mechanism. In wireless mesh network, as the density of network nodes increases, the RF interference will increase and the throughput of each node will drop rapidly. In our research, we use the geometry to resolve the RF interference problem by rebuilding network topology. We try to minimize the interference between neighboring nodes and improve the throughput in wireless mesh network. We transform the network topology problem into geometry problem and define the line intersection problem in geometric graph, then check path intersection in the geometric graph. If line intersection occurs in the graph, we remove the intersection line from the graph and re-plan the region by triangulation algorithm. When the network topology is built up, we use a standard deviation formula to improve network performance by removing longer links. The line intersection algorithm and triangulation algorithm, both of time complexity O(n log n), are used to find the minimal interference solution. At the end of our research, we use network simulator to verify if the proposed methods can help to meet all those performance expectations.
Chu, Kai-Ting y 朱凱鼎. "Distributed Topology Control for Wireless Sensor Network". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/90867362135880603522.
Texto completo中興大學
電機工程學系所
95
This thesis presents a decentralized clustering and gateway selection algorithm for wireless ad-hoc sensor networks. Each sensor uses a random waiting timer and local criteria to determine whether to form a new cluster or to join a current cluster and utilizes the messages transmitted during hierarchical clustering to choose distributed gateways such that communication for adjacent clusters and adaptive distributed topology control can be achieved. The algorithm operates without a centralized controller, it operates asynchronously, and does not require that the location of the sensors be known a priori. A performance analysis of the topology management and the energy requirements of the algorithm are used to study the behaviors of the proposed algorithm. The performance of the algorithm is described analytically and via simulation.
Reddy, T. N. K. "VLSI implementation of 4×4 Mesh topology for network-on-chip". Thesis, 2014. http://ethesis.nitrkl.ac.in/5708/1/e-79.pdf.
Texto completoChung, Yi-Fang y 鍾依芳. "Distributed Channel Assignment in Multi-channel Wireless Mesh Network". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/78916500809284034399.
Texto completo國立臺灣大學
資訊工程學研究所
99
In IEEE 802.11, channel resources are very limited and scarce. Thus channel assignment schemes which can effectively utilize available channels is one of the important issues in multi-channel wireless mesh networks. There are two approaches for channel assignment: centralized and distributed. We focus on distributed channel assignment, i.e., each node chooses its channel based on local information. The advantages of distributed approach are better flexibility and fault-tolerance. However, the problem of distributed channel assignment is channel oscillation which results that the channel assignment cannot converge for a long time and nodes change its channel repeatedly, and therefore the network throughput is throttled. In this thesis, we propose a new distributed channel assignment scheme to solve the channel oscillation problem, and to maximize the network throughput. Performance evaluation shows that our proposed algorithm improves the throughput and end-to-end delay in comparison to previously proposed distributed channel assignment schemes.
Li, Yu-Wei y 李育維. "A Secure Distributed Topology Control for Wireless Sensor Network". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/71335275859605595670.
Texto completo國立中興大學
電機工程學系所
96
Wireless sensor network is a wireless network consisting autonomous devices using sensor which equipped with a radio transceiver. In general, wireless environment is vulnerable for many kinds of security. Therefore, a secure wireless transmission attack is obviously very important. A clustering-based secure communication protocol is proposed to resolve this problem. There are three phases in the protocol. In the first phase, the sensor in the network is needed to be verified their identifications during forming clustering topology construction. In the second phase, sensors need to manage their communication keys of intra-cluster and inter-cluster. In the third phase, sensors are required to renew keys periodically. Then we show the secure protocol can form a security agreement and can effectively protect network from attack. When the sensor network encounters a spam attack, it forms quarantined regions by using clustering mode. Authentication is needed if message pass through a quarantined region. Or the message can select a different route by passing the quarantined region. Simulation result shows that using authentication in quarantined regions is cost effective.
Wu, Shin-Yu y 吳欣祐. "A Pre-decided Distributed Scheduling Scheme for IEEE 802.16 Mesh Network". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88733604575698893011.
Texto completo國立臺灣科技大學
電機工程系
98
IEEE 802.16 standard defines an election-based transmission timing(EBTT) scheme for coordinated distributed mesh network which can guarantee a collision-free environment for control subframe. And it use three-way handshaking mechanism for data scheduling. But three-way handshake mechanism has some problems such as the nodes which are two-hop neighbors cannot receive the schedule information. It causes the primary interference(PI) or the secondary interference(SI). The minislot utilization will be decreased. In order to solve the above-mentioned problems, we proposed a pre-decided distributed scheduling scheme(PDS). And we also proposed a two-way handshake mechanism that is suitable for PDS. Finally, we proposed a mechanism to relay the schedule information. Let the nodes which are two-hop neighbors can receive the schedule information. After combining these three schemes, we can ensure to avoid PI and SI to achieve high minislot utilization. We compare our scheme and the IEEE 802.16 standard. The simulation results show our scheme improve the node throughput significantly. The average packet delay and fairness also better than IEEE 802.16 standard.
Lin, Chih-Che y 林志哲. "Performance Enhancements of the IEEE 802.16 Mesh Coordinated Distributed Scheduling Mode Network". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72072013354252757103.
Texto completo國立交通大學
資訊科學與工程研究所
98
The Wireless Mesh Network (WMN) is a cost-effective solution for backbone networks in both metropolitan and rural areas and can be used as temporary broadband access for emergent and tactic purposes. Without the need of wires, WMNs are easy to deploy and reconstruct to satisfy the dynamic needs. The IEEE 802.16 mesh CDS-mode network is a candidate of next-generation WMNs, which provides the “collision-free” property unique to traditional IEEE 802.11 based WMNs. In this dissertation, we propose several schemes for this new network to enhance its scheduling efficiency on the control plane and its QoS support on the data plane. In addition, we also point out the issues of network initialization of this network on random topologies and propose a scheme to solve these issues. The performances of our proposed schemes are evaluated using both analyses and simulations. Our analytical and numerical results show that our proposed schemes can significantly enhance the performance of the IEEE 802.16 mesh CDS-mode network and benefits upper-layer applications.
Yang, Bo-Cheng y 楊博丞. "A Novel Hashing Allocation Algorithm in IEEE 802.16 Distributed Scheduling Mesh OFDMA Network". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/08191789921384936611.
Texto completo國立臺灣科技大學
電機工程系
96
In IEEE 802.16 mesh network, the transmission signaling and data scheduling method significantly affect the performance and capacity of the system. This paper propose a physical layer uses OFDMA-TDMA in the data subframe to improve data scheduling flexibility and spectrum efficiency. Because local nodes don’t know the exact scheduling information of 2-hop neighbors, the grant messages sent back by the receiver have the chance to collide with other’s decision, known as request invalid, and thus decreases throughput and increase access delay. Therefore, this paper provide an unique slot selection mechanism, known as hash selection scheme (HSS), to against the issue by allowing the node in the network to schedule data with a shifting basis. We compare three different slot selection mechanism, which include normal, random and HSS, on both primary interference scenario (PIS) and secondary interference scenario (SIS) with different topologies. Simulation results show that HSS is 35% better in throughput than others and reduces the request invalid ratio to 0.05% in the relative low loading system. In the relative heavy loading system, HSS is only 10% better in throughput than others and the request invalid ratio reach to 27%. In the full loading system, HSS improve the throughput anymore, and request invalid ratio is the same as others.
Joshi, Abhay. "Optimization approaches to network topology design for dynamic distributed wireless sensing in a hostile environment". 2006. http://proquest.umi.com/pqdweb?did=1051279951&sid=16&Fmt=2&clientId=39334&RQT=309&VName=PQD.
Texto completoTitle from PDF title page (viewed on July. 21, 2006) Available through UMI ProQuest Digital Dissertations. Thesis adviser: Batta, Rajan, Nagi, Rakesh. Includes bibliographical references.
Sunny, Albert. "Distributed Wireless Networks : Link Scheduling And Application Delay Modelling". Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2008.
Texto completo