Tesi sul tema "Multi-Layer communications"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-44 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Multi-Layer communications".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Mao, Yinian. "Securing multi-layer communications a signal processing approach /". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3792.
Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Boussemart, Vincent. "Bénéfices de la communication inter-protocoles au niveau applicatif et des ressources pour contrôler les interférences dans les communications satellites". Thesis, Toulouse, ISAE, 2013. http://www.theses.fr/2013ESAE0013/document.
This Ph.D. investigates resource management optimisations in the return-link of interference-limited multi-beam satellitesystems which can be seen as virtual MIMO systems. It focuses on the interference that users located in different beamsgenerate towards each other, when transmitting data at the same time and on the same frequency. The number offrequencies (colours) present in the satellite system rules the overall bandwidth and therefore the system capacity. Whenthe number of colours becomes low, e.g. considering one colour, the level of interference increases dramatically but thebandwidth available in each beam gets higher. Hence there is a tradeoff between number of colours and level ofinterference. The influence of the satellite channel is first studied by analysing the BER obtained through interferencecancellation techniques. The Ph.D. then moves towards information theory and investigates the impact of the colours onthe achievable sum rates. MUD schemes are then used to derive the per-user rates, and the max-min criterion is applied tothe user rates showing an improvement of the level of fairness between users. The different outcomes are used to optimisethe resource management. However, scheduling for large scale MIMO systems, as in the return-links of satellitecommunications, represents a challenging task, since the search space is prohibitive large. For this reason this Ph.D. alsoinvestigates low complexity heuristic algorithms based on graph theory with the aim of finding sub-optimal schedules.Finally, the number of spot beams and the number of users considered for scheduling are studied so as to propose newalgorithms aiming to satisfy quality of service constraints
Boviz, Dora. "Communications multi-utilisateurs dans les réseaux d’accès radio centralisés : architecture, coordination et optimisation". Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLC035/document.
In future mobile networks denser deployment of radio access points is planned to satisfy demand of higher throughput, but an increased number of mobile users can suffer from inter-cell interference. Fortunately, the centralization of base-band processing offered by Cloud Radio Access Network (C-RAN) architecture enables coordination and joint physical layer processing between cells. To make practical deployment of these techniques possible, we have to study C-RAN in an end-to-end view regarding several aspects: the functional architecture of a deployment, the multi-cell coordination strategy, the implementation of multi-user signal processing and possibilities for optimization to increase operational efficiency.In this thesis, first, we propose an architecture defining the placement of base-band processing functions between the distributed remote units and the central processing unit. The aim of this design is to enable multi-cell processing both on the uplink and the downlink while requiring low data rate between the involved entities. Secondly, we study how low latency coordination can be realized inside the central unit using software defined networking adapted to radio access networks. Our demonstration through a real-time prototype deployment shows the feasibility of the proposed control framework. Finally, we investigate adaptive allocation of fronthaul rate that is used for transferring quantized base-band symbols for users participating in uplink multi-cell reception in order to exploit interference between them. We propose an optimization model that includes the cost of fronthaul tranmissions and aims to maximize the gain of network operators from multi-user transmissions in C-RAN. We solve the optimization problem for different fronthaul pricing models, in a scenario where real-time and accurate channel estimates are available and in another where only channel statistics are exploited. Using our method - fitting in the architecture that we have defined - cost efficiency of fronthaul usage can be significantly improved
Amoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication". Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They offer flexibility, mobility and rapid expansion of telecommunication infrastructures. They are also particularly needed to connect mobile devices such as connected cars, watches and drones. Wireless networks are also used in the transport and security sector to connect trains and cameras to monitoring systems. However, in contrary to wired networks in which transmission are isolated in wires, in wireless networks, transmissions are emitted using omnidirectional antennas. This makes wireless networks more vulnerable to unauthorised listening, emission and some specific attacks. In this thesis, we have worked on the detection of three different types of attacks on IEEE 802.11 (Wi-Fi) networks. The three attacks are fake access points and two denial of service attacks namely, deauthentication and jamming attacks. In scientific literature, these three attacks are detected independently and using one or two indicators.We propose a method that uses classification algorithms to create a model that can detect the three attacks by analysing four indicators simultaneously. The model can detect the attacks when they are perpetuated independently and also when they are combined. Concerning data used to create the model, among the three different types of frames that can be transmitted on Wi-Fi networks, we have considered only management frames and more particularly, beacon frames. Beacon frames are sent at regular interval and even in the absence of user traffic. Therefore, basing the detection on the analysis of beacon frames leads to a more efficient detection. In this thesis, we have also considered variations in data rates (absence of user traffic, light, moderate and intense user traffic) and in jamming power (low, moderate and high jamming power). Results show that the model can detect fake access points, deauthentication and jamming attacks (low and moderate power) with high precision. The jamming attack with intense power is detected with satisfying precision. By considering the beacon frames of a farther second access point of the network, we have been able to increase detection precision in the latter case. Finally, we have considered special cases such as Wi-Fi transmissions in the 5 GHz band and the phantom fake access point attack
Allouis, Alain. "NOMA-MCM strategies in transmission and reception for advanced vehicular communications in 5G and beyond". Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0003.
The realm of intelligent transportation hinges upon robust vehicular communication infrastructure, vital for traffic management, road monitoring, Internet of Things (IoT) accessibility, and driver/passenger information. While the conventional IEEE802.11p standard has long dominated this domain, the advent of 5G and its successors marks a paradigm shift.This thesis represents a comprehensive exploration of 5G and beyond technologies specifically tailored to the unique demands of Vehicle-to-Everything (V2X) communication. The primary aim is a meticulous analysis of Non-Orthogonal Multiple Access (NOMA) technology and Multi-Carrier Modulation (MCM) schemes within the context of next-generation V2X applications. Central to this exploration is the pursuit of cross-layer PHY/MAC (Physical Layer/Medium Access Control) design strategies aimed at elevating performance benchmarks.The research journey begins with an introductory overview, delving into the historical context and relevance of V2X communications, accompanied by an examination of the diverse requirements across V2X use case groups. This foundational groundwork combines insights from normative organizations and the latest literature, providing a comprehensive overview of the historical landscape of vehicular communication.Subsequently, the thesis navigates the contemporary landscape, emphasizing the application of 5G enabling technologies to various V2X use cases. It maps the relationship between V2X Use Case Groups and Enabling Technologies while exploring the Hierarchical 5G V2X high-level architecture. This exploration bridges current communication requirements and existing standards with open research directions and impending challenges.The core of the thesis revolves around the exploration of NOMA and MCM schemes' implications within next-generation V2X applications. The culmination of this research manifests in a cross-layer design paradigm focusing on the enhancement of performance and adaptability within cellular vehicle-to-everything (C-V2X) communication systems. By dissecting NOMA mechanisms within the Physical/Medium Access Control (PHY/MAC) layers, this study demonstrates substantial throughput performance improvements compared to conventional Orthogonal Multiple Access (OMA) systems.The outcomes of this thesis aspire to contribute advanced solutions for future autonomous and connected transport systems, with a specific emphasis on the enhancement of physical and medium access layer performance within sophisticated V2X scenarios
Harrison, Willie K. "Physical-layer security: practical aspects of channel coding and cryptography". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44818.
Seong, Kibeom. "Cross-layer resource allocation for multi-user communication systems /". May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Jiang, Meilong. "Robust cross-layer scheduling design in multi-user multi-antenna wireless systems". Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B38346758.
Jiang, Meilong, e 江美龍. "Robust cross-layer scheduling design in multi-user multi-antenna wireless systems". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B38346758.
Breschi, Karla. "Optimisation multi-objectif des communications dans les réseaux de capteurs hétérogènes". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD045/document.
This thesis studies the problems of bi-objective optimization of communications in heterogeneous wireless sensor networks from the point of view of the transmission range. The first criterion considered is necessarily the energy consumption that needs to be reduced in order to maximize the network lifetime. The second criterion is the data transmission delay, which is essential for real-time applications.To solve the optimality problem of the broadcast, we propose an integer linear program, an approximation algorithm, a meta-heuristic and a heuristic. All these techniques allow us to find or to approximate the optimal solutions for the considered objectives.For the routing case, we propose a cross-layer approach via an integer linear program between the MAC and Data Link layers. Our method calculates the optimal solution, which represents a point of comparison for future heuristics having the same goals
Erpek, Tugba. "Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems". Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102705.
Doctor of Philosophy
Agüero, Calvo Ramón. "Contribución a la mejora de las prestaciones en redes de acceso inalámbricas no convencionales". Doctoral thesis, Universidad de Cantabria, 2008. http://hdl.handle.net/10803/10667.
The presence of multi-hop topologies within all types of wireless communications is becoming more and more common, and this tendency is expected to be maintained in the near future. Although they were originally conceived to compensate the lack of subjacent infrastructure in certain scenarios, these deployments have attracted the interest of different actors in the wireless communications value chain (including network operators) and thus it is logical to think that their relevance will gradually increase. In fact, there already exist some standardization initiatives which corroborate this point to some extent. Furthermore, other additional factors, such as the rapid growth which has been seen in wireless sensor technologies, also strengthen the use of these topologies..In spite of the growing activity in the multi-hop deployment field, it is still necessary to establish, in a quantitative way, their potential benefits, both for the end-users of the communication systems, as well as for the operators, considering, in addition, the high degree of heterogeneity which will characterize wireless networks in the future.On the other hand, as far as algorithms and protocols to be used over this type of topology are concerned, and despite the intense research which has been conducted into them, there is still a large number of issues to be tackled. First, the simple fact that their initial requirements and challenges have been modified can, and must, influence their basic principles. In addition, it becomes necessary to address their validation on real platforms and, on the other hand, to ensure that simulation-based evaluations of their performance make use of realistic models which accurately reflect the conditions which are observed in real scenarios.This dissertation tackles, on the one hand, the quantitative evaluation of the improvements which are achievable when using multi-hop topologies to extend legacy network deployments. One first aspect which is logical to consider is the increase in the coverage which is brought about. In this sense, a two-fold approach has been followed, employing both an analytical as well as a simulation-based analysis, to establish what the gain is. Two network models have been used, being complementary to each other; the first one assumes a complete lack of network planning for the deployment of the access elements, while the second one assumes an optimum distribution of them. Although their characteristics are completely different, the results are somehow similar for both cases. Furthermore, it can be concluded that, despite the coverage extension which can be obtained, it is indeed possible to establish a reasonable limit on the maximum number of hops to be used, since the improvement becomes less relevant for higher values. This aspect could influence the design of routing techniques to be used over this type of topology.Furthermore, other additional benefits have been also analyzed, using a network deployment in which the presence of heterogeneity (multi-access) is evident. The multi-hop extensions have been integrated within a generic access selection algorithm which enables the modification of the weights which are assigned to the different entities (both the end-user terminals and the network) as well as to the set of parameters and constraints to be considered when selecting the most appropriate access alternative. It is concluded that for both the end-users, who improve their perception of the quality of service, and the network, which is able to increase the overall amount of traffic possible to be handled, multi-hop extensions are certainly beneficial.In addition, the dissertation also tackles the improvement of the routing techniques which are traditionally employed over multi-hop networks, which are based on minimizing the number of hops between the two sides of the communication. To accomplish this, and using the Cross-Layer Optimisation paradigm, an improved version of the DSR protocol is proposed, namely SADSR. It uses information about the subjacent link qualities to modulate the route selection algorithm. It is worth highlighting that a fully empirical (on a real platform) validation has been conducted, addressing one of the most pressing demands within this field. The results obtained allow us to infer that the proposal made in the framework of this dissertation is clearly outperforming the original DSR version.Although the added value provided by empirical validations is unquestionable, they also have some limitations. First, they normally do not favour the establishment of large topologies, or to undertake repetitive experiments aimed at finding an average behaviour. In this sense, a simulation-based analysis is also used so as to compare the SADSR with the original DSR version as well as with other proposals which have recently attracted interest from the scientific community. The results obtained by the validation carried out on a real platform are confirmed, since the performance brought about by the SADSR is somewhat higher than that of the other strategies.In order to perform the previous analysis the use of a realistic channel model, able to capture with a high degree of accuracy the behaviour exhibited on real platforms, is mandatory. To fulfil this requirement, the dissertation also tackles the design, implementation, and integration within the Network Simulator platform of BEAR, a channel model based on auto-regressive filtering. It is mainly characterized by being able to emulate the bursty presence of errors which is observed over real channels. The design is based on an extensive set of measurements which is used to assess the validity of the proposal.
Shekhar, Hemabh. "Multi-antenna physical layer models for wireless network design". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22681.
Committee Chair: Ingram, Mary Ann; Committee Member: Andrew, Alfred; Committee Member: Copeland, John; Committee Member: Owen, Henry; Committee Member: Sivakumar, Raghupathy.
Zhou, Xiangyun. "Transmission resource allocation in multi-antenna wireless communication systems with channel uncertainty". Phd thesis, Institute of Electrical and Electronics Engineers (IEEE), 2013. http://hdl.handle.net/1885/9828.
Jarupan, Boangoat. "CROSS-LAYER DESIGN FOR LOCATION- AND DELAY-AWARE COMMUNICATION IN VEHICULAR NETWORKS". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1306504587.
Lakshminarayana, Subhash. "Cross Layer Design in MIMO Multi-cell Systems". Thesis, Supélec, 2012. http://www.theses.fr/2012SUPL0020/document.
Future wireless communication systems are expected to see an explosion in the wireless traffic which is mainly fueled by mobile video traffic. Due to the time varying and bursty nature of video traffic, wireless systems will see a widerrange of fluctuations in their traffic patterns. Therefore, traditional physical layer based algorithms which perform resource allocation under the assumption that the transmitters are always saturated with information bits, might no longer be efficient. It is, thus, important to design dynamic resource allocation algorithms which can incorporate higher layer processes and account for the stochastic nature of the wireless traffic.The central idea of this thesis is to develop cross-layer design algorithmsbetween the physical and the network layer in a multiple input multiple output (MIMO) multi-cell setup. Specifically, we consider base stations (BSs) equipped with multiple antennas serving multiple single antenna user terminals (UTs) in their respective cells. In contrast to the previous works, we consider the randomness in the arrival of information bits and hence account for the queuing at the BSs. With this setup, we develop various cross-layer based resource allocation algorithms. We incorporate two important design considerations namely decentralized design and energy efficiency. In particular, we focus on developing decentralized beamforming and traffic flow controller design, energy efficient design under time average QoS constraints and decentralized scheduling strategy in a multi-cell scenario. To this end, we use tools from Lyapunov optimization, random matrix theory and stochastic control theory
Mahal, Jasmin Ara. "Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems". Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/83570.
Ph. D.
Bharath, Krishna. "Signal and power integrity co-simulation using the multi-layer finite difference method". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28155.
Committee Chair: Madhavan Swaminathan; Committee Member: Andrew F. Peterson; Committee Member: David C. Keezer; Committee Member: Saibal Mukhopadyay; Committee Member: Suresh Sitaraman.
Muramoto, Eiichi, Tatsuya Jinmei, Takahiro Kurosawa, Odira Elisha Abade, Shuntaro Nishiura e Nobuo Kawaguchi. "NAT Free Open Source 3D Video Conferencing using SAMTK and Application Layer Router". IEEE, 2009. http://hdl.handle.net/2237/15458.
Kortebi, Mohamed Riadh. "A cross-layer approach for muti-constrained routing in 802.11 wireless mutli-hop networks". Thesis, Evry-Val d'Essonne, 2009. http://www.theses.fr/2008EVRY0036.
There is a growing interest in wireless multi-hop networks (WMNs) since there are promising in opening new business opportunity for network operators and service providers. This research field aims at providing wireless communication means to carry different types of applications (FTP, Web browsing, video streaming, in addition to VoIP). Such applications have different constraints and their specific requirements in terms of Quality of Service (QoS) or performance metrics (delay jitter, end-to-end delay). We examine, in this thesis, the problem of routing in WMNs. Our main goal is to propose a new multi-metrics routing capable to fit these particular needs. In this thesis, we make several contributions toward WMN multi-constrained routing. First, we show that the multi-constrained path finding problem is NP-Complete and inherently a cross-layer issue, and that three steps are necessary to design the multi-metric routing protocol: (i) modeling of the inferring signal, (ii) estimation of the remaining bandwidth, (iii) estimation of the one-hop delay. Second, moving in such direction, we propose two enhanced versions of the OLSR routing protocol. The suggested protocols consider the SINR as a routing metric to build a reliable topology graph. Performance evaluation shows that utilizing such routing metric helps to improve significantly the VoIP application quality in the context of ad hoc network while maintaining a reasonable overhead cost. Third, we have proposed a 2-Hop interference Estimation Algorithm (2-HEAR) in order to estimate the available bandwidth. Then, and based on such algorithm, we have proposed a novel routing metric for WMNs: Estimated Balanced Capacity (EBC) in order to achieve load-balancing among the different flows. The next issue tackled in this thesis is the one-hop delay estimation, the one-hop delay is estimated by means of an analytical model based on G/G/1 queue. Finally, we have encompassed all the previous contributions to address our main goal, i.e. the design of a multi-constrained routing protocol for WMNs. A hybrid routing protocol is then proposed. This protocol is a junction of two parts : a proactive part that makes use of the previously estimated constraint, and a reactive part, which is triggered ”on demand” when news applications are expressed
Meghji, Mahir Lumumba. "On a Joint Physical Layer and Medium Access Control Sublayer Design for Efficient Wireless Sensor Networks and Applications". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2013. https://ro.ecu.edu.au/theses/590.
Demeslay, Clément. "Contributions pour le standard IoT LoRa : améliorations du récepteur classique et de sa sécurisation". Electronic Thesis or Diss., Brest, 2023. http://theses-scd.univ-brest.fr/2023/These-2023-MATHSTICBO-Telecommunications-DEMESLAY_Clement.pdf.
This thesis aims to propose enhancements for the LoRa Internet of Things (IoT) standard in order to 1) improve thedemodulation performances in the presence of multi-path channels and 2) develop security mechanisms at the physical layer to strengthen the secrecy of communications.For the first line of contribution, a study of the impact of multi-path channels is conducted and a closed-form expression of the symbol error rate is derived. Capitalizing on this study, the enhanced LoRa RAKE receiver leveraging constructively the paths energy is proposed, for the realistic scenario of channel replicashaving delays close to the main path while taking into account synchronization. For the second line of contribution, the impact of traditional Band and Tone jammers on the LoRa demodulation is investigated and highlights the sub-optimal performances of such jammers. Then, a waveform self-jamming scheme is proposed, considerably reducing demodulation capabilities of interceptors thus further enhancing the secrecy of communications. The induced Peak-to-Average Power Ratio (PAPR) by the scheme is analyzed and a mitigation technique is proposed. Finally, experiments on Software Defined Radio (SDR) equipment are achieved and demonstrate the sustainability of this self-jamming scheme
Wolf, Anne. "Robust Optimization of Private Communication in Multi-Antenna Systems". Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-203827.
Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert
Ben, Slimane Jamila. "Allocation conjointe des canaux de fréquence et des créneaux de temps et routage avec QdS dans les réseaux de capteurs sans fil denses et étendus". Thesis, Université de Lorraine, 2013. http://www.theses.fr/2013LORR0224/document.
The general context of the present memory is about the cross-layer optimization of wireless sensors networks based on ultra wide band technology UWB. The proposed solutions ensure the share and the efficient allocation of spectral and temporal resources, the optimization of the energy consumption and the support of multi-constraints quality of services QoS. The most challenging issue is providing a tradeoff between the resource efficiency and the multiconstrained QoS support. For this purpose, we proposed a new Wireless Hospital Sensor Network (WHSN) three-tiered architecture in order to support large-scale deployment and to improve the network performance. Then we designed a channel allocation scheme (UWBCAS,)and a prioritized multi-channel multi-time slot MAC protocol (PMCMTP) to enhance network performance and maximize the resource utilization. Finally, we proposed a joint duty cycle scheduling, resource allocation and multi-constrained QoS routing algorithm (JSAR) which simultaneously combines, a duty cycle scheduling scheme for energy saving, a resource allocation scheme for efficient use of frequency channels and time slots, and an heuristic for multi-constrained routing protocol
Ben, Slimane Jamila. "Allocation conjointe des canaux de fréquence et des créneaux de temps et routage avec QdS dans les réseaux de capteurs sans fil denses et étendus". Electronic Thesis or Diss., Université de Lorraine, 2013. http://www.theses.fr/2013LORR0224.
The general context of the present memory is about the cross-layer optimization of wireless sensors networks based on ultra wide band technology UWB. The proposed solutions ensure the share and the efficient allocation of spectral and temporal resources, the optimization of the energy consumption and the support of multi-constraints quality of services QoS. The most challenging issue is providing a tradeoff between the resource efficiency and the multiconstrained QoS support. For this purpose, we proposed a new Wireless Hospital Sensor Network (WHSN) three-tiered architecture in order to support large-scale deployment and to improve the network performance. Then we designed a channel allocation scheme (UWBCAS,)and a prioritized multi-channel multi-time slot MAC protocol (PMCMTP) to enhance network performance and maximize the resource utilization. Finally, we proposed a joint duty cycle scheduling, resource allocation and multi-constrained QoS routing algorithm (JSAR) which simultaneously combines, a duty cycle scheduling scheme for energy saving, a resource allocation scheme for efficient use of frequency channels and time slots, and an heuristic for multi-constrained routing protocol
Hjern, Gunnar. "The modernization of a DOS-basedtime critical solar cell LBICmeasurement system". Thesis, Karlstads universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-74322.
"Practical Coding Schemes for Multi-User Communications". Doctoral diss., 2011. http://hdl.handle.net/2286/R.I.14385.
Dissertation/Thesis
Ph.D. Electrical Engineering 2011
Talat, Rehan. "Enhancing Secrecy via Exploring Randomness in the Wireless Physical Layer". 2013. https://scholarworks.umass.edu/theses/1168.
Liao, Chi-Chung, e 廖繼鐘. "Communication Minimization of Progressive Multi-layer Reconfiguration on Teamster". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/53803268996907982923.
國立成功大學
電機工程學系
89
The major purport of using progressive multi-layer reconfiguration is efficient using idle server resource in the Internet to perform our parallel program. After the reconfiguration mechanism invoking the thread migration, the unnecessary page sharing will increase and induce more communication thus reduce the performance. For solving this problem, we propose communication minimization. Through copyset adjustment and other improvement mechanisms, we reduce the overhead, which is caused by redundant communication, and make the whole reconfiguration mechanism more completely. In the SMP DSM, we have to conquer the problem of collecting thread’s access pattern, and then we can have the complete information to execute the mechanism for communication minimization. Besides, we implement two distributed thread migration methods, and make the reconfiguration mechanism take advantage of both the load balance and communication minimization. In the least experiment results, we observe combination the Diffusion Thread Migration and the mechanism of communication minimization can lead us to the best system performance. 表格目錄 III 圖目錄 IV 第一章 簡介 1 1.1 DSM簡介 1 1.2 研究動機 1 1.3 問題分析與討論 3 第二章 研究背景 5 2.1 TEAMSTER之介紹 5 2.2 PMR之介紹 6 2.3 相關研究 9 第三章 PMR通訊減量之設計 10 3.1 引線分頁共享資訊收集之設計 11 3.2 通訊減量之策略 12 第四章 系統實現 16 4.1 追蹤引線分頁共享資訊的方法 16 4.2 COPYSET ADJUSTMENT的方法 19 4.3 引線搬移模組和系統支援 21 第五章 效能測試 24 5.1 應用程式之介紹 24 5.2 測試結果與分析 26 第六章 結論與未來工作 32 參考文獻 33
Lee, Wei-lin, e 李韋霖. "Apply Multi-Layer Communication in Link Aggregation Auto Testing". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82701102319596163535.
大同大學
資訊工程學系(所)
94
Testing automation can be improved and tested the deficiency on artificially in the tradition, such as the questions , such as environmental equipment and tool ,etc., in addition, automation is tested can also shorten the time needed to test by a wide margin , can improve the accuracy of judging on the test result even more. Traditional artificial test is had, often test the analysis of the data, test erecting and such questions as the equipment must be asked of the environment, because reduce preparation degree tested, have increased the time spent of testing too. It be able to be in the test of short time that automation tests tools to hope to make the greatest working efficiency in Cheng, effective automation is tested can shorten real test time , can reduce the unnecessary fault while testing , and can solve the artificial test job that can't carry out , make the efficiency tested improve. This page will be proposed, if utilize the existing tool to solve relevant Protocol of network to test the blind spot on, and the method of testing. Link Aggregation will be test Protocol that this text will be discussed mainly , how to solve Link Aggregation present test difficult problem, how to shorten and test time and improve the accuracy tested, it will be the focal point that this text will be discussed .
Huang, Po-Hsiang, e 黃博祥. "Die-to-Die Multi-signaling Communication Mechanism with Common Conduction Layer". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/19529948395220705631.
國立交通大學
電控工程研究所
99
A broadcast interconnects method for 3D-IC applications is implemented by using common conduction layer. Die-to-Die Multi-signaling communication mechanism with common conduction layer has shorter communication distance. Compared with wireless or wire interconnect. Our communication distance is 2um. The shorter distance means that it can resist the neighborhood noise and increase the IO density for packaging. Moreover, chip thinning, together with device scaling, will further improve the density and performance of the vertical I/Os. As a result, because of the larger I/O count possible in 3D integration and the short length of the interconnections, it is expected that the vertical I/Os between stacked chips will be able to provide the high data bandwidth required by Moore’s law with the benefit of low-power signaling. We also use alignment method for detecting position error. In our design, a buffer stage may be needed between the circuit blocks in different layers, since common conduction layer usually have a much larger Parasitic Resistance than interconnects of circuits. This interconnect has energy efficiency of 0.18 pJ/bit at 2Gbps. The proposed broadcast interconnects method is implemented in TSMC 0.18um process for demonstration of this architecture.
Zhang, Ruonan. "Cross-layer protocol design and performance study for wideband wireless networks". Thesis, 2009. http://hdl.handle.net/1828/2118.
Hashemitabar, Behnam. "Physical layer network coding for the multi-way relay channel". Thesis, 2012. http://hdl.handle.net/1828/4364.
Graduate
Gao, Hongju1972. "Performance evaluation of multi-hop WPANS based on a realistic OFDM UWB physical layer". 2007. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.15856.
Mureithi, George Maina. "Scheduling in multi-user mimo wireless systems : a cross-layer approach". 2011. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000909.
It is widely believed that the implementation of multi-user multiple-input multiple- output (MU-MIMO) technology at the radio access portion of current and future wireless networks would positively impact on the performance of such networks. This however demands the design of efficient multi-user scheduling algorithms at the data link layer. One algorithm that is known to be throughput optimal is the opportunistic scheduler. This work takes a cross-layer approach in designing a scheduler that takes into account both the channel and queue states of users. We propose a scheduling algorithm referred to as the Maximum Throughput Scheduler (MTS). The MTS explicitly expresses network throughput as the utility function. Through simulations, we show that the MTS outperforms other schedulers in terms of network throughput.
Chun-Yu, Shih, e 施俊宇. "Platform Based Cross-Layer Multi-node MAC Hardware/Software Co-design for Wireless Communication System". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/77014337312444200627.
國立交通大學
電機學院IC設計產業專班
95
A procedure is for SoC verification process in wireless communication system. The most concern in wireless communication system is interactive between base stations and mobile stations. In other words, this is not enough for SoC verification to verify a single base station or mobile station, especially under the pressure of time-to-market and design complexity. Therefore, how to verify the interactive of wireless communication system fast and completely in the early process of design flow is the key point. This paper introduces an ESL tool, including HW/SW co-design, system architecture exploit, and co-simulation/verification, to establish a cross-layer multi-node environment for verifying the interactive and analyzing the system performance. The fundamental design concept is a system level design abstraction, so it can conveniently provide precise analysis results of a system performance in the early process of design flow.
HUANG, NIEN-TING, e 黃念廷. "An Implementation of MAC-Layer Relay Function and System Porting based on LTE Technology for Multi-UAV Communication". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b83px3.
朝陽科技大學
資訊與通訊系
106
This thesis proposes a scheduling architecture with commonality, portability, and scalability for the diverse application requirements in wireless communications. The proposed architecture conforms to 3GPP LTE (Long Term Evolution) standards supporting resource schedule to meet QoS (Quality of Service) requirements for both transmission directions of UL (Up Link) and DL (Down Link) between eNodeB (i.e., LTE base station) and UEs (i.e., LTE terminal devices). Furthermore, the thesis presents a design of relay function for multi-UAV communication for military purposes and evaluates its performance in an implemented simulation environment. The proposed design of relay function is based on the popular and commonly used LTE technology. Accordingly, the implementation can be low-cost and performance-efficient. Bandwidth requirements are classified into two types of GT (Guaranteed) and BE (Best Effort) by the implemented scheduler. Accordingly, transmission of control data using GT bandwidth has a higher scheduling priority than that of multimedia message (e.g., image, picture or video stream) with BE bandwidth. As such, bandwidth allocation for control data can be adequate to avoid UAV crash due to missing packet of control data. Consequently, by utilizing the proposed relay function, UAVs can be dispatched to areas that cannot reach before to monitor environment and collect information, and then transmit data messages backward to a ground console in real time.
Kundu, Arnab. "An Extension Of Multi Layer IPSec For Supporting Dynamic QoS And Security Requirements". Thesis, 2010. https://etd.iisc.ac.in/handle/2005/2220.
Kundu, Arnab. "An Extension Of Multi Layer IPSec For Supporting Dynamic QoS And Security Requirements". Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/2220.
Wolf, Anne. "Robust Optimization of Private Communication in Multi-Antenna Systems". Doctoral thesis, 2015. https://tud.qucosa.de/id/qucosa%3A29547.
Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt. In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert. Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert. Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.
Sahasrabudhe, Nachiket S. "Joint Congestion Control, Routing And Distributed Link Scheduling In Power Constrained Wireless Mesh Networks". Thesis, 2008. https://etd.iisc.ac.in/handle/2005/798.
Sahasrabudhe, Nachiket S. "Joint Congestion Control, Routing And Distributed Link Scheduling In Power Constrained Wireless Mesh Networks". Thesis, 2008. http://hdl.handle.net/2005/798.
Vijayvaradharaj, T. M. "Network Coding for Wirless Relaying and Wireline Networks". Thesis, 2014. http://etd.iisc.ac.in/handle/2005/2892.
Vijayvaradharaj, T. M. "Network Coding for Wirless Relaying and Wireline Networks". Thesis, 2014. http://etd.iisc.ernet.in/handle/2005/2892.