Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: LANs (networks).

Rozprawy doktorskie na temat „LANs (networks)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „LANs (networks)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Ertuerk, Ismail. "Internetworking between ATM LANs and legacy LANs over ATM networks". Thesis, University of Sussex, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.311332.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ozturk, Huseyin Selcuk. "Evaluation of secure 802.1X port-based network access authentication over 802.11 wireless local area networks". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FOzturk.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lin, Xiaoyang. "Improving fairness in the 802.11 infrastructure wireless local area networks /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20LIN.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Ren, Shaolei. "Cooperative wireless networks with QoS guarantees /". View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20REN.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kouhbor, Shahnaz University of Ballarat. "Optimal number and placement of network infrastructure in wireless networks". University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12762.

Pełny tekst źródła
Streszczenie:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.
Doctor of Philosophy
Style APA, Harvard, Vancouver, ISO itp.
6

Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks". Thesis, University of Ballarat, 2007. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/65892.

Pełny tekst źródła
Streszczenie:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.
Doctor of Philosophy
Style APA, Harvard, Vancouver, ISO itp.
7

Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks". University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14597.

Pełny tekst źródła
Streszczenie:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.
Doctor of Philosophy
Style APA, Harvard, Vancouver, ISO itp.
8

Foley, M. C. "Microprocessor based local area networks". Thesis, Bucks New University, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.381684.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chen, Xiang. "Resource management in wireless networks". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011549.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kriara, Lito. "Holistic and efficient link adaptation for 802.11x wireless LANs". Thesis, University of Edinburgh, 2014. http://hdl.handle.net/1842/15871.

Pełny tekst źródła
Streszczenie:
Wireless LANs (WLANs), based on the IEEE 802.11 standard, have become the standard means for indoor wireless connectivity. At the same time, the rising number of smart mobile devices, broadband access speeds, and bandwidth hungry applications (e.g., high definition video streaming) have led to an increase not only of usage but also of demand for higher data-rates. This demand for higher rates is being met with newer IEEE 802.11 standards (e.g., 802.11n/ac) that introduce new features and also increase the different possible settings for each feature. Inherent channel variations and the possible interference conditions when operating in unlicensed spectrum necessitate adaptation of the various medium access control (MAC) and physical (PHY) layer features to ensure high performance. Selecting the values of those features to optimise a criterion such as throughput is the link adaptation problem. Link adaptation, the focus of this thesis, can play a key role in improving the performance of 802.11 WLANs. Increasing number of features and feature setting combinations with newer 802.11 standards is not only making link adaptation even more important but also more challenging. The contributions made in this thesis significantly advance the state of the art on link adaptation for 802.11 WLANs along three dimensions. First, we show that not knowing the exact cause of loss is not an impediment to effective link adaptation. Nevertheless, actions taken in response to losses are more crucial and they ought to be holistic and not solely dependent on the exact cause of loss. Second, we make significant methodological contributions for analysing the impact of multiple parameters on a given criterion, based on comprehensive experimental measurements. The application of this methodology on 802.11n measurements, examining the interaction of the protocols various parameters on performance under varying conditions, has lead to several valuable findings on how to perform efficient link adaptation in a complex WLAN scenario like 802.11n and future 802.11 standards. Adaptation should be holistic, based on the channel quality instead of the interference scenario, and independent of loss differentiation. Based on these insights, lastly and most importantly, we propose two novel holistic link adaptation schemes for legacy 802.11a/b/g and 802.11n WLANs, termed Themis and SampleLite, respectively. Both Themis and SampleLite take a hybrid approach relying on easily accessed channel quality information at the sender side to perform holistic adaptation. The hypothesis that adaptation should be holistic is validated by our results, with both Themis and SampleLite outperforming the current state of the art.
Style APA, Harvard, Vancouver, ISO itp.
11

Kang, Jong Hee. "Location-aware information access through wireless networks /". Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/6878.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Paruchuri, Ravi Chandra Agrawal Prathima. "Perfomance analysis of 802.11b networks". Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Spring/master's/PARUCHURI_RAVI-CHANDRA_20.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Boom, Derrick D. "Denial of service vulnerabilities in IEEE 802.16 wireless networks". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBoom.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Kulkarni, Santosh B. Umphress David A. Agrawal Prathima. "Synergy MAC a cooperative MAC protocol /". Auburn, Ala, 2009. http://hdl.handle.net/10415/1609.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Hung, Ka-Lok. "The fair data collection problem in wireless sensor networks /". View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20HUNG.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Muriithi, Ndiritu. "Radio local area networks : protocol design and performance analysis". Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296384.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Fornaro, Antony. "Testbed evaluation of integrating ethernet switches in the differentiated services architecture using virtual LANs". Thesis, Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/15684.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Xia, Qiuyan. "Rate adaptation and resource allocation for wireless networks /". View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XIA.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Shu, Feng. "Analysis and optimization of MAC protocols for wireless networks /". Connect to thesis, 2007. http://eprints.unimelb.edu.au/archive/00003857.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Zhu, Fang. "Optimizations for vertical handoff in next generation wireless networks". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012983.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Krishnamurthi, Niranjan. "Feasibility and performance analysis of sensor modeling in OPNET /". Online version of thesis, 2007. http://hdl.handle.net/1850/4782.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Jaiaree, Thoetsak. "The security aspects of wireless local area network (WLAN)". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FJaiaree.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Norman F. Schneidewind, Douglas E. Brinkley. Includes bibliographical references (p. 75-78). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
23

Calhoun, Telvis Eugene. "A Convert Channel Using 802.11 LANS". Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/61.

Pełny tekst źródła
Streszczenie:
We present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channel provides a general method to hide communications in an 802.11 LAN. The technique uses a one-time password algorithm to ensure high-entropy randomness of the covert messages. We investigate how the covert side channel affects node throughput in mobile and non-mobile scenarios. We also investigate the covertness of the covert side channel using standardized entropy. The results show that the performance impact is minimal and increases slightly as the covert channel bandwidth increases. We further show that the channel has 100% accuracy with minimal impact on rate switching entropy. Finally, we present two applications for the covert channel: covert authentication and covert WiFi botnets.
Style APA, Harvard, Vancouver, ISO itp.
24

Ross, David Andrew. "Securing IEEE 802.11 wireless LANs". Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37638/1/David_Ross_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.
Style APA, Harvard, Vancouver, ISO itp.
25

Ngan, Hoi Lun. "Stimulus-based adaptive sleeping for wireless sensor networks /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20NGAN.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Wu, Minji. "Energy-efficient query processing in wireless sensor networks". HKBU Institutional Repository, 2006. http://repository.hkbu.edu.hk/etd_ra/724.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

El, Molla Nawar M. "Yao spanners for wireless ad hoc networks". Click here for download, 2009. http://proquest.umi.com.ps2.villanova.edu/pqdweb?did=1948681691&sid=1&Fmt=2&clientId=3260&RQT=309&VName=PQD.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Javali, Nagesh. "Topology control for wireless ad-hoc networks". Click here for download, 2008. http://proquest.umi.com/pqdweb?did=1580780361&sid=1&Fmt=2&clientId=3260&RQT=309&VName=PQD.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--Villanova University, 2008.
"This research work is funded in part by National Science Foundation (NSF), Computing and Communication Foundation (CCF) award 0728909"--P. iii. Computer Science Dept. Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
29

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks". Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Pełny tekst źródła
Streszczenie:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates the feasibility of using these elements together.
Style APA, Harvard, Vancouver, ISO itp.
30

Goldsmith, D. "Model-based transmission reduction and virtual sensing in wireless sensor networks". Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/418aa713-5150-4512-bcfd-600f379bb5c7/1.

Pełny tekst źródła
Streszczenie:
This thesis examines the use of modelling approaches in Wireless Sensor Networks (WSNs) at node and sink to: reduce the amount of data that needs to be transmitted by each node and estimate sensor readings for locations where no data is available. First, to contextualise the contributions in this thesis, a framework for WSN monitoring applications (FieldMAP) is proposed. FieldMAP provides a structure for developing monitoring applications that advocates the use of modelling to improve the informational output of WSNs and goes beyond the sense- and-send approach commonly found in current, elded WSN applications. Rather than report raw sensor readings, FieldMAP advocates the use of a state vector to encapsulate the state of the phenomena sensed by the node. Second, the Spanish Inquisition Protocol (SIP) is presented. SIP reduces the amount of data that a sensor node must transmit by combining model-based ltering with Dual-Prediction approaches. SIP makes use of the state vector component of FieldMAP to form a simple predictive model that allows the sink to estimate sensor readings without requiring regular updates from the node. Transmissions are only made when the node detects that the predictive model no longer matches the evolving data stream. SIP is shown to produce up to a 99% reduction in the number of samples that require transmission on certain data sets using a simple linear approach and consistently outperforms comparable algorithms when used to compress the same data streams. Furthermore, the relationship between the user-specied error threshold and number of transmissions required to reconstruct a data set is explored, and a method to estimate the number of transmissions required to reconstruct the data stream at a given error threshold is proposed. When multiple parameters are sensed by a node, SIP allows them to be combined into a single state vector. This is demonstrated to further reduce the number of model updates required compared to processing each sensor stream individually. iii Third, a sink-based, on-line mechanism to impute missing sensor values and predict future readings from sensor nodes is developed and evaluated in the context of an on-line monitoring system for a Water Distribution System (WDS). The mechanism is based on a machine learning approach called Gaussian Process Regression (GPR), and is implemented such that it can exploit correlations between nodes in the network to improve predictions. An on-line windowing algorithm deals with data arriving out of order and provides a feedback mechanism to predict values when data is not received in a timely manner. A novel approach to create virtual sensors that allows a data stream to be predicted where no physical sensor is permanently deployed is developed from the on-line GPR mechanism. The use of correlation in prediction is shown to improve the accuracy of predicted data from 1.55 Pounds per Square Inch (PSI) Root Mean Squared Error (RMSE) to 0.01 PSI RMSE. In-situ evaluation of the Virtual Sensors approach over 36 days showed that an accuracy of 0:75 PSI was maintained. The protocols developed in this thesis present an opportunity to improve the output of environmental monitoring applications. By improving energy consumption, long-lived networks that collect detailed data are made possible. Furthermore, the utility of the data collected by these networks is increased by using it to improve coverage over areas where measurements are not taken or available.
Style APA, Harvard, Vancouver, ISO itp.
31

Pandey, Santosh Agrawal Prathima. "Secure localization and node placement strategies for wireless networks". Auburn, Ala., 2007. http://hdl.handle.net/10415/1388.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Martucci, Leonardo A. "Identity and anonymity in ad hoc networks /". Karlstad : Faculty of economic sciences, Communication and IT, Computer science, Karlstads universitet, Universitetstryckeriet), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Tan, Boon Hwee. "Defending IEEE 802.11-based networks against denial of service attacks /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTan%5FB.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Lal, Dhananjay. "Performance enhancements in wireless LANs and ad hoc networks withmultiple-beam smart antennas". Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1091556814.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Bu, Shengrong. "Wireless ad-hoc control networks". Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060316.151756/index.html.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Sun, Fanglei, i 孫芳蕾. "Resource allocation in broadband wireless networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887868.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Sun, Fanglei. "Resource allocation in broadband wireless networks". Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40887868.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Almantheri, Hamed. "Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FAlmantheri.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Chan, Edward. "Supporting heterogeneous traffic in LANs and WANs : issues and techniques". Thesis, University of Sunderland, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390607.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Albath, Julia Gerda Maria. "Energy efficient clustering and secure data aggregation in wireless sensor networks". Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Albath_09007dcc805ab299.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Missouri University of Science and Technology, 2008.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 2, 2008) Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
41

Wong, Chi-Fai. "CACAO : client-assisted channel assignment optimization for uncoordinated home WLANs /". View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20WONG.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Alkandari, Bader A. "A Novel Approach for MAC and PHY Performance Analysis in Relay Networks in Presence of Interference and Shadow Fading". Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/561.

Pełny tekst źródła
Streszczenie:
Relays in communication networks is a well-researched topic. Historically, relays were used in analog radio and television to extend the coverage. Using relays in wireless data networking applications is a more recent problem. In the early 2000s, relays were introduced for Micro-cellular and Wi-Fi deployments. Recently it has been considered for sensor networks and Vehicular Ad-hoc Networks (VANETs) applications. In this dissertation we present a novel approach to determine the optimal bounds for the Medium Access Control (MAC) throughput at the target receiver in a multi-hop multirate wireless data network. For a given relationship between the throughput and the distance, and a given distance between the access point and the target receiver, there is a minimum number of nodes that provides the maximum throughput to the target receiver. It is always desirable to optimize the deployment from various aspects. These aspects are application dependent and they range from energy conservation in sensor networks to throughput and coverage maximization in data networks. We apply this novel approach to vehicular ad-hoc network (VANET) scenarios. Using multi-hop relays, we show how to determine the optimum throughput for communciation between two vehicles. The optimal number of relays is chosen to maximize the throughput for point-to-point communication between a source and a destination as well as broadcast among all vehicles in the coverage area of the source. Additionally, in the physical layer, performance issues arise from the effects of interference and fading. The physical layer performance will in turn impact medium access control performance, effectively reducing the network throughput. We evaluate the ii performance of dense small cells for wireless local area networks (WLAN) and femto cells for data applications under the effects of interference and fading. We assume the network is fully saturated. We use the throughput-distance relationship to take into consideration the effects of interference, fading as well as the medium access control overheads. Using this model, we show that under certain conditions, the medium access control throughput for WLANs can outperform that of femto cells.
Style APA, Harvard, Vancouver, ISO itp.
43

Yin, Li. "Sensor network coverage and data aggregation problem: solutions toward the maximum lifetime". Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/Yin_09007dcc803c1aa0.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed November 26, 2007) Includes bibliographical references (p. 51-55).
Style APA, Harvard, Vancouver, ISO itp.
44

Andrews, Nirmal Agrawal Prathima. "Resource sharing in a WiFi-WiMAX integrated network". Auburn, Ala., 2009. http://hdl.handle.net/10415/1999.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Zhu, Junhua. "Energy efficiency and reliability in wireless sensor networks /". View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20ZHU.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Lal, Dhananjay. "Performance Enhancements in Wireless LANs and Ad Hoc Networks With Multiple-Beam Smart Antennas". University of Cincinnati / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1091556814.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Zeng, Kai. "Opportunistic Routing in Multihop Wireless Networks: Capacity, Energy Efficiency, and Security". Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-072408-231438/.

Pełny tekst źródła
Streszczenie:
Dissertation (Ph.D.)--Worcester Polytechnic Institute.
Keywords: opportunistic routing; security; energy efficiency; medium access control; capacity; throughput. Includes bibliographical references (leaves 192-201).
Style APA, Harvard, Vancouver, ISO itp.
48

Zhu, Yanmin. "Low-power event detection and wakeup scheduling in wireless sensor networks /". View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20ZHU.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Yin, Bolian. "Adaptive clustering and transmission range adjustment for topology control in wireless sensor networks". Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/4485.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.) University of Missouri-Columbia, 2006.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on August 10, 2007) Vita. Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
50

Ma, Jian. "The impact of radio signal strength on the design of wireless sensor networks /". View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20MA.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii