Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Wireless communication systems (3)
- Computer networks (2)
- MAC (2)
- Abstraction (1)
- Access Network (1)
-
- Artificial intelligence (1)
- Association (1)
- Asynchronous transfer mode (1)
- B-nodes (1)
- Back propagation (1)
- Backhaul Network (1)
- Base station (BS) (1)
- Beacon interval (1)
- Bluetooth technology (1)
- Cell phones (1)
- Classification (1)
- Computer algorithms (1)
- Computer science (1)
- Conceptual models (1)
- Constructivism (1)
- Critical path analysis (1)
- Data compression (1)
- Data transmission systems. (1)
- Database management (1)
- E-learning (1)
- EDCA (1)
- Embedded (1)
- Energy efficiency (1)
- Energy efficiency (EE) (1)
- Evolutionary computation (1)
- Publication Year
Articles 1 - 17 of 17
Full-Text Articles in Digital Communications and Networking
Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla
Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla
Theses: Doctorates and Masters
The rapid growth in global mobile phone users has resulted in an ever-increasing demand for bandwidth and enhanced quality-of-service (QoS). Several consortia comprising major international mobile operators, infrastructure manufacturers, and academic institutions are working to develop the next generation wireless communication systems fifth generation (5G) - to support high data rates and increased QoS. 5G systems are also expected to represent a greener alternative for communication systems, which is important because power consumption from the information and communication technology (ICT) sector is forecast to increase significantly by 2030. The deployment of ultra-dense heterogeneous small cell networks (SCNs) is expected to …
Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari
Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari
Theses: Doctorates and Masters
With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems.
Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never completely …
On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji
On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji
Theses: Doctorates and Masters
Wireless sensor networks (WSNs) are distributed networks comprising small sensing devices equipped with a processor, memory, power source, and often with the capability for short range wireless communication. These networks are used in various applications, and have created interest in WSN research and commercial uses, including industrial, scientific, household, military, medical and environmental domains. These initiatives have also been stimulated by the finalisation of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate wireless personal area networks (LR-WPAN).
Future applications may require large WSNs consisting of huge numbers of inexpensive wireless sensor …
An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt
An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt
Theses: Doctorates and Masters
The IEEE 802.11 Wireless Local Area Network (WLAN), commonly known as Wi-Fi, has emerged as a popular internet access technology and researchers are continuously working on improvement of the quality of service (QoS) in WLAN by proposing new and efficient schemes. Voice and video over Internet Protocol (VVoIP) applications are becoming very popular in Wi-Fi enabled portable/handheld devices because of recent technological advancements and lower service costs. Different from normal voice and video streaming, these applications demand symmetric throughput for the upstream and downstream. Existing Wi-Fi standards are optimised for generic internet applications and fail to provide symmetric throughput due …
An Investigation Into Internetworking Education, Woratat Makasiranondh
An Investigation Into Internetworking Education, Woratat Makasiranondh
Theses: Doctorates and Masters
Computer network technology and the Internet grew rapidly in recent years. Their growth created a large demand from industry for the development of IT and internetworking professionals. These professionals need to be equipped with both technical hands-on skills and non-technical or soft skills. In order to supply new professionals to the industry, educational institutions need to address these skills training in their curricula. Technical hands-on skills in internetworking education can be emphasised through the practical use of equipment in classrooms. The provision of the networking equipment to the internetworking students is a challenge. Particularly, university students in developing countries may …
Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen
Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen
Theses: Doctorates and Masters
Every second, vast amounts of data are transferred over communication systems around the world, and as a result, the demands on optical infrastructures are extending beyond the traditional, ring-based architecture. The range of content and services available from the Internet is increasing, and network operations are constantly under pressure to expand their optical networks in order to keep pace with the ever increasing demand for higher speed and more reliable links.
Design Of Survivable Wdm Network Based On Pre-Configured Protection Cycle, Byungkyu Kang
Design Of Survivable Wdm Network Based On Pre-Configured Protection Cycle, Byungkyu Kang
Theses: Doctorates and Masters
Wavelength Division Multiplexing (WDM) is an important technique which allows the trans- port of large quantities of data over optical networks. All optical WDM-based networks have been used to improve overall communication capacity and provide an excellent choice for the design of backbone networks. However, due to the high traffic load that each link can carry in a WDM network, survivability against failures becomes very important. Survivability in this context is the ability of the network to maintain continuity of service against failures, since a failure can lead to huge data losses. In recent years, many survivability mechanisms have been …
An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli
An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli
Theses: Doctorates and Masters
This thesis consists of a series of internationally published, peer reviewed, conference research papers and one journal paper. The papers evaluate and further develop two modelling methods for use in Information Technology (IT) design and for the educational and training needs of students within the area of computer and network technology. The IT age requires technical talent to fill positions such as network managers, web administrators, e-commerce consultants and network security experts as IT is changing rapidly, and this is placing considerable demands on higher educational institutions, both within Australia and internationally, to respond to these changes.
Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb
Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb
Theses : Honours
Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.
This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …
The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai
The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai
Theses: Doctorates and Masters
The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …
Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao
Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao
Theses: Doctorates and Masters
Asynchronous Transfer Mode (ATM) technology is widely employed for the transport of network traffic, and has the potential to be the base technology for the next generation of global communications. Connection Admission Control (CAC) is the effective traffic control mechanism which is necessary in ATM networks in order to avoid possible congestion at each network node and to achieve the Quality-of-Service (QoS) requested by each connection. CAC determines whether or not the network should accept a new connection. A new connection will only be accepted if the network has sufficient resources to meet its QoS requirements without affecting the QoS …
Bluetooth Software On Linux, Wireless Hand-Held Devices, Teck Khoon Low
Bluetooth Software On Linux, Wireless Hand-Held Devices, Teck Khoon Low
Theses : Honours
In order to enable existing computers (non-Bluetooth ready) to connect to a Bluetooth piconet, a Bluetooth hardware device comprising of the Radio antenna, the baseband and control circuit is used. The digital portion of this device is also known as a Host Controller, HC. In the traditional communication lingo, the Bluetooth Hardware functions, as the Data Communication Equipment (DCE) while the Host is the Data terminal Equipment (DTE). This report discusses the theory and implementation of the communication protocol between the Host and the Host Controller, enabling communication between the computer and the Bluetooth hardware
Development Of Self-Adaptive Back Propagation And Derivative Free Training Algorithms In Artificial Neural Networks, Shamsuddin Ahmed
Development Of Self-Adaptive Back Propagation And Derivative Free Training Algorithms In Artificial Neural Networks, Shamsuddin Ahmed
Theses: Doctorates and Masters
Three new iterative, dynamically self-adaptive, derivative-free and training parameter free artificial neural network (ANN) training algorithms are developed. They are defined as self-adaptive back propagation, multi-directional and restart ANN training algorithms. The descent direction in self-adaptive back propagation training is determined implicitly by a central difference approximation scheme, which chooses its step size according to the convergence behavior of the error function. This approach trains an ANN when the gradient information of the corresponding error function is not readily available. The self- adaptive variable learning rates per epoch are determined dynamically using a constrained interpolation search. As a result, appropriate …
Bandwidth Management And Quality Of Service, Adalbert Engel
Bandwidth Management And Quality Of Service, Adalbert Engel
Theses: Doctorates and Masters
With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses …
Analysis Of Background Noise For Wireless Microwave Lan Channels, Jason C. Hislop
Analysis Of Background Noise For Wireless Microwave Lan Channels, Jason C. Hislop
Theses : Honours
Perusal of the details within, should provide the reader with an insight into general wireless indoor communications within the microwave spectrum, with respect to the problems laced, specific to noise corruption of the transmitted signal. Indoor communication systems are difficult to model, due to the largely random nature of the relevant environment, and the compounding factors that degrade system performance. These factors are many and varied, in accordance with the operational topologies of possible application area. However, there exists a common and increasing need to effectively model the communication links in question. Part of this strategy involves having an understanding …
The Mobile Telephone: The Transportation Of Social Relationships, Kenneth C. Staples
The Mobile Telephone: The Transportation Of Social Relationships, Kenneth C. Staples
Theses: Doctorates and Masters
In the studies of contemporary electronic media artifacts and their effects on society, television, satellites, and computers have been extensively investigated and their various impacts well documented. With regards to telecommunication technologies, academic scholarship is somewhat less, with most comment being restricted to either historic evolution, or technical description. Exceptions to this are, Marvin's reference to the telephone in her publication, When Old Technologies Were New: Thinking About Electronic Communication in the Late Nineteenth Century (1988}, and Umble's The Amish and the telephone: resistance and reconstruction (1992). Both of these publications are used for supporting arguments in my thesis investigating …
Simulator For The Performance Analysis Of Cpm Schemes In An Indoor Wireless Environment, Ronald Chua
Simulator For The Performance Analysis Of Cpm Schemes In An Indoor Wireless Environment, Ronald Chua
Theses : Honours
A software simulator for characterising Continuous Phase Modulation (CPM) schemes in an indoor multipath environment has been developed using SIMULINK and MATLAB. The simulator is capable of simulating a wide range of CPM schemes to determine bandwidth efficiency and robustness to additive white Gaussian noise (AWGN) and Rician fading. Initial trials of the simulator indicate that the simulator is functioning correctly. Eventually, the simulator will be used to determine the most suitable modulation scheme for the development of an actual indoor wireless system.