Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
-
- Computer networks (2)
- Network traffic (2)
- Wireless communication (2)
- Wireless communication systems (2)
- Ad-hoc networks (1)
-
- Cellular telephones | Cellular telephone services industry | Cell phone systems | Radio frequency | Global system for mobile communications (1)
- Channel matrix (1)
- Classification (1)
- Clustering protocols; wireless sensor networks; load balancing; routing protocols; energy efficiency protocols; ferry protocol. (1)
- Computer network security (1)
- Data Mining (1)
- Data center flows (1)
- Digital communications | Telecommunication systems | Timing circuits (1)
- Digital content (1)
- Distributed uplink channel decoding (1)
- Dynamic power management (1)
- Electronic data processing -- Distributed processing | Computer security | Computer networks -- Security measures (1)
- Extended alamouti quasi-orthogonal space-time bloc coding (Q-STBC) (1)
- Fault detection systems (1)
- Household electronics. (1)
- Hybrid Automatic Repeat reQuest (1)
- Improved computation efficiency (1)
- Intelligent transportation systems | Traffic safety | Vehicular ad hoc networks (Computer networks) (1)
- Interference (1)
- Intranet (1)
- Intranets (Computer networks) -- Management | Intranets (Computer networks) -- Design and construction | Workflow -- Management (1)
- Invariant fading channel (1)
- Local area networks (Computer networks) (1)
- Location sensing (1)
- Medium access control protocol (1)
Articles 1 - 30 of 36
Full-Text Articles in Digital Communications and Networking
Introducing Digital Content To Kclc, Chad Briesacher
Multiframe Coded Computation For Distributed Uplink Channel Decoding, Brinell F. Monteiro
Multiframe Coded Computation For Distributed Uplink Channel Decoding, Brinell F. Monteiro
Theses
The latest 5G technology in wireless communication has led to an increasing demand for higher data rates and low latencies. The overall latency of the system in a cloud radio access network is greatly affected by the decoding latency in the uplink channel. Various proposed solutions suggest using network function virtualization (NFV). NFV is the process of decoupling the network functions from hardware appliances. This provides the exibility to implement distributed computing and network coding to effectively reduce the decoding latency and improve the reliability of the system. To ensure the system is cost effective, commercial off the shelf (COTS) …
Preemptive Efficient Queueing For Scheduling Deadline-Bound Data Center Flows, Vinaykrishna Gopalakrishna
Preemptive Efficient Queueing For Scheduling Deadline-Bound Data Center Flows, Vinaykrishna Gopalakrishna
Theses
This thesis introduces a new deadline aware flow scheduling scheme called Preemptive Efficient Queuing (PEQ). Unlike other schemes which use policies like EDF, SJF or fair share, this scheme aims to procrastinate flows as much as they can afford to, while keeping with their deadlines. Thereby, PEQ prioritizes more urgent flows that have shorter time to procrastinate, or cushion time. Results of PEQ are compared with state-of-the-art schemes for the transport of data-center flows, such as Preemptive Distributed Quick (PDQ) and Deadline-Driven Delivery (D3). The results show that PEQ outperforms D3 and PDQ. We identify results …
Source-Channel Coding For Coordination Over A Noisy Two-Node Network, Sarah A. Obead
Source-Channel Coding For Coordination Over A Noisy Two-Node Network, Sarah A. Obead
Theses
Recently, the concept of coordinating actions between distributed agents has emerged in the information theory literature. It was first introduced by Cuff in 2008 for the point-to-point case of coordination. However, Cuff’s work and the vast majority of the follow-up research are based on establishing coordination over noise-free communication links. In contrast, this thesis investigates the open problem of coordination over noisy point-to-point links. The aim of this study is to examine Shannon’s source-channel separation theorem in the context of coordination. To that end, a general joint scheme to achieve the strong notion of coordination over a discrete memoryless channel …
Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki
Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki
Theses
Intrusion detection systems (IDSs) such as Snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is matched with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all …
Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi
Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi
Theses
The denseness and random distribution of large-scale WSNs makes it quite difficult to replace or recharge nodes. Energy efficiency and management is a major design goal in these networks. In addition, reliability and scalability are two other major goals that have been identified by researchers as necessary in order to further expand the deployment of such networks for their use in various applications. This thesis aims to provide an energy efficient and effective node clustering and data dissemination algorithm in large-scale wireless sensor networks. In the area of clustering, the proposed research prolongs the lifetime of the network by saving …
Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley
Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley
Theses
The concept of Intelligent Transportation Systems (ITS) presents new R&D challenges for the transportation and ICT sectors and is currently receiving considerable interest from the research community. The primary objective of ITS is the creation of advanced road traffic systems for improved traffic safety, efficiency, and travelling comfort. Basic vehicle and roadside infrastructure collaboration allows for an increase in efficiency and safety and acts as the foundation for an extensive service set to achieve these ITS goals. Applications such as journey planning, automatic tolling and emergency warnings, among others, are envisaged in a system which can potentially reform modern transportation. …
Reliability-Performance Trade-Offs In Photonic Noc Architectures, Pradheep Khanna Kaliraj
Reliability-Performance Trade-Offs In Photonic Noc Architectures, Pradheep Khanna Kaliraj
Theses
Advancements in the field of chip fabrication has facilitated in integrating more number of transistors in a given area which lead to the era of multi-core processors. Interconnect became the bottleneck for the multi-core processors as the number of cores in a chip increased. The traditional bus based architectures, which are currently used in the processors, cannot scale up to support the increasing number of cores in a multi-core chip. Hence, Network-on-Chip (NoC) is the preferred communication backbone for modern multicore chips. However, the multi-hop data transmission using wireline interconnects result in high energy dissipation and latency. Hence, many alternative …
A Design Tool For Wsn Design In Buildings, Antony Guinard
A Design Tool For Wsn Design In Buildings, Antony Guinard
Theses
The combination of sensing, processing, communication and actuation has made the monitoring and operation of buildings a significant emerging application area for Wireless Sensor Networks (WSN). The design, implementation and management of WSN is a complex task requiring a broad spectrum of disciplines such as networking and protocols, information management and embedding engineering to be successful. Indoor environments in particular pose a number of challenges that make the design of wireless networks a difficult task. These include the influence of obstacles and people on radio propagation, ever evolving building layout and interference from other wireless networks. The large-scale adoption of …
Safety Data Dissemination Framework For Vehicular Networks, Martin Koubek
Safety Data Dissemination Framework For Vehicular Networks, Martin Koubek
Theses
An effective transportation system is essential to modern societies with transportation having a significant influence on economic growth, social development and the environment. But this dependence on road mobility has had serious consequences in terms of rising crash costs that include deaths, injuries, lost productivity, material damage and congestion. The European Union and many other governments worldwide support active safety as being the next logical step in diminishing crash costs after passive safety (safety belt, ABS etc.) where drivers will be warned prior to reaching hazardous situations enabling them to react appropriately. While improving road safety is unanimously considered the …
Retransmission Strategies For Moving Networks Over Ricean Fading Channels, Alex Ruiz Lee
Retransmission Strategies For Moving Networks Over Ricean Fading Channels, Alex Ruiz Lee
Theses
The problem of designing retransmission protocols based on Hybrid Automatic Repeat reQuest (HARQ) for moving networks over Ricean fading channels has been considered. The scenario of interest consists of one receiver traveling at a given speed while connected to a wireless network based on OFDM (e.g., WiMax) through several base stations located along the path. Five different retransmission protocols that combine HARQ with handover between adjacent base stations are considered. Their performance in terms of number of retransmissions per packet via numerical simulations, considering both frequency selective and nonselective channels are presented. The results obtained show the relevant advantage that …
Proactive Methods For Measurement Of Available Bandwidth And Link Capacity, Khondaker Musfakus Salehin
Proactive Methods For Measurement Of Available Bandwidth And Link Capacity, Khondaker Musfakus Salehin
Theses
With the continuous expansion of network infrastructure and deployment of applications sensitive to Quality-of-Service, network measurement plays a major role in both network planning and management. Accurate measurement of various network parameters, e.g., available bandwidth, link capacity, delay, packet loss and jitter, provides a positive impact for effective traffic engineering, Quality-of-Service (QoS) routing, optimization of end-to-end transport performance, and link capacity planning. For network measurement, there exists several proactive estimation tools based on either probe-gap model or probe-rate model that estimate path related attributes. Most of these tools that have been implemented can measure tight-link capacity (smallest available bandwidth) and/or …
Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa
Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa
Theses
Several challenging applications and construction works demand real-time measurements for positioning at the centimeter-level accuracy. This positioning accuracy can be obtained by using a Global Positioning System (GPS) roving unit and employing a single reference station (base-station) or through utilizing the service of multiple reference stations forming a Real-Time Kinematics (RTK) Reference Network.
The limitation of the single reference approach is that measurement errors are distance dependent and good accuracy can be only obtained when distances are less than 10 kms. In addition, this method requires a nearby Geodetic Control Point (GCP). Recently, RTK reference networks are widely established in …
Location Estimation In A 3d Environment Using Radio Frequency Identification Tags, Adwitiya Akash Jain
Location Estimation In A 3d Environment Using Radio Frequency Identification Tags, Adwitiya Akash Jain
Theses
RFID tag location estimation in a 3D environment is investigated. The location of the tag with unknown coordinates can be estimated with certain accuracy. However, accuracy can be improved using the knowledge based on measurement of additional reference tags with known location. This thesis studies the mathematical formulation and practical realization of location sensing using RFID tags.
Deviating from the standard use of RFID technology which employs one tag reader to identify the presence of tag, here multiple tag readers with known location are used to estimate the physical location of an individual tag, with/without the help of few reference …
New Hybrid Automatic Repeat Request (Harq) Scheme For 4x4 Mimo System, Based On The Extended Alamouti Quasi-Orthogonal Space-Time Bloc Coding (Q-Stbc), In Invariant And Variant Fading Channel, Jordi Ferrer Torras
Theses
A new Hybrid Automatic Repeat reQuest (HARQ) combining scheme for a 4x4 Multiple Input Multiple Output (MIMO) system in invariant and variant fading channel conditions is proposed and analized. Based on the Extended Alamouti Quasi-orthogonal Space-Time Block Coding (Q-STBC), the use of the so-called Alternative Matrices for transmission, depending on the Channel State Information (CSI) received as feedback, is compared to other existing solutions.
Sign changes and permutations in the retransmission sequences allow reducing the interference while exploiting the spatial diversity to introduce some gain in the signal power. The best transmission order is selected by the Determinant Criterion, which …
New Hybrid Automatic Repeat Request (Harq) Combining With Space Time Block Coding (Stbc) In Invariant And Variant Fading Channel, Guillem Ernest Malagarriga Vilella
New Hybrid Automatic Repeat Request (Harq) Combining With Space Time Block Coding (Stbc) In Invariant And Variant Fading Channel, Guillem Ernest Malagarriga Vilella
Theses
Hybrid Automatic Repeat reQuest (HARQ) combining for space time block coding Multiple Input Multiple Output (MIMO) system consisting of N transmit antennas and M receive antennas (NxM) in a time invariant channel and in a time varying channel is proposed and its performance is analyzed. Based on the measured channel matrix, the receiver chooses the best retransmission order and communicated it to the transmitter.
The scheme, where this algorithm is performed, is a combination of a precombining HARQ scheme and the Multiple Alamouti Space-Time Block Coding (MASTBC), which is suitable for more than 2 transmit antennas. The combination of this …
Linux Based Pda Gateway For Wireless Sensor Networks, Áine Mccarthy
Linux Based Pda Gateway For Wireless Sensor Networks, Áine Mccarthy
Theses
Recent years have seen a dramatic increase in the development and deployment of intelligent sensors and their use with a plethora of networking protocol technologies. Wireless Sensor Networks (WSN) can be used to monitor the environment, objects in the environment and the interaction of these objects with each other. Examples include environment and habitat monitoring, structural monitoring, disaster management and emergency response. The deployment of such large-scale WSN possess many challenges, the most important being scalability, portability, fault tolerance, adaptability and ubiquitous connectivity. There also exist many challenges when trying to establish communication with WSN. WSN can function as a …
Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan
Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan
Theses
Multiple Input Multiple Output (MIMO) antenna systems have shown a great potential for wireless communication. These systems support high capacity, increased diversity and interference suppression. Recently it has been proposed MIMO constellations for Radar. MIMO Radar is not only a new research field, but also a very promising approach in terms of overcoming Radar Cross Section (RCS) fluctuations with diversity. This thesis explores the potential of coding schemes for MIMO Radar.
The ambiguity functions measures related to MIMO Radar are used to evaluate how much diversity gain can be coherently achieved with certain coding schemes. The results of this analysis …
An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh
An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh
Theses
Power efficiency is the most constraining requirement for viable operation of battery-powered networked sensors. Conventionally, dynamic power management (DPM) is used to put sensor nodes into different states such as active, idle, and sleep, each consuming a certain level of power. Within the active state, communication operational states, such as receive and transmit consume different levels of nodal power. This thesis shows how DPM states and protocol operational states can be combined into a single stochastic model to finely evaluate the power consumption performance of a medium access control (MAC) protocol. The model is formulated as a semi-Markov decision process …
Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya
Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya
Theses
A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. It is characterized by dynamically changing topology with no fixed infrastructure which exhibits a perfectly vulnerable state for a number of different kinds of attacks.
This thesis proposes a novel technique of achieving security in wireless mobile ad hoc networks by integrating a simple clustering and a voting mechanism together. The purpose of forming a cluster is to facilitate security in the network and the voting is performed to support the decision making process in the cluster. A procedure of forming small homogenous clusters throughout the …
Ultra Wideband Communication Link, Preeti Singh
Ultra Wideband Communication Link, Preeti Singh
Theses
Ultra-wideband communication (UWB) has been a topic of extensive research in recent years especially for its short-range communication and indoor applications. The preliminary objective of the project was to develop a description and understanding of the basic components of the communication link at microwave frequencies in order to achieve the primary objective of establishing a communication setup at a bandwidth of 2.5 GHz for testing Ultra Wideband (UWB) antennas. This was achieved with the aid of commercially available optical system which was modified for the purpose. Beginning with the generation of baseband narrow pulses with energy spanning over a broad …
Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar
Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar
Theses
Deadlock occurrence is a critical problem for any computer network. Various solutions have been proposed over last two decades to solve problem of deadlocks in networks using different routing schemes, like up/down routing algorithm used in Myrinet switches. However, most of existing approaches for deadlock-free routing either try to eliminate any possibility of deadlock occurrence, which can result in putting extra restrictions on the routing in the networks or put no restrictions on routing, which leads to other approach namely deadlock recovery. In this thesis emphasis is on developing hybrid approach for routing in wormhole networks, wherein some prohibition is …
Address Assignment In Ad-Hoc Networks, John Paul O'Grady
Address Assignment In Ad-Hoc Networks, John Paul O'Grady
Theses
A wireless ad-hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralised manner. In an ad hoc network routing is used to find and maintain a path through the network. Routing requires each node to have a unique identifier, to ensure that packets sent to a particular node reach their intended destination. Most ad-hoc routing protocols assume that a node already has an address prior to its entry into a network and so the issue of address assignment is largely ignored. This however …
Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan
Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan
Theses
Push To Talk (PTT) services have been in existence for several decades providing dispatch services via two-way radio such as walkie-talkies. For a number of years now PTT services have been available for use over mobile phone networks. These mobile PTT services have occupied a niche market with business users and have been provided on proprietary networks that do not enable roaming.
Over the past year there has been an explosion of interest in the concept of PTT provided over mobile networks using Internet Protocol (IP) technology. This service uses cellular access and radio resources more efficiently than circuit-switched cellular …
A Sip Based Multimedia Messaging Service, Donna Griffin
A Sip Based Multimedia Messaging Service, Donna Griffin
Theses
The Session Initiation Protocol (SIP) is the protocol of choice for establishing multimedia sessions in Universal Mobile Telecommunications System (UMTS) networks as stated by 3GPP. SIP is a protocol that will merge together the cellular and Internet worlds and is also scalable, highly available and extensible. It enables mobile carriers to extend operations, administration, maintenance and provisioning (OAMP) in one application to all applications. In addition, while SIP permits presence. Instant Messaging, File Sharing etc., its ultimate value lies in seamlessly aggregating these applications in more powerful offerings, such as Multimedia Messaging, Push to Talk and Voice over IP.
Multimedia …
Development Of A Low Jitter Multiplying Delay Locked Loop, Ian Kennedy
Development Of A Low Jitter Multiplying Delay Locked Loop, Ian Kennedy
Theses
The clock generator is a critical component in high-speed wireline communication systems. The clocks in these systems mark time at precise regular intervals. Any deviation of the clock edges from these ideal time points is called jitter and it degrades the overall integrity of the communication system. This thesis looks at both phase locked loops (PLLs) and delay locked loops (DLLs) and their ability to provide these precise clocks. Expressions for the thermal noise-induced jitter in both the PLL and DLL are compared. From this, the DLL is shown to possess the potential for better jitter performance. However, to realise …
Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta
Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta
Theses
In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.
This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …
Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer
Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer
Theses
In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …
Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan
Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan
Theses
This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …
Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe
Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe
Theses
Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …