Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Wireless communication systems (3)
- Ant System (2)
- Communication (2)
- Data Mining (2)
- Sensor Network (2)
-
- Spread spectrum communications (2)
- Swarm Intelligence (2)
- Asynchronous circuits (1)
- Asynchronous transfer mode (1)
- Broadband communication systems -- Analysis (1)
- Channel model (1)
- Clustered network (1)
- Coding theory (1)
- Communication--Network analysis (1)
- Complex object formats (1)
- Computer communication networks (1)
- Computer networks (1)
- Data compression (Telecommunication) (1)
- Data management (1)
- Data transmission systems (1)
- Digital communications -- Standards (1)
- Digital communications | Telecommunication systems | Timing circuits (1)
- Digital libraries (1)
- Digital resources (1)
- Documents (1)
- Electromagnetic interference (1)
- Equalizer (1)
- Fairness (1)
- IEEE 802.11 (Standard) (1)
- Integrated services digital networks -- Analysis (1)
- Publication
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Engineering
Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee
Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee
Electrical and Computer Engineering Faculty Publications
While most previous studies on mobile ad hoc networks (MANETs) rely on the assumption that nodes are randomly distributed in the network coverage area, this assumption is unlikely to hold, as nodes tend to be cluttered around hot spots like the site of an accident or disaster. We refer to this as a clustered layout. Intuitively, a MANET with the clustered layout may suffer from serious performance degradation due to the excessive collisions in congested hot spots and space underutilization of sparse areas. In this paper, we propose a power-controlled network protocol, called the power-stepped protocol (PSP), that maximizes the …
Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson
Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson
Theses and Dissertations
This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance …
Ultra Wideband Communication Link, Preeti Singh
Ultra Wideband Communication Link, Preeti Singh
Theses
Ultra-wideband communication (UWB) has been a topic of extensive research in recent years especially for its short-range communication and indoor applications. The preliminary objective of the project was to develop a description and understanding of the basic components of the communication link at microwave frequencies in order to achieve the primary objective of establishing a communication setup at a bandwidth of 2.5 GHz for testing Ultra Wideband (UWB) antennas. This was achieved with the aid of commercially available optical system which was modified for the purpose. Beginning with the generation of baseband narrow pulses with energy spanning over a broad …
Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi
Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi
Computer Science Theses & Dissertations
Physical constraints, bandwidth constraints and host mobility all contribute to the difficulty of providing Quality of Service (QoS) guarantees in wireless networks. There is a growing demand for wireless networks to support all the services that are available on wired networks. These diverse services, such as email, instant messaging, web browsing, video conferencing, telephony and paging all place different demands on the network, making QoS provisioning for wireless networks that carry multiple classes of traffic a complex problem. We have developed a set of admission control and resource reservation schemes for QoS provisioning in multi-class wireless networks.
We present three …
Energy-Aware Ad Hoc On-Demand Distance Vector Routing Protocol And Optimizing The Blocking Problem Induced In Wireless Ad Hoc Networks, Abdallah El Moutia
Energy-Aware Ad Hoc On-Demand Distance Vector Routing Protocol And Optimizing The Blocking Problem Induced In Wireless Ad Hoc Networks, Abdallah El Moutia
FIU Electronic Theses and Dissertations
The purpose of this thesis was to investigate some of the issues related to routing and medium access control protocol in ad hoc networks. In routing protocol, the goal is to tackle the power consumption problem and to present a case for using new cost energy-aware metric for Ad Hoc On-Demand Distance Vector (AODV). The idea of the new cost metric is to be able to avoid routes with a low energy capacity. By using this approach, high efficiency in energy consumption can be achieved in Ad-Hoc networks.
The second goal of this thesis was to investigate the blocking problem …
An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr.
Theses and Dissertations
Military communications require the rapid deployment of mobile, high-bandwidth systems. These systems must provide anytime, anywhere capabilities with minimal interference to existing military, private, and commercial communications. Ultra Wideband (UWB) technology is being advanced as the next generation radio technology and has the potential to revolutionize indoor wireless communications. The ability of UWB to mitigate multipath fading, provide high-throughput data rates (e.g., greater than 100 Mbps), provide excellent signal penetration (e.g., through walls), and low implementation costs makes it an ideal technology for a wide range of private and public sector applications. Preliminary UWB studies conducted by The Institute for …
Ultra-Wideband (Uwb) Communications: New Paradigms And Opportunities, Robert H. Morelos-Zaragoza
Ultra-Wideband (Uwb) Communications: New Paradigms And Opportunities, Robert H. Morelos-Zaragoza
Robert Henry Morelos-Zaragoza
In this talk, the unique characteristics of ultra wideband (UWB) communications systems are introduced. Receiver design considerations are presented. Focus is on the relation between the symbol duration and the delay spread of the channel. This determines whether the receiver should use a Rake receiver (Spread-spectrum system) or an equalizer (multiple carrier or OFDM system).
Interference Suppression In Multiple Access Communications Using M-Ary Phase Shift Keying Generated Via Spectral Encoding, Abel S. Nunez
Interference Suppression In Multiple Access Communications Using M-Ary Phase Shift Keying Generated Via Spectral Encoding, Abel S. Nunez
Theses and Dissertations
A conceptual transform domain communication system (TDCS) is shown capable of operating successfully using M-Ary phase shift keying (MPSK) data modulation in a multiple access environment. Using spectral encoding, the conceptual TDCS provides an effective means for mitigating interference affects while achieving multiple access communications. The use of transform domain processing with MPSK data modulation (TD-MPSK) provides higher spectral efficiency relative to other modulation techniques (antipodal signaling and cyclic shift keying) considered previously for TDCS applications. The proposed TD-MPSK technique uses spectral encoding for both data and multiple access phase modulations. Demodulation of the spectrally encoded TD-MPSK communication symbols is …
Stochastic Analysis And Performance Evaluation Of Wireless Schedulers, R. Rom, Hwee-Pink Tan
Stochastic Analysis And Performance Evaluation Of Wireless Schedulers, R. Rom, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In the last few years, wireless scheduling algorithms have been proposed by supplementing wireline scheduling algorithms with a wireless adaptation scheme. However, Quality of Service (QoS) bounds have either been derived for flows that perceive error-free conditions or a static worst-case channel condition. Such an assumption of the channel condition is unrealistic, since channel errors are known to be bursty in nature. Hence, these bounds are inadequate to characterize the scheduler's QoS performance. Our research focuses on performing an extensive analysis of wireless scheduling in order to derive statistical QoS performance bounds under realistic channel conditions. In this paper, we …
Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar
Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar
Theses
Deadlock occurrence is a critical problem for any computer network. Various solutions have been proposed over last two decades to solve problem of deadlocks in networks using different routing schemes, like up/down routing algorithm used in Myrinet switches. However, most of existing approaches for deadlock-free routing either try to eliminate any possibility of deadlock occurrence, which can result in putting extra restrictions on the routing in the networks or put no restrictions on routing, which leads to other approach namely deadlock recovery. In this thesis emphasis is on developing hybrid approach for routing in wormhole networks, wherein some prohibition is …
Attack-Resistant Location Estimation In Wireless Sensor Networks, Dongdang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du
Attack-Resistant Location Estimation In Wireless Sensor Networks, Dongdang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du
Electrical Engineering and Computer Science - All Scholarship
Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against range-based location discovery in sensor networks. The …
A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw
A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw
Electrical Engineering and Computer Science - All Scholarship
The need for a robust predictive sensor communication network inspired this research. There are many critical issues in a communication network with different data rate requirements, limited power and bandwidth. Energy consumption is one of the key issues in a sensor network as energy dissipation occurs during routing, communication and monitoring of the environment. This paper covers the routing of a sensor communication network by applying an evolutionary algorithm- the ant system. The issues considered include optimal energy, data fusion from different sensor types and predicting changes in environment with respect to time.
A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw
A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw
Electrical Engineering and Computer Science - All Scholarship
The need for a robust predictive sensor communication network inspired this research. There are many critical issues in a communication network with different data rate requirements, limited power and bandwidth. Energy consumption is one of the key issues in a sensor network as energy dissipation occurs during routing, communication and monitoring of the environment. This paper covers the routing of a sensor communication network by applying an evolutionary algorithm- the ant system. The issues considered include optimal energy, data fusion from different sensor types and predicting changes in environment with respect to time.
Future Of Asynchronous Transfer Mode Networking, Fakhreddine Mohamed Hachfi
Future Of Asynchronous Transfer Mode Networking, Fakhreddine Mohamed Hachfi
Theses Digitization Project
The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.
Address Assignment In Ad-Hoc Networks, John Paul O'Grady
Address Assignment In Ad-Hoc Networks, John Paul O'Grady
Theses
A wireless ad-hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralised manner. In an ad hoc network routing is used to find and maintain a path through the network. Routing requires each node to have a unique identifier, to ensure that packets sent to a particular node reach their intended destination. Most ad-hoc routing protocols assume that a node already has an address prior to its entry into a network and so the issue of address assignment is largely ignored. This however …
Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan
Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan
Theses
Push To Talk (PTT) services have been in existence for several decades providing dispatch services via two-way radio such as walkie-talkies. For a number of years now PTT services have been available for use over mobile phone networks. These mobile PTT services have occupied a niche market with business users and have been provided on proprietary networks that do not enable roaming.
Over the past year there has been an explosion of interest in the concept of PTT provided over mobile networks using Internet Protocol (IP) technology. This service uses cellular access and radio resources more efficiently than circuit-switched cellular …
A Sip Based Multimedia Messaging Service, Donna Griffin
A Sip Based Multimedia Messaging Service, Donna Griffin
Theses
The Session Initiation Protocol (SIP) is the protocol of choice for establishing multimedia sessions in Universal Mobile Telecommunications System (UMTS) networks as stated by 3GPP. SIP is a protocol that will merge together the cellular and Internet worlds and is also scalable, highly available and extensible. It enables mobile carriers to extend operations, administration, maintenance and provisioning (OAMP) in one application to all applications. In addition, while SIP permits presence. Instant Messaging, File Sharing etc., its ultimate value lies in seamlessly aggregating these applications in more powerful offerings, such as Multimedia Messaging, Push to Talk and Voice over IP.
Multimedia …
Development Of A Low Jitter Multiplying Delay Locked Loop, Ian Kennedy
Development Of A Low Jitter Multiplying Delay Locked Loop, Ian Kennedy
Theses
The clock generator is a critical component in high-speed wireline communication systems. The clocks in these systems mark time at precise regular intervals. Any deviation of the clock edges from these ideal time points is called jitter and it degrades the overall integrity of the communication system. This thesis looks at both phase locked loops (PLLs) and delay locked loops (DLLs) and their ability to provide these precise clocks. Expressions for the thermal noise-induced jitter in both the PLL and DLL are compared. From this, the DLL is shown to possess the potential for better jitter performance. However, to realise …
Resource Harvesting Within The Oai-Pmh Framework, Herbert Van De Sompel, Michael L. Nelson, Carl Lagoze, Simeon Warner
Resource Harvesting Within The Oai-Pmh Framework, Herbert Van De Sompel, Michael L. Nelson, Carl Lagoze, Simeon Warner
Computer Science Faculty Publications
Motivated by preservation and resource discovery, we examine how digital resources, and not just metadata about resources, can be harvested using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). We review and critique existing techniques for identifying and gathering digital resources using metadata harvested through the OAI-PMH. We introduce an alternative solution that builds on the introduction of complex object formats that provide a more accurate way to describe digital resources. We argue that the use of complex object formats as OAI-PMH metadata formats results in a reliable and attractive approach for incremental harvesting of resources using the OAI-PMH.
Metadata And Buckets In The Smart Object, Dumb Archive (Soda) Model, Michael L. Nelson, Kurt Maly, Delwin R. Croom Jr., Steven W. Robbins
Metadata And Buckets In The Smart Object, Dumb Archive (Soda) Model, Michael L. Nelson, Kurt Maly, Delwin R. Croom Jr., Steven W. Robbins
Computer Science Faculty Publications
We present the Smart Object, Dumb Archive (SODA) model for digital libraries (DLs), and discuss the role of metadata in SODA. The premise of the SODA model is to "push down" many of the functionalities generally associated with archives into the data objects themselves. Thus the data objects become "smarter", and the archives "dumber". In the SODA model, archives become primarily set managers, and the objects themselves negotiate and handle presentation, enforce terms and conditions, and perform data content management. Buckets are our implementation of smart objects, and da is our reference implementation for dumb archives. We also present our …
Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo
Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.