Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

PDF

2004

Institution
Keyword
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Engineering

Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee Sep 2004

Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee

Electrical and Computer Engineering Faculty Publications

While most previous studies on mobile ad hoc networks (MANETs) rely on the assumption that nodes are randomly distributed in the network coverage area, this assumption is unlikely to hold, as nodes tend to be cluttered around hot spots like the site of an accident or disaster. We refer to this as a clustered layout. Intuitively, a MANET with the clustered layout may suffer from serious performance degradation due to the excessive collisions in congested hot spots and space underutilization of sparse areas. In this paper, we propose a power-controlled network protocol, called the power-stepped protocol (PSP), that maximizes the …


Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson Sep 2004

Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson

Theses and Dissertations

This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance …


Ultra Wideband Communication Link, Preeti Singh Aug 2004

Ultra Wideband Communication Link, Preeti Singh

Theses

Ultra-wideband communication (UWB) has been a topic of extensive research in recent years especially for its short-range communication and indoor applications. The preliminary objective of the project was to develop a description and understanding of the basic components of the communication link at microwave frequencies in order to achieve the primary objective of establishing a communication setup at a bandwidth of 2.5 GHz for testing Ultra Wideband (UWB) antennas. This was achieved with the aid of commercially available optical system which was modified for the purpose. Beginning with the generation of baseband narrow pulses with energy spanning over a broad …


Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi Jul 2004

Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi

Computer Science Theses & Dissertations

Physical constraints, bandwidth constraints and host mobility all contribute to the difficulty of providing Quality of Service (QoS) guarantees in wireless networks. There is a growing demand for wireless networks to support all the services that are available on wired networks. These diverse services, such as email, instant messaging, web browsing, video conferencing, telephony and paging all place different demands on the network, making QoS provisioning for wireless networks that carry multiple classes of traffic a complex problem. We have developed a set of admission control and resource reservation schemes for QoS provisioning in multi-class wireless networks.

We present three …


Energy-Aware Ad Hoc On-Demand Distance Vector Routing Protocol And Optimizing The Blocking Problem Induced In Wireless Ad Hoc Networks, Abdallah El Moutia Mar 2004

Energy-Aware Ad Hoc On-Demand Distance Vector Routing Protocol And Optimizing The Blocking Problem Induced In Wireless Ad Hoc Networks, Abdallah El Moutia

FIU Electronic Theses and Dissertations

The purpose of this thesis was to investigate some of the issues related to routing and medium access control protocol in ad hoc networks. In routing protocol, the goal is to tackle the power consumption problem and to present a case for using new cost energy-aware metric for Ad Hoc On-Demand Distance Vector (AODV). The idea of the new cost metric is to be able to avoid routes with a low energy capacity. By using this approach, high efficiency in energy consumption can be achieved in Ad-Hoc networks.

The second goal of this thesis was to investigate the blocking problem …


An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr. Mar 2004

An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr.

Theses and Dissertations

Military communications require the rapid deployment of mobile, high-bandwidth systems. These systems must provide anytime, anywhere capabilities with minimal interference to existing military, private, and commercial communications. Ultra Wideband (UWB) technology is being advanced as the next generation radio technology and has the potential to revolutionize indoor wireless communications. The ability of UWB to mitigate multipath fading, provide high-throughput data rates (e.g., greater than 100 Mbps), provide excellent signal penetration (e.g., through walls), and low implementation costs makes it an ideal technology for a wide range of private and public sector applications. Preliminary UWB studies conducted by The Institute for …


Ultra-Wideband (Uwb) Communications: New Paradigms And Opportunities, Robert H. Morelos-Zaragoza Mar 2004

Ultra-Wideband (Uwb) Communications: New Paradigms And Opportunities, Robert H. Morelos-Zaragoza

Robert Henry Morelos-Zaragoza

In this talk, the unique characteristics of ultra wideband (UWB) communications systems are introduced. Receiver design considerations are presented. Focus is on the relation between the symbol duration and the delay spread of the channel. This determines whether the receiver should use a Rake receiver (Spread-spectrum system) or an equalizer (multiple carrier or OFDM system).


Interference Suppression In Multiple Access Communications Using M-Ary Phase Shift Keying Generated Via Spectral Encoding, Abel S. Nunez Mar 2004

Interference Suppression In Multiple Access Communications Using M-Ary Phase Shift Keying Generated Via Spectral Encoding, Abel S. Nunez

Theses and Dissertations

A conceptual transform domain communication system (TDCS) is shown capable of operating successfully using M-Ary phase shift keying (MPSK) data modulation in a multiple access environment. Using spectral encoding, the conceptual TDCS provides an effective means for mitigating interference affects while achieving multiple access communications. The use of transform domain processing with MPSK data modulation (TD-MPSK) provides higher spectral efficiency relative to other modulation techniques (antipodal signaling and cyclic shift keying) considered previously for TDCS applications. The proposed TD-MPSK technique uses spectral encoding for both data and multiple access phase modulations. Demodulation of the spectrally encoded TD-MPSK communication symbols is …


Stochastic Analysis And Performance Evaluation Of Wireless Schedulers, R. Rom, Hwee-Pink Tan Feb 2004

Stochastic Analysis And Performance Evaluation Of Wireless Schedulers, R. Rom, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In the last few years, wireless scheduling algorithms have been proposed by supplementing wireline scheduling algorithms with a wireless adaptation scheme. However, Quality of Service (QoS) bounds have either been derived for flows that perceive error-free conditions or a static worst-case channel condition. Such an assumption of the channel condition is unrealistic, since channel errors are known to be bursty in nature. Hence, these bounds are inadequate to characterize the scheduler's QoS performance. Our research focuses on performing an extensive analysis of wireless scheduling in order to derive statistical QoS performance bounds under realistic channel conditions. In this paper, we …


Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar Jan 2004

Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar

Theses

Deadlock occurrence is a critical problem for any computer network. Various solutions have been proposed over last two decades to solve problem of deadlocks in networks using different routing schemes, like up/down routing algorithm used in Myrinet switches. However, most of existing approaches for deadlock-free routing either try to eliminate any possibility of deadlock occurrence, which can result in putting extra restrictions on the routing in the networks or put no restrictions on routing, which leads to other approach namely deadlock recovery. In this thesis emphasis is on developing hybrid approach for routing in wormhole networks, wherein some prohibition is …


Attack-Resistant Location Estimation In Wireless Sensor Networks, Dongdang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du Jan 2004

Attack-Resistant Location Estimation In Wireless Sensor Networks, Dongdang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du

Electrical Engineering and Computer Science - All Scholarship

Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against range-based location discovery in sensor networks. The …


A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw Jan 2004

A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw

Electrical Engineering and Computer Science - All Scholarship

The need for a robust predictive sensor communication network inspired this research. There are many critical issues in a communication network with different data rate requirements, limited power and bandwidth. Energy consumption is one of the key issues in a sensor network as energy dissipation occurs during routing, communication and monitoring of the environment. This paper covers the routing of a sensor communication network by applying an evolutionary algorithm- the ant system. The issues considered include optimal energy, data fusion from different sensor types and predicting changes in environment with respect to time.


A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw Jan 2004

A Predictive Sensor Network Using Ant System, Rajani Muraleedharan, Lisa Ann Osadciw

Electrical Engineering and Computer Science - All Scholarship

The need for a robust predictive sensor communication network inspired this research. There are many critical issues in a communication network with different data rate requirements, limited power and bandwidth. Energy consumption is one of the key issues in a sensor network as energy dissipation occurs during routing, communication and monitoring of the environment. This paper covers the routing of a sensor communication network by applying an evolutionary algorithm- the ant system. The issues considered include optimal energy, data fusion from different sensor types and predicting changes in environment with respect to time.


Future Of Asynchronous Transfer Mode Networking, Fakhreddine Mohamed Hachfi Jan 2004

Future Of Asynchronous Transfer Mode Networking, Fakhreddine Mohamed Hachfi

Theses Digitization Project

The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.


Address Assignment In Ad-Hoc Networks, John Paul O'Grady Jan 2004

Address Assignment In Ad-Hoc Networks, John Paul O'Grady

Theses

A wireless ad-hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralised manner. In an ad hoc network routing is used to find and maintain a path through the network. Routing requires each node to have a unique identifier, to ensure that packets sent to a particular node reach their intended destination. Most ad-hoc routing protocols assume that a node already has an address prior to its entry into a network and so the issue of address assignment is largely ignored. This however …


Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan Jan 2004

Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan

Theses

Push To Talk (PTT) services have been in existence for several decades providing dispatch services via two-way radio such as walkie-talkies. For a number of years now PTT services have been available for use over mobile phone networks. These mobile PTT services have occupied a niche market with business users and have been provided on proprietary networks that do not enable roaming.

Over the past year there has been an explosion of interest in the concept of PTT provided over mobile networks using Internet Protocol (IP) technology. This service uses cellular access and radio resources more efficiently than circuit-switched cellular …


A Sip Based Multimedia Messaging Service, Donna Griffin Jan 2004

A Sip Based Multimedia Messaging Service, Donna Griffin

Theses

The Session Initiation Protocol (SIP) is the protocol of choice for establishing multimedia sessions in Universal Mobile Telecommunications System (UMTS) networks as stated by 3GPP. SIP is a protocol that will merge together the cellular and Internet worlds and is also scalable, highly available and extensible. It enables mobile carriers to extend operations, administration, maintenance and provisioning (OAMP) in one application to all applications. In addition, while SIP permits presence. Instant Messaging, File Sharing etc., its ultimate value lies in seamlessly aggregating these applications in more powerful offerings, such as Multimedia Messaging, Push to Talk and Voice over IP.

Multimedia …


Development Of A Low Jitter Multiplying Delay Locked Loop, Ian Kennedy Jan 2004

Development Of A Low Jitter Multiplying Delay Locked Loop, Ian Kennedy

Theses

The clock generator is a critical component in high-speed wireline communication systems. The clocks in these systems mark time at precise regular intervals. Any deviation of the clock edges from these ideal time points is called jitter and it degrades the overall integrity of the communication system. This thesis looks at both phase locked loops (PLLs) and delay locked loops (DLLs) and their ability to provide these precise clocks. Expressions for the thermal noise-induced jitter in both the PLL and DLL are compared. From this, the DLL is shown to possess the potential for better jitter performance. However, to realise …


Resource Harvesting Within The Oai-Pmh Framework, Herbert Van De Sompel, Michael L. Nelson, Carl Lagoze, Simeon Warner Jan 2004

Resource Harvesting Within The Oai-Pmh Framework, Herbert Van De Sompel, Michael L. Nelson, Carl Lagoze, Simeon Warner

Computer Science Faculty Publications

Motivated by preservation and resource discovery, we examine how digital resources, and not just metadata about resources, can be harvested using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). We review and critique existing techniques for identifying and gathering digital resources using metadata harvested through the OAI-PMH. We introduce an alternative solution that builds on the introduction of complex object formats that provide a more accurate way to describe digital resources. We argue that the use of complex object formats as OAI-PMH metadata formats results in a reliable and attractive approach for incremental harvesting of resources using the OAI-PMH.


Metadata And Buckets In The Smart Object, Dumb Archive (Soda) Model, Michael L. Nelson, Kurt Maly, Delwin R. Croom Jr., Steven W. Robbins Jan 2004

Metadata And Buckets In The Smart Object, Dumb Archive (Soda) Model, Michael L. Nelson, Kurt Maly, Delwin R. Croom Jr., Steven W. Robbins

Computer Science Faculty Publications

We present the Smart Object, Dumb Archive (SODA) model for digital libraries (DLs), and discuss the role of metadata in SODA. The premise of the SODA model is to "push down" many of the functionalities generally associated with archives into the data objects themselves. Thus the data objects become "smarter", and the archives "dumber". In the SODA model, archives become primarily set managers, and the objects themselves negotiate and handle presentation, enforce terms and conditions, and perform data content management. Buckets are our implementation of smart objects, and da is our reference implementation for dumb archives. We also present our …


Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo Jan 2004

Would Mandating Network Neutrality Help Or Hurt Broadband Competition? A Comment On The End-To-End Debate, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.