Dissertations / Theses on the topic 'Multicasting (Computer networks) Wireless communication systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Multicasting (Computer networks) Wireless communication systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Boinpalli, Vamshi Krishna. "A Robust Wireless Multicast Protocol." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1121356426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gopala, Praveen Kumar. "Feedback in wireless networks cross-layer design, secrecy and reliability /." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1189452535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Handel, Peter. "Multimedia delivery in a wireless environment." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lakshmanan, Sriram. "Cooperative communication in wireless networks: algorithms, protocols and systems." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42702.

Full text
Abstract:
Current wireless network solutions are based on a link abstraction where a single co-channel transmitter transmits in any time duration. This model severely limits the performance that can be obtained from the network. Being inherently an extension of a wired network model, this model is also incapable of handling the unique challenges that arise in a wireless medium. The prevailing theme of this research is to explore wireless link abstractions that incorporate the broadcast and space-time varying nature of the wireless channel. Recently, a new paradigm for wireless networks which uses the idea of 'cooperative transmissions' (CT) has garnered significant attention. Unlike current approaches where a single transmitter transmits at a time in any channel, with CT, multiple transmitters transmit concurrently after appropriately encoding their transmissions. While the physical layer mechanisms for CT have been well studied, the higher layer applicability of CT has been relatively unexplored. In this work, we show that when wireless links use CT, several network performance metrics such as aggregate throughput, security and spatial reuse can be improved significantly compared to the current state of the art. In this context, our first contribution is Aegis, a framework for securing wireless networks against eavesdropping which uses CT with intelligent scheduling and coding in Wireless Local Area networks. The second contribution is Symbiotic Coding, an approach to encode information such that successful reception is possible even upon collisions. The third contribution is Proteus, a routing protocol that improves aggregate throughput in multi-hop networks by leveraging CT to adapt the rate and range of links in a flow. Finally, we also explore the practical aspects of realizing CT using real systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Wen, and 黄文. "Opportunistic scheduling in wireless data networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45895235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lai, Lifeng. "Multiuser wireless networks the user cooperation perspective." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1186425130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Soundararajan, Srivathsan Agrawal Prathima. "Scheduling in WiMAX based wireless networks." Auburn, Ala, 2008. http://hdl.handle.net/10415/1449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lightfoot, Leonard E. "An energy efficient link-layer security protocol for wireless sensor networks." Diss., Connect to online resource - MSU authorized users, 2006.

Find full text
Abstract:
Thesis (M.S.)--Michigan State University. Dept. of Electrical & Computer Engineering, 2006.<br>Title from PDF t.p. (viewed on Nov. 20, 2008) Includes bibliographical references (p. 49-55). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Anantharaman, Vaidyanathan. "Reliable transport over multihop wireless Ad Hoc Networks." Thesis, Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dai, Rui. "Correlation-based communication in wireless multimedia sensor networks." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42736.

Full text
Abstract:
Wireless multimedia sensor networks (WMSNs) are networks of interconnected devices that allow retrieving video and audio streams, still images, and scalar data from the environment. In a densely deployed WMSN, there exists correlation among the observations of camera sensors with overlapped coverage areas, which introduces substantial data redundancy in the network. In this dissertation, efficient communication schemes are designed for WMSNs by leveraging the correlation of visual information observed by camera sensors. First, a spatial correlation model is developed to estimate the correlation of visual information and the joint entropy of multiple correlated camera sensors. The compression performance of correlated visual information is then studied. An entropy-based divergence measure is proposed to predict the compression efficiency of performing joint coding on the images from correlated cameras. Based on the predicted compression efficiency, a clustered coding technique is proposed that maximizes the overall compression gain of the visual information gathered in WMSNs. The correlation of visual information is then utilized to design a network scheduling scheme to maximize the lifetime of WMSNs. Furthermore, as many WMSN applications require QoS support, a correlation-aware QoS routing algorithm is introduced that can efficiently deliver visual information under QoS constraints. Evaluation results show that, by utilizing the correlation of visual information in the communication process, the energy efficiency and networking performance of WMSNs could be improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
12

Kohagura, Monique Sachie. "Local coordination medium access control for wireless sensor networks." Online access for everyone, 2008. http://www.dissertations.wsu.edu/Thesis/Summer2008/m_kohagura_050808.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Hejun. "A framework for secure mobility in wireless overlay networks." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/819.

Full text
Abstract:
Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
APA, Harvard, Vancouver, ISO, and other styles
14

Lakhiani, Avinash. "A transparent authentication protocol for wireless networks." Ohio : Ohio University, 2003. http://www.ohiolink.edu/etd/view.cgi?ohiou1049469715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cheung, Victor. "Distributed position estimation for wireless sensor networks /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHEUNG.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Eriksson, Joakim. "Detailed simulation of heterogeneous wireless sensor networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-142754.

Full text
Abstract:
Wireless sensor networks consist of many small nodes. Each node has a small microprocessor, a radio chip, some sensors, and is usually battery powered which limits network lifetime. Applications of wireless sensor networks range from environmental monitoring and health-care to industrial automation and military surveillance. Since the nodes are battery powered and communication consumes more than computation much of the research focuses on power efficient communication. One of the problems is however to measure the power consumption and communication quality of the different solutions. Simulation of sensor networks can greatly increase development speed and also be used for evaluating power consumption as well as communication quality. Simulation experiments typically give easier access to fine grained results than corresponding real-world experiments. The problem with simulators is that it is hard to show that a simulation experiment corresponds well with a similar real-world experiment. This thesis studies how detailed simulation of wireless sensor networks can be validated for accuracy and also shows several important uses of detailed simulation such as power consumption profiling and interoperability testing. Both of them represent important topics in today's wireless sensor network research and development. The results of the thesis are the simulation platform COOJA/MSPSim and that we show that MAC-protocol experiments performed in our simulator COOJA/MSPSim correspond well with experiments performed in our testbed. We also show that using COOJA/MSPSim any software running in the simulation can be power profiled.<br>WISENET
APA, Harvard, Vancouver, ISO, and other styles
17

梁鉅輝 and Kui-fai Leung. "Enhancing transmission control protocol performance over wireless networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Alwadani, Dhaifallah. "Hybrid multicasting using Automatic Multicast Tunnels (AMT)." Thesis, University of Stirling, 2017. http://hdl.handle.net/1893/26026.

Full text
Abstract:
Native Multicast plays an important role in distributing and managing delivery of some of the most popular Internet applications, such as IPTV and media delivery. However, due to patchy support and the existence of multiple approaches for Native Multicast, the support for Native Multicast is fragmented into isolated areas termed Multicast Islands. This renders Native Multicast unfit to be used as an Internet wide application. Instead, Application Layer Multicast, which does not have such network requirements but is more expensive in terms of bandwidth and overhead, can be used to connect the native multicast islands. This thesis proposes Opportunistic Native Multicast (ONM) which employs Application LayerMulticast (ALM), on top of a DHT-based P2P overlay network, and Automatic Multicast Tunnelling (AMT) to connect these islands. ALM will be used for discovery and initiating the AMT tunnels. The tunnels will encapsulate the traffic going between islands' Primary Nodes (PNs). AMT was used for its added benefits such as security and being better at traffic shaping and Quality Of Service (QoS). While different approaches for connecting multicast islands exists, the system proposed in the thesis was designed with the following characteristics in mind: scalability, availability, interoperability, self-adaptation and efficiency. Importantly, by utilising AMT tunnels, this approach has unique properties that improve network security and management.
APA, Harvard, Vancouver, ISO, and other styles
19

Ding, Jin. "Communication protocols for wireless ad-hoc and sensor networks." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Spring2006/j%5Fding%5F050306.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chan, Michael Chi Fung. "MOLE : multi-hop object location in wireless mesh networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20CHAN.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Dong, Ying. "Providing security services for mobile ad hoc networks." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/HKUTO/record/B3955711X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ge, Renwei. "Information security in mobile ad hoc networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.57 Mb., 158 p, 2006. http://wwwlib.umi.com/dissertations/fullcit?3220810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ramachandran, Iyappan. "Joint PHY-MAC optimization for energy-constrained wireless networks /." Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/5968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yu, Yuan. "Power scheduling for multi-hop wireless networks." Diss., [Riverside, Calif.] : University of California, Riverside, 2009. http://proquest.umi.com/pqdweb?index=0&did=1957365431&SrchMode=2&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1268679792&clientId=48051.

Full text
Abstract:
Thesis (Ph. D.)--University of California, Riverside, 2009.<br>Includes abstract. Available via ProQuest Digital Dissertations. Title from first page of PDF file (viewed March 12, 2010). Includes bibliographical references. Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
25

Kang, Intae. "Topology control for broadcasting over energy constrained wireless ad hoc networks /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hewage, Kasun. "Towards a secure synchronous communication architecture for low-power wireless networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-284331.

Full text
Abstract:
The Internet of Things (IoT) is becoming the future Internet where most day-to-day devices are connected to the Internet. These devices are often resource constrained and use low-power wireless communication. Hence networks of them are called low-power and lossy networks (LLNs). LLN devices may be used in critical applications such as health care, traffic and industrial plants that concern privacy and security, thus their communication has to be protected from malicious activities. LLNs face threats at different levels ranging from transmitting bits wirelessly to applications. In this thesis, we primarily explore LLN security issues related to application protocols and attacks that target the availability of LLNs. Particularly, we investigate compressing messages of a transport security protocol, DTLS, to make it efficient for LLNs. The IETF proposes to use DTLS for securing CoAP, a specialized web protocol for constrained devices. Furthermore, we experimentally study disrupting the communication of one of the state of the art LLN protocols, Glossy, by attacking its core mechanism. Secondarily, we aim at improving the performance of TCP in LLNs with mobility over a reliable data link protocol. To this end, we use a Glossy-based communication protocol, LWB, as a reliable data link protocol. We plan to use the evaluation of this work as a stepping stone towards comparing the performance of secure Glossy-based communication protocols. The main contributions of this thesis are threefold. We propose novel message compression mechanisms for DTLS messages. We also present novel attacks on Glossy, evaluate the effectiveness of them experimentally, and propose potential counter measures. Finally, we show that a reliable data link protocol can improve the performance of TCP in static and mobile settings.
APA, Harvard, Vancouver, ISO, and other styles
27

Lai, Kai-Ming. "Strategic message forwarding on wireless ad-hoc networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LAI.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yuan, Yin. "Transmission power control in wireless ad-hoc networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20YUAN.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Jin. "Relay and routing selection in relay-based wireless networks /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20ZHANG.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Baalaji, Venkateshwaraiyer S. "Collaborative services in an ad hoc wireless network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBaalaji%5FITM.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.<br>Thesis advisor(s): Alex Bordetsky, Gurminder Singh. Includes bibliographical references (p. 71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Ke. "Designing authenication scheme for wireless sensor networks." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gao, Xin. "A space-efficient wireless mesh network : architecture, frequency planning and routing /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20GAO.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Xiaoshan. "Mobility and radio resource management in heterogeneous wireless networks." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B38233873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rodhe, Ioana. "Query authentication and data confidentiality in wireless sensor networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-85854.

Full text
Abstract:
In this thesis we consider different aspects of security in sensor networks, in particular query authentication and confidential data aggregation. Authenticating the queries is important so attackers cannot modify existing queries because this would lead to wrong readings; or insert new queries into the network because this would lead to waste of energy. When answering to queries, in-network aggregation in sensor networks is an efficient way to save energy. Nevertheless, node capture in hostile environments require protocols for data aggregation where the intermediate nodes contribute with their own values to the aggregated data without getting access to it. Our contributions are two protocols for query authentication and confidential data aggregation together with a common layered key distribution scheme. Both static and mobile base stations are supported. The proposed protocols use symmetric cryptography, which is preferred in sensor networks because of the sensor’s limited computational power, energy supply and memory storage. The results from our simulations show that, if an attacker captures a small number of nodes, the attacker can only introduce unauthorized queries into a limited part of the network and can only get access to a small part of the data that is aggregated into the network.<br>WISENET
APA, Harvard, Vancouver, ISO, and other styles
35

Kerdsri, Jiradett. "SNMP over Wi-Fi wireless networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FKerdsri.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): Ted Lewis, Geoffrey Xie, Gurminder Singh. Includes bibliographical references (p. 89). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
36

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates the feasibility of using these elements together.
APA, Harvard, Vancouver, ISO, and other styles
37

Gavini, Sireesh. "Detecting packet-dropping faults in mobile ad-hoc networks." Online access for everyone, 2004. http://www.dissertations.wsu.edu/Thesis/Fall2004/s%5Fgavini%5F121404.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Xiaoshan, and 劉曉杉. "Mobility and radio resource management in heterogeneous wireless networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B38233873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ahlehagh, Hasti. "Techniques for communication and geolocation using wireless ad hoc networks." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-0526104-111538/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sánchez-Vélez, José E. "Performance measurement of TCP over packet switched GSM networks." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000159.

Full text
Abstract:
Thesis (M.E.)--University of Florida, 2002.<br>Title from title page of source document. Document formatted into pages; contains viii, 128 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
41

Gone, Thomas Alwala. "Content distribution framework for wireless mesh networks : an information-centric approach." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2647.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2017.<br>Information Centric Networking (ICN) is an emerging research field that aims to replace the current host-centric model of Content distribution on the Internet. In ICN architectures, network devices not only forward Content, but also store it thus effectively distributing the traffic load and making access to Content faster. In this thesis, the ability to utilize ICN as the content distribution scheme in WMNs is explored. The main contribution is the development of IcnMesh – a simulator that integrates a Content-Centric scheme in Wireless Mesh Networks thus allowing the study of ICN Content distribution schemes in WMNs. Through simulation experiments, it is shown that ICN schemes can significantly enhance the performance of a WMN and eliminate some of their existing shortcomings.
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Yunhuai. "Probabilistic topology control in wireless sensor networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20LIU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chiu, Hon-sun, and 邵漢新. "Channel assignment and routing in multi-channel multi-interface wireless networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42182050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chiu, Hon-sun. "Channel assignment and routing in multi-channel multi-interface wireless networks." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42182050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Law, Chun-fai Terry. "Design and evaluation of key redistribution mechanisms in wireless sensor networks." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39007005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wennerström, Hjalmar. "Meteorological impact and transmission errors in outdoor wireless sensor networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-227639.

Full text
Abstract:
Wireless sensor networks have been deployed outdoors ever since their inception. They have been used in areas such as precision farming, tracking wildlife, and monitoring glaciers. These diverse application areas all have different requirements and constraints, shaping the way in which the sensor network communicates. Yet something they all share is the exposure to an outdoor environment, which at times can be harsh, uncontrolled and difficult to predict. Therefore, understanding the implications of an outdoor environment is an essential step towards reliable wireless sensor network operations. In this thesis we consider aspects of how the environment influence outdoor wireless sensor networks. Specifically, we experimentally study how meteorological factors impact radio links, and find that temperature is most significant. This motivates us to further study and propose a first order model describing the impact of temperature on wireless sensor nodes. We also analyze transmission errors in an outdoor wireless sensor networks, identifying and explaining patterns in the way data gets corrupted. The findings lead to a design and evaluation of an approach for probabilistic recover of corrupt data in outdoor wireless sensor networks. Apart from the experimental findings we have conducted two different outdoor deployments for which large data sets has been collected, containing both link and meteorological measurements.<br>WISENET
APA, Harvard, Vancouver, ISO, and other styles
47

Jin, Guang. "Towards Spatial Queries over Phenomena in Sensor Networks." Fogler Library, University of Maine, 2009. http://www.library.umaine.edu/theses/pdf/JinG2009.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sanders, Derek T. Hamilton John A. "An adaptive single-hop medium access control layer for noisy channels." Auburn, Ala, 2009. http://hdl.handle.net/10415/1720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lakshmanan, Sriram. "Securing wireless networks against eavesdropping using smart antennas." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/26698.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.<br>Committee Chair: Raghupathy, Sivakumar; Committee Member: Farmarz Fekri; Committee Member: Mary Ann, Ingram. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
50

Sun, Jingbo. "An autonomic communication framework for wireless sensor networks." University of Western Australia. School of Computer Science and Software Engineering, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0087.

Full text
Abstract:
Sensor networks use a group of collaborating sensor nodes to collect information about real world phenomena. Sensor nodes use low-power short-range radio links to communicate with each other. Communication between sensor nodes shows significant variation over time and space. This can lead to unreliable and unpredictable network performance. These dynamic and lossy characteristics of wireless links pose major challenges for building reliable sensor networks and raise new issues that data delivery protocols must address. This thesis addresses the problems of designing protocols to overcome time-varying environmental conditions that lead to unpredictable network performance. The goal is to provide reliable data delivery in sensor networks and to minimise energy use. The major contributions of this thesis are: measuring the performance of wireless links in field trials on a time scale of weeks; systematic analysis of strengths and weaknesses of existing data delivery protocols; and the design, implementation and testing of a novel autonomic communication framework. We have measured link quality over time in experiments in unattended outdoor environments. Most previous work focused on spatial properties and experiments were not extensive, only lasting for a few hours. Besides common phenomena found in other work, such as the variation of network performance over time and the existence of asymmetric links, we find that links are independent over long time scales, and performance patterns of links are different. We also analyse the performance of data delivery protocols that use different techniques to improve reliability in sensor networks. Through systematic analysis of strengths and weaknesses of existing data delivery strategies, we find that networks using a single technique can only perform well for a limited range of link conditions. Different strategies are required in different operating conditions. Based on these experimental and theoretical studies, a novel autonomic communication framework (ACF) for wireless sensor networks is proposed. Nodes in this ACF are able to change their behaviour to adapt to time-varying environments so that optimal network performance can be achieved. Our framework provides a holistic solution for reliable data delivery to overcome time-varying wireless links. Our implementation and experimental evaluations demonstrate that this holistic framework is effective for reliable and energy-efficient data delivery in realistic sensor network settings.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography