Dissertations / Theses on the topic 'Réseaux ad-hoc de capteurs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Réseaux ad-hoc de capteurs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Makhoul, Abdallah. "Réseaux de capteurs : localisation, couverture et fusion de données." Besançon, 2008. http://www.theses.fr/2008BESA2025.
Full textThis thesis tackles the problems of localization, coverage and data fusion in randomly deployed sensor networks. First, we introduce a novel approach for node's localization. It is based on a single mobile beacon aware of its positions. Sensor nodes receiving beacon packets will be able to locate themselves. The mobile beacon follows a defined Hilbert curve. On the other hand, we exploit the localization phase to construct sets of active nodes that ensure as much as possible the zone coverage. To optimize the energy consumption, we construct disjoint sets of active nodes such that only one of them is active at any moment, while ensuring at the same time both the network connectivity and the area coverage. We present and study four different scheduling methods. Ln a third step, we study the problem of data fusion in sensor networks in particular the" average consensus" problem. It allows the nodes of a sensor network to track the average of n sensor measurements. To compute the average, we propose an iterative asynchronous algorithm that is robust to the dynamic topology changes and the loss of messages. To show the effectiveness of the proposed algorithms, we conducted series of simulations based on OMNet++
Bessaoud, Karim. "Algorithmes auto-stabilisants pour les réseaux ad hoc." Versailles-St Quentin en Yvelines, 2013. http://www.theses.fr/2013VERS0048.
Full textIn this thesis, we propose three self-stabilizing algorithms for ad hoc wireless networks. The first one is an algorithm that builds a low weight connected dominating set, called backbone. The backbone is used to create a logical infrastructure in an ad hoc network. We show by simulation the efficiency of this algorithm in different contexts according to the semantics given to the weight of the nodes : the backbone may contain for instance the least mobile nodes or nodes with the highest battery level. The two other algorithms deal with energy conservation in wireless sensor networks. We propose two solutions based on topology control by reducing transmission powers, each one dedicated to a type of communication used by the sensors : communication between any pair of sensors or by diffusion. The proposed algorithms are formally proven and evaluated by simulation
Panaitopol, Dorin. "Réseaux de capteurs ad-hoc Ultra Wide Band : une analyse multi couche." Phd thesis, Supélec, 2011. http://tel.archives-ouvertes.fr/tel-00840023.
Full textBa, Mandicou. "Vers une structuration auto-stabilisante des réseaux ad hoc : cas des réseaux de capteurs sans fil." Thesis, Reims, 2014. http://www.theses.fr/2014REIMS029/document.
Full textWe propose SDEAC, a self-Stabilizing Distributed Energy-Aware and fault-tolerant Clustering algorithm. SDEAC uses an asynchronous message-passing model and is based on 1-hop neighboring to build non-overlapping k-hops clusters. We prove that, starting from an arbitrary configuration, SDEAC structures the network after at most n + 2 transitions and requires (Δu+1)log(2n+k+3) memory space for each node u, where n is the number of network nodes, Δu is the degree of u and k represents the maximum hops number. Through simulations under OMNeT++, we observe that over arbitrary network, the stabilization time is far below the worst case scenario. Furthermore, we remark that after faults, the re-clustering cost is significantly lower than the clustering cost. In the context of Wireless Sensor Networks (WSNs), we evaluate the energy consumption of SDEAC according to multiple criteria in the election of cluster-heads, such as nodes' identity, residual energy or degree and we compare it with the well-known message-passing based self-stabilizing clustering algorithm proposed by Mitton et al. Results show that SDEAC is scalable and reduces energy consumption between 42% and 49%.Afterwards, we propose efficient scenarios in order to transfer information: (i) the non-aggregation scenario that provides a better end-to-end delay and (ii) the partially-decentralized aggregation scenario that reduces the total energy consumption and prolongs the network lifetime
Benbadis, Farid. "Positionnement topologique et dissémination passive dans les réseaux ad hoc." Paris 6, 2007. http://www.theses.fr/2007PA066565.
Full textSow, Idrissa. "Partitionnement et Geocasting dans les Réseaux Mobiles Ad hoc et Collecte des Données dans les Réseaux de Capteurs." Phd thesis, Université de Picardie Jules Verne, 2009. http://tel.archives-ouvertes.fr/tel-00440004.
Full textAmdouni, Ichrak. "Wireless Self-adaptive Ad hoc and Sensor Networks : Energy Efficiency and Spatial Reuse." Paris 6, 2013. http://www.theses.fr/2013PA066003.
Full textThe need to maximize network lifetime in wireless ad hoc networks and especially in wireless sensor networks requires the use of energy efficient algorithms and protocols. Motivated by the fact that a node consumes the least energy when its radio is in sleep state, we achieveenergy efficiency by scheduling nodes activity. Nodes are assigned time slots during which they can transmit and they can turn off their radio when they are neither transmitting nor receiving. Compared to classical TDMA-based medium access scheme, spatial bandwidth use is optimized: non interfering nodes are able to share the same time slots, collisions are avoided and overhearing and interferences are reduced. In our work about time slots assignment, two cases are studied. First, when nodes require equal channel access, we use node coloring. Second, when nodes have heterogeneous traffic demands, we designed the traffic aware time slot assignment algorithm TRASA. Unlike the majority of previous works, we generalize the definition of node coloring and slot allocation problems. Indeed, we set the maximum distance between two interfering nodes as a parameter of these problems. We prove that they are NP-complete, making heuristic approaches inevitable in practice. A central directive of this thesis is to design self-adaptive solutions. This adaptivity concerns many aspects such as the mission given by the application, the heterogeneity of nnode traffic demands, the network density, the regularity of network topology, and the failure of wirelesslinks
Maréchal, Nicolas. "Consensus de moyenne dans les réseaux de capteurs : applications et optimisation." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0078/these.pdf.
Full textDepending on their applications, sensor networks may be composed of a varying number of nodes having severe constraints on their size, cost, energetic consumption, and as a consequence on a large set of related parameters. These characteristics involve the need of distributed methods for organization and data processing. In particular, the class of average consensus algorithms (ACA), initially designed for computing the empirical mean of a set of input parameters, is a building block which is about to play an important role for complex applicative algorithms/protocols. The goal of this thesis is to provide elements for improving this category of algorithms, and validating them on some applications. In a first time, it focuses on characterization and optimization methods applied to ACA from the state of the art. Then, two new algorithms are proposed in order to reduce the energetic cost. The first one takes place in an estimation framework and aims at taking quickly account of fresh information. The second algorithm focuses on reducing the communication cost by exploiting the diffusive nature of wireless communications and requiring no transmission control mechanism (such as acknowledgements or synchronization). To finish with, applications to fine synchronization of clocks (physical layer) and to parametric cartography (application layer) are given
Ingelrest, François. "Protocoles localisés de diffusion et économie d'énergie dans les réseaux ad hoc et de capteurs." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2006. http://tel.archives-ouvertes.fr/tel-00113869.
Full textLes réseaux de capteurs sont similaires aux réseaux ad hoc, car ils sont également décentralisés et autonomes. Un capteur est un petit appareil capable de surveiller son environnement. Des cas typiques d'utilisation peuvent être la surveillance de zones militaires (détection de mouvements) ou de forêts (détection d'incendie).
Parmi les problèmes communs à ces deux types de réseaux se trouve la diffusion. Dans une telle communication, un message est envoyé depuis un objet donné vers tous les autres du réseau. Les applications de ce processus sont nombreuses : découverte de routes, synchronisation... Comme les objets mobiles utilisent une batterie, il est nécessaire que la diffusion soit la plus économe possible d'un point de vue énergétique. Cela est généralement obtenu en réduisant la quantité de relais nécessaires, ou en limitant la puissance d'émission à chaque relais.
Le but de mon travail était d'étudier la diffusion dans les réseaux ad hoc et de capteurs, afin de mettre en lumière les caractéristiques et les défauts des mécanismes existants, puis d'en proposer de nouveaux, plus efficaces. Dans tous ces travaux, nous avons toujours voulu rester dans le domaine des solutions 'réalistes' : beaucoup des précédentes études utilisaient en effet des mécanismes centralisés, où une connaissance globale du réseau est nécessaire pour effectuer la diffusion. Nous nous sommes concentrés sur des solutions fiables et localisés, c'est-à-dire n'utilisant que des informations sur le voisinage de chaque noeud. Ce type de mécanisme permet également un passage à l'échelle simplifié, car la quantité d'informations nécessaire ne varie pas avec la taille du réseau. Nos études montrent de plus que ces solutions peuvent être aussi efficaces que les méthodes centralisées.
Puisque l'ajustement de portée est un mécanisme très important dans la conservation de l'énergie, nous avons proposé une méthode de diffusion originale, basée sur le concept de portée optimale de communication. Cette dernière est calculée de manière théorique grâce au modèle énergétique considéré, et représente le meilleur compromis entre l'énergie dépensée à chaque noeud et le nombre de relais nécessaires. Nous avons ainsi proposé deux protocoles différents basés sur ce concept, chacun étant plus spécifiquement adapté soit aux réseaux ad hoc (TR-LBOP), soit aux réseaux de capteurs (TR-DS).
Afin de réduire encore plus la consommation énergétique, nous avons étudié le fameux protocole centralisé nommé BIP. Son efficacité est due au fait qu'il considère la couverture obtenue par une seule émission omnidirectionnelle, au lieu de considérer chaque lien séparément. Nous avons proposé une solution localisée basée sur BIP, afin de construire incrémentalement une structure de diffusion. Nous avons montré de manière expérimentale que les résultats ainsi obtenus sont très proches de ceux fournis par BIP, notamment dans les réseaux de forte densité, tout en n'utilisant que des informations locales à chaque noeud.
Nous avons finalement considéré la suppression d'une hypothèse forte, largement répandue dans la communauté des réseaux ad hoc et de capteurs : l'utilisation d'un graphe du disque unitaire. Ce dernier définit la zone de communication d'un noeud comme étant un cercle parfait. Nous avons remplacé cette hypothèse par une autre plus réaliste afin d'en étudier les conséquences sur un protocole connu, le protocole de diffusion par relais multipoints (MPR). Nous avons montré que ce dernier ne fournit plus de résultats suffisants dans un tel environnement. Nous avons également proposé quelques modifications afin d'obtenir à nouveau de bons résultats.
Aguilar, Teck. "Vers un protocole de routage géographique avec contention et communications coopératives pour les réseaux de capteurs." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00612332.
Full textHajlaoui, Rejab. "Résolution à base d'heuristiques du problème de routage dans les réseaux ad hoc de vehicules." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD047/document.
Full textVehicular ad hoc networks (VANETs) consist of a set of vehicles trying to exchange security and comfort data even if they are not directly within radio range of each other. The problems related to VANET networks are not yet solved. In this context, and in order to maximize the stability in the VANETs networks, we propose different contributions combining the metaheuristics and the clustering technique. First, we propose a routing model using the most efficient clustering algorithm K-medoids. Then, we propose several improvements using metaheuristics, more precisely the AGs, the RT and the Scatter Search. Finally, we propose a real application that uses the Arduino Uno platform to allow communication between three mobile robots in an areas not covered by the VANET network.Using various metrics, extensive simulations prove that our contributions show good results compared to other models designed for the same purpose
Assous, Noureddine. "Etude des capteurs intelligents à transmission sans fil dans les milieux industriels sévères." Lyon, INSA, 2009. http://www.theses.fr/2009ISAL0113.
Full text[Communication between electrical and electronic systems in industrial environments was for a long time assured through wired connection very costly in material and installation labour. The modern wireless RF transmission techniques intend to reduce or even put away this expensive cabling. The work of this thesis finds its origin in the need to replace wired transmission by RF1 transmission inside instrumented industrial machines. Its goal is to give an answer to a specific problem which is the study concerning intelligent wireless transmission sensors inside industrial harsh environments. After presentation of the work context and project roots in the first chapter, a review on wireless smart sensors is further provided. A comparison and analysis of standardization aspects and different published research results gave us the opportunity to draw the principal axes of our working field. The second part of our work is dedicated to research solutions permitting to specify the technical characteristics and conditions to satisfy to develop and promote the wireless transmission sensors inside harsh industrial environments. Next, we aim to provide the most suitable conditions, like for example, choice of frequency bands, rate. . Etc. Chapters four and five are consequently dedicated to the theoretical study concerning monochromatical and large band propagation in the vicinity of the boat engines. The models and simulation results are presented inside these chapters. The sixth and last chapter is dedicated to the practical results concerning wireless transmission inside ship engine rooms. ]
Zairi, Sajeh. "Stratégies de configuration pour l’optimisation de la consommation énergétique dans les réseaux de capteurs." Lyon, INSA, 2010. http://theses.insa-lyon.fr/publication/2010ISAL0062/these.pdf.
Full textBecause of their miniature size, the sensors are highly constrained on energy. The deployment of these networks in remote or sensitive areas makes impossible the recharge or the replacement of the batteries. It is therefore imperative that the nodes configure them-self to maximize the lifetime of the network. This configuration includes the decisions of activation and the determination of the paths connecting each node to the base station. While part of the nodes ensures the achievement of the application, others are deactivated to conserve their energy. The active nodes must covert an area as wide as that covered by the set of initially deployed nodes. To maximize the lifetime of the network, which is a function of the node's energy, the premature loss of a subset of highly used nodes must be avoided. Consequently, the proposed algorithms are based on energy criteria. The nodes having a minimum energy are more privileged to be deactivated and the determiner paths must avoid them. The determined paths seek a compromise between two conflicting criteria: cost of transmission and minimum energy belonging to the path. No weight is associated with these criteria. The comparison of the paths is based on the concept of Pareto dominance. A deactivation priority, introduced between neighboring nodes, avoids the phases of negotiation and thus reduced energy costs for decision making. Validation of these algorithms was initially done through simulations. In a second step, a more comprehensive validation was performed based on a new model of high level Petri nets (RdPHN). This model is hierarchical, global and generic. The hierarchical model includes different levels of abstraction. It is global as it incorporates the behavior of various components forming the sensor network: nodes and base stations. Thus, it validates the overall behavior of the network and not the conduct of specific protocols as is the case with most of the existing work. This model is generic because it is independent of the network component's specificity. In addition, the used model incorporates a model of energy consumption. What makes possible the validation of different criteria for this use: as the worst case lifetime (which can not be obtained through simulations). The model also included an image of the environment as it is perceived by the nodes. This image can interface the proposed model with other models representing the behavior of the environment
Apavatjrut, Anya. "De l'usage des codes fontaines dans les réseaux de capteurs multisauts." Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00708449.
Full textHerberg, Ulrich. "Réseaux Ad Hoc : Performance, Dimensionnement, Gestion Automatisée et Intégration dans l'Internet." Phd thesis, Ecole Polytechnique X, 2011. http://pastel.archives-ouvertes.fr/pastel-00598156.
Full textCartron, Mickaël. "Vers une plate-forme efficace en énergie pour les réseaux de capteurs sans fil." Rennes 1, 2006. http://www.theses.fr/2006REN1S163.
Full textOuld, Cheikhna Aboubecrine. "Applications du partitionnement des réseaux de capteurs sans fil au multicast géographique et au tri partiel." Amiens, 2011. http://www.theses.fr/2011AMIE0119.
Full textThe rise of Wireless technologies, today offers new perspectives in the field of telecommunication. Recent advances in Wireless communication allow the use of information through mobile computing units that have specific characteristics (low storage, capacity, an autonomous source of energy. . . ) and access the network interface through a Wireless communication links. A Wireless sensor network consists of hundereds or thousands of sensors. The sensor are devices with following features : (1) Ability to capture data relating to the environment where they are physically located and convert them into electrical signals. (2) Capacity to perform processing on the retrieved. (3) Ability to exchange data with other devices. The initialization problem of the sensors consists of assigning each station an integer in the range [1 n] so that two stations may not have the same identification number. We proposed an approach based on the basagni clustering algorithm. The processing of our algorithm is composed of : (1) Network partitioning. (2) Assignment of partial identifiers. (3) The gossiming. (4) Final identifiers. Also we superimposed two clustering algorithms to solve the problem of geocast in the Wireless sensor networks. The first approach uses the clustering algorithm of Gerla & Tsai and the second exploits the technique of the hierarchical control clustering of Banerjee & Khuller. Our approachs guarantee delivery message to each node in the geocast region. The first algorithm guarantees delivery to all nodes in one or more geocast regions. Whereas, the second algorithm takes into account the depht of the hierarchical tree partitioning and estimates the numbers of broadcast rounds in the worst case necessary to solve the given geocast problem. And finally, we proposed algorithms for solving the sort partial problem in multi-hop Wireless sensor networks. The main motivation of our approaches to tackle this problem in multi-hop model is the fact that there were not yet solutions on this model. Initially, we consider that each node in the network holds one and only one data. Once the problem with one data item is solved, we proceed to generalize our approach to solving the sort partial problem in the case where a node can have multiple data items
Abdulalli, Abusaif. "Reseaux ad-hoc : étude de modèles de mobilité et de protocoles de routage minimisant la consommation d'énergie." Valenciennes, 2008. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/9d7396e4-4c5f-40f5-bee2-d336b156addc.
Full textWireless ad-hoc networks became more and more popular in the past few years, owing to their use of deployment. In such a network, the hosts (or nodes) exchange data packets via radio links, without resorting to any hierarchic scheme nor supervisory control. In fact, the data transfers are driven by special distributed routing protocols and each node may potentially contribute in the data transportation from some source to some destination. The main resulting problems are the node mobility (which complicate routing protocols), as well as the limitations of the available frequency bandwidth (and thus of the data flow rate) and of the available energy consumption (related to the more or less extended lifetime of batteries). Mobility, energy consumption minimization and suited routing protocols are the key points of our study. The existing mobility models have thus been looked over first and, using simulation, the characteristics of the corresponding modeled trajectories together with the effects on energy consumption have been studied. Next, the leading routing protocols have been detailed, their impact on energy consumption and the influence of node mobility have been considered (using again simulation). Finally, a new protocol, called LEMFN, has been introduced, which consists in the fusion and extension of two already known protocols, with the main objective of energy consumption reduction in mind. The new algorithm has been studied by simulation and compared to other ones
Aït-Salem, Boussad. "Sécurisation des réseaux ad hoc : systèmes de confiance et de détection de répliques." Limoges, 2011. https://aurore.unilim.fr/theses/nxfile/default/2c59d107-ed34-48b1-a0b9-7aa44317d4f9/blobholder:0/2011LIMO4024.pdf.
Full textThe rapid evolution of wireless technologies has allowed the emergence of new types of networks whose architectures are highly decentralized, dynamic and whose services are organized in an autonomous manner. These features are a double-edged sword, because, on the one hand, they allow a rapid and cheap selling up of these networks, and on the other hand, they involve additional difficulties in the design of certain services such as routing, QoS, security, etc. As part of this thesis, we focused on the security of trust systems in these networks. In the lack of a central entity, the entities must evaluate each others and aggregate the results. In order to make the evaluations without fear, it is necessary that their values remain secret until the aggregation. In this manuscript, we will try to resolve this problem by proposing a new scheme based on an homomorphic encryption and on the superposed sending protocol, that enables each entity lo compute the trust value of another entity while protecting the private data of the entities involved in this computation. We built our scheme in a semi-honest model. We give, for this purpose, security proofs that show that our scheme respects this model and in particular that is resistant lo collusion of up to n - 1 participants, where n is the number of participants included in the calculation. In terms of performance, it is also proved that our proposal reduces communication costs compared to previous proposals. Moreover, the absence of a trusted entity in ad hoc networks such as sensor networks (e. G. , a certification authority) can also cause problems in terms of users authentication. Indeed, due to the weaknesses in the physical protection of sensors and to the hostile environment in which they are deployed, an attacker can easily build multiple copies of a captured node and thus bypass the authentication mechanism in place. In this manuscript, we propose a new detection approach which is autonomous, resilient to attacks, involves O(V n) communication complexity and does not require any backup on
Heurtefeux, Karel. "Protocoles Localisés pour Réseaux de Capteurs." Phd thesis, INSA de Lyon, 2009. http://tel.archives-ouvertes.fr/tel-00449801.
Full textAlaoui, Nabih. "Cooperative Communications In Mobile Ad hoc NETworks." Limoges, 2013. http://aurore.unilim.fr/theses/nxfile/default/16707b62-af2a-425b-b97b-ee0f900ae15d/blobholder:0/2013LIMO4035.pdf.
Full textThe work done in this study focuses on communication and data transmission in the context of sensor networks. To improve the reliability of transmission, relays are inserted between the sensors and the destination in order to correct errors in transmissions using LDPC codes. The architecture is optimized thanks to the block codes but also to the error detection protocols and the use of a combination of the error correction and detection. Another interesting way to improve performances is to use multiple antenna systems. Energy efficiency is evaluated in the protocols studied and the solutions proposed. Besides, a joint optimization of channel coding and physical network coding is proposed in this paper
Cunha, Daniel De Oliveira. "Réseaux sans fil multi-sauts : protocoles à applications spécifiques et routage orienté vers la diversité coopérative." Paris 6, 2008. http://www.theses.fr/2008PA066646.
Full textJamet, Raphaël. "Protocols and models for the security of wireless ad-hoc networks." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM039/document.
Full textIn this document, we focus on ways of increasing the security of wireless ad-hoc networks. These networks, and more specifically wireless sensor networks, look increasingly like the right answer to a lot of problem, such as data collection over a large area, or providing emergency network infrastructure after a disaster. They are also inherently exposed to malicious intents due to their collaborative nature. In order to protect them, we focus on the security aspects of the protocols built for these networks. We first propose a Secure and Resilient Reputation-based Routing protocol, called SR3. This protocol routes messages according to a reputation metric built using only trusted information. This protocol achieves data confidentiality and data packet unforgeability, which we prove formally using two verification tools: CryptoVerif and Scyther. We experimentally show the resiliency of SR3 against various attack scenarios, and we compared our results to several routing algorithms of the literature. This evaluation shows that both the resiliency and fairness accomplished by SR3 are better than for those others protocols, especially when the network is sparse. Moreover, and unlike previous solutions, if the compromised nodes behavior changes, then SR3 will self-adapt in order to ensure an acceptable quality of service. Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols. We propose the notion of incorruptibility, a quantitative computational definition for routing security based on the attacker's ability to alter the routes used by messages. These definitions are then illustrated with several routing algorithms. Finally, we study Intrusion Detection Systems (IDS) for WANET, and more specifically their inputs. These systems provide a supplementary layer of defenses for WANETs, and they are able to easily detect attacks who are complicated for the network protocols. We classify the different inputs used by the decision process of these IDS, according to their level of required cooperation, and the source of their data. We then propose the InDICE tool, a decision aid which, given an IDS, allows automated discovery of undetectable attacks according to the inputs used by that IDS. In the end, we apply our framework to discover weaknesses in two existing IDS
Watteyne, Thomas. "Energy-Efficient Self-Organization for Wireless Sensor Networks." Lyon, INSA, 2008. http://theses.insa-lyon.fr/publication/2008ISAL0082/these.pdf.
Full textDans un réseau de capteurs, les nœuds communiquent en mode multi-sauts. Les principaux enjeux de ces réseaux sont d’économiser l’énergie (ressource limitée car embarquée dans le capteur) et l’auto-organisation (afin de s’adapter aux changements de topologie). Les contributions majeures de cette thèse sont: - Nous proposons un protocole d’accès au médium qui évite le maintien des tables de voisinage pour chaque nœud. Notre protocole ne construit cette table qu’à la demande, ce qui permet d’être robuste aux changements de topologies. - Nous utilisons des coordonnées virtuelles comme base pour l’auto-organisation du réseau de capteurs. Ces coordonnées sont utilisées par un protocole de routage pour découvrir des chemins multi-sauts. Chaque capteur met continuellement à jour ses coordonnées pour augmenter la robustesse. - Nous combinons ces propositions pour former une architecture de communication transcouches. Des résultats expérimentaux montrent l’efficacité de nos propositions
Sayadi, Afef. "Medium access protocol (MAC) design for wireless multi-hop ad hoc and sensor networks." Thesis, Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0002/document.
Full textWireless multi-hop ad hoc and sensor networks provide a promising solution to ensure ubiquitous connectivity for the Future Internet. Good network connectivity requires designing a reliable Medium Access Control (MAC) protocol, which is a challenging task in the ad hoc and sensor environments. The broadcast and shared nature of the wireless channel renders the bandwidth resources limited and expose the transmissions to relatively high collisions and loss rates. The necessity to provide guaranteed Quality of Service (QoS) to the upper layers triggered the design of conflict-free MAC protocols. The TDMA synchronization constraint is basically behind the rush of MAC protocol design based on a fixed frame size. This design shows inflexibility towards network variations and creates a network dimensioning issue that leads to a famine risk in case the network is under-dimensioned, and to a waste of resources, otherwise. Moreover, the alternative dynamic protocols provide more adaptive solutions to network topology variations at the expense of a fair access to the channel. Alongside with the efficient channel usage and the fair medium access, reducing the energy consumption represents another challenge for ad hoc and sensor networks. Solutions like node activity scheduling tend to increase the network lifetime while fulfilling the application requirements in terms of throughput and delay, for instance. Our contributions, named OSTR and S-OSTR, address the shortcomings of the medium access control protocol design in the challenging environment of wireless multi-hop ad hoc and sensor networks, respectively. For OSTR the idea consists in adopting a dynamic TDMA frame size that increases slot-by-slot according to the nodes arrival/departure to/from the network, and aiming to achieve a minimum frame size. For this end, OSTR couples three major attributes: (1) performing slot-by-slot frame size increase, (2) providing a spatial reuse scheme that favors the reuse of the same slot if possible, (3) and ensuring an on-demand frame size increase only according to the node requirements in terms of throughput. To tackle different frame sizes co-existence in the network, OSTR brings a cooperative solution that consists in fixing an appointment, a date when the frame size in the network is increased. Concerning S-OSTR, it is an amendment of OSTR for wireless sensor networks. It brings the idea of a dynamic active period, since it deploys a dynamic frame size that is built slot-by-slot according to nodes arrival to the network. S-OSTR enforces the slot-by-slot frame size increase by a node activity scheduling to prolong the inactivity period in the network, and hence prolong the overall network lifetime for wireless sensor networks. Our contributions are both based on the new dynamic TDMA frame size increase that consists in increasing the frame size slot-by-slot aiming to achieve a shorter frame size, and hence improve the channel utilization, and reduce the energy consumption. The performance analysis of OSTR and S-OSTR shows that they present good potentials to support QoS requirements, to provide energy-efficiency, to ensure fair medium access, to accommodate network topology changes and finally, to enhance robustness against scalability. The impact of this new TDMA frame size increase technique on the medium access control protocol performance is highlighted through multiple simulations of OSTR and S-OSTR. Multiple comparative studies are also handled to point out the effectiveness of this new technique and the soundness of our contributions
Faheem, Yasir. "Routage avec économie d'énergie dans les réseaux de capteurs sans fils." Paris 13, 2012. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_faheem.pdf.
Full textLimited battery power is one of the major stringent factors in deploying Wireless Sensor Networks (WSNs), in spite of their numerous applications both on small scale as inWireless Body Area Networks (WBANs) and on large scale as in agricultural and habitat monitoring. Especially, stationary sink based data gathering protocols for large scaleWSNs have limited network lifetime, because relay nodes around the sink quickly deplete their battery power due to high traffic loads, making the rest of the network unreachable to the sink. On the other hand, sink mobility improves network lifetime by distributing relay nodes’ energy consumption. However, mobile sink now has to periodically update the network about its changing position. This control traffic is non-negligible for low power, limited capacity sensors as it induces energy consumption problem. In this thesis, we are considering energy efficient routing protocols in the context of WBANs and large scale WSNs. Moreover, we also address multi-channel assignment algorithm with the aim of minimizing power consumption and increasing network throughput. In the first part of this thesis, a deep analysis of the energy consumption of one hop vs multi-hop communications in WBANs is performed. In fact, recent advances in technology has led to the development of small, intelligent, wearable sensors which are capable of remotely performing critical health monitoring tasks, and then transmitting patient’s data back to health care centers over wireless medium. But to the day, energy also remains to be a big constraint in enhancing WBAN lifetime [Net12]. Some recent literature on WBANs proposes deliberate use of multi-hops to transfer data from a sensor to the gateway via relay health sensors as more energy efficient than single hop communication. There are studies which argue contrarily. In this context, we have analyzed the single vs multi-hop energy consumption effect for real very short range sensor devices. In the second part of this thesis, two distributed energy-efficient sink location update algorithms are proposed for large scale mobile sink WSNs. First algorithm, named SN- MPR, uses a combination of multi-point relay broadcast and a local path repair mechanism by means of which sink’s location update packets are forwarded only to nodes which are affected by sink mobility; the rest of the network does not receive these update messages. Next, a duty-cycle aware multi-point relay based algorithm which is a modified version of the SN-MPR algorithm is proposed. It allows non-relay nodes to switch-off their radios when communication is not desired. Simulation results show that the two aforementioned algorithms minimize network’s power consumption without compromising data delivery efficiency. The final part of this thesis deals with traffic-aware channel assignment problem in IEEE 802. 15. 4 standard-based heterogeneous WSNs which have rather high traffic rate requirements than low-rate scalar WSN applications. In fact, traditional single channel communication suffers from interferences caused by concurrent transmissions in the same neighborhood. These parallel transmissions waste battery power as multiple retransmis- sions are required before a packet can be successfully delivered at the destination due to frequent collisions. Moreover, already limited network throughput of the single channel communication protocols is further degraded at higher traffic rates due to increased colli-sions and congestion. On the other hand, concurrent transmissions over multiple channels not only reduce power consumption as packet collisions are minimized or eliminated depend- ing upon the efficiency of the concerned channel assignment algorithm, but also offer better network throughput and data delivery delays. Modern WSN platforms like crossbow’s Mi-caZ nodes [Mot12] are equipped with single, half-duplex IEEE 802. 15. 4 standard-based radio which can operate over sixteen multiple channels. In order to make effective use of multiple channels, a number of channel assignment algorithms have been proposed recently for WSNs. However, they are suitable for rather low-rate homogeneous WSNs, and they consider fixed physical channel widths. These multi-channel assignments increase network throughput, but they may not be able to ensure QoS requirements of high bandwidth de- manding multimedia traffic, as in the case of heterogeneous WSNs. In order to address the energy issue and at the same time increase network capacity, we propose a distributive Traffic-Aware Bandwidth-Adaptive (TABA) channel selection algorithm which enables the nodes to not only choose interference free channels in the neighborhood, but also to adapt channel-width to increase/decrease throughput according to varying traffic conditions
Kara, Messaoud. "Réseau de capteurs sans fil : étude en vue de la réalisation d'un récepteur GPS différentiel à faible coût." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2009. http://tel.archives-ouvertes.fr/tel-00724810.
Full textBen, Maad Hassen. "Optimisation des stratégies de décodage des codes LDPC dans les environnements impulsifs : application aux réseaux de capteurs et ad hoc." Thesis, Reims, 2011. http://www.theses.fr/2011REIMS023/document.
Full textThe goal of this PhD is to study the performance of LDPC codes in an environment where interference, generated by the network, has not a Gaussian nature but presents an impulsive behavior.A rapid study shows that, if we do not take care, the codes’ performance significantly degrades.In a first step, we study different approaches for impulsive noise modeling. In the case of multiple access interference that disturb communications in ad hoc or sensor networks, the choice of alpha-stable distributions is appropriate. They generalize Gaussian distributions, are stable by convolution and can be theoretically justified in several contexts.We then determine the capacity if the α-stable environment and show using an asymptotic method that LDPC codes in such an environment are efficient but that a simple linear operation on the received samples at the decoder input does not allow to obtain the expected good performance. Consequently we propose several methods to obtain the likelihood ratio necessary at the decoder input. The optimal solution is highly complex to implement. We have studied several other approaches and especially the clipping for which we proposed several approaches to determine the optimal parameters
Delye, de Clauzade de Mazieux Alexandre. "Etude théorique des clusters multi-sauts dans les réseaux de capteurs sans fils." Paris 6, 2007. http://www.theses.fr/2007PA066192.
Full textZhou, Hai-ying. "Réseau de capteurs sans fil dédié à la détection et au diagnostic d'arytmie cardiaque en temps réel, en continu et à distance." Clermont-Ferrand 2, 2004. http://www.theses.fr/2004CLF22539.
Full textZaouche, Lotfi. "Sécurité et fiabilité des communications dans les réseaux d’essaims." Thesis, Compiègne, 2017. http://www.theses.fr/2017COMP2339/document.
Full textThe emergence of small and inexpensive Unmanned Aerial Vehicles (UAVs) promotes their use in several applications. UAVs are usually equipped with different sensors and have the ability to communicate via wireless connections. Their capability to fly freely in the space offers new opportunities to monitoring and tracking applications. A Flying Ad hoc Network (FANET) is composed of a fleet of autonomous UAVs and is used for monitoring applications in hostile environments, surveillance or site inspection. FANETs could also be used for filming special events such as bike races or soccer matches, so, the connections must guarantee a minimum of quality of service. In FANETs, saving energy of UAVs that have limited battery is very challenging and protecting the network from malicious attacks is even more difficult. In this thesis, we focus on tracking and filming a moving target using a fleet of UAVs. Since the target is moving, the UAVs have to follow it continuously, and a path to the ground station must be available. In this context, we propose an efficient solution that allows the coordination of the UAVs to maintain an optimal path between the target and the ground station. The proposed solution is time and energy efficient. We also propose a solution based on hierarchical protocols to save more energy in the communication process with the ground station. Another solution that allows energy saving is to force selfish nodes to participate in the network to route received packets towards their destination. Indeed, a selfish node is concerned only about its own welfare, refusing to route packets of other node, causing an extra charge for the rest of nodes in the network. We validate our solutions through simulation campaigns
Champ, Julien. "Communication et Localisation dans les réseaux de capteurs sans-fil." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20133.
Full textRecent advancements in the fields of telecommunications and miniaturization make it possible to deploy for a reasonnable cost, autonomous communicating objects in order to collect environmental data, or to respond when a given event appears in the deployment area. Due to the emergence of these new kind of ad hoc networks, it is needed to design various new protocols, adapted to the constraints of considered objects and to the specific needs of targeted applications.During this thesis, the objective was to contribute to the field of wireless sensor networks by proposing solutions for some of the most important issues. In the first part of this document, dedicated to communication problems, we study and propose a new energy efficient geographical routing mechanism which overcomes the periodic exchange of HELLO messages, often required to determine sensors neighborhood. We also extend this method when considering the presence of location errors of sensors. Next, we have studied a strategy to enhance the lifetime of the network when periodic queries must be sent from the base station to the whole network, by adapting an efficient localized broadcast algorithm, in order to balance energy consumption between nodes. Additionally we have shown that it is not necessary to recompute the broadcast trees for each query to obtain a good lifetime.In the second part of this document, we considered the localization problem in wireless multihop networks. After a study of some of the most interesting solutions in the litterature, we propose a new family of localization methods which are well suited for wireless sensor networks, using 2-hop information and force-based algorithms. Through extensive simulations we show the scalabity of our method, and its ability to obtain accurate results, even when considering complex topologies or the presence of large measurement errors
Bomgni, Alain Bertrand. "Qualité de services dans les protocoles de multicast géographique et de routage par permutation dans les réseaux de capteurs sans fil." Amiens, 2013. http://www.theses.fr/2013AMIE0100.
Full textA wireless sensors network (WSN for short) can be represented as a graph, tree, or other structures. The structure is more or less important depending on the problem that we will deal with and the respect of constraints on WSNs. In fact, in WSNs, security and economy of energy are two important and necessary aspects to consider. Particularly, security helps to ensure that such a network is not subject to attacks that involve reading, modification or destruction of information while economy of energy prolong the network life as the energy supply for sensor nodes is usually extremely limited, non-rechargeable and non-replaceable. In this work, we are interested in two problems : the permutation routing problem on multi-hop WSN and the problem of geocasting. A large variety of permutation routing protocols in a single-hop Network are known in the literature. Since they are single hop, there is always a wireless link connecting two nodes. One way to solve this problem in a multiple hop environment is to partition nodes into clusters, where a node in each cluster called clusterhead is responsible for the routing service. We first propose a hybrid clustering mechanism to perform permutation routing in multi-hop ad hoc Networks. Simulation results show that our algorithm performs better than the naive multiple gossiping. Next, we derive a new protocol that performs with less number of broadcast rounds compared to the one above. Finally, we present a protocol for permutation routing, which is secure, fault tolerant and energy-efficient. The proposed protocol is based on two main principles. First, the use of a heterogeneous hierarchical clustered structure to assign the most important roles to the sensors having the most energy, in order to ensure the protection and routing of data items. Second, the use of multiple processes based on this structure to ensure, regardless of network and sensors status, no data is lost and that a data item from a point A to a point B always arrives safety. In the other hand, Geocasting or Multi-Geocasting in wireless sensor network is the delivery of packets from a source (or sink) to all the nodes located in one or several geographic areas. The objectives of a geocasting (multi-geocasting) protocol are the guarantee of message delivery and low transmission cost. The existing protocols which guarantee delivery run on network in which each node has an ID beforhand. They either are valid only in dense networks or must derive a planar graph from the network topology. Hence the nodes may be adaptated in order to carry out huge operations to make the network planar. In our first solution which does not need node to have such capacity, we consider anonymous networks and derive geocast and multi-geocast algorithms that guarantee delivery and that need less gaps or obstacles and dense networks. In our second solution, we add energy-efficient issues. Effectively, we propose an energy-efficient geocast algorithm for wireless sensor networks with guaranteed delivery of packets from the sink to all nodes located in several geocast regions
Valois, Fabrice. "Auto-organisation de réseaux radio multi-saut." Habilitation à diriger des recherches, Université Claude Bernard - Lyon I, 2007. http://tel.archives-ouvertes.fr/tel-00272361.
Full textKouassi, Kouakou. "Modélisation et optimisation des transmissions ultra-large bande à impulsions radio dans les réseaux ad hoc." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10197/document.
Full textThis thesis focuses on impulse radio Ultra-Wide Band (UWB) transmissions in ad hoc sensor network. Such networks are able to generate strong enough multiple access interference to be less reliable. The method used to distinguish data is the Pulse Position Modulation where different delay is assign to each data type. The purpose of this study is to suggest proposals to mitigate this issue while fitting with the radio waves regulations in the countries where these networks will operate. As a rough guide, this thesis only refers to the American UWB regulation. However, the obtained results are relevant to any kind of mask. The masks are highly restrictive, we therefore interested to the transmitted signals spectrum shapes, first, in order to guarantee an optimal use of the available power. The proposal we made for this purpose reveals highly interesting. Then an analytical model taking into account the last suggestion is built to numerically evaluate the performances. These performances are compared to the ones obtained with Monte-Carlo simulations. It appears that the model is accurate enough to be used in an optimisation process. This process aims to find data signals that give the best performances and the optimal spectral occupancies, at the same time. The obtained results show that our proposal allows to make more reliable transmissions in dense ad hoc sensor networks
Romdhani, Bilel. "Exploitation de l’hétérogénéité des réseaux de capteurs et d’actionneurs dans la conception des protocoles d’auto-organisation et de routage." Thesis, Lyon, INSA, 2012. http://www.theses.fr/2012ISAL0066/document.
Full textIn this thesis, we focused on urban wireless networks considered by the ANR project ARESA2. The networks considered by this project are heterogeneous networks. This heterogeneity is caused by the coexistence of sensor nodes with limited resources and actuator nodes with higher resources. Actuators nodes should be used differentially by the network. Hence designed protocols for WSANs should exploit resource-rich devices to reduce the communication burden on low power nodes. It is in this context that this thesis takes place in which we studied self-organizing and routing algorithms based on the heterogeneity. First, we are interested in self-organization protocols in a heterogeneous network. Based on the idea that resource-rich nodes must be exploited to reduce the communication load level on low-power nodes, we proposed self-organizing protocol called Far-Legos. Far-Legos uses the large transmit power of actuators to provide gradient information to sensor nodes. Actuators initiate and construct a logical topology. The nature of this logical topology is different inside and outside the transmission range of these resourceful nodes. This logical topology will be used to facilitate the data collection from sensor to actuator nodes. Second, we investigated the asymmetric links caused by the presence of heterogeneous nodes with different transmission ranges. The apparition of asymmetric links can dramatically decrease the performance of routing protocols that are not designed to support them. To prevent performance degradation of these routing protocols, we introduce a new metric for rank calculation. This metric will be useful to detect and avoid asymmetric links for RPL routing protocol. We also present an adaptation of data collection protocol based on Legos to detect and avoid these asymmetric links. Finally, we are interested in exploiting the asymmetric links present in the network. We proposed a new routing protocol for data collection in heterogeneous networks, called AsymRP. AsymRP, a convergecast routing protocol, assumes 2-hop neighborhood knowledge and uses implicit and explicit acknowledgment. It takes advantage of asymmetric links to ensure reliable data collection
Bekhti, Mustapha. "Réseaux de capteurs : application à la poursuite des cibles mobiles." Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCD092.
Full textFor decades Unmanned Aerial Vehicles (UAVs) are widely used in modern warfare for surveillance, reconnaissance, sensing, battle damage assessment and attacking. The benefits of UAVs include reduced cost and no warfighter risk. In fact UAVs use is increased by time,especially under the concept of the network centric operation environment and under the concept of revolution in military affairs. On the other hand, the UAVs technology which originates from military applications, arouse the interest of the civilian, and yet, the domestic use began with limited aerial patrols of the nation’s borders, disaster and law enforcement situation. Recently, these products have also been destined to the commercial market and have gained much attention. Although UAVs use is expanding, their level of automation, cooperation and integration in civil application is far from being efficient and the design principles of such cooperation, coordination and self-organization under an Ad-hoc networkof a multi-UAV still need intensive studies and remain an open research problem. In this thesis, the investigated tracks were drawn both from the literature review and from the news topics. Thus, they covered two main classes of contributions, first, path planning and tracking of drones with package delivery and data gathering missions, and second, intrusion detection in a sensitive area through the use of networked drones.The results show that the integration of the drone segment to the terrestrial wireless network presents a relevant added value and opens new perspectives to the use of this technology in the civilian realm
El, Rachkidy Nancy. "Cross-Layering et routage dans un réseau ad hoc : politique de relais de trame sur un réseau de capteurs sans fil organisé selon une topologie en arbre." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2011. http://tel.archives-ouvertes.fr/tel-00697017.
Full textGallais, Antoine. "Ordonnancement d'Activité dans les Réseaux de Capteurs : l'Exemple de la Couverture de surface." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2007. http://tel.archives-ouvertes.fr/tel-00256841.
Full textNous avons choisi d'étudier des approches localisées uniquement, ne reposant sur aucune infrastructure. L'objectif est d'obtenir un comportement global cohérent à partir de décisions individuelles simples issues d'informations locales. Chaque noeud décide de sa propre activité en ne se basant que sur l'observation de ses propres voisins. Les changements de topologie du réseau (dus à la mobilité, aux pannes ou à des changements de statut) ne sont par conséquent vécus par les noeuds que comme de simples modifications de leurs voisinages. Ceci permet d'obtenir des solutions robustes, adaptables et surtout passables à l'échelle, aspect extrêmement important dans des réseaux où les densités évoquées peuvent être d'une centaine de noeuds par zone de communication.
Nos propositions se distinguent non seulement parce qu'elles considèrent les problèmes de connexité et de couverture de zone comme n'en étant qu'un seul, mais aussi de par leur faible coût en communication ainsi que par leur robustesse. Nous avons ensuite étudié diverses méthodes d'extension à la couverture multiple où tout point de la zone doit être couvert par un nombre fixé de capteurs actifs. Enfin, nous avons évalué toutes ces approches à l'aide de modèles de communication réalistes, montrant que nos solutions conservent toute leur cohérence, en termes de couverture et de connexité. En revanche, aux protocoles classiques souffrant de pertes de performances, nous avons proposé des mécanismes améliorerant leur comportement dans des environnements réalistes.
Mahfoudh, Saoucene. "Energy efficiency in wireless ad hoc and sensor networks : routing, node activity scheduling and cross-layering." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00757251.
Full textAmadou, Ibrahim. "Protocoles de routage sans connaissance de voisinage pour réseaux radio multi-sauts." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00763865.
Full textDagher, Roudy. "Sur la radionavigation dans les villes intelligentes du futur : le cas des réseaux de capteurs sans fils." Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10079/document.
Full textWith the development of the internet of things, the number of communicating objects is rapidly increasing especially with the emergence of the "Smart City'' concept. As in the case of WiFi access points, many of these objects would operate at fixed and known positions. Such information is made available in the Cloud under the Big Data paradigm, thus leading to the so called geo-referencing of the nodes. In such a context, we pose the problem of opportunistic vehicular radio-localization by means of neighborhood discovery and signal processing of received neighboring signals. We propose a novel approach for vehicle self-localization as a contribution to the field of intelligent transportation systems. The proposed solution is opportunistic, passive and non-intrusive regarding the network operations and deployed applications. The thesis defends a localization system that seamlessly integrates with a standard communication stack and covers two layers: physical and link. At physical level, we use an antenna array for collecting and processing the received signals for both identification and localization. As soon as a packet is detected at MAC layer, the corresponding signals are exploited to localize the source with respect to the vehicle body frame. By using the source identifier, its position in the external (or global) frame is looked up in a database that was previously built off-line and made accessible locally or remotely. By assuming that the vehicle orientation is known, the position of the vehicle is then estimated using basis change equations
Romdhani, Bilel. "Exploitation de l'hétérogénéité des réseaux de capteurs et d'actionneurs dans la conception des protocoles d'auto-organisation et de routage." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00941099.
Full textChalhoub, Gérard. "MaCARI : une méthode d'accès déterministe et économe en énergie pour les réseaux de capteurs sans fil." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2009. http://tel.archives-ouvertes.fr/tel-00724590.
Full textJacquot, Aurélien. "Supervision de réseaux d'objets intelligents communicants sans fil." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2010. http://tel.archives-ouvertes.fr/tel-00719350.
Full textBuhrig, Aurélien. "Optimisation de la consommation des noeuds de réseaux de capteurs sans fil." Phd thesis, Grenoble INPG, 2008. http://tel.archives-ouvertes.fr/tel-00319073.
Full textJamont, Jean-Paul. "DIAMOND : Une approche pour la conception de systèmes multi-agents embarqués." Phd thesis, Grenoble INPG, 2005. http://tel.archives-ouvertes.fr/tel-00189046.
Full textIl n'était pas suffisant de proposer une méthode : considérer les composants des systèmes complexes physiques comme des noeuds coopérants d'un réseau sans fil est une démarche attrayante qui peut être vue comme la traduction physique extrême de la décentralisation. De fait, des besoins spécifiques en architectures doivent être traités. Pour cela, nous proposons le modèle MWAC (Multi-Wireless-Agent Communication) qui repose sur l'auto-organisation des entités du système.
Ces deux contributions sont exploitées au sein de l'application EnvSys qui a pour objectif l'instrumentation d'un réseau hydrographique.
Berthe, Abdoulaye. "Modélisation et simulation de réseaux locaux et personnels sans fil : intégration des couches PHY et MAC." Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1568/.
Full textIn this work, we focus on physical and medium access control layer modeling and simulation for short range wireless communication. In particular, the modeling of the Impulse Radio Ultra Wide Band technique for wireless sensor networks and the high data rate communication modeling which uses millimeter wave and beamforming. The first part deals with the modeling of Impulse Radio Ultra Wide Band. The proposed model takes into account the pulse collision induced by multiple concurrent transmissions at the physical layer which is also called multi user interference. This aspect is accurately introduced thanks to the concept of reception time hopping sequences of concurrent reception and their orthogonality. The simulation architecture is built using two models: the first model is based on a uniformly distributed pulse train and the second model, more complete, takes into account variable time hopping sequences. The performance evaluation of this part is based on a typical wireless sensor networks application, in which sensor nodes are scattered on a particular area to detect and report intrusion events to a base station. The second part deals with the modeling of high data rate communication using millimeter wave. The targeted goal of millimeter wave transmission is to increase the data rate using some novel techniques: beamforming and data aggregation. Beamforming is modeled on the so-called codebook beamforming defined as the new beamforming technique for high data rate wireless communication standards. A methodology is developed to take into account the radiation pattern defined by the codebook indexes. For each index the gain of the directional antenna is computed for each direction. This is used in the simulation model physical layer to determine the directional antenna gain in a particular direction during the propagation stage. The defined protocols for sector level and beam level training defined in the 802. 15. 3c draft are also modeled. The performance evaluation of this part is based on a multimedia distribution system
Sareh, Said Adel Mounir. "Ubiquitous sensor network in the NGN environment." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0016/document.
Full textUbiquités Sensor Network (USN) is a conceptual network built over existing physical networks. It makes use of sensed data and provides knowledge services to anyone, anywhere and at anytime, and where the information is generated by using context awareness. Smart wearable devices and USNs are emerging rapidly providing many reliable services facilitating people life. Those very useful small end terminals and devices require a global communication substrate to provide a comprehensive global end user service. In 2010, the ITU-T provided the requirements to support USN applications and services in the Next Génération Network (NGN) environment to exploit the advantages of the core network. One of the main promising markets for the USN application and services is the e-Health. It provides continuous patients’ monitoring and enables a great improvement in medical services. On the other hand, Vehicular Ad-Hoc NETwork (VANET) is an emerging technology, which provides intelligent communication between mobile vehicles. Integrating VANET with USN has a great potential to improve road safety and traffic efficiency. Most VANET applications are applied in real time and they are sensitive to delay, especially those related to safety and health. In this work, we propose to use IP Multimedia Subsystem (IMS) as a service controller sub-layer in the USN environment providing a global substrate for a comprehensive end-to-end service. Moreover, we propose to integrate VANETs with USN for more rich applications and facilities, which will ease the life of humans. We started studying the challenges on the road to achieve this goal
Ducrocq, Tony. "Auto-organisation des réseaux sans-fil multi-sauts dans les villes intelligentes." Phd thesis, Lille 1, 2013. http://tel.archives-ouvertes.fr/tel-00915269.
Full text