Current Search: Mobile communication systems (x)
View All Items
Pages
- Title
- Efficient localized broadcast algorithms in mobile ad hoc networks.
- Creator
- Lou, Wei., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The broadcast operation has a most fundamental role in mobile ad hoc networks because of the broadcasting nature of radio transmission, i.e., when a sender transmits a packet, all nodes within the sender's transmission range will be affected by this transmission. The benefit of this property is that one packet can be received by all neighbors while the negative effect is that it interferes with other transmissions. Flooding ensures that the entire network receives the packet but generates...
Show moreThe broadcast operation has a most fundamental role in mobile ad hoc networks because of the broadcasting nature of radio transmission, i.e., when a sender transmits a packet, all nodes within the sender's transmission range will be affected by this transmission. The benefit of this property is that one packet can be received by all neighbors while the negative effect is that it interferes with other transmissions. Flooding ensures that the entire network receives the packet but generates many redundant transmissions which may trigger a serious broadcast storm problem that may collapse the entire network. The broadcast storm problem can be avoided by providing efficient broadcast algorithms that aim to reduce the number of nodes that retransmit the broadcast packet while still guaranteeing that all nodes receive the packet. This dissertation focuses on providing several efficient localized broadcast algorithms to reduce the broadcast redundancy in mobile ad hoc networks. In my dissertation, the efficiency of a broadcast algorithm is measured by the number of forward nodes for relaying a broadcast packet. A classification of broadcast algorithms for mobile ad hoc networks has been provided at the beginning. Two neighbor-designating broadcast algorithms, called total dominant pruning and partial dominant pruning, have been proposed to reduce the number of the forward nodes. Several extensions based on the neighbor-designating approach have also been investigated. The cluster-based broadcast algorithm shows good performance in dense networks, and it also provides a constant upper bound approximation ratio to the optimum solution for the number of forward nodes in the worst case. A generic broadcast framework with K hop neighbor information has a trade-off between the number of the forward nodes and the size of the K-hop zone. A reliable broadcast algorithm, called double-covered broadcast, is proposed to improve the delivery ratio of a broadcast package when the transmission error rate of the network is high. The effectiveness of all these algorithms has been confirmed by simulations.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fau/fd/FADT12103
- Subject Headings
- Wireless LANS, Mobile communication systems, Wireless communication systems--Mathematics, Algorithms
- Format
- Document (PDF)
- Title
- Quorum based IP autoconfiguration in mobile ad hoc networks.
- Creator
- Xu, Tinghui., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
IP address autoconfiguration poses a challenge for mobile ad-hoc networks (MANETs) because it has to be done to ensure correct routing. An IP autoconfiguration protocol that is based on quorum voting is proposed. Nodes are distributed configured when a write quorum can be collected. Making the compromise between message overhead and data consistency, quorum voting enforces data consistency by ensuring fresh read on every access so that each node is configured with a unique IP address. The...
Show moreIP address autoconfiguration poses a challenge for mobile ad-hoc networks (MANETs) because it has to be done to ensure correct routing. An IP autoconfiguration protocol that is based on quorum voting is proposed. Nodes are distributed configured when a write quorum can be collected. Making the compromise between message overhead and data consistency, quorum voting enforces data consistency by ensuring fresh read on every access so that each node is configured with a unique IP address. The protocol is scalable since the configuration information is maintained locally and no central server is involved. Extensive experiments are carried out comparing the configuration latency, message overhead and address reclamation cost between our protocol and existing stateful protocols. The simulation results show that nodes are configured in lower latency and the message overhead for maintaining the network is fairly low. Moreover, the proposed protocol greatly enhances the address availability by keeping proper redundancy.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13362
- Subject Headings
- TCP/IP (Computer network protocol), Computer network architectures, Mobile communication systems, Wireless communication systems
- Format
- Document (PDF)
- Title
- Knowledge Discovery Through Drive Test Data Visualization.
- Creator
- Saxena, Shalini, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increasing number of cellular phone service subscribers, the telecommunications service providers have placed immense emphasis on improving audio quality and ensure fewer dropped calls. Handoff behavior of all handsets is an important factor in quality of service of a mobile phone service. This thesis focuses on the analysis of large volumes of diagnostic data collected from mobile phones in the real world and the identification of aberrant behavior of a mobile handset under test by...
Show moreWith the increasing number of cellular phone service subscribers, the telecommunications service providers have placed immense emphasis on improving audio quality and ensure fewer dropped calls. Handoff behavior of all handsets is an important factor in quality of service of a mobile phone service. This thesis focuses on the analysis of large volumes of diagnostic data collected from mobile phones in the real world and the identification of aberrant behavior of a mobile handset under test by means of drive test data visualization. Our target was to identify poor mobility decisions that are made by the handsets in calls. Premature, delayed or exceedingly sensitive decisions are considered poor mobility decisions. The goal was to compare a set of behaviors from a baseline unit (one accepted to generally operate well). We were able to identify a particular call that was exhibiting a different path (talking to a different cell than expected or taking longer to move to a new cell). We designed a chi-square statistical test to evaluate the performance of specific mobile handset models. We also developed a mobility tool that evaluated the handset's performance by means of mapping the handoffs on the Google Maps. The mapping of the handoffs by means of the Google Maps were very powerful in identifying the above mentioned mobility patterns.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012548
- Subject Headings
- Mobile communication systems--Quality control, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- Investigation of debonding failures in sandwich constructions.
- Creator
- Sendlein, Lyle Scott., Florida Atlantic University, Merry, Stephanie L., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Debonding failure of cored marine composite materials is investigated. A new test method that subjects the bond line between the core and the face sheets to a shear stress singularity is presented and studied analytically by laminated beam shear deformation theory, numerically by the finite element method, and experimentally with specimens of glass/polyester face sheets on balsa wood or PVC core sandwich beams.
- Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/14519
- Subject Headings
- Mobile communication systems--Design, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- Location management for mobile Internet protocols.
- Creator
- Shah, Jigar Vireshkumar., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this present computer age, cellular technology and portable computers are becoming an integral part of day to day life. Each computer user wants to access the computing resources, irrespective of the location. Because of this need the computing paradigm "Mobile Computing" has assumed a primary role in modern computer communication technology. There are different Internet protocols proposed for Mobile Computing. In the present research, we study the Internet Engineering Task Force (IETF)...
Show moreIn this present computer age, cellular technology and portable computers are becoming an integral part of day to day life. Each computer user wants to access the computing resources, irrespective of the location. Because of this need the computing paradigm "Mobile Computing" has assumed a primary role in modern computer communication technology. There are different Internet protocols proposed for Mobile Computing. In the present research, we study the Internet Engineering Task Force (IETF) Mobile IPv6 (new version of current IPv4 protocol). We have developed simulation program using Scientific and Engineering Software (SES/workbench) and studied three mobility patterns namely Travelling Salesman, Pop-Up and Boring Professor for the performance study of Mobile IPv6. Performance of Mobile IPv6 is measured in terms of utilization and overhead and compared with Mobile IPv4 and Basic Triangular Routing (BTR). It has been observed that Mobile IPv6 scheme has better route optimization than the other schemes when Mobile node's movement from one network to another network is less frequent. But, when the movement of the Mobile node is more frequent then Basic Triangular Routing scheme outperformed the Mobile IPv6 scheme.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15683
- Subject Headings
- Mobile computing, TCP/IP (Computer network protocol), Mobile communication systems
- Format
- Document (PDF)
- Title
- Enabling access for mobile devices to the web services resource framework.
- Creator
- Mangs, Jan Christian., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The increasing availability of Web services and grid computing has made easier the access and reuse of different types of services. Web services provide network accessible interfaces to application functionality in a platform-independent manner. Developments in grid computing have led to the efficient distribution of computing resources and power through the use of stateful web services. At the same time, mobile devices as a platform of computing have become a ubiquitous, inexpensive, and...
Show moreThe increasing availability of Web services and grid computing has made easier the access and reuse of different types of services. Web services provide network accessible interfaces to application functionality in a platform-independent manner. Developments in grid computing have led to the efficient distribution of computing resources and power through the use of stateful web services. At the same time, mobile devices as a platform of computing have become a ubiquitous, inexpensive, and powerful computing resource. Concepts such as cloud computing has pushed the trend towards using grid concepts in the internet domain and are ideally suited for internet-supported mobile devices. Currently, there are a few complete implementations that leverage mobile devices as a member of a grid or virtual organization. This thesis presents a framework that enables the use of mobile devices to access stateful Web services on a Globus-based grid. To illustrate the presented framework, a user-friendly mobile application has been created that utilizes the framework libraries do to demonstrate the various functionalities that are accessible from any mobile device that supports Java ME.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/186290
- Subject Headings
- User interfaces (Computer systems), Data structures (Computer science), Mobile computing, Security measures, Mobile communication systems, Computational grids (Computer systems)
- Format
- Document (PDF)
- Title
- Channel assignment in multi-radio networks.
- Creator
- Mihnea, Amalya, Cardei, Mihaela, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Channel assignment in multi-radio networks is a topic of great importance because the use of multiple channels and multiple radios reduces interference and increases the network throughput. The goal of our research is to design algorithms that maximize the use of available resources while providing robustness to primary users that could reclaim one or more channels. Our algorithms could be used in ad hoc networks, mesh networks, and sensor networks where nodes are equipped with multiple...
Show moreChannel assignment in multi-radio networks is a topic of great importance because the use of multiple channels and multiple radios reduces interference and increases the network throughput. The goal of our research is to design algorithms that maximize the use of available resources while providing robustness to primary users that could reclaim one or more channels. Our algorithms could be used in ad hoc networks, mesh networks, and sensor networks where nodes are equipped with multiple radios. We design algorithms for channel assignment which provide robustness to primary users without assuming an accurate primary user behavior model. We also compute bounds for capacity in grid networks and discuss how the capacity of a network changes when multiple channels are available. Since preserving energy is very important in wireless networks, we focus on algorithms that do not require powerful resources and which use a reduced number of messages.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004393, http://purl.flvc.org/fau/fd/FA00004393
- Subject Headings
- Adaptive signal processing, Long Term Evolution (Telecommunications), MIMO systems, Mobile communication systems, Wireless communication systems, Wireless sensor networks
- Format
- Document (PDF)
- Title
- Cross-domain authentication for multi-protocol phones.
- Creator
- Thakker, Chetan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to...
Show moreThe last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to extra costs for the company. Thus for the integrated networks to have an impact on the market some issues such as simpler authentication and registration must be resolved. Therefore we propose a new inter-working model that shall addresses the authentication and registration problem for an integrated network for voice and data. The Single authentication system of the new inter-working model, shall authenticate the user in an integrated network using the SIM credentials, this authentication shall be valid for both voice and data. Also registration costs will be saved by preventing separate registration of users in the WLAN and Cellular domain.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13260
- Subject Headings
- Integrated services digital networks, Digital telephone systems, Wireless communication systems--Technological innovations, Mobile communication systems--Technological innovations
- Format
- Document (PDF)
- Title
- Indoor localization using Wi-Fi fingerprinting.
- Creator
- Mirzaei, Azandaryani Saeid, Cardei, Ionut E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Nowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name,...
Show moreNowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name, floor number, and room number where the user is located based on a Wi-Fi access point signal fingerprint pattern matching. We designed and evaluated a new machine learning algorithm, KRedpin, and developed a new web-services architecture for indoor localization based on J2EE technology with the Apache Tomcat web server for managing Wi-Fi signal data from the FAU WLAN. The prototype localization client application runs on Android cellphones and operates in the East Engineering building at FAU. More sophisticated classifiers have also been used to improve the localization accuracy using the Weka data mining tool.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004038
- Subject Headings
- Location based services, Mobile geographic information systems, Wireless LANs, Wireless communication systems
- Format
- Document (PDF)
- Title
- Label routing protocol: A new cross-layer protocol for multi-hop ad hoc wireless network.
- Creator
- Wang, Yu., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Compared to the traditional wireless network, the multi-hop ad hoc wireless network (simply called ad hoc networks) is self-configurable, dynamic, and distributed. During the past few years, many routing protocols have been proposed for this particular network environment. While in wired and optical networks, multi-protocol label switching (MPLS) has clearly shown its advantages in routing and switching such as flexibility, high efficiency, scalability, and low cost, however MPLS is complex...
Show moreCompared to the traditional wireless network, the multi-hop ad hoc wireless network (simply called ad hoc networks) is self-configurable, dynamic, and distributed. During the past few years, many routing protocols have been proposed for this particular network environment. While in wired and optical networks, multi-protocol label switching (MPLS) has clearly shown its advantages in routing and switching such as flexibility, high efficiency, scalability, and low cost, however MPLS is complex and does not consider the mobility issue for wireless networks, especially for ad hoc networks. This thesis migrates the label concept into the ad hoc network and provides a framework for the efficient Label Routing Protocol (LRP) in such a network. The MAC layer is also optimized with LRP for shorter delay, power saving, and higher efficiency. The simulation results show that the delay is improved significantly with this cross-layer routing protocol.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13321
- Subject Headings
- Computer network protocols, Wireless communication systems, Mobile computing, Computer algorithms, MPLS standard, Operating systems (Computers)
- Format
- Document (PDF)
- Title
- Modeling Perceived Audio for Cellular Phones Based on Field Data.
- Creator
- Kitbamrung, Pateep, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Even though, the current cellular network provides the user with a wide array of services, for a typical user voice communication is still the primary usage. It has become increasingly important for a cellular network provider to provide the customers with the clearest possible end-to-end speech during a call. However, this perceptually motivated QoS is hard to measure. While the main goal of this research has been on the modeling of the perceptual audio quality, this thesis focuses on the...
Show moreEven though, the current cellular network provides the user with a wide array of services, for a typical user voice communication is still the primary usage. It has become increasingly important for a cellular network provider to provide the customers with the clearest possible end-to-end speech during a call. However, this perceptually motivated QoS is hard to measure. While the main goal of this research has been on the modeling of the perceptual audio quality, this thesis focuses on the discovery of procedures for collecting audio and diagnostic data, the evaluation of the captured audio, and the mapping and visualization of the diagnostic and audio related data. The correct application of these modified procedures should increase the productivity of the drive test team as well as provides a platform for the accurate assessment of the data collected.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012530
- Subject Headings
- Computer network protocols, Wireless communication systems--Quality control, Routers (Computer networks), Mobile communication systems--Quality control
- Format
- Document (PDF)
- Title
- Efficient Resource Discovery Technique in a Mobile Ad Hoc Networks.
- Creator
- Thanawala, Ravi, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis describes a resource discovery technique in mobile ad hoc networks. Resource discovery is technique to search data in among the mobile nodes in the network. The highly dynamic nature of the infrastructure-less ad hoc networks poses new challenges in resource discovery, thus there is a need to for an optimized resource discovery technique. Efficient resource discovery algorithm discovers the resources in a mobile ad-hoc network in an optimized way. As there is no pre-established...
Show moreThis thesis describes a resource discovery technique in mobile ad hoc networks. Resource discovery is technique to search data in among the mobile nodes in the network. The highly dynamic nature of the infrastructure-less ad hoc networks poses new challenges in resource discovery, thus there is a need to for an optimized resource discovery technique. Efficient resource discovery algorithm discovers the resources in a mobile ad-hoc network in an optimized way. As there is no pre-established infrastructure in the network, every node takes its decision in forwarding resources and every node dynamically ranks these resources before disseminating them in the network. Ranking of the resources spreads the data which is of high priority at that instance of time. Ranking avoids the spreads the unwanted or low priority data which will utilize the bandwidth unnecessarily. The efficient resource discovery algorithm also keeps a check that redundant information is not spread in the network with the available bandwidth and the bandwidth is utilized in an optimized manner. We then introduce brokers in the algorithm for a better performance. We present a technique to maintain a constant number of brokers in the network. Our simulations show that, in a network with high density, the efficient resource discovery algorithm gives a better performance than the flooding and rank based broadcast algorithms.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012562
- Subject Headings
- Mobile communication systems--Mathematics, Computer algorithms, Wireless communication systems--Mathematics, Ad hoc networks (Computer networks)--Programming
- Format
- Document (PDF)
- Title
- Smart campus.
- Creator
- Danda, Naga Prakash, Agarwal, Ankur, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Smart Campus project envisions a university campus where technology assists faculty, staff, students and visitors to improve and more efficiently accomplish their daily activities. The objective of this project is to develop a smart phone application that assists users in finding a certain location on campus, locating their friends and professors, interacting with any student or professors of the campus, get the count of users at certain locations and remain updated about all the events...
Show moreThe Smart Campus project envisions a university campus where technology assists faculty, staff, students and visitors to improve and more efficiently accomplish their daily activities. The objective of this project is to develop a smart phone application that assists users in finding a certain location on campus, locating their friends and professors, interacting with any student or professors of the campus, get the count of users at certain locations and remain updated about all the events and campus news. Through this project, an idea of ‘Futuristic Social Network’ in a Campus is modeled and developed on Android platform.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004098, http://purl.flvc.org/fau/fd/FA00004098
- Subject Headings
- Mobile communication systems -- Security measures, Technological innovations -- Social aspects, Ubiquitous computing, Universities and colleges -- Design
- Format
- Document (PDF)
- Title
- Connected Dominating Set in Wireless Ad Hoc Networks: Variations with Applications.
- Creator
- Yang, Shuhui, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless ad hoc networks (or simply ad hoc networks) are infrastructureless multihop networks consisting of mobile or stationary wireless devices, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). These networks are characterized by limited bandwidth and energy resources, frequent topology changes, and a lack of central control. These characteristics lead to the research challenges of ad hoc networks. The algorithms designed for ad hoc networks should be...
Show moreWireless ad hoc networks (or simply ad hoc networks) are infrastructureless multihop networks consisting of mobile or stationary wireless devices, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). These networks are characterized by limited bandwidth and energy resources, frequent topology changes, and a lack of central control. These characteristics lead to the research challenges of ad hoc networks. The algorithms designed for ad hoc networks should be localized, selforganizing, and energy efficient. A connected dominating set (CDS) is frequently used in ad hoc networks as a virtual backbone to support efficient routing, service discovery, and area monitoring. In addition, efficient broadcasting (i.e., finding a small set of forward nodes to ensure full delivery) can be viewed as forming a CDS on-the-fly. The periodically maintained virtual backbone is called a static CDS, and the temporarily formed forward node set is called a dynamk CDS. For efficiency and robustness, the ideal CDS construction algorithm is lightweight, has fast convergence, and minimizes the CDS size. Recently, due to some specific applications and new techniques, the concept of a connected dominating set can be modified or further extended for more efficient usage. This dissertation focuses on the variations with applications of the connected dominating set, designing new concepts, and developing new algorithms for them. A review of CDS construction algorithms for ad hoc networks has been provided at the beginning. An efficient scheme, called Rule K, has been proposed for static CDS construction. Rule K achieves a probabilistic constant upper bound on the expected CDS size, which is currently the best known performance guarantee for localized CDS algorithms. Several CDS algorithms are extended to generate the extended CDS, which exploits the cooperative communication technique to further reduce the size of CDS. A k-coverage set is developed for higher robustness. With the equipment of directional antennas , the transmission can be restricted to some certain directions to reduce interference and energy consumption. The corresponding directional CDS is discussed. Finally, a wireless sensor and actor network (WSAN) is introduced and localized algorithms are designed for it.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012580
- Subject Headings
- Computer network protocols, Wireless communication systems--Design and construction, Mobile computing, Computer algorithms
- Format
- Document (PDF)
- Title
- Enhanced ticket-based QoS routing protocols in ad hoc networks.
- Creator
- Huang, Chun-Jung, Florida Atlantic University, Wu, Jie
- Abstract/Description
-
This thesis describes QoS routing techniques in ad hoc networks. QoS routing is to find paths between given source and destinations that fulfill a set of QoS requirements. QoS routing in ad hoc networks is a challenging problem due to the dynamical nature of ad hoc networks and the complexity of the QoS routing problem. Ticket-based probing scheme (TBP) is a creative approach to solve QoS routing problem, however, its proactive nature makes it deficient and unscalable. In this thesis, we...
Show moreThis thesis describes QoS routing techniques in ad hoc networks. QoS routing is to find paths between given source and destinations that fulfill a set of QoS requirements. QoS routing in ad hoc networks is a challenging problem due to the dynamical nature of ad hoc networks and the complexity of the QoS routing problem. Ticket-based probing scheme (TBP) is a creative approach to solve QoS routing problem, however, its proactive nature makes it deficient and unscalable. In this thesis, we first present the adaptive ticket-based routing protocol (ATBR), a proactive protocol enhanced from TBP, by introducing a new imprecise QoS state model. We then present the location-aided, ticket-based routing protocol (LTBR), an integration of locate-based routing and ticket-based routing, where tickets are dynamically generated and guided by location and QoS metric. Our simulations show that, in networks under any density, LTBR achieves close performances to flooding with considerably lower routing overhead.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13060, http://purl.flvc.org/fau/fd/FADT13060
- Subject Headings
- Computer network protocols, Mobile computing, Wireless communication systems, Routers (Computer networks)
- Format
- Document (PDF)
- Title
- Energy-efficient routing in ad hoc wireless networks.
- Creator
- Dai, Qing., Florida Atlantic University, Wu, Jie
- Abstract/Description
-
The ad hoc wireless network is an infrastructureless network, where mobile stations are typically powered by batteries. Energy conservation has therefore becomes a very important issue. In this thesis, we discuss our work on several problems in energy-efficient routing. Chapter 3 focuses on how to compute the minimum uniform broadcast transmission power in an ad hoc wireless network. Several algorithms are proposed and their running time compared through simulation. It is shown that Prim's...
Show moreThe ad hoc wireless network is an infrastructureless network, where mobile stations are typically powered by batteries. Energy conservation has therefore becomes a very important issue. In this thesis, we discuss our work on several problems in energy-efficient routing. Chapter 3 focuses on how to compute the minimum uniform broadcast transmission power in an ad hoc wireless network. Several algorithms are proposed and their running time compared through simulation. It is shown that Prim's Minimum Spanning Tree (MST) has better performance than Kruskal's MST and the two binary search algorithms. In the following two chapters, routing algorithms are studied for specific situations, when directional antenna is used (Chapter 4) or when partial signal could be collected, stored and integrated (Chapter 5). Different algorithms are discussed and their energy performance illustrated by simulation study. Their application and limitation are also discussed in the thesis.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13077
- Subject Headings
- Wireless communication systems, Routers (Computer networks), Electronic digital computers--Power supply, Mobile computing
- Format
- Document (PDF)
- Title
- Power-aware broadcasting and activity scheduling in ad hoc wireless networks using connected dominating sets.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc wireless networks (MANET), due to host mobility, broadcasting is expected to be frequently used to find a route to a particular host, to page a host, and to alarm all hosts. A straightforward broadcasting by flooding is usually very costly and results in substantial redundancy and more energy consumption. Power consumption is an important issue since most mobile hosts operate on battery. Broadcasting based on a connected dominating set (CDS) is a promising approach, where...
Show moreIn mobile ad hoc wireless networks (MANET), due to host mobility, broadcasting is expected to be frequently used to find a route to a particular host, to page a host, and to alarm all hosts. A straightforward broadcasting by flooding is usually very costly and results in substantial redundancy and more energy consumption. Power consumption is an important issue since most mobile hosts operate on battery. Broadcasting based on a connected dominating set (CDS) is a promising approach, where only nodes inside CDS need to relay the broadcast packet. Wu and Li proposed a simple distributed algorithm for calculating CDS in MANET. In general, nodes inside CDS consume more energy to handle various bypass traffics than nodes outside the set. To prolong the life span of each node and, hence, the network by balancing the energy consumption in the system, nodes should be alternated in being chosen to form a CDS. Activity scheduling deals with the way to rotate the role of each node among a set of given operation modes. In thesis I propose to apply power-aware CDS notions to broadcasting and activity scheduling. I also introduce distance rule and extended rules to further reduce broadcasting energy consumption. The effectiveness of the proposed method are confirmed through my simulation experiment.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12958
- Subject Headings
- Mobile computing, Wireless communication systems, Electronic digital computers--Power supply
- Format
- Document (PDF)
- Title
- VoIP Network Security and Forensic Models using Patterns.
- Creator
- Pelaez, Juan C., Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred....
Show moreVoice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred. Many of these attacks occur in similar ways in different contexts or environments. Generic solutions to these issues can be expressed as patterns. A pattern can be used to guide the design or simulation of VoIP systems as an abstract solution to a problem in this environment. Patterns have shown their value in developing good quality software and we expect that their application to VoIP will also prove valuable to build secure systems. This dissertation presents a variety of patterns (architectural, attack, forensic and security patterns). These patterns will help forensic analysts as well, as secure systems developers because they provide a systematic approach to structure the required information and help understand system weaknesses. The patterns will also allow us to specify, analyze and implement network security investigations for different architectures. The pattern system uses object-oriented modeling (Unified Modeling Language) as a way to formalize the information and dynamics of attacks and systems.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012576
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Global system for mobile communications, Software engineering
- Format
- Document (PDF)
- Title
- Visualization as a Qualitative Method for Analysis of Data from Location Tracking Technologies.
- Creator
- Mani, Mohan, VanHilst, Michael, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being...
Show moreOne of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being analyzed that led to interesting observations about the data itself as opposed to the entity, or entities, that the data is supposed to describe. In doing so, we underscored the value addition brought forth by spatial data visualization techniques even in the incipient stages of analysis of georeferenced data from cellular networks. We also demonstrated the value of visualization techniques as a verification tool to verify the results of analysis done through other methods, such as statistical analysis.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012536
- Subject Headings
- Mobile communication systems, Algorithms--Data analysis, Radio--Transmitters and transmissions, Code division multiple access
- Format
- Document (PDF)
- Title
- Local construction of connected dominating sets in wireless ad hoc networks.
- Creator
- Dai, Fei., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless ad hoc networks are infrastructure-less multi-hop networks consisting of mobile (such as in mobile ad hoc networks) or stationary (such as in wireless sensor networks) wireless devices. These networks involve several challenges, including limited bandwidth and energy resources, frequent topology changes, and a lack of central control. Local acting, self-organizing, and self-healing algorithms (also called localized algorithms) are essential to the design of wireless ad hoc networks....
Show moreWireless ad hoc networks are infrastructure-less multi-hop networks consisting of mobile (such as in mobile ad hoc networks) or stationary (such as in wireless sensor networks) wireless devices. These networks involve several challenges, including limited bandwidth and energy resources, frequent topology changes, and a lack of central control. Local acting, self-organizing, and self-healing algorithms (also called localized algorithms) are essential to the design of wireless ad hoc networks. A connected dominating set (CDS) is frequently used in wireless ad hoc networks as a virtual backbone to support efficient routing, service discovery, and area monitoring. In addition, efficient broadcasting (i.e., finding a small set of forward nodes to ensure full delivery) can be viewed as forming a CDS on-the-fly. The periodically maintained virtual backbone is called a static CDS, and the temporarily formed forward node set is called a dynamic CDS. For efficiency and robustness, the ideal CDS construction algorithm is lightweight, has fast convergence, and minimizes the CDS size. This dissertation focuses on providing a generic framework to unify localized CDS construction schemes, including both static and dynamic CDS constructions, for wireless ad hoc networks. The goal is to provide insights on how to form a small CDS (forward node set) in dynamic networks with affordable overhead and high robustness. A classification of CDS construction algorithms for wireless ad hoc networks has been provided at the beginning. An efficient scheme, called Rule K, has been proposed for static CDS construction. Rule K achieves a probabilistic constant upper bound on the expected CDS size, which is currently the best known performance guarantee for localized CDS algorithms. Rule K has been extended to a unified framework, called the coverage condition, which contains most existing localized virtual backbone construction and efficient broadcast algorithms as its special cases. The coverage condition has been further extended to construct a k-connected k-dominating set for higher robustness, and integrated in an iterative process that further reduces the CDS size while maintaining the same level of robustness.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12144
- Subject Headings
- Wireless communication systems, Electronic digital computers--Power supply, Mobile computing, Sensor networks
- Format
- Document (PDF)