Khurram Masood Phd.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Khurram Masood Phd.Pdf c Khurram Masood May 2013 iii Dedicated to my loving parents and family iv ACKNOWLEDGMENTS In the name of Allah, the Most Beneficent, the Most Merciful All praise be to Allah for His boundless blessings. May Allah bestow peace and His choicest blessings on His last prophet, Hazrat Muhammad (Peace Be Upon Him), his family (May Allah be pleased with them), his companions (May Allah be pleased with them) and his followers. Firstly my gratitude goes to my esteemed university, King Fahd University of Petroleum and Minerals (KFUPM), and to its knowledgeable faculty members who have been a source of inspiration during my stay at KFUPM. I would like to acknowledge the efforts of my advisor, Dr. Asrar U. H. Sheikh, whose expert opinion and enthusiastic encouragement helped in achieving my goals during the research phase. His valuable guidance and friendly working en- vironment made the work interesting and possible. I am grateful to my dissertation committee members Dr. Ali H. Muqaibel, Dr. Mohamed A. Deriche, Dr. Abdelmalek Zidouri and Dr. Ashraf S. Hasan Mah- moud for their useful critique and feedback during my research work. I would particularly like to thank Mr. Muhammad Saqib Sohail for his efforts in develop- ment of the MATLAB simulations and his valued suggestions. v I would like to make a special acknowledgement to my friend Dr. Muhammad Imran Akram, who was always there to help me during my stay at KFUPM. I would also like to appreciate the support of all my friends at KFUPM whom I shall not be able to name here. Their friendship made my stay here at KFUPM pleasant and enjoyable. Finally, I would like to thank my parents for their prayers and support from the core of my heart. I would also like to thank my wife and my siblings for the moral support that they provided and made my stay in KSA enjoyable and memorable. May Allah help us in following Islam according to Quran and Sunna!(Ameen) vi TABLE OF CONTENTS LIST OF TABLES xi LIST OF FIGURES xii NOMENCLATURE xv ABSTRACT (ENGLISH) xxiv ABSTRACT (ARABIC) xxvi CHAPTER 1. INTRODUCTION 1 1.1 Background .............................. 3 1.2 LiteratureSurvey ........................... 4 1.3 DissertationContributions . 15 1.4 DissertationLayout.......................... 16 CHAPTER 2. SUCCESS PROBABILITY IN MULTIPATH FRE- QUENCYSELECTIVEFADINGCHANNEL 18 2.1 Ring Distribution of STAs . 22 2.1.1 Phasorsumofinterferencesignals . 22 2.1.2 Power sum of interference signals . 24 2.1.3 Power Phasor Sum of Interference Signals . 28 2.1.4 Summary of results for ring distributed STAs . 29 2.2 SpatialDistributionofSTAs . 30 2.2.1 Phasorsumofinterferencesignals . 33 vii 2.3 Results................................. 38 2.4 Summary ............................... 40 CHAPTER 3. APPLICATION OF TAGGED USER ANALYSIS TO SLOTTED ALOHA PERFORMANCE 42 3.1 Introduction.............................. 43 3.2 SystemModel............................. 43 3.3 TaggedUserAnalysis......................... 45 3.3.1 Channel Contention Analysis . 46 3.3.2 Queueing Analysis . 48 3.4 PerformanceMeasuresandIterativealgorithm . 50 3.4.1 PerformanceMeasures . 50 3.4.2 TheAlgorithm ........................ 53 3.5 Selection of Optimum system operating point . 53 3.6 NumericalResultsandDiscussion . 58 3.6.1 SOI is dominant path of TU transmission . 60 3.6.2 SOI power sum of all paths of TU transmission . 63 3.6.3 Comparison between SOI dominant path and SOI sum of multipaths........................... 66 3.6.4 Effect of the buffer length on system performance . 67 3.7 Summary ............................... 68 CHAPTER 4. PERFORMANCE ANALYSIS OF IEEE 802.11 EDCF 71 4.1 Introduction.............................. 72 4.2 OverviewofIEEE802.11. .. .. 72 4.2.1 IEEE802.11DCF ...................... 72 4.2.2 IEEE802.11QoSEDCF . .. .. 74 4.3 SystemModel............................. 74 4.4 AnalyticalModelforTUA . 76 4.4.1 Channel Contention Analysis . 76 viii 4.4.2 Queueing Analysis . 86 4.5 Performance parameters and iterative Algorithm . 88 4.5.1 Performanceparameters . 88 4.5.2 Iterative Algorithm . 91 4.6 Resultsanddiscussion ........................ 91 4.6.1 An example of WLAN network with heterogeneous traffic . 91 4.6.2 Comparison of phasor and power sum for interference signal in WLAN network with homogeneous traffic . 97 4.7 Summary ............................... 103 CHAPTER 5. APPLICATION OF TUA TO RESOURCE MAN- AGEMENT 104 5.1 Introduction.............................. 105 5.2 SystemModel............................. 105 5.2.1 ChannelSelectionStrategies . 108 5.3 Tagged User Analysis Model for Multiple Channel System . 109 5.3.1 Channel Contention Analysis . 109 5.4 PerformanceMeasures . 121 5.5 Resultsanddiscussion . .. .. 122 5.5.1 Like channels ......................... 124 5.5.2 Unlike channels ........................ 127 5.6 Summary ............................... 133 CHAPTER 6. CONCLUSIONS AND FUTURE RECOMMENDA- TIONS 135 6.1 Achievementsofthework . 135 6.2 Summaryofmaincontributions . 136 6.3 Futurerecommendations . 137 APPENDIX CHAPTER A. PGF FOR VPST USING SIGNAL FLOW GRAPH 138 ix APPENDIX CHAPTER B. DERIVATION OF SELECTED EQUA- TIONS IN CHAPTER 2 141 B.1 DerivationofEquation2.5 . 141 B.2 DerivationofEquation2.7 . 142 B.3 DerivationofEquation2.13 . 143 B.4 DerivationofEquation2.18 . 144 B.5 DerivationofEquation2.20 . 146 B.6 DerivationofEquation2.22 . 147 B.7 DerivationofEquation2.38 . 148 B.8 DerivationofEquation2.44 . 151 APPENDIX CHAPTER C. DERIVATION OF SELECTED EQUA- TION IN CHAPTER 4 154 C.1 DerivationofEquation4.17 . 154 REFERENCES 157 VITAE 172 x LIST OF TABLES 2.1 ChannelmodelBforNLOSmode . 38 3.1 ITU channel model for outdoor to indoor and pedestrian test envi- ronment ................................ 59 4.1 IEEE 802.11 parameters common to all traffic categories . 92 4.2 Parametersrelatedtothetrafficcategories . 92 4.3 IEEE802.11DCFsimulationparameters . 98 5.1 High rate PHY frequency channel plan for IEEE 802.11 . 106 5.2 IEEE 802.11 parameters common to all traffic categories . 122 5.3 Parametersrelatedtothetrafficcategories . 122 5.4 Times (T, D and P) at different data rates for the traffic categories 124 A.1 GainsforIEEE802.11EDCFandS-ALOHA . 138 xi LIST OF FIGURES 2.1 Bellshapeduserdistributionpdf . 32 2.2 Success probability in presence of n interferers . 39 2.3 Success probability in presence of n interferers with phasor sum . 39 2.4 Success probability in presence of n interferers with power sum . 40 3.1 Stateflowdiagramofataggeduser . 44 3.2 Time line of packet transmission . 52 3.3 Fluid approximation trajectories for p = 0 .03 > y max ....... 57 3.4 Analytic and simulation results for an S-ALOHA system with im- mediate acknowledgement, non-coherent addition, SOI dominant path only. N = 100, λ = 0 .0035 ................... 61 3.5 Throughput and load lines for (L=1,p=0.06) and (L=8,p=0.021), non-coherent addition, SOI dominant path only. N = 100, λ = 0 .0035 63 3.6 Analytic and simulation results for an S-ALOHA system with im- mediate acknowledgement, non-coherent addition, SOI sum of mul- tipaths. N = 100, λ = 0 .0035 .................... 64 3.7 Throughput and load lines for (L=1,p=0.068) and (L=8,p=0.032), non-coherent addition, SOI sum of multipaths. N = 100, λ = 0 .0035 67 3.8 Throughput vs channel access probability for a system with 100 users in ideal and fading scenario, D = 1, and capture ratio = 4dB (fading) ................................ 69 4.1 StateFlowGraphforCSMA/CA fora certain group . 76 4.2 Throughput: AggregateandeachTC . 94 xii 4.3 Blocking probability for each TC . 95 4.4 PacketresponsetimeforeachTC . 95 4.5 WaitingtimeforeachTC ...................... 96 4.6 AveragequeuelengthofeachTC . 96 4.7 VirtualpacketservicetimeforeachTC. 97 4.8 Throughput for voice oriented continuous traffic wireless networks: AggregateandforeachTC. 98 4.9 SystemthroughputforIEEE802.11DCF. 100 4.10 Blocking probability for IEEE 802.11 DCF . 100 4.11 Packet dropping probability for IEEE 802.11 DCF . 101 4.12 ResponsetimeforIEEE802.11DCF . 101 4.13 WaitingdelayforIEEE802.11DCF. 102 4.14 AveragequeuelengthforIEEE802.11DCF . 102 5.1 Flow diagram for multi-channel IEEE 802.11 . 107 5.2 State flow graph for IEEE 802.11 EDCF using 2-parallel channels 110 5.3 Throughputcomparisonfor3cases . 126 5.4 Throughput comparison with different offered load per TC. Vo:Vi:Da::4:1:1 . 126 5.5 Throughput comparison with different offered load per TC. Vo:Vi:Da::1:4:1 . 128 5.6 Throughput comparison with different offered load per TC. Vo:Vi:Da::1:1:4 . 128 5.7 Throughput for C=3 SPC each @11Mbps and same CWmin=16 forvideoanddatatraffic . 129 5.8 Throughput for C=3 SPC each @11Mbps and same CWmin=10 forvideoanddatatraffic . 129 5.9 Throughput for C=2 Unlike channels @22,11 Mbps . 132 5.10 Throughput for C=3 Unlike channels @22,2x5.5 Mbps . 132 5.11 Throughput for C=5 Unlike channels @11,4x5.5 Mbps . 133 xiii A.1 EvaluationofPGFusingstateflowgraph . 139 xiv Nomenclature Abbreviations AC : Access Category AIFS : Arbitration Inter-Frame Space AIFSN : Arbitration Inter-Frame Spacing Number AP : Access Point BBR : Basic Bit Rate BO : Back-off BR : Bit Rate CR : Cognitive Radio CSMA : Carrier Sense Multiple Access CSMA/CA : CSMA with Collision Avoidance CSMA/CD : CSMA with Collision Detection CT : Channel Type CTB : Collapsed Transition onto Basis CW : Contention Window CWmax : Maximum Contention Window CWmin : Minimum Contention Window DCA : Dynamic Channel Assignment DCF : Distributed Coordination Function DFT : Defer First Transmission xv DIFS : DCF Inter Frame Space DPC : Dedicated Parallel Channel EDCA : Enhanced Distributed Channel Access EDCF : Enhanced
Recommended publications
  • Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications
    tv '2s.\--qq T! Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications Theodore V. Buot B.S.Eng (Electro&Comm), M.Eng (Telecomm) Thesis submitted for the degree of Doctor of Philosophy 1n The University of Adelaide Faculty of Engineering Department of Electrical and Electronic Engineering August 1997 Contents Abstract IY Declaration Y Acknowledgments YI List of Publications Yrt List of Abbreviations Ylu Symbols and Notations xi Preface xtv L.Introduction 1 Background, Problems and Trends in Personal Communications and description of this work 2. Literature Review t2 2.1 ALOHA and Random Access Protocols I4 2.1.1 Improvements of the ALOHA Protocol 15 2.1.2 Other RMA Algorithms t6 2.1.3 Random Access Protocols with Channel Sensing 16 2.1.4 Spread Spectrum Multiple Access I7 2.2Fixed Assignment and DAMA Protocols 18 2.3 Protocols for Future Wireless Communications I9 2.3.1 Packet Voice Communications t9 2.3.2Reservation based Protocols for Packet Switching 20 2.3.3 Voice and Data Integration in TDMA Systems 23 3. Teletraffic Source Models for R-TDMA 25 3.1 Arrival Process 26 3.2 Message Length Distribution 29 3.3 Smoothing Effect of Buffered Users 30 3.4 Speech Packet Generation 32 3.4.1 Model for Fast SAD with Hangover 35 3.4.2Bffect of Hangover to the Speech Quality 38 3.5 Video Traffic Models 40 3.5.1 Infinite State Markovian Video Source Model 41 3.5.2 AutoRegressive Video Source Model 43 3.5.3 VBR Source with Channel Load Feedback 43 3.6 Summary 46 4.
    [Show full text]
  • 2009 IEEE 70Th Vehicular Technology Conference Fall
    2009 IEEE 70th Vehicular Technology Conference Fall (VTC 2009-Fall) Anchorage, Alaska, USA 20 – 23 September 2009 Pages 1-485 IEEE Catalog Number: CFP09VTF-PRT ISBN: 978-1-4244-2514-3 TABLE OF CONTENTS PORTABLE 2009 OPENING KEYNOTE SELF-ORGANIZING NETWORKS IN 3GPP LTE..........................................................................................................1 Seppo Hämäläinen 22W: ELECTRICAL DESIGN II NONINVASIVE CONTINUOUS BLOOD PRESSURE MEASUREMENT AND GPS POSITION MONITORING OF PATIENTS ..........................................................................................................................................3 Ondrej Krejcar, Zdenek Slanina, Jan Stambachr, Petr Silber And Robert Frischer NUMERICAL INVESTIGATION OF ALGORITHMS FOR MULTI-ANTENNA RADIOLOCATION ..............................................................................................................................................................8 Danko Antolovic WBAN MEETS WBAN: SMART MOBILE SPACE OVER WIRELESS BODY AREA NETWORKS.................... 13 Dae-Young Kim And Jinsung Cho AN ALGORITHM FOR SIMULTANEOUS RADIOLOCATION OF MULTIPLE SOURCES................................. 18 Danko Antolovic 2W: PHYSICAL DESIGN MICRO AND NANO ELECTRO MECHANICAL SYSTEMS (MEMS/NEMS) FOR MOBILE COMPUTING SYSTEMS .................................................................................................................................................. 23 M. Abdelmoneum, D. Browning, T. Arabi And Waleed Khalil BATTERY-SENSING INTRUSION PROTECTION SYSTEM
    [Show full text]
  • Etsi Tr 102 862 V1.1.1 (2011-12)
    ETSI TR 102 862 V1.1.1 (2011-12) Technical Report Intelligent Transport Systems (ITS); Performance Evaluation of Self-Organizing TDMA as Medium Access Control Method Applied to ITS; Access Layer Part 2 ETSI TR 102 862 V1.1.1 (2011-12) Reference DTR/ITS-0040021 Keywords ITS, MAC, TDMA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Self-Stabilizing TDMA Algorithms for Wireless Ad-Hoc Networks Without External Reference
    2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET) Self-stabilizing TDMA Algorithms for Wireless Ad-hoc Networks without External Reference (Extended Abstract) Thomas Petig, Elad M. Schiller, Philippas Tsigas {petig, elad, tsigas}@chalmers.se Department of Computer Science and Engineering Chalmers University of Technology, Sweden Abstract—Time division multiple access (TDMA) is a method needed MAC protocol properties, using limited radio and clock for sharing communication media. In wireless communications, settings, i.e., no external reference for collision detection, time TDMA algorithms often divide the radio time into timeslots of or position. Note that ad hoc networks often do not consider uniform size, ξ, and then combine them into frames of uniform size, τ. We consider TDMA algorithms that allocate at least collision detection mechanisms, and external references are one timeslot in every frame to every node. Given a maximal subject to signal loss. For these settings, we demonstrate node degree, δ, and no access to external references for collision that there is no solution for the studied problem when the detection, time or position, we consider the problem of collision- frame size is τ<max{2δ, χ2}, where δ is the maximal free self-stabilizing TDMA algorithms that use constant frame node degree, and χ2 is the chromatic number for distance-2 size. We demonstrate that this problem has no solution when vertex coloring. The main result is the existence of collision- the frame size is τ<max{2δ, χ2}, where χ2 is the chromatic free self-stabilizing TDMA algorithms that use constant frame number for distance-2 vertex coloring.
    [Show full text]
  • Data Link Layer
    Data Link Layer Sublayers: • Sublayers of the data link layer o Logical link control sublayer o Media access control sublayer Data link layer services: • Encapsulation of network layer data packets into frames • Frame synchronization- Done by Media Access Control sublayer • Logical link control (LLC) sublayer: o Error control (automatic repeat request, ARQ) o Flow control • Media access control (MAC) sublayer: o Multiple access protocols for channel-access control, for example CSMA/CD protocols for collision detection and re-transmission in Ethernet bus networks and hub networks, or the CSMA/CA protocol for collision avoidance in wireless networks. o Physical addressing (MAC addressing) o LAN switching (packet switching) including MAC filtering and spanning tree protocol o Data packet queuing or scheduling o Store-and-forward switching or cut-through switching o Quality of Service (QoS) control o Virtual LANs (VLAN) The uppermost sublayer, LLC, multiplexes protocols running atop the data link layer, and optionally provides flow control, acknowledgment, and error notification. More about MAC Sublayer: 1. The Media Access Control sublayer also determines where one frame of data ends and the next one starts – frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing. 2. The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. 3. Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station.
    [Show full text]
  • Unit-Iii Datalink Layer: Error Detection and Correction
    UNIT-III DATALINK LAYER: ERROR DETECTION AND CORRECTION Error-Correcting Codes Error control in computer networks is typically achieved by error detecting using cyclic redundancy check (CRC), which is the checksum inside a frame, combined with retransmission For this purpose, systematic cyclic or polynomial generated codes are often used, which are special linear block codesSome basic concepts in error control coding are first reviewedAn n-bit frame, which consists of m-bit data and r check bits, is called a codeword. AllCode words form the codebook Hamming distance between two code words is number of bits in which two code words differ For example, 10001001 and 10110001 have a Hamming distance of 3, where is bit-wise exclusive OR (modulo 2) The minimum Hamming distance d min of a codebook is the smallest Hamming distance between any pair of code words in the codebook A codebook with dmin can detect up to dmin − 1 errors and correct up to (dmin − 1)/2 errors in each codeword. Use of a Hamming code to correct burst errors Hamming codes can only correct single errors. However, there is a trick that can be used to permit Hamming codes to correct burst errors. A sequence of k consecutive codewords is arranged as a matrix, one codeword per row. Normally, the data would be transmitted one codeword at a time, from left to right. To correct burst errors, the data should be transmitted one column at a time, starting with the leftmost column. When all k bits have been sent, the second column is sent, and so on.
    [Show full text]
  • Medium Access Control for Vehicular Ad Hoc Networks KATRIN SJÖBERG ISBN 978-91-7385-832-8
    Thesis for the degree of Doctor of Philosophy Medium Access Control for Vehicular Ad Hoc Networks Katrin Sjöberg Department of Signals and Systems School of Information Science, Computer and Electrical Engineering CHALMERS UNIVERSITY OF TECHNOLOGY HALMSTAD UNIVERSITY Göteborg, Sweden, 2013 Medium Access Control for Vehicular Ad Hoc Networks KATRIN SJÖBERG ISBN 978-91-7385-832-8 Copyright Katrin Sjöberg, 2013. All rights reserved. Doktorsavhandlingar vid Chalmers tekniska högskola ISSN 1403-266X Ny serie nr 3513 Department of Signals and Systems CHALMERS UNIVERSITY OF TECHNOLOGY Hörsalsvägen 11 SE-412 96 Göteborg Sweden Telephone: +46 - (0)31 - 772 10 00 Fax: +46 - (0)31 - 772 36 63 Contact Information: Katrin Sjöberg School of Information Science, Computer and Electrical Engineering HALMSTAD UNIVERSITY SE-301 18 Halmstad Sweden Telephone: +46 - (0)35 - 16 71 00 Fax: +46 - (0)35 - 12 03 48 Email: [email protected] Printed in Sweden Chalmers Reproservice Göteborg, Sweden, 2013 Medium Access Control for Vehicular Ad Hoc Networks KATRIN SJÖBERG Department of Signals and Systems, Chalmers University of Technology Abstract Cooperative intelligent transport systems (C-ITS), where vehicles cooperate by exchanging messages wirelessly to avoid, for example, hazardous road traffic situations, receive a great deal of attention throughout the world currently. Many C-ITS applications will utilize the wireless communication technology IEEE 802.11p, which offers the ability of direct communication between vehicles, i.e., ad hoc communication, for up to 1000 meters. In this thesis, medium access control (MAC) protocols for vehicular ad hoc networks (VANET) are scrutinized and evaluated. The MAC protocol decides when a station has the right to access the shared communication channel and schedules transmissions to minimize the interference at receiving stations.
    [Show full text]
  • Agile Wireless Transmission Strategies
    Agile wireless transmission strategies Citation for published version (APA): Ho, C. K. (2009). Agile wireless transmission strategies. Technische Universiteit Eindhoven. https://doi.org/10.6100/IR640214 DOI: 10.6100/IR640214 Document status and date: Published: 01/01/2009 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim.
    [Show full text]
  • COST Action CA15104 Collaborative White Paper on Future Architecture and Protocols for Iot
    COST Action CA15104 Collaborative White Paper on Future Architecture and Protocols for IoT COST Action CA15104 (IRACON) aims to achieve scientific networking and cooperation in novel design and analysis methods for 5G, and beyond-5G, radio communication networks. The scientific activities of the action are organized according to two types of Working Groups: disciplinary and experimental Working Groups. In total, IRACON consists of 6 working groups: Radio Channels (DWG1), PHY layer (DWG2), NET Layer (DWG3), OTA Testing (EWG-OTA), Internet-of-Things (EWG-IoT), Localization and Tracing (EWG-LT) and Radio Access (EWG-RA). A sub-working group of EWG-IoT was also recently created: IoT for Health. This white paper focuses on the Internet of Things (IoT). First, it introduces the IoT field with a general definition and the main applications, with the related requirements. Then, a description of the technologies available nowadays is provided; for each technology the main key parameters are given, and some quantitative and/or qualitative key performance indicators are reported. The white paper concludes with a brief overview of IoT architectures and a mapping between the identified applications and the most appropriate technology. Editors: C. Anton, C. Buratti, L. Clavier, G. Gardasevic, E. Strom, R. Verdone Authors: L. O. Barbosa, T. Baykas, A. Bazzi, C. Buratti, L. Clavier, G. Gardasevic, S. Mignardi, E. Strom, R. Verdone Date: March 2019 Contents Contents ..............................................................................................................................................
    [Show full text]
  • Ethernet 95 Link Aggregation 102 Power Over Ethernet 107 Gigabit Ethernet 116 10 Gigabit Ethernet 121 100 Gigabit Ethernet 127
    Computer Networking PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 10 Dec 2011 02:24:44 UTC Contents Articles Networking 1 Computer networking 1 Computer network 16 Local area network 31 Campus area network 34 Metropolitan area network 35 Wide area network 36 Wi-Fi Hotspot 38 OSI Model 42 OSI model 42 Physical Layer 50 Media Access Control 52 Logical Link Control 54 Data Link Layer 56 Network Layer 60 Transport Layer 62 Session Layer 65 Presentation Layer 67 Application Layer 69 IEEE 802.1 72 IEEE 802.1D 72 Link Layer Discovery Protocol 73 Spanning tree protocol 75 IEEE 802.1p 85 IEEE 802.1Q 86 IEEE 802.1X 89 IEEE 802.3 95 Ethernet 95 Link aggregation 102 Power over Ethernet 107 Gigabit Ethernet 116 10 Gigabit Ethernet 121 100 Gigabit Ethernet 127 Standards 135 IP address 135 Transmission Control Protocol 141 Internet Protocol 158 IPv4 161 IPv4 address exhaustion 172 IPv6 182 Dynamic Host Configuration Protocol 193 Network address translation 202 Simple Network Management Protocol 212 Internet Protocol Suite 219 Internet Control Message Protocol 225 Internet Group Management Protocol 229 Simple Mail Transfer Protocol 232 Internet Message Access Protocol 241 Lightweight Directory Access Protocol 245 Routing 255 Routing 255 Static routing 260 Link-state routing protocol 261 Open Shortest Path First 265 Routing Information Protocol 278 IEEE 802.11 282 IEEE 802.11 282 IEEE 802.11 (legacy mode) 292 IEEE 802.11a-1999 293 IEEE 802.11b-1999 295 IEEE 802.11g-2003 297
    [Show full text]
  • Nuno Fábio Gomes Camacho Ferreira Controlo De Acesso Ao Meio
    Universidade de Aveiro Departamento de Eletrónica, Telecomunicações e Ano 2019 Informática Nuno Fábio Controlo de Acesso ao Meio em Comunicações Gomes Veiculares de Tempo-Real Camacho Ferreira Medium Access Control in Real-Time Vehicular Communications Universidade de Aveiro Departamento de Eletrónica, Telecomunicações e Ano 2019 Informática Nuno Fábio Controlo de Acesso ao Meio em Comunicações Gomes Veiculares de Tempo-Real Camacho Ferreira Medium Access Control in Real-Time Vehicular Communications Tese apresentada à Universidade de Aveiro para cumprimento dos requisitos necessários à obtenção do grau de Doutor em Engenharia Eletrotécnica. Apoio financeiro da FCT refª SFRH/BD/31212/2006 e do FSE no âmbito do III Quadro Comunitário de Apoio. Dedico este trabalho à minha esposa, Mónica, ao meu filho, Guilherme, à minha mãe, Paulina, e à minha sogra Filomena, que estará sempre comigo. o júri Presidente Doutor João Filipe Colardelle da Luz Mano, Professor Catedrático da Universidade de Aveiro Vogais Doutora Susana Isabel Barreto de Miranda Sargento, Professora Associada com Agregação da Universidade de Aveiro Doutor José Boaventura Ribeiro da Cunha, Professor Associado com Agregação da Universidade de Trás-os-Montes e Alto Douro Doutor Paulo José Lopes Machado Portugal, Professor Associado da Universidade do Porto Doutor José Alberto Gouveia Fonseca, Professor Associado da Universidade de Aveiro Doutor Mário Jorge de Andrade Ferreira Alves, Professor Coordenador do Instituto Superior de Engenharia do Porto agradecimentos Attaining a PhD degree may, sometimes, seem like an endless road, in which hard work and innovative ideas may not seem enough. However, that illusion may be suppressed with the support and encouragement of important people, which I did and owe gratitude to them.
    [Show full text]
  • University of Cincinnati
    UNIVERSITY OF CINCINNATI Date:___________________ I, _________________________________________________________, hereby submit this work as part of the requirements for the degree of: in: It is entitled: This work and its defense approved by: Chair: _______________________________ _______________________________ _______________________________ _______________________________ _______________________________ Modeling and Performance Analysis of Mobile Ad Hoc Networks A dissertation submitted to the Division of Graduate Studies and Research of The University of Cincinnati In partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY In the Department of Electrical & Computer Engineering and Computer Science of the College of Engineering by Xiaolong Li M.E., (EE), Huazhong University of Science & Technology, China, 2002. B.E., (EE), Huazhong University of Science & Technology, China, 1999. Thesis Advisor and Committee Chair: Dr. Qing-An Zeng February 23, 2006 Abstract Ad hoc networks are gaining increasing popularity in recent years because of their ease of deployment. No wired base station or infrastructure is supported, and each host communicates one another via packet radios. In ad hoc networks, nodes are mobile which bring many challenges, such as network connectivity, topology change, link characteristic, and etc. In this research work, a novel model to analyze the link stability in mobile ad hoc networks is proposed. In the proposed analytical model, between each communicating pair, one node is considered to be stationary while the other moves relative to it. With this method, the mobility models defined in this dissertation can be approximated as a fluid flow model. Using the result of the fluid flow model, the analytical model for the link duration is obtained, which is used to obtain the link holding time and the link breaking probability of a communicating pair.
    [Show full text]