645 research outputs found

    WIMAX LINK PERFORMANCE ANALYSIS FOR WIRELESS AUTOMATION APPLICATIONS

    Get PDF
    Wireless broadband access technologies are rapidly growing and a corresponding growth in the demand of its applicability transcends faster internet access, high speed file download and different multimedia applications such as voice calls, video streaming, teleconferencing etc, to industrial operations and automation. Industrial and automation systems perform operations that requires the transmission of real time information from one end to another through high-performance wireless broadband communication links. WiMAX, based on IEEE 802.16 standard is one of the wireless broadband access technologies that has overcome location, speed, and access limitations of the traditional Digital Subscriber Line and Wireless Fidelity, and offers high efficient data rates. This thesis presents detailed analysis of operational WiMAX link performance parameters such as throughput, latency, jitter, and packet loss for suitable applicability in wireless automation applications. The theoretical background of components and functionalities of WiMAX physical and MAC layers as well as the network performance features are presented. The equipment deployed for this field experiment are Alvarion BreeZeMAX 3000 fixed WiMAX equipment operating in the 3.5 GHz licensed band with channel bandwidth of 3.5 MHz. The deployed equipment consisting of MBSE and CPE are installed and commissioned prior to field tests. Several measurements are made in three link quality scenarios (sufficient, good and excellent) in the University of Vaasa campus. Observations and results obtained are discussed and analyzed.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    A Novel Approach for Always Best Connected in Future Wireless Networks

    Get PDF
    Basically, Vertical handover (VHO) decision relies on the selection of the 2018;best2019; available network that could meet the QoS requirements for the end-user. Therefore, a network selection mechanism is required to help mobile users choose the best network; that is, one that provides always best connected (ABC) that suits users needs and is able to change dynamically with the change in conditions. The definition of best depends on a number of different aspects such as user personal preferences, device size and capabilities, application requirements, security, present network traffic, and network signal strength. This work proposes to assign weight to all the above stated aspects so as to compute ABC. The novelty of this work is to exploit intelligent agents for weight calculations after analyzing the explored parameters for various networks. An analysis and a comparison of both services and factors for different networks are also provided in the paper

    The WiMAX PHY Layer

    Get PDF

    A novel network architecture for train-to-wayside communication with quality of service over heterogeneous wireless networks

    Get PDF
    In the railway industry, there are nowadays different actors who would like to send or receive data from the wayside to an onboard device or vice versa. These actors are e.g., the Train Operation Company, the Train Constructing Company, a Content Provider, etc. This requires a communication module on each train and at the wayside. These modules interact with each other over heterogeneous wireless links. This system is referred to as the Train-to-Wayside Communication System (TWCS). While there are already a lot of deployments using a TWCS, the implementation of quality of service, performance enhancing proxies (PEP) and the network mobility functions have not yet been fully integrated in TWCS systems. Therefore, we propose a novel and modular IPv6-enabled TWCS architecture in this article. It jointly tackles these functions and considers their mutual dependencies and relationships. DiffServ is used to differentiate between service classes and priorities. Virtual local area networks are used to differentiate between different service level agreements. In the PEP, we propose to use a distributed TCP accelerator to optimize bandwidth usage. Concerning network mobility, we propose to use the SCTP protocol (with Dynamic Address Reconfiguration and PR-SCTP extensions) to create a tunnel per wireless link, in order to support the reliable transmission of data between the accelerators. We have analyzed different design choices, pinpointed the main implementation challenges and identified candidate solutions for the different modules in the TWCS system. As such, we present an elaborated framework that can be used for prototyping a fully featured TWCS

    Security-centric analysis and performance investigation of IEEE 802.16 WiMAX

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed

    Network-Assisted Handover for Heterogeneous Wireless Networks using IEEE 802.21

    Get PDF
    The IEEE 802.21 is a standard for enabling handover in heterogeneous wireless networks. Published in January 2009, it defines protocols and messages for mobile-to-node and node-to-node communication in a technology-neutral and flexible manner. The need arises because of the widespread diffusion of different technologies for wireless communications (e.g., WiFi, WiMAX, LTE) coexisting in the same geographical area. Even though the number of multi-radio multi-technology mobile devices is increasing significantly, there are no open solutions in the market to enable efficient inter-technology handover. As is often the case with communication standards, the structure of the required components, the procedures, and the algorithms are left unspecified by the IEEE 802.21 standard so as to promote competion by differentiation of equipment capabilities and services. The contribution of this thesis is two-fold: i) a design and an implemenation of the Media Independent Information Service (MIIS) server; and, ii) a solution to enable network-assisted handover using the IEEE 802.21 standard, aimed at reducing the handover latency and the energy consumption of mobile devices due to scanning. The MIIS server has been fully implemented in C++ under Linux. In order to perform testbed evaluations, all the required components have been implemented, as well, within an open source framework for IEEE 802.21 called ODTONE. Modifications to the latter have been performed for optimization and fine tuning, and for extending those functional modules needed but not fully implemented. For a realistic evaluation, Linux-based embedded COTS devices have been used, equipped with multiple IEEE 802.11a and IEEE 802.11g wireless network interface cards. This has required additional development for kernel/user space binding and hardware control. Testbed results are reported to show the effectiveness of the proposed solution, also proving the MIIS server scalability

    Collaboration Enforcement In Mobile Ad Hoc Networks

    Get PDF
    Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost

    Exploitation of RF-DNA for Device Classification and Verification Using GRLVQI Processing

    Get PDF
    This dissertation introduces a GRLVQI classifier into an RF-DNA fingerprinting process and demonstrates applicability for device classification and ID verification. Unlike MDA/ML processing, GRLVQI provides a measure of feature relevance that enables Dimensional Reduction Analysis (DRA) to enhance the experimental-to-operational transition potential of RF-DNA fingerprinting. Using 2D Gabor Transform RF-DNA fingerprints extracted from experimentally collected OFDM-based 802.16 WiMAX and 802.11 WiFi device emissions, average GRLVQI classification accuracy of %C greater than or equal to 90% is achieved using full and reduced dimensional feature sets at SNR greater than or equal to 10.0 dB and SNR greater than or equal to 12.0 dB, respectively. Performance with DRA approximately 90% reduced feature sets included %C greater than or equal to 90% for 1) WiMAX features at SNR greater than or equal to 12.0 dB and 2) WiFi features at SNR greater than or equal to 13.0 dB. For device ID verification with DRA approximately 90% feature sets, GRLVQI enabled: 1) 100% ID verification of authorized WiMAX devices and 97% detection of spoofing attacks by rogue devices at SNR=18.0 dB, and 2) 100% ID verification of authorized WiFi devices at SNR=15.0 dB
    corecore