UMD Theses and Dissertations

Permanent URI for this collectionhttp://hdl.handle.net/1903/3

New submissions to the thesis/dissertation collections are added automatically as they are received from the Graduate School. Currently, the Graduate School deposits all theses and dissertations from a given semester after the official graduation date. This means that there may be up to a 4 month delay in the appearance of a given thesis/dissertation in DRUM.

More information is available at Theses and Dissertations at University of Maryland Libraries.

Browse

Search Results

Now showing 1 - 6 of 6
  • Thumbnail Image
    Item
    EXTRINSIC CHANNEL-LIKE FINGERPRINT EMBEDDING FOR TRANSMITTER AUTHENTICATION IN WIRELESS SYSTEMS
    (2011) Goergen, Nathan Scott; Liu, K.J.Ray; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    We present a physical-layer fingerprint-embedding scheme for wireless signals, focusing on multiple input multiple output (MIMO) and orthogonal frequency division multiplexing (OFDM) transmissions, where the fingerprint signal conveys a low capacity communication suitable for authenticating the transmission and further facilitating secure communications. Our system strives to embed the fingerprint message into the noise subspace of the channel estimates obtained by the receiver, using a number of signal spreading techniques. When side information of channel state is known and leveraged by the transmitter, the performance of the fingerprint embedding can be improved. When channel state information is not known, blind spreading techniques are applied. The fingerprint message is only visible to aware receivers who explicitly preform detection of the signal, but is invisible to receivers employing typical channel equalization. A taxonomy of overlay designs is discussed and these designs are explored through experiment using time-varying channel-state information (CSI) recorded from IEEE802.16e Mobile WiMax base stations. The performance of the fingerprint signal as received by a WiMax subscriber is demonstrated using CSI measurements derived from the downlink signal. Detection performance for the digital fingerprint message in time-varying channel conditions is also presented via simulation.
  • Thumbnail Image
    Item
    Time-based Location Techniques Using Inexpensive, Unsynchronized Clocks in Wireless Networks
    (2011) Mah, Matthew Yew Mun; Agrawala, Ashok K; Computer Science; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    The ability to measure location using time of flight in IEEE 802.11 networks is impeded by the standard clock resolution, imprecise synchronization of the 802.11 protocol, and the inaccuracy of available clocks. To achieve real-time location with accuracy goals of a few meters, we derive new consensus synchronization techniques for free-running clocks. Using consensus synchronization, we improve existing time of arrival (TOA) techniques and introduce new time difference of arrival (TDOA) techniques. With this common basis, we show how TOA is theoretically superior to TDOA. Using TOA measurements, we can locate wireless nodes that participate in the location system, and using TDOA measurements, we can locate nodes that do not participate. We demonstrate applications using off-the-shelf 802.11 hardware that can determine location to within 3m using simple, existing optimization methods. The synchronization techniques extend existing ones providing distributed synchronization for free-running clocks to cases where send times cannot be controlled and adjusted precisely, as in 802.11 networks. These location and synchronization techniques may be applied to transmitting wireless nodes using any communication protocol where cooperating nodes can produce send and receive timestamps.
  • Thumbnail Image
    Item
    Properties of a DTN Packet Forwarding Scheme Inspired By Themodynamics
    (2010) Mathew, Bipin; La, Richard J.; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    In this thesis, we develop a discrete time model of a recently proposed algorithm, inspired by thermodynamics, for message routing in Disruption Tolerant Networks (DTNs). We model the evolution of the temperature at the nodes as a stochastic switched linear system and show that the temperatures converge in distribution to a unique stationary distribution that is independent of initial conditions. The proof of this result borrows tools from Iterated Random Maps (IRMs) and Queuing theory. Lastly, we simulate the proposed algorithm, using a variety of mobility models, in order to observe the performance of the algorithm under various conditions.
  • Thumbnail Image
    Item
    Flow Control in Wireless Ad-hoc Networks
    (2009) Papageorgiou, Georgios; Baras, John S.; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    We are interested in maximizing the Transmission Control Protocol (TCP) throughput between two nodes in a single cell wireless ad-hoc network. For this, we follow a cross-layer approach by first developing an analytical model that captures the effect of the wireless channel and the MAC layer to TCP. The analytical model gives the time evolution of the TCP window size which is described by a stochastic differential equation driven by a point process. The point process represents the arrival of acknowledgments sent by the TCP receiver to the sender as part of the self-regulating mechanism of the flow control protocol. Through this point process we achieve a cross-layer integration between the physical layer, the MAC layer and TCP. The intervals between successive points describe how the packet drops at the wireless channel and the delays because of retransmission at the MAC layer affect the window size at the TCP layer. We fully describe the statistical behavior of the point process by computing first the p.d.f. for the inter-arrival intervals and then the compensator and the intensity of the process parametrized by the quantities that describe the MAC layer and the wireless channel. To achieve analytical tractability we concentrate on the pure (unslotted) Aloha for the MAC layer and the Gilbert-Elliott model for the channel. Although the Aloha protocol is simpler than the more popular IEEE 802.11 protocol, it still exhibits the same exponential backoff mechanism which is a key factor for the performance of TCP in a wireless network. Moreover, another reason to study the Aloha protocol is that the protocol and its variants gain popularity as they are used in many of today's wireless networks. Using the analytical model for the TCP window size evolution, we try to increase the TCP throughput between two nodes in a single cell network. We want to achieve this by implicitly informing the TCP sender of the network conditions. We impose this additional constraint so we can achieve compatibility between the standard TCP and the optimized version. This allows the operation of both protocol stacks in the same network. We pose the optimization problem as an optimal stopping problem. For each packet transmitted by the TCP sender to the network, an optimal time instance has to be computed in the absence of an acknowledgment for this packet. This time instance indicates when a timeout has to be declared for the packet. In the absence of an acknowledgment, if the sender waits long for declaring a timeout, the network is underutilized. If the sender declares a timeout soon, it minimizes the transmission rate. Because of the analytical intractability of the optimal stopping time problem, we follow a Markov chain approximation method to solve the problem numerically.
  • Thumbnail Image
    Item
    Cross-Layer Resource Allocation Protocols for Multimedia CDMA Networks
    (2004-11-11) Kwasinski, Andres; Farvardin, Nariman; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    The design of mechanisms to efficiently allow many users to maintain simultaneous communications while sharing the same transmission medium is a crucial step during a wireless network design. The resource allocation process needs to meet numerous requirements that are sometimes conflicting, such as high efficiency, network utilization and flexibility and good communication quality. Due to limited resources, wireless cellular networks are normally seen as having some limit on the network capacity, in terms of the maximum number of calls that may be supported. Being able to dynamically extend network operation beyond the set limit at the cost of a smooth and small increase in distortion is a valuable and useful idea because it provides the means to flexibly adjust the network to situations where it is more important to service a call rather than to guarantee the best quality. In this thesis we study designs for resource allocation in CDMA networks carrying conversational-type calls. The designs are based on a cross-layer approach where the source encoder, the channel encoder and, in some cases, the processing gains are adapted. The primary focus of the study is on optimally multiplexing multimedia sources. Therefore, we study optimal resource allocation to resolve interference-generated congestion for an arbitrary set of real-time variable-rate source encoders in a multimedia CDMA network. Importantly, we show that the problem could be viewed as the one of statistical multiplexing in source-adapted multimedia CDMA. We present analysis and optimal solutions for different system setups. The result is a flexible system that sets an efficient tradeoff between end-to-end distortion and number of users. Because in the presented cross-layer designs channel-induced errors are kept at a subjectively acceptable level, the proposed designs are able to outperform equivalent CDMA systems where capacity is increased in the traditional way, by allowing a reduction in SINR. An important application and part of this study, is the use of the proposed designs to extend operation of the CDMA network beyond a defined congestion operating point. Also, the general framework for statistical multiplexing in CDMA is used to study some issues in integrated real-time/data networks.
  • Thumbnail Image
    Item
    Design considerations in wireless sensor networks
    (2004-08-02) Borbash, Steven A.; Ephremides, Anthony; Electrical Engineering; Digital Repository at the University of Maryland; University of Maryland (College Park, Md.)
    We consider three problems in the design of wireless sensor networks: cross-layer optimization, neighbor discovery, and scheduling as a method of medium access control (MAC). Cross-layer optimization will be important for sensor networks, which typically have only one or two objectives to meet. We consider a sensor network which performs decentralized detection. We devise a method in which local observations by sensors are condensed into a single bit message and forwarded to a sink node which makes a final decision. The method involves unusual interactions between the application, the routing function, and the physical layer. Neighbor discovery is useful in sensor networks whose nodes are immobile, since routing and scheduling algorithms can make good use of neighbor information. We propose an asynchronous neighbor discovery algorithm. The algorithm is probabilistic: each node obtains a list of its neighbors which is possibly incomplete. Performance is analyzed and optimal parameter settings are obtained. Scheduling deserves consideration as a MAC in sensor networks, because MACs based on contention methods waste energy in retransmissions. We state a natural centralized scheduling problem, in which link demands are to be satisfied under signal-to-interference-and-noise-ratio (SINR) constraints, and transmit powers may be varied. We show that solving this minimum length scheduling problem is at least as hard as another problem we define, MAX-SINR-MATCHING, in the sense that if there is no polynomial-time algorithm to solve the latter then there is no polynomial-time algorithm to solve the former. We give evidence that MAX-SINR-MATCHING is a difficult problem. We add several theorems on the SINR model which exploit algebraic structure. The theorems predict what sets of links could be simultaneously activated in a wireless network and depend only on the SINR requirements of the nodes and the worst propagation loss in a network. These theorems apply to all wireless networks which can be described by SINR requirements, not only to sensor networks.