Endre søk
Begrens søket
1234567 1 - 50 of 3520
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Abad Caballero, Israel Manuel
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Mikroelektronik och Informationsteknik, IMIT.
    Secure Mobile Voice over IP2003Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Voice over IP (VoIP) can be defined as the ability to make phone calls and to send faxes (i.e., to do everything we can do today with the Public Switched Telephone Network, PSTN) over IP−based data networks with a suitable quality of service and potentially a superior cost/benefit ratio. There is a desire to provide (VoIP) with the suitable security without effecting the performance of this technology. This becomes even more important when VoIP utilizes wireless technologies as the data networks (such as Wireless Local Area Networks, WLAN), given the bandwidth and other constraints of wireless environments, and the data processing costs of the security mechanisms. As for many other (secure) applications, we should consider the security in Mobile VoIP as a chain, where every link, from the secure establishment to the secure termination of a call, must be secure in order to maintain the security of the entire process.

    This document presents a solution to these issues, providing a secure model for Mobile VoIP that minimizes the processing costs and the bandwidth consumption. This is mainly achieved by making use of high− throughput, low packet expansion security protocols (such as the Secure Real−Time Protocol, SRTP); and high−speed encryption algorithms (such as the Advanced Encryption Standard, AES).

    In the thesis I describe in detail the problem and its alternative solutions. I also describe in detail the selected solution and the protocols and mechanisms this solution utilizes, such as the Transport Layer Security (TLS) for securing the Session Initiation Protocol (SIP), the Real−Time Protocol (RTP) profile Secure Real−Time Protocol (SRTP) for securing the media data transport , and the Multimedia Internet KEYing (MIKEY) as the key−management protocol. Moreover, an implementation of SRTP, called MINIsrtp, is also provided. The oral presentation will provide an overview of these topics, with an in depth examination of those parts which were the most significant or unexpectedly difficult.

    Regarding my implementation, evaluation, and testing of the model, this project in mainly focused on the security for the media stream (SRTP). However, thorough theoretical work has also been performed and will be presented, which includes other aspects, such as the establishment and termination of the call (using SIP) and the key−management protocol (MIKEY).

  • 2.
    Abad Camarero, Daniel
    KTH, Skolan för elektro- och systemteknik (EES), Kommunikationsnät.
    Performance analysis of IPv4 / IPv6 protocols over the third generation mobile network2014Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Currently, the IPv4 protocol is heavily used by institutions, companies and individuals, but every day there is a higher number of devices connected to the network such as home appliances, mobile phones or tablets. Each machine or device needs to have its own IP address to communicate with other machines connected to Internet. This implies the need for multiple IP addresses for a single user and the current protocol begins to show some deficiencies due to IPv4 address space exhaustion. Therefore, for several years experts have been working on an IP protocol update: the IPv6 128-bit version can address up to about 340 quadrillion system devices concurrently. With IPv6, today, every person on the planet could have millions of devices simultaneously connected to the Internet.

    The choice of the IP protocol version affects the performance of the UMTS mobile network and the browsers as well. The aim of the project is to measure how the IPv6 protocol performs compared to the previous IPv4 protocol. It is expected that the IPv6 protocol generates a smaller amount of signalling and less time is required to fully load a web page. We have analysed some KPIs (IP data, signalling, web load time and battery) in lab environment using Smartphones, to observe the behaviour of both, the network and the device.  The main conclusion of the thesis is that IPv6 really behaves as expected and generates savings in signalling, although the IP data generated is larger due to the size of the headers. However, there is still much work as only the most important webpages and the applications with a high level of market penetration operate well over the IPv6 protocol.

  • 3. Abbasi, A. G.
    et al.
    Muftic, Sead
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
    Schmölzer, Gernot
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
    A model and design of a security provider for Java applications2009Inngår i: International Conference for Internet Technology and Secured Transactions, ICITST 2009, 2009, s. 5402592-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties extensibility, flexibility, abstraction, and compatibility of the Java Security Provider.

  • 4. Abbasi, A. G.
    et al.
    Muftic, Sead
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
    Schmölzer, Gernot
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster (Stängd 20120101), Kommunikationssystem, CoS (stängd 2012-01-01).
    CryptoNET: A model of generic security provider2010Inngår i: International Journal of Internet Technology and Secured Transactions, ISSN 1748-569X, E-ISSN 1748-5703, Vol. 2, nr 3-4, s. 321-335Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The model and design of a generic security provider provides a comprehensive set of security services, mechanisms, encapsulation methods, and security protocols for Java applications. The model is structured in four layers; each layer provides services to the upper layer and the top layer provide services to applications. The services reflect security requirements derived from a wide range of applications; from small desktop applications to large distributed enterprise environments. Based on the abstract model, this paper describes design and implementation of an instance of the provider comprising various generic security modules: symmetric key cryptography, asymmetric key cryptography, hashing, encapsulation, certificates management, creation and verification of signatures, and various network security protocols. This paper also describes the properties for extensibility, flexibility, abstraction, and compatibility of the Java security provider.

  • 5.
    Abdul Aziz Hasan Ali, Aamir
    et al.
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska högskolan.
    Shahzad, Muhammad Adil
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska högskolan.
    A Joint Subcarrier/Power allocation Scheme for OFDMA-based Cellular Networks2012Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    The assignment of this master thesis consists of initiating power, subcarrier allocation in a dynamic FFR based scheme designed for multi-cell OFDMA networks and to enhance the throughput of all center users in bandwidth hungry borrower cells (overloaded cells) which was previously degraded by original FFR3 scheme as a result of partitioning of system bandwidth into center and edge bands respectively. The method uses band borrowing to compensate center user’s throughput loss in a semi and fully overloaded system. The scheme uses dynamic programming method (0/1 knapsack problem) to bargain an edge band on various power levels and tends to check the best combination (power and sub-carrier) which the system can utilize while still maintaining acceptable throughput loss for the users at the edge of the neighboring cell (lender cell).

    The algorithm consists of generating a borrowing request to neighboring cells for utilizing their edge bands by the overloaded borrower cell if their average center user throughput reaches below a minimum threshold value set in the system. The borrowing method uses 0/1 knapsack problem to capture an edge band based on limiting factors of total cost in average throughput losses by neighbors (Ci) and Un (tolerable mean user edge user throughput loss by lending cell). While solving knapsack problem the lender (neighbors) will check Ci and Un before granting the right to use its edge band. The later stage requires reducing subcarrier power level in order to utilize the lenders edge band using "soft borrower" mode. The borrowed sub-carriers will be activated take power from the original center band sub-carriers of the overloaded cell by taking into account the interference between the lender and the borrower. In case of negative (0) reply from the lender cell after the first request, multiple requests are generated at reduce power level at every step to order to acquire more bands. If a neighbor has band borrowing requests from multiple overloaded base stations, the band will be granted to the one which gives minimal loss in terms of throughput to the lender cell.

    The simulation results are analyzed w.r.t reuse-1 and FFR3 scheme of a multi cell regular and irregular scenarios comprising of lightly to heavily overloaded cells with various subcarrier allocation patterns. An overhead and time assessment is also presented between borrower and lender cells. Simulation results show an increase of 60% in center user’s throughput w.r.t original FFR3 scheme with an acceptable loss of 18% at the edges in complex overloaded scenarios while the overall system throughout increases by 35%.

  • 6. Abedifar, V.
    et al.
    Furdek, Marija
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Muhammad, Ajmal
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Eshghi, M.
    Wosinska, Lena
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Routing, modulation format, spectrum and core allocation in SDM networks based on programmable filterless nodes2018Inngår i: Optics InfoBase Conference Papers, Optics Info Base, Optical Society of America, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    An RMSCA approach based on binary particle swarm optimization is proposed for programmable filterless SDM networks, aimed at minimizing core and spectrum usage. Nearoptimal resource consumption.

  • 7. Abedifar, Vahid
    et al.
    Furdek, Marija
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Muhammad, Ajmal
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Eshghi, Mohammad
    Wosinska, Lena
    KTH, Skolan för elektroteknik och datavetenskap (EECS).
    Routing, Modulation and Spectrum Assignment in Programmable Networks based on Optical White Boxes2018Inngår i: Journal of Optical Communications and Networking, ISSN 1943-0620, E-ISSN 1943-0639, Vol. 10, nr 9, s. 723-735Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Elastic optical networks (EONs) can help overcome the flexibility challenges imposed by emerging heterogeneous and bandwidth-intensive applications. Among the different solutions for flexible optical nodes, optical white box switches implemented by architecture on demand (AoD) have the capability to dynamically adapt their architecture and module configuration to the switching and processing requirements of the network traffic. Such adaptability allows for unprecedented flexibility in balancing the number of required nodal components in the network, spectral resource usage, and length of the established paths. To investigate these trade-offs and achieve cost-efficient network operation, we formulate the routing, modulation, and spectrum assignment (RMSA) problem in AoD-based EONs and propose three RMSA strategies aimed at optimizing a particular combination of these performance indicators. The strategies rely on a newly proposed internal node configuration matrix that models the structure of optical white box nodes in the network, thus facilitating hardware-aware routing of connection demands. The proposed strategies are evaluated in terms of the number of required modules and the related cost, spectral resource usage, and average path length. Extensive simulation results show that the proposed RMSA strategies can achieve remarkable cost savings by requiring fewer switching modules than the benchmarking approaches, at a favorable trade-off with spectrum usage and path length.

  • 8.
    Abrahamsson, Henrik
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS.
    Ben Abdesslem, Fehmi
    RISE - Research Institutes of Sweden, ICT, SICS.
    Ahlgren, Bengt
    RISE - Research Institutes of Sweden, ICT, SICS.
    Björkman, Mats
    Mälardalen University; Sweden.
    Brunstrom, Anna
    Karlstad University, Sweden.
    Marsh, Ian
    RISE - Research Institutes of Sweden, ICT, SICS.
    Selecting Operator in 3G/4G Networks for Time-Critical C-ITS Applications2018Konferansepaper (Fagfellevurdert)
  • 9.
    Abrahamsson, Henrik
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS.
    Ben Abdesslem, Fehmi
    RISE - Research Institutes of Sweden, ICT, SICS.
    Ahlgren, Bengt
    RISE - Research Institutes of Sweden, ICT, SICS.
    Brunstrom, Anna
    Karlstad University, Sweden.
    Marsh, Ian
    RISE - Research Institutes of Sweden, ICT, SICS.
    Björkman, Mats
    Mälardalen University, Sweden.
    Connected Vehicles in Cellular Networks: Multi-access versus Single-access Performance2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Connected vehicles can make roads traffic safer andmore efficient, but require the mobile networks to handle timecriticalapplications. Using the MONROE mobile broadbandmeasurement testbed we conduct a multi-access measurementstudy on buses. The objective is to understand what networkperformance connected vehicles can expect in today’s mobilenetworks, in terms of transaction times and availability. The goalis also to understand to what extent access to several operatorsin parallel can improve communication performance.In our measurement experiments we repeatedly transfer warningmessages from moving buses to a stationary server. Wetriplicate the messages and always perform three transactionsin parallel over three different cellular operators. This creates adataset with which we can compare the operators in an objectiveway and with which we can study the potential for multi-access.In this paper we use the triple-access dataset to evaluate singleaccessselection strategies, where one operator is chosen for eachtransaction. We show that if we have access to three operatorsand for each transaction choose the operator with best accesstechnology and best signal quality then we can significantlyimprove availability and transaction times compared to theindividual operators. The median transaction time improves with6% compared to the best single operator and with 61% comparedto the worst single operator. The 90-percentile transaction timeimproves with 23% compared to the best single operator andwith 65% compared to the worst single operator.

  • 10.
    Abramson, Norman
    et al.
    Department of Electrical Engineering, University of Hawaii, USA.
    Sacchi, Claudio
    Information Engineering and Computer Science Department, University of Trento, Italy.
    Bellalta, Boris
    Department of Information and Communication Technologies, Universitat Pompeu Fabra, Spain.
    Vinel, Alexey
    Saint-Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Russia.
    Multiple access communications in future-generation wireless networks2012Inngår i: EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, E-ISSN 1687-1499, s. Art nr 45-Artikkel i tidsskrift (Fagfellevurdert)
  • 11. Abrardo, A
    et al.
    Fodor, Gabor
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik.
    Tola, B.
    Network coding schemes for Device-To-Device communications based relaying for cellular coverage extension2015Inngår i: IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015, s. 670-674Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, we study the performance of device-To-device (D2D) based range extension in terms of sum rate and power efficiency when a relaying user equipment (UE) helps to improve the coverage for cell-edge UEs. In our design, the relaying UE has own traffic to transmit and receive to/from the cellular base station (BS) and can operate either in amplify-And-forward (AF) or decode-And-forward (DF) modes and can make use of either digital or analogue (PHY layer) network coding. In this rather general setting, we propose mode selection, resource allocation and power control schemes and study their performance by means of system simulations. We find that the performance of the DF scheme with network coding is superior both to the traditional cellular and the AF based relaying schemes, including AF with two-slot or three-slot PHY layer network coding.

  • 12.
    Abrardo, Andrea
    et al.
    University of Siena, Italy.
    Fodor, Gabor
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik. Ericsson Research, Stockholm.
    Tola, Besmir
    University of Siena, Italy.
    Network Coding Schemes for Device-to-Device Communications Based Relaying for Cellular Coverage Extension2015Rapport (Annet vitenskapelig)
    Abstract [en]

    Although network assisted device-to-device (D2D) communications is known to improve the spectraland energy efficiency of proximal communications, its performance is less understood when employedto extend the coverage of cellular networks.In this paper, we study the performance of D2D basedrange extension in terms of sum rate and power efficiency when a relaying user equipment (UE) helps to improvethe coverage for cell-edge UEs.In our design, the relaying UE has own traffic to transmit and receive to/from the cellular base station (BS) andcan operate either in amplify-and-forward (AF) or decode-and-forward (DF) modes and can make use of either digital oranalogue (PHY layer) network coding.In this rather general setting, we propose mode selection, resource allocation and power control schemesand study their performance by means of system simulations.We find that the performance of the DF scheme with network coding is superior both to the traditional cellularand the AF based relaying schemes, including AF with two-slot or three-slot PHY layer network coding.

  • 13.
    Abusubaih, Murad
    et al.
    Technische Universit¨at Berlin.
    Gross, James
    Technische Universit¨at Berlin.
    Wolisz, Adam
    Technische Universit¨at Berlin.
    An Inter-Access Point Coordination Protocol for Dynamic Channel Selection in IEEE802.11 Wireless LANs2007Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper presents and evaluates an Inter-Access Point Coordination protocol for dynamic channel selection in IEEE 802.11 WLANs. It addresses an open issue for the implementation of many distributed and centralized dynamic channel selection policies proposed to mitigate interference problems in Wireless LANs (WLANs). The presented protocol provides services to a wide range of policies that require different levels of coordination among APs by enabling them to actively communicate and exchange information. An Intra-Cell protocol that enables interaction between the AP and its accommodated stations to handle channel switching within the same cell is also presented.

  • 14.
    Achilleos, Achilleas
    et al.
    Frederick University, Cyprus.
    Mettouris, Christos
    University of Cyprus, Cyprus.
    Yeratziotis, Alexandros
    University of Cyprus, Cyprus.
    Papadopoulos, George
    University of Cyprus, Cyprus.
    Pllana, Sabri
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för datavetenskap och medieteknik (DM).
    Huber, Florian
    SYNYO GmbH, Austria.
    Jäger, Bernhard
    SYNYO GmbH, Austria.
    Leitner, Peter
    SYNYO GmbH, Austria.
    Ocsovszky, Zsófia
    BioTalentum Ltd, Hungary.
    Dinnyés, András
    BioTalentum Ltd, Hungary.
    SciChallenge: A Social Media Aware Platform for Contest-Based STEM Education and Motivation of Young Students2018Inngår i: IEEE Transactions on Learning Technologies, ISSN 1939-1382, E-ISSN 1939-1382Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Scientific and technological innovations have become increasingly important as we face the benefits and challenges of both globalization and a knowledge-based economy. Still, enrolment rates in STEM degrees are low in many European countries and consequently there is a lack of adequately educated workforce in industries. We believe that this can be mainly attributed to pedagogical issues, such as the lack of engaging hands-on activities utilized for science and math education in middle and high schools. In this paper, we report our work in the SciChallenge European project, which aims at increasing the interest of pre-university students in STEM disciplines, through its distinguishing feature, the systematic use of social media for providing and evaluation of the student-generated content. A social media-aware contest and platform were thus developed and tested in a pan-European contest that attracted >700 participants. The statistical analysis and results revealed that the platform and contest positively influenced participants STEM learning and motivation, while only the gender factor for the younger study group appeared to affect the outcomes (confidence level – p<.05).

  • 15.
    Adigozalov, Niyaz
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    The Intelligent Use of Multiple Interfaces: Using multiplexing to reduce the overhead for small packets2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Long-Term Evolution (LTE) is the latest development in wide area cellular mobile network technology. In contrast with the earlier generations of circuit-switched mobile networks, LTE is all-IP packet-switched network. Both voice and data are sent inside IP packets. Voice over IP (VoIP) is used to provide voice service to LTE users. The speech frames are encapsulated into real-time protocol (RTP) packets and sent over the network. The underlying UDP and IP layers prepend their headers to this small RTP packet resulting in a relatively high overhead. The small size of the RTP packets containing voice/audio leads to an overhead problem as the protocol overhead is in addition to the large LTE frame overhead, thus wasting network resources. This master’s thesis project proposes to multiplex RTP and data packets at the user’s device as a solution to reduce the overhead. Moreover, the capability of modern user devices to switch between several interfaces (such as LTE and WLAN), is taken into account and the multiplexing of multiple traffic flows or a single traffic flow are studied in the case of a vertical handover. Performance and cost metrics are used to evaluate different potential demultiplexing points, and then the best possible demultiplexing point is identified. The results of this evaluation show that several demultiplexing points can be used based on the operator’s needs. The increased packet payload size increases the energy efficiency of LTE and may avoid the need of the UE to switch to WLAN to save power. In addition, to ensure high quality of service for VoIP traffic, the simultaneous use of multiple interfaces is efficient if the multiplexer is enabled. The multiplexing solution proposed by this thesis is also fully compatible with any virtual private network encapsulation protocol.

  • 16.
    af Sandeberg, Joakim
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Graphical system visualization and flow display: A visual representation of an authentication, authorization, and accounting backend2016Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Displaying the architecture of a software system is not a simple task. Showing all of the available information will unnecessarily complicate the view, while showing too little might render the view unhelpful. Furthermore, showing the dynamics of the operation of such a system is even more challenging.

    This thesis project describes the development of a graphical tool that can both display the configuration of an advanced authentication, authorization, and accounting (AAA) system and the messages passed between nodes in the system.  The solution described uses force-based graph layouts coupled with adaptive filters as well as vector-based rendering to deliver a view of the status of the system. Force-based layout spreads out the nodes in an adaptive fashion. The adaptive filters starts by showing what is most often the most relevant information, but can be configured by the user. Finally, the vector based rendering offers unlimited zoom into the individual nodes in the graph in order to display additional detailed information.

    Unified Modeling Language (UML) sequence charts are used to display the message flow inside the system (both between nodes and inside individual nodes).

    To validate the results of this thesis project each iteration of the design was evaluated through meetings with the staff at Aptilo Networks. These meetings provided feedback on the direction the project was taking as well as provided input (such as ideas for features to implement).

    The result of this thesis project shows a way to display the status of an AAA system with multiple properties displayed at the same time. It combines this with a view of the flow of messages and application of policies in the network via a dynamically generated UML sequence diagram. As a result human operators are able to see both the system’s architecture and the dynamics of its operation using the same user interface. This integrated view should enable more effective management of the AAA system and facilitate responding to problems and attacks.

  • 17.
    Af Ugglas, Mikael
    KTH, Tidigare Institutioner, Teleinformatik.
    Accounting Management on a DTM Network1999Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Large investments are currently being made for the infrastructure of voice and data services. The network providers’ revenues consist of fees from the users of the network. Until today it has been difficult to charge for the actual usage, instead so-called flat rate charging has been applied.

    Dynamic synchronous Transfer Mode (DTM) is a circuit switched technique that is designed to meet the requirements of future multimedia services. This includes support for real time applications and high throughput. Physically separated channels, whose capacity can easily be adjusted to the users’ demands, provide the service. The channels and their guaranteed service make DTM a very interesting technique when it comes to charging for network usage, as the characteristics of the channel can be easily described by relatively few parameters.

    This thesis describes how accounting management can be applied on a DTM network. It identifies the parameters that need to be collected and describes how to gather these parameters into call data records (CDRs). Furthermore, it outlines how the transportation of the CDRs to the network providers’ billing system can be performed.

  • 18.
    Aguilar, Antonio
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    A Patient Identification System using RFID and IEEE 802.11b Wireless Networks2007Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    The recent increased focus on patient safety in hospitals has yielded a flood of new technologies and tools seeking to improve the quality of patient care at the point of care. Hospitals are complex institutions by nature, and are constantly challenged to improve the quality of healthcare delivered to patients while trying to reduce the rate of medical errors and improve patient safety. Here a simple mistake such as patient misidentification, specimen misidentification, wrong medication, or wrong blood transfusion can cause the loss of a patient’s life. Misidentification of patients is a common problem that many hospitals face on the daily basis. Patient misidentification is one of the leading causes of medical errors and medical malpractice in hospitals and it has been recognised as a serious risk to patient safety.

    Recent studies have shown that an increasing number of medical errors are primarily caused by adverse drug events which are caused directly or indirectly by incorrect patient identification. In recognition of the increasing threat to patient safety, it is important for hospitals to prevent these medical errors from happening by adopting a suitable patient identification system that can improve upon current safety procedures.

    The focus of this master’s thesis is the design, implementation, and evaluation of a handheld-based patient identification system that uses radio frequency identification (RFID) and IEEE 802.11b wireless local area networks to identify patients. In this solution, each patient is given a RFID wristband which contains demographic information (patient ID number, ward number, hospital code, etc.) of the patient. A handheld device equipped with IEEE 802.11b wireless local area network connectivity and a RFID reader is then used by the medical staff to read the patient’s wristband, identify the patient, and access the relevant records of this patient.

    This work was carried out at the Department of Medical Physics and Bioengineering at the University College Hospital Galway (UCHG), Ireland and the National University of Ireland, Galway.

  • 19.
    Aguilar, Antonio
    et al.
    Digital Enterprise Research Institute, National University of Ireland, Galway, Ireland.
    van der Putten, Wil
    Department of Medical Physics, University College Hospital Galway, Galway, Ireland .
    Maguire Jr., Gerald Q.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Positive Patient Identification using RFID and Wireless  Networks2006Inngår i: Proceedings of the HISI 11th Annual Conference and Scientific Symposium, Dublin, Ireland, Dublin, Ireland, 2006Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The increased focus on patient safety in hospitals has yielded a flood of new technologies and tools seeking to improve the quality of patient care at the point-of-care. Hospitals are complex institutions by nature, and are constantly challenged to improve the quality of healthcare delivered to patients while trying to reduce the rate of medical errors and improve patient safety. Here a simple mistake such as patient misidentification, specimen misidentification, wrong medication, or wrong blood transfusion can cause the loss of a patient's life. The focus of this paper is the implementation and evaluation of a handheld-based patient identification system that uses radio frequency identification (RFID) and 802.11b wireless networks to identify patients. In this approach, each patient is given a RFID wristband which contains demographic information (patient ID number, patient summary, hospital code) of the patient. A handheld device equipped with 802.11b wireless connectivity and a RFID reader is then used by the medical staff to read the patient's wristband and identify the patient. This work was carried out at the Department of Medical Physics and Bioengineering at the University College Hospital Galway, Ireland and in co-operation with the National University of Ireland, Galway.

  • 20.
    Ahgren, Per
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi.
    Jakobsson, Andreas
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi.
    A study of doubletalk detection performance in the presence of acoustic echo path changes2006Inngår i: IEEE transactions on consumer electronics, ISSN 0098-3063, E-ISSN 1558-4127, Vol. 52, nr 2, s. 515-522Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    An efficient and well-performing double-talk detection (DTD) algorithm is a vital part of a practically working acoustic echo canceller. However, recent algorithms are typically evaluated using a static time-invariant room acoustic impulse response, omitting a proper treatment of the case when the acoustic path is changing. In this work, we introduce a common framework to objectively evaluate how path changes affect the DTD performance. Via extensive numerical simulations, we conclude that the main factor in acoustic path changes affecting the DTD performance for some of the more common DTD algorithms is variations in the damping of the acoustic path.

  • 21. Ahlgren, Bengt
    et al.
    Hidell, Markus
    Ngai, Edith C.-H.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Internet of Things for smart cities: Interoperability and open data2016Inngår i: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, Vol. 20, nr 6, s. 52-56Artikkel i tidsskrift (Fagfellevurdert)
  • 22.
    Ahlin, Lars
    et al.
    FOI.
    Zander, Jens
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Ben Slimane, Slimane
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Principles of Wireless Communications2006Bok (Fagfellevurdert)
    Abstract [en]

    This textbook provides the reader with a basic understanding of the design and analysis of wireless and mobile communication systems. It deals with the most important techniques, models and tools used today in the design of mobile wireless links and gives an introduction to the design of wireless networks. Topics covered include: fundamentals of radio propagation and antennas; transmission schemes, including modulation, coding and equalising schemes for broadband wireless communications; diversity systems; wireless data transmission; introduction to Wireless Network design and resource management. The fundamentals are illustrated by examples from state-of-the-art technologies such as OFDM, WCDMA, WLANs and others. The book contains a significant number of worked examples and more than 160 problems with answers. It is intended for use in a first graduate course in wireless communications and the reader should be familiar with the fundamentals of probability and communication theory.

  • 23.
    Ahmad, Aftab
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för fysik och elektroteknik (IFE).
    Performance of MLSE over Fading Channels2013Independent thesis Advanced level (degree of Master (Two Years)), 80 poäng / 120 hpOppgave
    Abstract [en]

    This work examines the performance of a wireless transceiver system. The environment is indoor channelsimulated by Rayleigh and Rician fading channels. The modulation scheme implemented is GMSK inthe transmitter. In the receiver the Viterbi MLSE is implemented to cancel noise and interference dueto the ltering and the channel. The BER against the SNR is analyzed in this thesis. The waterfallcurves are compared for two data rates of 1 M bps and 2 Mbps over both the Rayleigh and Rician fadingchannels.

  • 24.
    Ahmad, Ashfaq
    et al.
    Univ Engn & Technol, ACTSENA Res Grp, Taxila 47050, Pakistan..
    Arshad, Farzana
    Univ Engn & Technol, ACTSENA Res Grp, Taxila 47050, Pakistan..
    Naqvi, Syeda I.
    Univ Engn & Technol, ACTSENA Res Grp, Taxila 47050, Pakistan..
    Amin, Yasar
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. Univ Engn & Technol, ACTSENA Res Grp, Taxila 47050, Pakistan.
    Tenhunen, Hannu
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. Univ Turku, Dept Informat Technol, TUCS, FIN-20520 Turku, Finland..
    Design, Fabrication, and Measurements of Extended L-Shaped Multiband Antenna for Wireless Applications2018Inngår i: Applied Computational Electromagnetics Society Journal, ISSN 1054-4887, Vol. 33, nr 4, s. 388-393Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article expounds a multi-band compact shaped antenna, which is based on CPW ground plane. FR-4 with a thickness of 1.6 mm is used as a substrate for the proposed antenna. The proposed antenna is capable of operating at 1.56 GHz for (Global Positioning System), 2.45 GHz (Wireless Local Area Network) and 4.49 GHz (Aeronautical Mobile Telemetry (AMT) fixed services). The efficiency at 1.56, 2.45, and 4.49 GHz is 79.7, 76.9 and 76.7%, respectively. The VSWR of the presented antenna is less than 1.5 at all the desired resonance modes, which confirms its good impedance matching. The performance of the proposed antenna is evaluated in terms of VSWR, return loss, radiation pattern and efficiency. CST (R) MWS (R) software is used for simulations. In order to validate the simulation results, a prototype of the designed antenna is fabricated and a good agreement is found between the simulated and measured results.

  • 25.
    Ahmad, Ijaz
    et al.
    University of Oulu, Finland.
    Kumar, Tanesh
    University of Oulu, Finland.
    Liyanage, Madhusanka
    University of Oulu, Finland.
    Okwuibe, Jude
    University of Oulu, Finland.
    Ylianttila, Mika
    University of Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    5G Security: Analysis of Threats and Solutions2017Inngår i: 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE , 2017, s. 193-199Konferansepaper (Fagfellevurdert)
    Abstract [en]

    5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing security challenges in these technologies besides the growing concerns for user privacy. In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G. Furthermore, we present security solutions to these challenges and future directions for secure 5G systems.

  • 26.
    Ahmad, Ijaz
    et al.
    Univ Oulu, Finland.
    Liyanage, Madhusanka
    Univ Oulu, Finland.
    Ylianttila, Mika
    Univ Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Analysis of Deployment Challenges of Host Identity Protocol2017Inngår i: 2017 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), IEEE , 2017Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited deployment and highlight the challenges faced by HIP for its commercial use. We propose technological development and outline deployment strategies for the wide use of HIP. Furthermore, this paper investigates the use of HIP in Software Defined Networks (SDN) to evaluate its performance in new disruptive networking technologies. In a nutshell, this paper presents revealing challenges for the deployment of innovative networking protocols and a way ahead for successful and large scale deployment.

  • 27.
    Ahmad, Shabir
    et al.
    Jeju National University, Jeju, South Korea.
    Hussain, Ishfaq
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Fayaz, Muhammad
    Jeju National University, Jeju, South Korea.
    Kim, Do-Hyeun
    Jeju National University, Jeju, South Korea.
    A Distributed Approach towards Improved Dissemination Protocol for Smooth Handover in MediaSense IoT Platform2018Inngår i: Processes, ISSN 2227-9717, E-ISSN 1099-5862, Vol. 6, nr 5, artikkel-id 46Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Recently, the Internet has been utilized by many applications to convey time-sensitive messages. The persistently expanding Internet coverage and its easy accessibility have offered to ascend to a problem which was once regarded as not essential to contemplate. Nowadays, the Internet has been utilized by many applications to convey time-sensitive messages. Wireless access points have widely been used but these access points have limitations regarding area coverage. So for covering a wider space, various access points need to be introduced. Therefore, when the user moves to some other place, the devices expected to switch between access points. Packet loss amid the handovers is a trivial issue. MediaSense is an Internet of Things distributed architecture enabling the development of the IoT application faster. It deals with this trivial handover issue by utilizing a protocol called Distributed Context eXchange Protocol. However, this protocol is centralized in nature and also suffers in a scenario when both sender and receiver address change simultaneously. This paper presents a mechanism to deal with this scenario and presents a distributed solution to deal with this issue within the MediaSense platform. The proposed protocol improves dissemination using retransmission mechanism to diminish packet loss. The proposed protocol has been delineated with a proof of concept chat application and the outcomes have indicated a significant improvement in terms of packet loss.

  • 28.
    Ahmadi Mehri, Vida
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    An Investigation of CPU utilization relationship between host and guests in a Cloud infrastructure2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Cloud computing stands as a revolution in IT world in recent years. This technology facilitates resource sharing by reducing hardware costs for business users and promises energy efficiency and better resource utilization to the service providers. CPU utilization is a key metric considered in resource management across clouds.

    The main goal of this thesis study is directed towards investigating CPU utilization behavior with regard to host and guest, which would help us in understanding the relationship between them. It is expected that perception of these relationships would be helpful in resource management.

    Working towards our goal, the methodology we adopted is experi- mental research. This involves experimental modeling, measurements and observations from the results. The experimental setup covers sev- eral complex scenarios including cloud and a standalone virtualization system. The results are further analyzed for a visual correlation.

    Results show that CPU utilization in cloud and virtualization sce- nario coincides. More experimental scenarios are designed based on the first observations. The obtaining results show the irregular behav- ior between PM and VM in variable workload.

    CPU utilization retrieved from both cloud and a standalone system is similar. 100% workload situations showed that CPU utilization is constant with no correlation co-efficient obtained. Lower workloads showed (more/less) correlation in most of the cases in our correlation analysis. It is expected that more number of iterations can possibly vary the output. Further analysis of these relationships for proper resource management techniques will be considered. 

  • 29.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Markendahl, Jan
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Impact of the flexible spectrum aggregation schemes on the cost of future mobile network2015Inngår i: 2015 22nd International Conference on Telecommunications, ICT 2015, IEEE conference proceedings, 2015, s. 96-101Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Nowadays the spectrum regulations landscape is changing towards more flexible spectrum management schemes, such trends are expected to make additional spectrum resources available and lowers the spectrum access hurdles. In this paper, different spectrum aggregation scenarios have been compared focusing on the tradeoff between the total cost of ownership and the targeted QoS under different market conditions. The main finding in this study thereof indicates that the addition of more spectrum resources will lead to an overall reduction in the total cost of ownership (TCO) as long as the spectrum price remains small compared to the cost of the network infrastructure. Moreover, schemes such as LSA and secondary access will enable operators who have insufficient licensed spectrum resource to expand their mobile network infrastructure especially in hotspots with high subscribers demand in a cost-effective way. In this regard, the harmonization of spectrum use for LSA and TVWS across multiple countries stands as a key requirement for the reduction of the production cost of equipment and hence, the creation of an economy of scale considering both of the network equipment (i.e. radio base station) and end-subscriber devices. © 2015 IEEE.

  • 30.
    Ahmed, Atheeq
    Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem.
    Human Detection Using Ultra Wideband Radar and Continuous Wave Radar2017Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    A radar works by radiating electromagnetic energy and detecting the reflected signal returned from the target. The nature of the reflected signal provides information about the target’s distance or speed. In this thesis, we will be using a UWB radar and a CW radar to help detect the presence and rough location of trapped survivors by detecting their motions. Range is estimated in the UWB radar using clutter removal with SVD and for the dual frequency CW Radar using STFT and median filtering. The effect of the algorithm parameters on their performance was analyzed. The performance of the implemented algorithms with regards to small motion detection, distance estimation and penetration capability was analyzed. Both systems are certainly capable of human detection and tracking.

  • 31.
    Ahmed, Jawwad
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Dynamic Resource Provisioning and Survivability Strategies in Optical Networks2013Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Optical networks based on Wavelength Division Multiplexing (WDM) technology show many clear benefits in terms of high capacity, flexibility and low power consumption. All these benefits make WDM networks the preferred choice for today’s and future transports solutions which are strongly driven by a plethora of emerging online services.

    In such a scenario, capability to provide high capacity during the service provisioning phase is of course very important, but it is not the only requirement that plays a central role. Traffic dynamicity is another essential aspect to consider because in many scenarios, e.g., in the case of real time multimedia services, the connections are expected to be provisioned and torn down quickly and relatively frequently. High traffic dynamicity may put a strain on the network control and management operations (i.e., the overhead due to control message exchange can grow rapidly) that coordinate any provisioning mechanisms. Furthermore, survivability, in the presence of new failure scenarios that goes beyond the single failure assumption, is still of the utmost importance to minimize the network disruptions and data losses. In other words, protection against any possible future failure scenario where multiple faults may struck simultaneously, asks for highly reliable provisioning solutions.

    The above consideration have a general validity i.e., can be equally applied to any network segment and not just limited to the core part. So, we also address the problem of service provisioning in the access paradigm. Long reach Passive Optical Networks (PONs) are gaining popularity due to their cost, reach, and bandwidth advantages in the access region. In PON, the design of an efficient bandwidth sharing mechanism between multiple subscribers in the upstream direction is crucial. In addition, Long Reach PONs (LR-PONs) introduces additional challenges in terms of packet delay and network throughput, due to their extended reach. It becomes apparent that effective solutions to the connection provisioning problem in both the core and access optical networks with respect to the considerations made above can ensure a truly optimal end-to-end connectivity while making an efficient usage of resources.

    The first part of this thesis focuses on a control and management framework specifically designed for concurrent resource optimization in WDM-based optical networks in a highly dynamic traffic scenario. The framework and the proposed provisioning strategies are specifically designed with the objective of: (i) allowing for a reduction of the blocking probability and the control overhead in a Path Computation Element (PCE)-based network architecture, (ii)  optimizing resource utilization for a traffic scenario that require services with diverse survivability requirements which are achieved by means of  dedicated and shared path-protection, and (iii) designing provisioning mechanism that guarantees high connection availability levels in Double Link Failures (DLF) scenarios. The presented results show that the proposed dynamic provisioning approach can significantly improve the network blocking performance while making an efficient use of primary/backup resources whenever protection is required by the provisioned services. Furthermore, the proposed DLF schemes show good performance in terms of minimizing disruption periods, and allowing for enhanced network robustness when specific services require high connection availability levels.

    In the second part of this thesis, we propose efficient resource provisioning strategies for LR-PON. The objective is to optimize the bandwidth allocation in LR-PONs, in particular to: (i) identify the performance limitations associated with traditional (short reach) TDM-PON based Dynamic Bandwidth Allocation (DBA) algorithms when employed in long reach scenarios, and (ii) devise efficient DBA algorithms that can mitigate the performance limitations imposed by an extended reach. Our proposed schemes show noticeable performance gains when compared with conventional DBA algorithms for short-reach PON as well as specifically devised approaches for long reach.

  • 32.
    Ahmed, Jawwad
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Cavdar, Cicek
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Monti, Paolo
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Optical Network Laboratory (ON Lab).
    Hybrid Survivability Schemes Achieving High Connection Availability With a Reduced Amount of Backup Resources2013Inngår i: Journal of Optical Communications and Networking, ISSN 1943-0620, E-ISSN 1943-0639, Vol. 5, nr 10, s. A152-A161Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Maximizing connection availability in WDM networks is critical because even small disruptions can cause huge data losses. However, there is a trade-off between the level of network survivability and the cost related to the backup resources to be provided. The 100% survivability can be achieved by dedicated path protection with multiple pre-reserved protection paths for each provisioned connection, i.e., DPP (1:N). Unfortunately, the blocking probability performance of DPP (1:N) is negatively affected by the large number of pre-reserved backup wavelengths standing-by unutilized. On the other hand, path restoration (PR)-based solutions ensure good blocking performance at the expense of lower connection availability.

    The work in this paper aims at finding hybrid network survivability strategies that combine the benefits of both techniques (i.e., high availability with low blocking rate). More specifically, the paper focuses on a double link failure scenario and proposes two strategies. The first one, couples dedicated path protection DPP (1:1) with path restoration (referred to as DPP + PR) to minimize the number of dropped connections. The second scheme adds up the concept of backup reprovisioning (BR), referred to as DPP + BR + PR, in order to further increase the connection availability achieved by DPP + PR. Integer Linear Programming (ILP) models for the implementation of the proposed schemes are formulated. Extensive performance evaluation conducted in a PCE-based WDM network scenario shows that DPP + BR + PR and DPP + PR can significantly lower the blocking probability value compared to DPP (1:2) without compromising too much in terms of connection availability.

  • 33.
    Ahmed Mohamed Ahmed, Mazz
    Högskolan i Gävle, Akademin för teknik och miljö, Avdelningen för elektronik, matematik och naturvetenskap.
    Traffic Model Based Energy Efficient Radio Access Network2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    As the concerns about global energy consumption increased the matter of energy consumption in Radio Access Networks (RANs) became an important issue especially with the exponential growth in demanded traffic. This interest of developing innovative technologies to reduce the expected energy consumption by the mobile communication sector was driven by environmental concerns and cost reduction.

    The aim of this thesis is to introduce a new methodology to make the Radio Access Network (RAN) more energy efficient based on jointly the demanded throughput and a realistic traffic profile. Furthermore, to find a metric that quantifies the relation between the Energy Efficiency (EE), Spectrum Efficiency (SE) and demanded throughput.

    The proposed methodology for reducing the energy consumption in the RAN characterizes the offered throughput in order to determine the sufficient energy needed. The manner for reducing the energy consumed by the RAN is simply by switching (OFF/ON) Base Stations (BSs) based on the demanded throughput which introduces an energy efficient RAN.

    The results show a significant reduction in the energy consumption with regard to the demanded traffic. Moreover, it gives a measure of the EE with consideration to the SE which enhances the performance evaluation from an EE point of view during the RAN planning phase.

  • 34.
    Ahmed, Zubair
    Linköpings universitet, Institutionen för systemteknik, Elektroniksystem. Linköpings universitet, Tekniska högskolan.
    Design of Autonomous Low Power Sensor for Soil Moisture Measurement.2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Drought is the most severe disaster compared to other disasters in human civilization and their impacts are serious which can cause hungur, thrist, food shortages, loss of livestock directly effects the human life. The main objective of this project is to develop an early warning system (EWS) [3] for drought indices by using wireless sensor networks (WSNs) which is the only way forward for an on-site monitoring and validation of locally defined drought indices [3].The designed wireless sensor network (WSN) consisting of a sensor unit, a master unit and a sensor power management unit (PMU). The sensor unit measures the moisture of the soil and transmitt the measured data through ZigBee module to the master unit. A real time clock (RTC) is also used in the sensor unit which records the information of second, minute, hour, day, month of day and year about when or what time the measurement taken. The master unit consisting of a SD-card and Bluetooth module. SD-card is used to store measured data from other sensor units and it is possible to take out the reading of measured data from the master unit by accessing the SD-card via Bluetooth inside the master unit to a PC or a smartphone mobile.To manage the power in the sensor unit and to make sensor alive for several years, the power management unit (PMU) manages the power level between two energy storage buffers (i.e., a supercapacitor and a Li+ ion battery) for a sensor node.

  • 35.
    Ahmid, Abdel
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    More than downloading: Toward a scale with wireless connectivity2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Sensors are light-weight, low powered devices that measure some aspect of a physical or virtual environment and transmit this information in some format. This thesis describes how to integrate a sensor onto devices to enable network connectivity.

    The phrase “internet of things” suggests that within a few years many devices will be connected to an internet. Devices, including common household appliances, will transmit and receive data over a network. The CEO of Ericsson has stated that there will be more than 50 billion connected devices by 2020[1]. These devices could be microwaves, fridges, lights, or temperature sensors. Devices that are usually not associated with internet connectivity will be integrated into networks and play a larger role in providing information and controlling other devices. Sensors will have a major role in “the internet of things”. These small computers could be integrated in any appliances and transmit data over the network. The sensors’ low power and low cost, as well as their light weight, makes them very attractive to integrate them into many devices. The goal of this thesis project is to build upon this trend toward “The internet of things” by integrating a sensor into a bathroom scale thus enabling the scale to have networking connectivity. The sensor will be low cost and simple. It should wirelessly or via USB transmit the current weight that it measures to a receiver (specifically a gateway). This gateway will forward the message over the network to a website or mobile phone for visual presentation of the data. This thesis describes different techniques and approaches toward developing this sensor. The thesis also evaluates these different choices in order to select one technique that will be implemented. This solution will be evaluated in terms of its cost and ease of integration into an existing commercially produced scale.

  • 36.
    Ahola, David
    et al.
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska högskolan.
    Yin To, Jie
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska högskolan.
    To be entered/Green Cargo2013Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Schemakonstruktion för järnvägspersonal är en stor utmaning. En orsak är att arbetsuppgifterna vid järnvägen kräver olika kunskaps- och kompetenskrav, samt att det finns många arbetsregler som utgör restriktioner för schemakonstruktionen. I detta examensarbete har en fallstudie utförts för datorstödd schemakonstruktion för personalbemanning. Examensarbetet har utförts vid avdelningen för bemanningsplanering som ansvarar för planering av personal vid två av Green Cargos olika bangårdar. Huvudsyftet med det här examensarbetet är att utreda skillnaderna i scheman som skapats manuellt respektive automatiskt med hjälp av programvaran BP. Schemajämförelserna ska också redovisa nyttan av det automatiska planeringssättet där det finns applicerat. Under arbetet genomfördes litteraturstudier samt en fallstudie. I fallstudien genomfördes testkörningar med olika schemakonstruktionsmetoder på två bangårdar. Det numeriska resultatet visar att den datorassisterade bemanningsmetoden innebär en förbättrad bemanningsplanering ur företagets synvinkel då produktionsbehovet kan täckas utan ökade kostnader. Detta innebär också en ökad flexibilitet i produktionsplaneringen då tjänstgöringsturer enkelt kan ändras. Det gör det också mycket enklare att tilldela personal olika arbetsuppgifter som de har kompetens för. Den optimeringsbaserade bemanningsplanen innebär inte en ökad arbetsbelastning för medarbetaren. Trots att fler bangårdstjänster kan bemannas genom att använda den datorassisterade metoden visar det sig att den totala utlagda arbetstiden inte alls ökar eller att den bara ökar marginellt för vissa medarbetare. När planering sker med programvaran styrs denna av parametrar som är lätta att ändra. Dessa inställningar av parametrar är avgörande för utseendet på schemat. Indata kan vara fridagsplanering, kompetenstillgång och produktionsbehov. De i sin tur avgör i betydande grad på hur balansen mellan livs- och ekonomiska kvalitetsmåtten ser ut för medarbetarna.

  • 37.
    Ahsin, Tafzeel ur Rehman
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Cooperative Communications: Link Reliability and Power Efficiency2012Doktoravhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    Demand for high data rates is increasing rapidly for the future wireless generations, due to the requirement ofubiquitous coverage for wireless broadband services. More base stations are needed to deliver these services, in order tocope with the increased capacity demand and inherent unreliable nature of wireless medium. However, this would directly correspond to high infrastructure costand energy consumption in cellular networks. Nowadays, high power consumption in the network is becoming a matter of concern for the operators,both from environmental and economic point of view.

    Cooperative communications, which is regarded as a virtual multi-input-multi-output (MIMO) channel, can be very efficient in combating fading multi-path channels and improve coverage with low complexity and cost. With its distributed structure, cooperativecommunications can also contribute to the energy efficiency of wireless systems and green radio communications of the future. Using networkcoding at the top of cooperative communication, utilizes the network resources more efficiently.

    Here we look at the case of large scale use of low cost relays as a way of making the links reliable, that directly corresponds to reductionin transmission power at the nodes. A lot of research work has focused on highlighting the gains achieved by using network codingin cooperative transmissions. However, there are certain areas that are not fully explored yet. For instance, the kind of detectionscheme used at the receiver and its impact on the link performance has not been addressed.The thesis looks at the performancecomparison of different detection schemes and also proposes how to group users at the relay to ensure mutual benefit for the cooperating users.Using constellation selection at the nodes, the augmented space formed at the receiver is exploited for making the links more reliable. Thenetwork and the channel coding schemes are represented as a single product code, that allows us to exploit the redundancy present in theseschemes efficiently and powerful coding schemes can also be designed to improve the link performance.

    Heterogeneous network deployments and adaptive power management has been used in order to reduce the overall energy consumption in acellular network. However, the distributed structure of nodes deployed in the network, is not exploited in this regard. Here we have highlightedthe significance of cooperative relaying schemes in reducing the overall energy consumption in a cellular network.  The role of differenttransmission and adaptive resource allocation strategies in downlink scenarios have been investigated in this regard.It has been observed that the adaptive relaying schemes can significantly reduce the total energy consumption as compared to the conventionalrelaying schemes. Moreover, network coding in these adaptive relaying schemes, helps in minimizing the energy consumption further.The balance between the number of base stations and the relays that minimizes the energy consumption, for each relaying scheme is also investigated.

  • 38.
    Ahsin, Tafzeel Ur Rehman
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Ben Slimane, Slimane
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Energy Efficiency using Cooperative Relaying2011Inngår i: 2011 IEEE 22nd International Symposium On Personal Indoor And Mobile Radio Communications (PIMRC), New York: IEEE , 2011, s. 1698-1702Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The rising demand for the high data rates in the future cellular systems, is directly linked with the power consumption at the transmitting nodes. Due to the various economical and environmental factors, it is becoming difficult to maintain the current rate of power consumption per unit of data, for the upcoming generations of the cellular systems. This has shifted the focus of many researchers towards the energy efficiency aspect of the cellular systems and power consumption has become an important design parameter in the recent works. In this article, we propose the use of cooperative communications using low cost fixed relays, in order to reduce the energy consumption at the transmitting nodes for a given quality of service requirement. It has been investigated that, how different factors, such as cell radius, relay position, number of relays and target data rate effects the area energy consumption for the different relaying schemes. It has been shown that, the cooperative relaying schemes along with adaptive resource allocation provides minimum energy consumption along with the better coverage as compared to the non adaptive cooperative relaying schemes.

  • 39.
    Ahsin, Tafzeel ur Rehman
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Ben Slimane, Slimane
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Network coding based on product codes in cooperative relaying2010Inngår i: IEEE Wireless Communications and Networking Conference 2010, WCNC 2010, 2010Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Employing network coding at the relay in cooperative relay system can improve the system throughput. However, XOR based network coding does not provide a strong error correction capability that can be used at the base station (receiver) in decoding the information of the cooperating users. Instead a block code can be used to combine the received user packets at the relay station where only the extra redundancy of the block code are forwarded by the relay station. With this structure a better error correction capability is embedded to the network coding scheme providing a better help to the receiver when decoding the user information. Combining this network coding structure with the individual block codes of the users, an overall product code can be obtained which gives the possibility of generating more powerful overall codes and increases the correction capability of the decoding process at the receiver. The obtained results show that the proposed scheme outperforms the conventional XOR based network coding scheme and gives the possibility of combining more users in the cooperation process.

  • 40.
    Ahsin, Tafzeel Ur Rehman
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Slimane, Ben
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Energy efficient resource allocation and deployment strategies for wireless networks2012Inngår i: 2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops, IEEE , 2012, s. 6208715-Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Future wireless systems are being designed for extremely high data rates and are directly contributing to the global energy consumption. This trend is undesirable not only due to the environmental concerns, but to cost as well since energy costs are becoming a significant part of the operating expenditures for the telecom operators. Recently, energy efficient wireless systems have become a new research paradigm. Cooperative communication has shown good potential in improving coverage, providing robust radio links, reducing infrastructure cost, and has the possibility to reduce the total system energy consumption. This paper looks at possible deployment strategies for wireless networks that can reduce the energy consumption. We look at the tradeoff between the number of relay nodes and the number of base stations and their implications on the total energy consumption of wireless networks. The obtained results show that adaptive resource allocation between the base station and the relay node is an efficient way of reducing the energy consumption of the system. Furthermore, this reduction in energy consumption increases with increasing the system target spectral efficiency.

  • 41. Akhtar, Nadeem
    et al.
    Markendahl, Jan
    Univ Surrey.
    Moessner, Klaus
    Analysis of Complexity and Transaction Costs For Cooperating Networks2007Inngår i: 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, s. 4270-4274Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper we investigate the impact that introduction of new Ambient Networks (AN) functionality will have on usage of system resources and on connection delay. The signalling load for multiple attachment and negotiation procedures is assessed by modelling signalling sequences for a WLAN system enabled with AN technology. The load is computed for varying numbers of users and for users with different levels of “willingness to evaluate and negotiate offers”. The results show that the most important parameter is the number of attachment attempts per time unit, which is an indicator of user activity level. In the investigated scenarios, the relative load of signalling is 0.1 – 1.0 % of the transferred user data. The delay depends on the current load situation of the network.

  • 42.
    Al Rifai, Ahmad
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Indoor Positioning at Arlanda Airport2009Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Recent years have witnessed remarkable developements in wireless positioning systems to satisfy the need of the market for real-time services. At Arlanda airport in Stockholm, LFV - department of research and developement wanted to invest in an indoor positioning system to deliver services for customers at the correct time and correct place.

    In this thesis, three different technologies, WLAN, Bluetooth, and RFID and their combination are investigated for this purpose. Several approaches are considered and two searching algorithms are compared, namely Trilateration and RF fingerprinting. The proposed approaches should rely on an existing WLAN infrastructure which is already deployed at the airport. The performances of the different considered solutions in the aforementioned approaches are quantified by means of simulations.

    This thesis work has shown that RF fingerprinting provide more accurate results than Trilateration algorithm especially in indoor environments, and that infrastructures with a combination of WLAN and Bluetooth technologies result in lower average error if compared to infrastructures that adopt only WLAN.

  • 43.
    Al-Abaychi, Mustafa
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Ellvin, Joanna
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Evaluation of VPNs2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This thesis evaluated the performance of four different virtual private networks (VPNs): IP security (IPsec), OpenVPN, SSH port forwarding and SSH using virtual interfaces. To evaluate these VPNs, three comparative performance tests were carried out in which the maximum throughput of each VPN was measured. In every test, a specific parameter was varied to observe how it affected the VPNs throughput. The parameters varied were the type of transport layer protocol used, the encryption algorithm used and whether the VPN used compression or not. The results showed, among others, that when TCP traffic was transferred through the VPN and AES-128 was used as encryption algorithm in a Gigabit Ethernet network, the throughput for SSH port forwarding was 168 Mbit/s, 165 Mbit/s for IPsec, 95,0 Mbit/s for SSH using virtual interfaces and 83,3 Mbit/s for OpenVPN. These results are to be compared to the through put measured when no VPN was used, 940 Mbit/s. Three conclusions are drawn from the results of the performance tests. The first conclusion is that the throughput of a VPN depends on the technology the VPN solution is based on, the encryption method that is used and the type ofdata that is sent over the VPN. The second conclusion is that IPsec and SSH port forwarding are the most effective VPNs of the ones compared in this thesis, while OpenVPN and SSH using virtual interfaces are less effective. Lastly, it is concluded that although the different parameters affected the throughput of each VPN, the relation between the VPNs is the same in almost every test. In other words a VPN that performs well in one test performs well in every test.

  • 44.
    Alabbasi, Abdulrahman
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Cavdar, Cicek
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Delay-Aware Green Hybrid CRAN2017Inngår i: 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 201727 June 2017, IEEE conference proceedings, 2017, artikkel-id 7959942Konferansepaper (Fagfellevurdert)
    Abstract [en]

    As a potential candidate architecture for 5G systems,cloud radio access network (CRAN) enhances the system’s capacityby centralizing the processing and coordination at the centralcloud. However, this centralization imposes stringent bandwidthand delay requirements on the fronthaul segment of the networkthat connects the centralized baseband processing units (BBUs)to the radio units (RUs). Hence, hybrid CRAN is proposed toalleviate the fronthaul bandwidth requirement. The concept ofhybrid CRAN supports the proposal of splitting/virtualizing theBBU functions processing between the central cloud (centraloffice that has large processing capacity and efficiency) and theedge cloud (an aggregation node which is closer to the user,but usually has less efficiency in processing). In our previouswork, we have studied the impact of different split points onthe system’s energy and fronthaul bandwidth consumption. Inthis study, we analyze the delay performance of the end user’srequest. We propose an end-to-end (from the central cloud tothe end user) delay model (per user’s request) for differentfunction split points. In this model, different delay requirementsenforce different function splits, hence affect the system’s energyconsumption. Therefore, we propose several research directionsto incorporate the proposed delay model in the problem ofminimizing energy and bandwidth consumption in the network.We found that the required function split decision, to achieveminimum delay, is significantly affected by the processing powerefficiency ratio between processing units of edge cloud and centralcloud. High processing efficiency ratio ( 1) leads to significantdelay improvement when processing more base band functionsat the edge cloud.

  • 45.
    Alam, Assad
    et al.
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik.
    Asplund, Fredrik
    KTH, Skolan för industriell teknik och management (ITM), Maskinkonstruktion (Inst.), Mekatronik.
    Behere, Sagar
    KTH, Skolan för industriell teknik och management (ITM), Maskinkonstruktion (Inst.), Mekatronik.
    Björk, Mattias
    KTH, Skolan för industriell teknik och management (ITM), Maskinkonstruktion (Inst.), Mekatronik.
    Garcia Alonso, Liliana
    KTH, Skolan för industriell teknik och management (ITM), Maskinkonstruktion (Inst.), Mekatronik.
    Khaksari, Farzad
    KTH, Skolan för elektro- och systemteknik (EES), Signalbehandling.
    Khan, Altamash
    KTH, Skolan för elektro- och systemteknik (EES), Signalbehandling.
    Kjellberg, Joakim
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik.
    Liang, Kuo-Yun
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik.
    Lyberger, Rickard
    Scania CV AB.
    Mårtensson, Jonas
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik. KTH, Skolan för elektro- och systemteknik (EES), Centra, ACCESS Linnaeus Centre.
    Nilsson, John-Olof
    KTH, Skolan för elektro- och systemteknik (EES), Signalbehandling.
    Pettersson, Henrik
    Scania CV AB.
    Pettersson, Simon
    KTH, Skolan för industriell teknik och management (ITM), Maskinkonstruktion (Inst.), Mekatronik.
    Stålklinga, Elin
    KTH, Skolan för elektro- och systemteknik (EES), Reglerteknik.
    Sundman, Dennis
    KTH, Skolan för elektro- och systemteknik (EES), Signalbehandling.
    Zachariah, Dave
    KTH, Skolan för elektro- och systemteknik (EES), Signalbehandling.
    Cooperative driving according to Scoop2011Rapport (Annet vitenskapelig)
    Abstract [en]

    KTH Royal Institute of Technology and Scania are entering the GCDC 2011 under the name Scoop –Stockholm Cooperative Driving. This paper is an introduction to their team and to the technical approach theyare using in their prototype system for GCDC 2011.

  • 46.
    Alaniz, Monica
    et al.
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Belyayev, Serhiy
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Bergman, David
    Casselbrant, Gustav
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Honeth, Mark
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Huang, Jiangwei
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Ivchenko, Nickolay
    KTH, Skolan för elektro- och systemteknik (EES), Rymd- och plasmafysik.
    Laukkanen, Mikko
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Michelsen, Jacob
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Pronenko, Vira
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Paulson, Malin
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Schlick, Georg
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Tibert, Gunnar
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    Valle, Mario
    KTH, Skolan för teknikvetenskap (SCI), Mekanik, Strukturmekanik.
    The SQUID sounding rocket experiment2011Inngår i: Proceedings of the 20th ESA Symposium on European Rocket and Balloon Programmes and Related Research, European Space Agency, 2011, s. 159-166Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The objective of the SQUID project is to develop and in flight verify a miniature version of a wire boom deployment mechanism to be used for electric field measurements in the ionosphere. In February 2011 a small ejectable payload, built by a team of students from The Royal Institute of Technology (KTH), was launched from Esrange on-board the REXUS-10 sounding rocket. The payload separated from the rocket, deployed and retracted the wire booms, landed with a parachute and was subsequently recovered. Here the design of the experiment and post fight analysis are presented.

  • 47.
    Alasali, Mohammad
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Beckman, Claes
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    LTE MIMO Performance Measurements on Board Passenger Trains2013Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    Providing passenger internet on board trains with continuous connectivity at high speeds and over large rural distances is a challenging issue. A frequently used solution to the problem is to use an on board WiFi network connected to the 3G or 4G networks deployed outside the train. In order to be able to provide the capacity and the data rates that tomorrow's business travelers are expecting it has been suggested to use a combination of MIMO and carrier aggregation in the LTE-Advance standard. In this study, we practically investigate the plausibility of using MIMO functionality in an 900 LTE system when the receive antennas are mounted at a train roof about 4m above ground and the base stations antennas are on average placed 2.3km away from the track in towers with an average height of 45m and, hence, most of the time in line of site. It is found that along our test route MIMO is in practice supported by the radio channel at around 70% of the time when the train is travelling with an average speed of 185km/h and the MIMO antennas are mounted 10.5m apart.

  • 48.
    Alasali, Mohammad
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Beckman, Claes
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab). KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    LTE MIMO performance measurements on trains2013Inngår i: 2013 7th European Conference on Antennas and Propagation (EuCAP), New York: IEEE , 2013, s. 2327-2330Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Providing passenger internet on board trains with continuous connectivity at high speeds and over large rural distances is a challenging issue. A frequently used solution to the problem is to use an on board WiFi network connected to the 3G or 4G networks deployed outside the train. In order to be able to provide the capacity and the data rates that tomorrow's business travelers are expecting it has been suggested to use a combination of MIMO and carrier aggregation in the LTE-Advance standard. In this study, we practically investigate the plausibility of using MIMO functionality in an 900 LTE system when the receive antennas are mounted at a train roof about 4m above ground and the base stations antennas are on average placed 2.3km away from the track in towers with an average height of 45m and, hence, most of the time in line of site. It is found that along our test route MIMO is in practice supported by the radio channel at around 70% of the time when the train is travelling with an average speed of 185km/h and the MIMO antennas are mounted 10.5m apart.

  • 49.
    Alasali, Mohammad
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth. KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Beckman, Claes
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab). KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Karlsson, M.
    Providing internet to trains using MIMO in LTE networks2014Inngår i: 2014 International Conference on Connected Vehicles and Expo, ICCVE 2014 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2014, s. 810-814Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Providing broadband passenger internet on board trains with continuous connectivity at high speeds and over large rural distances is a challenging issue. One solution to the problem is to use an onboard WiFi network connected to multiple 3G and 4G networks deployed outside the train and aggregate their combined capacity at the IP protocol level. In order to be able to provide the capacity and the data rates that tomorrow’s travelers are expecting, the future 4G standard (LTE-Advance) uses a combination of high order MIMO and carrier aggregation. In this study we use the Swedish company Icomera’s passenger internet system for our investigation. The system provides aggregation of multiple carrier and handover on an IP level. For about 10 years the system has in Sweden primarily been using multiple 3G communication links. However, here we present analysis and onboard measurements of a 2×2 MIMO channel to fast moving train in a live LTE 900 network. The results indicate that MIMO works surprisingly well and it is discussed that by combining 8×8 MIMO with carrier aggregation in future releases of 4G, it may be possible to bring gigabit internet connections to trains.

  • 50.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    Peón-Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway Communications, Norway.
    Evensen, Kristian
    Celerway Communications, Norway.
    Hansen, Audun
    Celerway Communications, Norway.
    Alfredsson, Stefan
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Karlsson, Jonas
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Brunström, Anna
    Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).
    Safari Khatouni, Ali
    Politecnico di Torino, Italy.
    Mellia, Marco
    Politecnico di Torino, Italy.
    Ajmone Marsan, Marco
    IMDEA Networks Institute, Spain and Politecnico di Torino, Italy.
    Experience: An open platform for experimentation with commercial mobile broadband networks2017Inngår i: MobiCom '17 Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, New York: ACM Digital Library, 2017, s. 70-78Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Open experimentation with operational Mobile Broadband (MBB) networks in the wild is currently a fundamental requirement of the research community in its endeavor to address the need of innovative solutions for mobile communications. Even more, there is a strong need for objective data about stability and performance of MBB (e.g., 3G/4G) networks, and for tools that rigorously and scientifically assess their status. In this paper, we introduce the MONROE measurement platform: an open access and flexible hardware-based platform for measurements and custom experimentation on operational MBB networks. The MONROE platform enables accurate, realistic and meaningful assessment of the performance and reliability of 11 MBB networks in Europe. We report on our experience designing, implementing and testing the solution we propose for the platform. We detail the challenges we overcame while building and testing the MONROE testbed and argue our design and implementation choices accordingly. We describe and exemplify the capabilities of the platform and the wide variety of experiments that external users already perform using the system

1234567 1 - 50 of 3520
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf