WorldCat Identities

Institut national des télécommunications (Evry)

Overview
Works: 404 works in 480 publications in 2 languages and 606 library holdings
Genres: Conference papers and proceedings 
Roles: Degree grantor, Editor, Other, Contributor, Producer
Publication Timeline
.
Most widely held works by Institut national des télécommunications (Evry)
Nouvelles technologies et enseignement des langues : actes du colloque du 18 au 20 mars 1993 à l'Institut national des télécommunications d'Évry by Jean-Pierre Attal( Book )

2 editions published in 1993 in French and held by 19 WorldCat member libraries worldwide

L'Année des TIC : télécom, électronique, informatique, médias, internet by Institut National des Télécommunications( )

in French and held by 10 WorldCat member libraries worldwide

Prévention de la violence à l'école : [actes de la journée du 29 avril 2003]( Book )

1 edition published in 2004 in French and held by 6 WorldCat member libraries worldwide

Petit panorama des mathématiques appliquées contemporaines : [actes des journées du 5 avril 2001 et du 28 mars 2002, INT, Évry]( Book )

1 edition published in 2004 in French and held by 5 WorldCat member libraries worldwide

Sur diverses extensions des chaînes de Markov cachées avec application au traitement des signaux radar by Jérôme Lapuyade-Lahorgue( Book )

2 editions published in 2008 in French and held by 4 WorldCat member libraries worldwide

The objective of this thesis is to propose different - more general - models than the classical hidden Markov chain, which is often used in Bayesian inference of signals or images. The different extensions of this model aim to take into account different properties of the signal, such as its non gaussian behaviour or semi-markovianity of the hidden process. In a Bayesian inference context, we have two random processes X and Y , where the realisation y of Y is observed and the realisation x of X has to be estimated. The relationship between the two processes X and Y is modeled by the probability distribution p(x, y). In the classical model of hidden Markov chains with independent noise, the distribution p(x) is that of a Markov chain and the distribution p(y|x) is that of a vector whose marginal distributions are independent conditionally to x. Although this model can be used in several applications, it fails to model all situations of dependence. The first model we propose belongs to the Markov triplet models, in which we consider a third process U such that the triplet (X, U, Y ) is a Markov chain. In the proposed model, this auxiliary process models the semi-markovianity of X, and so we are able to take into account the possible non-markovianity of the hidden process. In a second model, we consider long dependence within the observations and we propose an original algorithm to estimate the parameters of this model. We also study different models taking simultaneously into account semi-markovianity of the hidden data, long dependence and non-stationarity. Finally, the non-Gaussian properties of noise are taken into account through the introduction of copulas. The viability of different models is also confirmed through experimentation. In the last part of this thesis, we are studying how the segmentation obtained by a Bayesian method can be used in detecting targets in the radar signal. The original detector that we implement uses statistical difference between a signal and the signals received from its surroundings. To achieve this, we define a distance between distributions that is used in detection. Through a series of tests, we show how the new detector thus implemented produces better results than the classical detector in a very noisy environment
Network design, channel access and time synchronization for multi-hop wireless mash networks by Bachar Wehbi( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

Le succès de la norme IEEE 802.11 pour les communications sans fil a motivé les mondes académiques et industriels à la fois pour répondre à de nouveaux modèles et architectures de réseaux basé sur des technologies sans fil uniquement. En particulier, les réseaux ad hoc sans fil étaient le sujet de nombreuses études durant la dernière décennie grâce à leur architecture sans infrastructure. Toutefois, les réseaux ad hoc ne parviennent pas à fournir une certaine garantie de service en raison de la mobilité des nœuds et du fort dynamisme de leur topologie. Les réseaux maillés sans fil se basent sur les réseaux ad hoc pour construire une architecture de réseau à deux niveaux afin de fournir un réseau d'accès pour des utilisateurs équipés avec des cartes WIFI classiques. Les réseaux maillés sans fil ont fait l'objet de nombreuses recherches au cours des dernières années pour leur capacité à offrir une alternative intéressante pour la construction des réseaux communautaires et des réseaux d'accès à l'Internet. Malgré la quantité énorme de recherches sur les réseaux sans fil multi sauts et plus particulièrement, les réseaux maillées, de nombreuses problèmes techniques liées à leur conception et leur performance persistent toujours. Dans cette thèse, nous nous intéressons à deux des aspects complémentaires des réseaux maillés sans fil: (1) la conception d'une architecture et le développement de mécanismes qui améliorent les performances de l'accès au canal, et (2) la synchronisation d'horloge dans les réseaux maillés et plus généralement dans les réseaux sans fil multi sauts. Nous concevons une solution efficace pour améliorer l'accès au canal en exploitation les diversités dans le medium sans fil ainsi qu'en coordonnant l'accès au canal entre les différents nœuds. Nous proposons un mécanisme de synchronisation d'horloge pour les réseaux sans fil multi sauts qui permet de fournir une précision de l'ordre de la microseconde. Plus précisément, nous fournissons les contributions suivantes : premièrement, la proposition de ReactiveMesh, notre conception pour les réseaux maillés qui comporte la gestion des clients et le support de mobilité afin de maintenir la connectivité des clients. Deuxièmement, la conception de TAR et de ReDEx, deux mécanismes complémentaires d'accès au canal. TAR améliore le débit global du réseau ainsi que son équité par la coordination des transmissions entre les différents nœuds du réseau. D'autre part, ReDEx exploite la diversité des récepteurs dans le medium sans fil afin d'améliorer le débit individuel de chaque nœud d'une part, et de résoudre le problème de blocage de IEEE 802.11 d'autre part. Troisièmement, la conception et la mise en œuvre de MTS, un mécanisme de synchronisation d'horloge, qui exploite la nature hertzienne des communications sans fil pour fournir une précision de l'ordre de la microseconde. MTS permet la mise en place des applications les plus contraignantes de point de vue de besoins de synchronisation. Cette thèse présente des contributions qui touchent de nombreux aspects allant de la conception des réseaux sans fil, à l'évaluation et l'amélioration des performances, et enfin à la synchronisation d'horloge. Elle touche des aspects théoriques dans la formalisation de REDEX et de MTS et des questions pratiques dans la conception de ReactiveMesh et l'implantation de MTS. Les évaluations des idées sont aussi variées : des chaîne de Markov sont utilisés pour la modélisation de REDEX, des simulations réseaux sont utilisées pour la validation de TAR et MTS, et finalement une implantation réelle de MTS est produite pour prouver sa faisabilité
Protocoles de protection de la vie privée pour les systèmes RFID by Sépideh Fouladgar( Book )

2 editions published in 2008 in French and held by 4 WorldCat member libraries worldwide

Abstract service model for adaptive provision in ambient assistive living by Mahmoud Ghorbel( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

The rapid development of information and communication technologies is opening a large variety of new services and aids not only for independent people, but also for dependent persons due to physical/cognitive restriction or the elderly. Combining technical aids and mobile technology allows those people to benefit from an independent living through ambient intelligent environments. The term ambient intelligent (AmI) describes a pervasive, transparent infrastructure able to observe people without interfering in their life, supplying an intelligent environment to adapt to the needs and requirements of the user and the environment itself. Ambient Intelligence (AmI) is a step beyond Ubiquitous and Pervasive Computing. There is an explicit focus on individuals in an environment. So far, the individual has had to adapt to what the computer/device could do for the person; now with AmI the computer/device must adapt to the individual and his current context. This concept should be applied to develop AmI-enabled devices/products to be deployed in different application domains. Personalized home care assistance is an emerging application area where AmI can play an important role. Some examples of claimed services can be summarized as following : - Indoor/outdoor Control Services : open a door, elevator button, traffic light call - Navigation Assistance Services : get accessible circuit to reach a target, navigation inside building... - Information Service : Agenda, reminders, bus timetable... - Security Assistance Services : emergency call, remote assistance... This research work focuses on designing and developing an Assistive Service Provision Framework in Ambient Intelligent space. This architecture, based on a distributed approach, ensures service design, deployment and selection processes. The provision of services is designed according to two main adaptation levels : - Service Selection level : A first adaptation phase concerns the service selection process. In fact, there is a variety of services which can offer assistance for users in their living environment, however they could be more of a hindrance than a help if all of them will be provided at once. A selection according to the location, preference, resource capabilities, etc is relevant in this case (Context aware services). Only suitable services overcoming a handicap situation and satisfied in term of required dependency are eligible to be provided to a user in a given location. - Service Presentation level : The second adaptation phase is about the personalization of the presentation layer of services according to user (user profile). This adaptation is crucial especially when dealing with people having special needs (dependant people). Developed software framework was integrated in a global system deployed within pilot sites (residence of dependant people) in order to validate its impact when involving real end-users in ecological situations
An autonomic simulation platform for studying and optimizing addressing issues in next generation networks by Sandoche Balakrichenan( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

Cette thèse traite des problématiques d'adressage pour les réseaux du futurs ; entre les réseaux téléphonique traditionnels et le monde de l'internet. L'adressage unique des usagers au delà des limites des réseaux, et sans faire exploser le nombre d'adresses utilisées est un enjeu essentiel des NGN. ENUM est une des principales technologies qui utilise une seule adresse pour plusieurs services de communication et à travers différents types de réseaux. ENUM est un nouveau type de protocole prévu pour permettre l'usage d'une seule adresse pour plusieurs noms de domaines différents, tout permettant à l'architecture DNS de les indexer. Son succès va dépendre de si le DNS peut avoir une performance similaire à celles des bases de données utilisées pour la téléphonie classique. Dans cette thèse nous proposons une nouvelle façon de mesurer et de modéliser les performances des serveurs DNS de l'implémentation française d'ENUM. Nous modélisons et nous mesurons aussi les performances des liens IP connectant les différentes entités du système DNS : système de recherche, base de donnée, cache et serveur autoritaire. Enfin nous avons développés un modèle de simulation qui nous permet de simuler le trafic ENUM. Nous avons ensuite utilisé les paramètres obtenus avec les deux modèles précédents comme valeurs d'entrée de ce simulateur. Les résultats numériques obtenus avec cette simulation ont été comparés avec des mesures réelles afin de valider le modèle global. Nous avons prévu d'utiliser le simulateur pour étudier différents scénarios en faisant varier les différents paramètres. La difficulté dans l'étude de l'implémentation réelle d'ENUM est que cette architecture implique différentes infrastructures, architectures, applications et services qui seront utilisés dans les réseaux du futur. C'est donc très intéressant pour nous d'avoir construit une plateforme de simulation. Cette plateforme doit être autonome et donc auto-adaptative à la configuration voulue. Dans ce travail de thèse nous expliquons comment le modèle de simulation a été conçu de façon à ce que ce simulateur soit autonome. Différentes expériences ont été faites avec ce modèle et nous avons présenté comment les solutions obtenues avec la simulation peuvent aider à améliorer les implémentations réelles
Lasers à boîtes quantiques et tolérance à la rétroaction optique by Shéhérazade Lamkadmi Azouigui( Book )

2 editions published in 2008 in French and held by 4 WorldCat member libraries worldwide

Gestion de la confiance dans les réseaux personnels by Khaled Masmoudi( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

With the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Integration of assistive technology in the information age( Book )

1 edition published in 2001 in English and held by 4 WorldCat member libraries worldwide

Un système de nommage pair-à-pair pour la découverte et la mise en réseau de services dans les environnements dynamiques étendus = A P2P-based naming system for service discovery and networking in wide-area dynamic environments by Wassef Louati( Book )

2 editions published in 2007 in English and held by 4 WorldCat member libraries worldwide

The world is becoming one large pervasive environment where devices and services autonomously work together, without human intervention. These devices and services are deployed in Clusters, forming dynamic communities of interacting entities. To link clients in any Cluster with remote services in other Clusters, devices and nodes have to capable of remotely discovering services throughout the Clusters. Wide-area service discovery has emerged as a potential solution for achieving the requirements of these pervasive environments and services. In highly dynamic environments, applications interact with frequently changing services and achieving wide-area service discovery and provisioning remains a challenge due to mobility of users, devices and services. Availability and failures of service instances, intermittent network disconnections, and changes in service context are just a few dynamic variations that pervasive networks have to contend with. Even if service discovery protocols are available as one means by which an application can stay informed about the current state of the environment, scalability of these pervasive systems in terms of number of services and in heterogeneity of the protocols describing and finding these services is still an obstacle. In fact, scalability, dynamicity support and enabling heterogeneity in service discovery are key objectives in wide-area service discovery. This thesis proposes a naming system to address part of these challenges in wide area service discovery. The naming system acts as a middleware mediating between services in the Clusters to enable wide-area service discovery and networking in dynamic environments. The naming system is applied to Personal Networks (PN) where user devices, nodes and services are scattered throughout personal Clusters. The services are named mainly according to their type, properties, location and ownership. The naming system resolves service names to their locations and service descriptions. The thesis starts with the design and implementation of a scalable naming system, called PNSD (P2P-based Naming System for Service Discovery), based on a structured P2P network and supporting services and network dynamics, mobility and service heterogeneity. The second part of this thesis integrates a publish/subscribe model in the naming system. The resulting system implements a notification service which informs subscribers about the services and their mobility. A security architecture is also proposed at the edge of the naming system to provide authentication and access control. As application use case, this work combines UPnP, a local-area service discovery protocol, with the PNSD system to implement a wide-area service discovery framework. Finally, the thesis focuses on the applicability of the proposed naming system to Personal Networks where a PN networking management framework is supported by the PNSD system. The latter acts as a service locating system that provides network entities with PN Cluster location information to achieve PN networking
Service de réseau virtuel à la demande pour les réseaux dynamiques = -demand virtual network service for dynamic networks by Wajdi Louati( Book )

2 editions published in 2007 in English and held by 4 WorldCat member libraries worldwide

Recent advances in software and hardware in terms of computing power and storage capabilities and the availability of open source frameworks combined with the emergence of Network Processors motivated much research and development for new router and switch technologies to face the challenges of future Internet services and applications. This thesis was motivated by these advances and by the need for extensible and programmable routers to support dynamic configuration and networking for future generation context aware fixed and wireless networks and services. The initial objective of the thesis has consequently been to conceive an open, extensible and programmable software based router architecture to achieve ubiquitous networking via the dynamic and run time establishment of overlay networks according to situation and user needs. The objective gradually grew into the design of an autonomic router architecture for on demand virtual routing services provisioning. Deploying network services within a router in a dynamic and flexible manner requires open architectures and standard interfaces capable of supporting and controlling new components and packet processing functionality at run time. This is a great challenge when addressing Dynamic Networks, such as Personal Networks, where network dynamics, mobility and adaptation induce important and drastic changes in state and secure networking needs. In order to keep private and secure communications for each Dynamic Network across a shared Networking Infrastructure, our investigation and research objective is to explore how Service Providers can offer "on demand" Virtual Network Services to customers to support their dynamic networks and services. The Virtual Network Service itself is composed of two services: Virtual Routing Link and Virtual Routing Service. The provisioning of the Virtual Routing Services in Provider Edge Routers should be achieved automatically and at run time to support the on demand Virtual Network services. However, traditional edge routers have monolithic architectures that prevent the dynamic and automated deployment of network services at run time. The objective of this work is to conceive an architecture that can enable such automated Virtual Routing Service provisioning in current Provider Edge Routers
Apport des techniques multi-niveaux dans une architecture de satellites géostationnaires DVB-S2/RCS by Armando García Berumen( Book )

2 editions published in 2008 in French and held by 4 WorldCat member libraries worldwide

On se dirige depuis plusieurs années vers l'intégration de divers services sur un seul et même réseau de télécommunications : c'est le service « triple-play ». Les satellites, par leur couverture, permettent de l'offrir dans les zones sans couverture par les réseaux terrestres. Par ailleurs, la norme DVB a évolué, on a ouvert le canal de retour (RCS) pour permettre des services interactifs, on y gère la bande passante de façon dynamique et, pour la gestion adaptative de la couche physique, des techniques dites F.M.T. (« fade modulation techniques ») ont été proposées pour maintenir un taux d'erreurs bas, tout en optimisant la bande passante en minimisant les données de F.E.C. et en exploitant les modulations présentant les plus grands débits lorsque c'est possible. Depuis quelques années, les techniques dites multi-niveaux ont été généralisées à divers environnements, et divers types de services, elles ont été testées et utilisées dans les réseaux ad-hoc, par exemple, avec un certain succès pour transporter divers services, multimédia et TCP en particulier. Dans cette situation, il était intéressant d'évaluer l'apport des techniques multi-niveaux dans les architectures satellites DVB-S2/RCS en présence de techniques « F.M.T. ». C'est l'objet de cette thèse. Ce travail a été démarré dans le contexte d'une collaboration avec Astrium pour le CNES. Dans la première partie, nous proposons un algorithme multi-niveau pour le transport de la voix sur IP dans ces réseaux. Cet algorithme fait intervenir la couche transport et la couche MAC. L'intégration de cet algorithme dans l'architecture puis ses performances sont étudiées, et particulièrement son comportement en présence de trafic concurrent. Dans la deuxième partie, en vue du travail proposé dans la troisième, on évalue l'influence du délai de transmission sur le comportement de TFRC, et particulièrement dans la façon dont il partage la bande avec TCP. On constate que le comportement est assez variable selon la valeur du délai de transmission, et que les différences sont essentiellement dues à la différence de convergence des mécanismes de contrôle de congestion vers la pleine estimation de la bande qui leur est disponible. Dans la troisième partie, nous présentons un algorithme multi-niveau d'affectation de la bande passante pour un lien sur lequel transitent à la fois du trafic multimédia et du trafic de données. Chaque service a une bande passante garantie de manière paramétrable et l'algorithme récupère la bande inutilisée d'un autre trafic, soit qu'il n'ait pas besoin d'émettre, soit qu'il n'ait pas encore convergé vers la pleine utilisation de sa bande passante, pour la répartir au mieux entre les connexions qui saturent déjà la bande qui leur est réservée
MobAppGen : a modular framework for mobile applications generation by Mabel Vázquez-Briseño( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

The advance of mobile telephony and mobile devices has created the need of a fast and effective implementation of new services and applications. This project is focused on the definition and deployment of a generic framework conceived to facilitate the development of mobile applications. This framework is called MobAppGen that stands for Mobile Applications Generator. It is a modular and extendable framework for client-only and client-server mobile applications generation. It was conceived considering that most mobile applications require similar basis, including: screen management, data persistence and network communication. In this way the framework allows the creation of applications based on reusable software components defined as modules. Therefore, MobAppGen consists of several modules with specific attributes that can be reused for different projects or can be adapted as is needed. Each module implements a basic task, and is adaptable to specific jobs by changing its attributes. A project generated with our framework can consist of one or several applications generated with similar or different modules. Similar module's applications will share basic source classes, helping to reduce the size of the project. The modules are aimed to create several useful projects including a streaming system using the RTSP protocol. This last module offers also a solution to implement streaming on mobile devices without requiring a native application and even if they originally lack of streaming features. To develop our framework we selected a deployment environment that runs on as many types of devices as possible as well as open standards to allow future extensions and code mobility. Finally, several tests were done to evaluate the framework's performance as well as the behaviour of the generated applications
Design and implementation of a CMOS prototype for a TDSC-UWB receiver based on TR detection scheme by Francisco Iwao Hirata Flores( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

Recently the techniques based on Impulse Radio (IR) Ultra Wideband (UWB) have experienced a growing interest in the field of wireless systems. An efficient technique known as Transmitted Reference (TR) UWB, has gained in popularity for low and medium data rates applications such as sensor networks. This technique uses two pulses per symbol period, which are strongly correlated and separated by a well known delay (D). The reception system is composed of a wideband analog delay element and a correlator. The delay line allows making a copy of the received signal with a delay that corresponds exactly to D; the correlation is then made with these two pulses. Despite the apparent simplicity of this type of receiver, its implementation in a low power integrated circuit is not an easy task, especially the delay element which must be wideband for UWB applications. > To overcome this difficulty, a new detection method called Time Delayed Sampling and Correlation (TDSC) has been proposed recently, which will be explained in this document. It uses two analog waveform samplers activated at different times; here the delay D between pulses is applied to the control signals of the two samplers. The delay is generated in a digital way; it becomes programmable and can be used in a multi-user context (a different delay for each user for example). > This document describes the design and implementation of a CMOS prototype for a TDSC-UWB receiver based on TR-UWB detection scheme. The prototype made in CMOS 0.35mm technology, allows the validation of the new detection concept, i.e. TDSC. Thanks to this prototype, it was possible to measure a -3 dB bandwidth of around 1.1 GHz and a sampling frequency of more than 7 GHz. This allows the detection of impulse signals with an input bandwidth of 500 MHz (»2 ns), which is the minimum bandwidth for the UWB technology
Gestion des interactions de service dans la sous-couche de contrôle de service des réseaux de nouvelle génération : IMS by Anahita Gouya( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

In the Next Generation Networks the control plane and the service plane are entirely separated. This separation ensures the autonomy of each plane and enables their independent development and deployment. The specification of the IP Multimedia Subsystem (IMS), as a unique service control overlay over the heterogeneous networks, eases the interaction between these planes. However, this interaction becomes challenging when multiple services are invoked during a session. The goal of this thesis is to provide IMS, with mechanisms to manage the interactions between services. We addressed two problems in this field: the negative interactions that are due to the conflicts between services and the positive interactions that enable the composition of services. The service conflicts occur as services invoked during an IP session behave correctly when processed separately from each other, but not when running together. We defined a SIP-based algorithm and the associated mechanisms to enhance IMS service invocation. This algorithm is the core of the Service Broker, a new functional entity in charge of managing the service conflicts. We validated our proposal through a performance evaluation and prototyped the Service Broker on an open source IMS platform. By means of service composition all kinds of service inter-working scenarios, independently of the underlying control functionalities, can be achieved. We defined a SIP-based service composition management algorithm, over the Service Capability Interaction Manager (SCIM) of IMS. This algorithm enables the interoperability and cooperation between different services and allows enriching and personalizing the services based on the user needs and preferences. We presented the application of our proposition in different use cases and validated it through the analytical studies
Optimisation de l'énérgie dans les réseaux de capteurs : techniques adaptatives pour l'accès, le routage et le contrôle de topologie by Ines Slama( Book )

2 editions published in 2008 in English and held by 4 WorldCat member libraries worldwide

The convergence of micro-electronic systems technology, digital electronics and wireless communications made viable the concept of sensor networks. The vision involves a large number of inexpensive nodes which consist of sensing, data processing and short range communicating components. Wireless Sensor Networks (WSN) have the potential to truly revolutionize the way we interact with our environment. Typically, sensors have lower computing power, communication bandwidth and smaller storage compared to traditional wireless devices. The most important characteristic of wireless sensor networks is that nodes are very constrained in energy resources. In most applications, replenishment of the batteries might be impossible. The network lifetime depends strongly on nodes' battery lifetime. This makes energy efficiency critical in WSNs. Exhaustive research has been conducted in the past few years about energy conserving protocols and algorithms at each network layer. In this thesis, we focus on the routing and medium access control (MAC) schemes as they are being identified as the most energy consuming features in WSNs. To address these two targeted areas, we first design a power aware routing strategy that maximizes the lifetime of a small energy constrained sensor network. The power management is cast into an optimization problem. The system model and resolution are described and results of optimization show that the prosposed algortithm quickly converges to an optimal solution. A global and adaptive routing framework is then proposed to dynamically adapt to topology changes. Next, we extend our research to large-scale WSNs. A two-tiered architecture where nodes are divided into clusters and nodes forward data to base stations through cluster heads is considered. To maximize the network lifetime, two energy efficient approaches are investigated. We first propose an energy efficient usage of multiple mobile base stations within the network area. We then introduce a new optimal multi-hop routing scheme to arrange the communication between the Cluster Heads. The overall dynamic framework that combines the above two schemes is described and evaluated showing satisfactory results. Finally, we propose I-MAC; an adaptive hybrid MAC protocol for WSNs. I-MAC combines TDMA and CSMA techniques and uses a prioritization mechanism to efficiently manage the access to the channel and reduce the energy consumption. The different operations processed during the transmission phase of the protocol are described. The transmission control mechanism based on prioritization is then detailed. The overall protocol is evaluated through simulations and the results show that I-MAC is energy efficient, robust to topology changes and fair in resource allocation
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  General Special  
Audience level: 0.91 (from 0.85 for Préventio ... to 0.95 for Nouvelles ...)

Integration of assistive technology in the information age
Covers
Alternative Names
France Institut national des télécommunications

France. Ministère des postes, des télécommunications et de l'espace. Institut national des télécommunications

GET-INT

Groupe des écoles des télécommunications

Institut National des Telecommunications

Int

INT Management

Telecom & Management SudParis formerly Institut National des Télécommunications (INT), a French higher education institute

TELECOM and Management SudParis

Telecom INT

法國國立電訊所大學

Languages
English (21)

French (14)