• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 496
  • 208
  • 135
  • 93
  • 75
  • 74
  • 48
  • 41
  • 28
  • 18
  • 16
  • 16
  • 15
  • 14
  • 10
  • Tagged with
  • 1373
  • 491
  • 354
  • 353
  • 252
  • 191
  • 167
  • 150
  • 150
  • 116
  • 116
  • 112
  • 101
  • 99
  • 97
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Emulation of industrial Fieldbus modules for Virtual Commissioning

García Concejero, Yeray, Salazar del Río, Miguel Antonio January 2019 (has links)
The evolution of the industry, known as industry 4.0, has introduced new technologies such as Virtual Commissioning and Industrial Internet of things. Nowadays, virtual models of automated systems are being created in order to be tested while being built in real life, what includes PLC programs, robots, etc. In order to provide a real behaviour emulation, these virtual models should be as similar to reality as possible. Currently, the components communication in a real system is done through Internet with the use of fieldbuses I/O modules. Right now, these modules are not integrated in the virtual model, as the PLC program returns an error due to the hardware not being found. This implies that the PLC project must be modified, and a workaround must be done in order to connect the I/O cards components of the modules. Furthermore, it means that two PLC projects need to be maintained at the same time, one for the real system and another for the virtual system. In this thesis, a research was done to prove if fieldbuses modules could be emulated, helping to improve Virtual Commissioning. The final goal is to allow a PLC project created for a real system to be run again the corresponding virtual model without any change. To achieve this, a driver able to emulate the communication behaviour of an Ethernet/IP fieldbus module is developed and tested against a real PLC program.
242

Gestion des risques dans les infrastructures VoIP / Risk management in VoIP infrastructures

Dabbebi, Oussema 03 June 2013 (has links)
La téléphonie sur IP est devenue un nouveau paradigme pour établir et transmettre les communications téléphoniques directement sur les réseaux IP de manière flexible et à faible coût. Toutefois, les services VoIP sont confrontés à plusieurs problèmes de sécurité qui sont soit hérités de la couche IP soit spécifiques au service lui-même. Une grande variété de mécanismes de protection est disponible pour y faire face. Cependant, ces services nécessitent des performances et une disponibilité du réseau élevé, et les mécanismes de protection peuvent nuire à ces performances. La gestion des risques offre de nouvelles perspectives à l'égard de cette problématique. Nos contributions portent sur l'application et l'automatisation de la gestion de risques dans les infrastructures VoIP selon trois axes. Le premier axe porte sur l'automatisation du processus de gestion des risques dans un réseau VoIP d'entreprise. Dans ce cadre, nous avons développé un modèle pour évaluer les risques, un ensemble de contremesures progressives et des algorithmes de mitigation. Nous l'avons couplé à un système de détection d'anomalies basé sur les SVM et un mécanisme d'auto-configuration qui peut fournir un retour d'expérience sur l'efficacité des contremesures. Le deuxième axe concerne l'extension de notre stratégie dans les réseaux P2PSIP. Nous avons mis en place une solution adaptée à la nature distribuée des environnements pair-à-pair. Nous nous sommes aussi intéressés à l'architecture RELOAD et avons étudié comment traiter les attaques résiduelles à travers des mécanismes de confiance. Nous avons enfin étudié les services VoIP dans le cloud où nous proposons plusieurs stratégies pour le déploiement et l'application des contremesures / IP telephony has become a new paradigm that permits to establish and transmit voice communications with IP networks. Its deployment has been accelerated by the standardization of dedicated signaling protocols. However, VoIP services are faced to several security issues which are inherited from the IP layer or specific to the service. A large variety of protection mechanisms are available to deal with them. However, IP telephony is a real-time service which requires high network performance. The application of countermeasures may significantly affect such a critical service. Risk management provides new perspectives for this issue. This thesis deals with the application of risk management in VoIP infrastructures. The first axis consists in the automation of the risk management process in VoIP enterprise network. In this context, we have developed a mathematical model for assessing risk, a set of progressive countermeasures to counter attackers and mitigation algorithms that evaluate the risk level and takes the decision to activate a subset of countermeasures. To improve our strategy, we have coupled it with an anomaly detection system based on SVM and a self-configuration mechanism which provides feedback about countermeasure efficiency. The second axis deals with the extension of our adaptive risk strategy to P2PSIP infrastructures. We have implemented a specific risk model and a dedicated set of countermeasures with respect to its peer-to-peer nature. For that, we have identified attack sources and established different threat scenarios. We have analyzed the RELOAD framework and proposed trust mechanisms to address its residual attacks. Finally, the third axis focuses on VoIP services in the cloud where we have proposed a risk strategy and several strategies to deploy and apply countermeasures
243

Sistema supervisório de parâmetros de máquinas elétricas via TCP/IP e painel eletrônico de mensagens / Supervisory system of electric machine\'s parameter via TCP/IP and message displays

Ranieri, Fernando 17 August 2007 (has links)
Com o advento da internet, a comunicação entre sistemas remotos foi amplamente facilitada, tornando viável a aplicação de sistemas supervisórios através dela, principalmente via protocolo TCP/IP. Embora esses sistemas já sejam empregados na indústria, principalmente utilizando como driver os controladores lógicos programáveis (CLP\'s), a implementação de qualquer sistema mais simples de supervisionamento teria um custo elevado, devido tanto ao preço do hardware quanto do software envolvido. Além disso, os programas supervisórios existentes fornecem um número limitado de recursos de visualização, que se restringem principalmente ao software. Assim, o que se propõe nesse trabalho é um sistema supervisório de baixo custo, via TCP/IP, aplicado em máquinas elétricas, mas que pode ser generalizado na supervisão de outros tipos de sistemas, onde o monitoramento remoto é necessário. Além da exibição convencional dos parâmetros supervisionados através de gráficos e labels, o sistema permite também que esses sejam exibidos através de painéis eletrônicos, fornecendo assim, uma nova interface visual ao usuário com o intuito de facilitar sua supervisão. / The advent of internet simplified the comunication between remote systems, allowing the application of supervisory systems through the internet, mainly using the TCP/IP protocol. Although these systems have already been employed in industry, using the Programmer Logic Controller (PLC\'s) as driver, the implementation of any simple supervisory system could have an expensive cost, due to the prices of hardware and software employed. Moreover, the existing supervisory systems provide limited visual resources, restricted to the used software. So, this work presents a low cost supervisory system, via TCP/IP, applied to electric machines but it can be generalized in the supervision of differents types of systems, where the remote monitoring is necessary. Besides the conventional displaying of the monitored parameters through graphics and labels, the developed system allows the exhibition of the supervisioned parameters using eletronic panels, providing an alternative visual interface to the user so that their supervision becomes easier.
244

SACK TCPVENO: an enhanced version of SACK TCP. / SACK TCP VENO

January 2001 (has links)
by Chung Ling Chi. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 74-76). / Abstracts in English and Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Overview --- p.1 / Chapter 1.2 --- Motivation and Proposed Solution --- p.2 / Chapter 1.3 --- Organization of the Thesis --- p.4 / Chapter Chapter 2 --- Background --- p.5 / Chapter 2.1 --- Basics of Transmission Control Protocol --- p.5 / Chapter 2.1.1 --- Slow Start and Congestion Avoidance --- p.5 / Chapter 2.1.2 --- Fast Retransmit and Fast Recovery --- p.7 / Chapter 2.2 --- SACK TCP Mechanism --- p.8 / Chapter 2.2.1 --- SACK-permitted Option during Three-way Handshake --- p.8 / Chapter 2.2.2 --- SACK blocks in SACK Option --- p.9 / Chapter 2.2.3 --- Interpreting the SACK Option using Scoreboard --- p.10 / Chapter 2.2.4 --- Retransmission Strategy --- p.11 / Chapter 2.3 --- TCP Veno Mechanism --- p.13 / Chapter 2.3.1 --- Refined Additive Increase --- p.13 / Chapter 2.3.2 --- Refined Multiplicative Decrease --- p.14 / Chapter Chapter 3 --- SACK TCPVeno --- p.16 / Chapter 3.1 --- Distinguishing between Types of Packet Loss --- p.17 / Chapter 3.2 --- Refined Multiplicative Decrease --- p.21 / Chapter 3.2.1 --- Algorithm --- p.21 / Chapter 3.2.2 --- Recovery in Consecutive packet Losses --- p.22 / Chapter 3.2.3 --- Recovering Multiple Packet Losses within a Single Window --- p.26 / Chapter 3.3 --- Refined Additive Increase --- p.37 / Chapter 3.3.1 --- Algorithm --- p.37 / Chapter 3.3.2 --- Advantages --- p.40 / Chapter 3.4 --- Other Issues --- p.43 / Chapter 3.4.1 --- Two Side Modifications --- p.43 / Chapter Chapter 4 --- Experiments --- p.44 / Chapter 4.1 --- The Network Scenario --- p.44 / Chapter 4.1.1 --- Dummynet --- p.45 / Chapter 4.2 --- Experiment Results --- p.47 / Chapter 4.2.1 --- Single Connection --- p.47 / Chapter 4.2.1.1 --- Congestion Window Evolution --- p.47 / Chapter 4.2.1.2 --- Sending Rate and Throughput Evolution --- p.49 / Chapter 4.2.1.2.1 --- Impact of Packet Loss Rate Due to Lossy Link --- p.49 / Chapter 4.2.1.2.2 --- Impact of Buffering --- p.52 / Chapter 4.2.1.2.3 --- Impact of Propagation Delay --- p.57 / Chapter 4.2.2 --- Multiple Connections --- p.62 / Chapter 4.2.2.1 --- Fairness --- p.62 / Chapter 4.2.2.2 --- Compatibility --- p.67 / Chapter Chapter 5 --- Conclusion --- p.72 / Bibliography --- p.74
245

Implementación de mecanismos de transición al protocolo IPv6 en VNUML y en una red Windows

Vivas Ruiz, Jesús Marco 17 April 2017 (has links)
El objetivo de la presente tesis es implementar un laboratorio virtual para simular los mecanismos de transición vigentes en redes IPv4/IPv6, aplicándolos en el enrutamiento dinámico, y para facilitar su implementación en una red de área local con usuarios Windows. La metodología usada en este documento consiste en, por un lado, establecer un enlace a un repositorio remoto con el uso de la herramienta Apache Subversion. En donde, bajo la supervisión del Asesor de la tesis, se realiza el control de versiones de los escenarios virtuales y del documento de la tesis. Así mismo, a través de reuniones presenciales y virtuales con la herramienta de comunicación Skype, se verifica el avance del presente trabajo. Por otro lado, en cuanto al desarrollo de la tesis, en primer lugar, se diseña la topología de los escenarios para su posterior implementación a través de la lógica del lenguaje de programación de la herramienta de virtualización. En segundo lugar, se realiza la ejecución de pruebas de conectividad y eficiencia de los escenarios virtuales. Y, en tercer lugar, a partir del resultado de las pruebas obtenidas en los escenarios virtuales, se selecciona los mecanismos adecuados para lograr la migración de una red con clientes Windows a IPv6. Esto, sin afectar los servicios y la operatividad de la red. En el Capítulo I, se describe la necesidad de adoptar el protocolo IPv6. Se exponen las ventajas del protocolo IPv6 sobre IPv4. Además, se analiza los mecanismos de traducción, NAT64+DNS64, y de túneles, 6to4 y 6RD; se describe el protocolo ICMPv6, el papel que cumple en el direccionamiento dinámico IPv6 y en el sistema de nombres de dominio (DNS) en IPv6. Así mismo, se muestra la situación actual de la Red Académica Peruana RAAP y de los operadores de telecomunicaciones en la adopción de IPv6. En relación a la tendencia actual de los mecanismos de transición en las redes móviles, se describe el estado y uso de las tecnologías, como Dual- Stack y 464XLAT. Por otro lado, el primer aporte de la tesis se muestra en el Capítulo II. La implementación de los escenarios virtuales utilizando una herramienta desarrollada por la Universidad Politécnica de Madrid llamada VNUML. En donde, el único requerimiento que permite ejecutar los escenarios completos es adecuar un solo equipo anfitrión con capacidades de procesamiento y almacenamiento necesarios para la óptima ejecución de cada máquina virtual. En ese sentido, a través del diseño e implementación de cada escenario virtual que corresponde a los mecanismos de traducción NAT64 y DNS64, y los túneles 6to4 y 6RD, se demuestra la capacidad de la herramienta VNUML en el diseño, ejecución y comprobación de los aspectos teóricos señalados en el primer capítulo de esta tesis. El siguiente aporte de esta tesis se muestra en el Capítulo III. La migración de una red privada de usuarios Windows a IPv6. En primer lugar, se hace un despliegue dinámico de direcciones IPv6 a través de DHCPv6 + SLAAC. En segundo lugar, el acceso a los servicios e Internet IPv4 se realiza a través de NAT64 stateful y DNS64. Y, en tercer lugar, el acceso a Internet IPv6 se hace posible con el mecanismo NAT66. De esta manera, se demuestra que es factible desplegar IPv6 de forma transparente para los usuarios finales. / Tesis
246

Migración de una red de cajeros automáticos a TCP/IP

Vásquez Montes, Christian Eddy 25 November 2011 (has links)
Se plantea un problema de cambio de infraestructura y rediseño de red de comunicaciones en una empresa dedicada al servicio de transferencia electrónica de fondos interbancarios a través de una red de cajeros automáticos y al procesamiento y administración de tarjetas de débito y crédito. Tanto en el frente de los cajeros automáticos o terminales transaccionales, como en el frente de los computadores que autorizan las transacciones, se han ido experimentando y exigiendo cambios, los cuales no solo han involucrado nuevas tecnologías y aplicaciones, sino también la apertura a protocolos de comunicación como el TCP/IP con nuevos servicios y posibilidades, en un servicio financiero, que por mantener altos niveles de seguridad, mantenía protocolos de comunicación “heredados” como el X.25 y el SNA. En el presente documento se revisa la situación inicial de la red, los servicios y las necesidades del negocio, y la evolución de las redes de cajeros. Con el fin de conseguir los objetivos, se plantean propuestas de solución para dar soporte a las aplicaciones con protocolos “heredados” en una red IP, se revisan las alternativas técnico-económicas de enlaces de comunicación, las propuestas para la renovación de la infraestructura de comunicaciones y seguridad, y finalmente una serie de recomendaciones para la implantación y la migración a la red IP. Con un adecuado planeamiento e implantación de políticas de seguridad adecuadas, en una red privada, publica o compartida con otra institución, es posible conseguir una red de cajeros automáticos TCP/IP eficiente, segura, con alta disponibilidad, y capaz de brindar mayores servicios. / Tesis
247

Should we give every cow its calf? : monopoly, competition and transaction costs in the promotion of innovation and creativity

Pollock, Rufus January 2008 (has links)
The work presented here is part of a wider research programme oriented around three specific questions. First, how do individual agents appropriate returns from innovation and how is this affected by the availability (or not) of intellectual property rights such as copyrights and patents? Second, how does this translate into the aggregate production of knowledge, once one takes account of the interaction between producers and the cumulative nature of the process of knowledge production? Finally, How can we incorporate this into an estimate of the welfare trade-off inherent in intellectual property rights (the basic prerequisite for formulating rational IP policy)? The dissertation contains theoretical work on each of these questions together with a brief introductory preamble and a review of the existing literature on the economics of knowledge.
248

Development and applications of high-throughput SNP genotyping technologies in non-model plant genomes

Silva Junior, Orzenil Bonfim da 11 July 2017 (has links)
Submitted by Sara Ribeiro (sara.ribeiro@ucb.br) on 2017-09-08T18:11:30Z No. of bitstreams: 1 OrzenilBonfimdaSilvaJuniorTeseParcial2017.pdf: 781918 bytes, checksum: 8eef627ca550957f6bfa1f46e54c687c (MD5) / Approved for entry into archive by Sara Ribeiro (sara.ribeiro@ucb.br) on 2017-09-08T18:11:38Z (GMT) No. of bitstreams: 1 OrzenilBonfimdaSilvaJuniorTeseParcial2017.pdf: 781918 bytes, checksum: 8eef627ca550957f6bfa1f46e54c687c (MD5) / Made available in DSpace on 2017-09-08T18:11:38Z (GMT). No. of bitstreams: 1 OrzenilBonfimdaSilvaJuniorTeseParcial2017.pdf: 781918 bytes, checksum: 8eef627ca550957f6bfa1f46e54c687c (MD5) Previous issue date: 2017-07-11 / In the last twenty-five years, we have witnessed the wide adoption of DNA markers for the study of genetic variation in many organisms. A DNA marker must have two or more identifiable allelic DNA sequences to be useful. It usually does not have a biological effect, but instead functions as a traceable landmark in the genome, found in a specific location, and transmitted by the standard laws of inheritance from one generation to the next. Its application goes beyond genetic mapping and includes the analysis of genetic diversity, marker-trait association studies, marker assisted selection and, more recently, with the advent of wholegenome sequencing, whole-genome association and genomic selection. Among the several types of DNA sequence polymorphisms that can be used as DNA marker, Single Nucleotide Polymorphisms (SNPs) are the most powerful for large-scale variation analysis. There are vast numbers of SNPs in every genome and they can be typed by methods that have been proven easy to automate. Detection of alternative alleles is rapid and effortless because it is based on well-known polymerase chain reaction and DNA oligomer hybridization assays. Various strategies have been devised to discriminate alleles at a SNP, including fixed DNA arrays technologies, solution hybridization techniques and many sequencing-based genotyping. In our study, we have developed high-throughput DNA marker systems for non-model, highly heterozygous, diploid tree species. We took advantage of the combined power of Next Generation Sequencing (NGS) technologies, well-established highly automated methods of SNP typing and bioinformatics algorithms to perform genome-wide DNA variation analysis. We used whole genome resequencing of pooled individuals to develop a high-density 60K SNP chip for Eucalyptus species (EucHIP60k) providing a 96% genome-wide coverage with 1 SNP/12???20 kbp, and 47,069 SNPs at ??? 10 kb from 30,444 of the 33,917 genes in the Eucalyptus genome. We then used high-density SNP data and whole-genome pooled resequencing to examine the landscape of population recombination (??) and theta (??), assess the extent of linkage disequilibrium (r2) and build the highest density linkage maps for Eucalyptus to date. Chromosome-wide ancestral recombination graphs allowed us to date the split of Eucalytpus grandis (1.7???4.8 million yr. ago) and identify a scenario for the recent demographic history of the species. In a final set of studies, we built the first genome assembly for a Neotropical forest tree, the Pink Ip?? (Handroanthus impetiginosus), a highly-valued keystone timber species. Genome sequence was screened for the development of a targeted-capture sequencing system for SNP genotyping consisting of nearly 24,000 probe sequences. This genotyping system showed flexibility as it allowed the identification of SNPs across different populations of the species in moderate sample sizes. The good genome coverage, consistent Ts/Tv ratio estimated across samples and fair technical reproducibility between replicates, in terms of recall and precision of the SNP calling and accuracy on genotypes, indicate that this genotyping platform can be confidently used to estimate population genetics parameters and carry out population genomics investigations at the genome-wide scale / ***
249

IP BASED PATIENT MONITORING SYSTEMS

Syed Muhammad Yasir, Jafri January 2010 (has links)
No description available.
250

TCP performance over mobile data networks. / Transmission control protocol performance over mobile data networks / CUHK electronic theses & dissertations collection

January 2013 (has links)
近年來,使用者通過移動數據網路,如3G和LTE,連接到互聯網的數目急劇增加。眾所周知無線網路和移動數據網路展現的特點和有線網路有很大的不同。儘管如此,大多數移動應用程式的基本構建塊,即傳輸控制協議(TCP),在很大程度上仍是根植於有線網路。本論文通過廣泛的開展多個移動數據網路,包括3G,HSPA,最新的LTE網路的測試和實驗,探討TCP在現代移動數據網路的性能。儘管移動數據網路頻寬的迅速增加,我們的測量結果均顯示,現有的TCP實現在實踐中表現不佳,未能利用高速移動數據網路豐富的頻寬。這項工作解決TCP的性能限制,採用一種新的方法透明協議優化,通過在中間網路設備即時優化TCP,顯著提高TCP的吞吐量。具體來說,這項工作發展(一)一個新穎的機會傳輸算法克服TCP的流量控制的瓶頸;(二)一個傳輸速率控制演算法來解決TCP的拥塞控制的瓶頸;(三)一個新穎的投機重傳演算法,以提高TCP在重傳中的吞吐量;(四)用隨機模型來量化TCP吞吐量性能對移動網路資源利用率的影響;(五)一個新的隊列長度測量算法,為擁塞控制和網路監測打開一條新的途徑。另外,擬議的協議優化技術已全面實施,變成一個移動加速器裝置已經成功在三個不同的3G/LTE生產移動數據網路領域試用,實驗顯示TCP的吞吐量從48%增加至163%。在發明一種新的傳輸協議,或修改現有的TCP實施相比,所提出的方法不要求在用戶端/伺服器的主機現有的TCP實施任何修改,不需要重新配置伺服器或用戶端,並因此可以容易在現今的3G和4G移動網路部署,提高所有現有網路上運行在TCP之上的應用程式的吞吐量性能。 / The number of Internet users which are connected via mobile networks such as 3G and LTE has increased dramatically in recent years. It is well-known that wireless networks in general, and mobile data networks in particular, exhibit characteristics that are very different from their wired counterparts. Nevertheless, the fundamental building block of most Internet applications, namely the Transmission Control Protocol (TCP), is still largely rooted in wired networks. This dissertation investigate the performance of TCP over modern mobile data networks through extensive measurements and experiments carried out in multiple production data networks, ranging from 3G, HSPA, to the latest LTE networks. Despite the rapid increases in mobile network bandwidth, our measurements consistently reveal that existing TCP implementations perform sub-optimally in practice, failing to utilize the abundant bandwidth available in high-speed mobile networks. This work tackles the performance limitations of TCP using a novel approach - transparent protocol optimization, to significantly improve TCP’s throughput performance using on-the-fly protocol optimization carried out by an intermediate network device in-between the TCP end-hosts. Specifically, this work develops (i) a novel opportunistic transmission algorithm to overcome the TCP’s flow control bottleneck; (ii) a transmission rate control algorithm to tackle TCP’s congestion control bottleneck; (iii) a new opportunistic retransmission algorithm to improve TCP’s performance during packet loss recovery; (iv) a stochastic model to quantify the impact of TCP throughput performance on mobile network capacity; and (v) a new queue length estimation algorithm which opens a new avenue for congestion control and network monitoring. In addition, the proposed protocol optimization techniques have been fully implemented into a mobile accelerator device which has been successfully field trialed in three different production 3G/LTE mobile networks, consistently increasing TCP’s throughput by 48% to 163%. In contrast to inventing a new transport protocol or modifying an existing TCP implementation, the proposed approach does not require any modification to the existing TCP implementation at the client/server hosts, does not require any reconfiguration of the server or client, and hence can be deployed readily in today’s 3G and 4G mobile networks, raising the throughput performance of all existing network applications running atop TCP. / Detailed summary in vernacular field only. / Liu, Ke. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 166-174). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese. / Abstract --- p.2 / Acknowledgement --- p.6 / Chapter 1 --- p.1 / Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Contributions --- p.3 / Chapter 1.3 --- Structure of the Thesis --- p.6 / Chapter 2 --- p.9 / Flow and Congestion Control --- p.9 / Chapter 2.1 --- TCP Performance Bottlenecks --- p.9 / Chapter 2.2 --- Background and related works --- p.16 / Chapter 2.3 --- Transparent Protocol Optimization --- p.20 / Chapter 2.3.1 --- Opportunistic Transmission --- p.20 / Chapter 2.3.2 --- Transmission Rate Control --- p.22 / Chapter 2.3.3 --- Lost Packet Recovery --- p.27 / Chapter 2.4 --- Modeling and Analysis --- p.28 / Chapter 2.4.1 --- Background and Assumptions --- p.28 / Chapter 2.4.2 --- Queue Length at the Radio Interface --- p.31 / Chapter 2.4.3 --- Queue Length Bounds --- p.38 / Chapter 2.4.4 --- Guaranteeing Full Bandwidth Utilization --- p.45 / Chapter 2.4.5 --- Link Buffer Size Requirement --- p.47 / Chapter 2.5 --- Performance Evaluation --- p.53 / Chapter 2.5.1 --- Parameter Tuning --- p.53 / Chapter 2.5.2 --- Bandwidth Efficiency --- p.56 / Chapter 3 --- p.62 / Packet Loss Recovery --- p.62 / Chapter 3.1 --- Introduction --- p.62 / Chapter 3.2 --- TCP Loss Recovery Revisited --- p.64 / Chapter 3.2.1 --- Standard TCP Loss Recovery Algorithm --- p.64 / Chapter 3.2.2 --- Loss Recovery Algorithm in Linux --- p.66 / Chapter 3.2.3 --- Loss Recovery Algorithm in A-TCP --- p.67 / Chapter 3.3 --- Efficiency of TCP Loss Recovery Algorithms --- p.68 / Chapter 3.3.1 --- Standard TCP Loss Recovery Algorithm --- p.70 / Chapter 3.3.2 --- TCP Loss Recovery in Linux --- p.72 / Chapter 3.3.3 --- Loss Recovery Algorithm Used in A-TCP --- p.72 / Chapter 3.3.4 --- Discussions --- p.73 / Chapter 3.4 --- Opportunistic Retransmission --- p.74 / Chapter 3.4.1 --- Applications and Performance Analysis --- p.76 / Chapter 3.4.2 --- Bandwidth Utilization During Loss Recovery --- p.78 / Chapter 3.5 --- Experimental Results --- p.81 / Chapter 3.5.1 --- Model Validation --- p.85 / Chapter 3.5.2 --- Impact of Loss Recovery Phase on TCP Throughput --- p.85 / Chapter 3.5.3 --- A-TCP with Opportunistic Retransmission --- p.86 / Chapter 3.6 --- Summary --- p.87 / Chapter 4 --- p.89 / Impact on Mobile Network Capacity --- p.89 / Chapter 4.1 --- Introduction --- p.89 / Chapter 4.2 --- Background and Related Work --- p.91 / Chapter 4.2.1 --- TCP Performance over Mobile Data Networks --- p.91 / Chapter 4.2.2 --- Modeling of Mobile Data Networks --- p.92 / Chapter 4.3 --- System Model --- p.94 / Chapter 4.3.1 --- Mobile Cell Bandwidth Allocation --- p.95 / Chapter 4.3.2 --- Markov Chain Model --- p.96 / Chapter 4.3.3 --- Performance Metric for Mobile Internet --- p.98 / Chapter 4.3.4 --- Protocol-limited Capacity Loss --- p.100 / Chapter 4.3.5 --- Channel-limited Capacity Loss --- p.101 / Chapter 4.4 --- Performance Evaluation --- p.102 / Chapter 4.4.1 --- Service Response Time --- p.103 / Chapter 4.4.2 --- Network Capacity Loss --- p.105 / Chapter 5 --- p.114 / Mobile Link Queue Length Estimation --- p.114 / Chapter 5.1 --- Introduction --- p.115 / Chapter 5.2 --- Sum-of-Delay (SoD) algorithm Revisited --- p.117 / Chapter 5.2.1 --- Queue Length and Link Buffer Size Estimation --- p.117 / Chapter 5.2.2 --- A Bound on Estimation Error --- p.120 / Chapter 5.2.3 --- Impact of Uplink Delay Variations --- p.122 / Chapter 5.3 --- Uplink Delay Variation Compensation --- p.127 / Chapter 5.3.1 --- Exploiting the TCP Timestamp Option --- p.127 / Chapter 5.3.2 --- TCP Timestamp Granularity --- p.130 / Chapter 5.4 --- Performance Evaluation --- p.131 / Chapter 5.4.1 --- Link buffer size estimation under uplink delay variations --- p.132 / Chapter 5.4.2 --- Queue length estimation under uplink delay variations --- p.136 / Chapter 5.5 --- Summary --- p.136 / Chapter 6 --- p.139 / Summary and Future Works --- p.139 / Chapter 6.1 --- Transparent Protocol Optimization --- p.139 / Chapter 6.2 --- Cross-Layer Modeling and Optimization of Mobile Networks --- p.141 / Chapter Appendix A. --- Derivation of Equations (2.24) and (2.25) --- p.143 / Chapter Appendix B. --- Proof of Theorem 2.1 --- p.145 / Chapter Appendix C. --- for Proof of Theorem 2.2 --- p.147 / Chapter Appendix D. --- for Proof of Theorem 2.3 --- p.150 / Chapter Appendix E. --- for Proof of Theorem 2.4 --- p.151 / Chapter Appendix F. --- for Proof of Theorem 2.5 --- p.152 / Chapter Appendix G. --- for Proof of Theorem 2.6 --- p.153 / Chapter Appendix H. --- for Proof of Theorem 2.7 --- p.156 / Chapter Appendix I. --- for Proof of Theorem 2.8 --- p.157 / Chapter Appendix J. --- for Proof of Theorem 3.2 --- p.161 / Chapter Appendix K. --- for Theorem 3.4 --- p.163 / Chapter Appendix H. --- for Theorem 3.5 --- p.164 / Bibliography --- p.166

Page generated in 0.0538 seconds