• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 496
  • 208
  • 135
  • 93
  • 75
  • 74
  • 48
  • 41
  • 28
  • 18
  • 16
  • 16
  • 15
  • 14
  • 10
  • Tagged with
  • 1373
  • 491
  • 354
  • 353
  • 252
  • 191
  • 167
  • 150
  • 150
  • 116
  • 116
  • 112
  • 101
  • 99
  • 97
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
951

Snížení paměťové náročnosti stavového zpracování síťového provozu / Memory Reduction of Stateful Network Traffic Processing

Hlaváček, Martin January 2012 (has links)
This master thesis deals with the problems of memory reduction in the stateful network traffic processing. Its goal is to explore new possibilities of memory reduction during network processing. As an introduction this thesis provides motivation and reasons for need to search new method for the memory reduction. In the following part there are theoretical analyses of NetFlow technology and two basic methods which can in principle reduce memory demands of stateful processing. Later on, there is described the design and implementation of solution which contains the application of these two methods to NetFlow architecture. The final part of this work summarizes the main properties of this solution during interaction with real data.
952

Monitorovací a zabezpečovací systém / Monitoring and Security System

Felix, Martin January 2010 (has links)
This master's thesis deals with design and implementation of system for securing and monitoring objects. The whole system is serving as an application getaway between typical TCP/IP network and heterogeneous network containing different end devices such as security cameras, microphones and some sensors (e.g. for temperature measurement). In case of detected event, the notification is created, recorded and the user is informed via administrative front-end. System can be managed from remote location and data from devices can be shown by web interface. Theoretical part of this project concerns with the analysis of different types of connecting devices and sensors and the possibilities of their usage for the monitoring systems along with description of communications protocols for each end device. The next part deals with the cameras interfaces, content analysis and connectivity with central server. Practical part describes methods and techniques used for implementation of system.
953

Performance analysis of IPv4 / IPv6 protocols over the third generation mobile network

Abad Camarero, Daniel January 2014 (has links)
Currently, the IPv4 protocol is heavily used by institutions, companies and individuals, but every day there is a higher number of devices connected to the network such as home appliances, mobile phones or tablets. Each machine or device needs to have its own IP address to communicate with other machines connected to Internet. This implies the need for multiple IP addresses for a single user and the current protocol begins to show some deficiencies due to IPv4 address space exhaustion. Therefore, for several years experts have been working on an IP protocol update: the IPv6 128-bit version can address up to about 340 quadrillion system devices concurrently. With IPv6, today, every person on the planet could have millions of devices simultaneously connected to the Internet. The choice of the IP protocol version affects the performance of the UMTS mobile network and the browsers as well. The aim of the project is to measure how the IPv6 protocol performs compared to the previous IPv4 protocol. It is expected that the IPv6 protocol generates a smaller amount of signalling and less time is required to fully load a web page. We have analysed some KPIs (IP data, signalling, web load time and battery) in lab environment using Smartphones, to observe the behaviour of both, the network and the device.  The main conclusion of the thesis is that IPv6 really behaves as expected and generates savings in signalling, although the IP data generated is larger due to the size of the headers. However, there is still much work as only the most important webpages and the applications with a high level of market penetration operate well over the IPv6 protocol. / Cada día existe un mayor número de dispositivos conectados a la red, tales como electrodomésticos, teléfonos móviles inteligentes o tabletas, por lo que la red debe evolucionar constantemente y ser capaz de proveer servicio a todos los usuarios. Cada equipo necesita tener su propia dirección IP para comunicarse con otras máquinas conectadas a Internet, por lo que es necesario tener un gran número de direcciones IP y la versión del protocolo actual comienza a mostrar algunas deficiencias (debido fundamentalmente al agotamiento del espacio de direccionamiento IPv4 y algunas funciones de seguridad que han quedado obsoletas). Desde hace varios años, los expertos están trabajando en una actualización del protocolo IP: la versión seis (llamada IPv6) que utiliza 128 bits para el direccionamiento pudiendo administrar simultáneamente hasta unos 340 trillones de dispositivos al mismo tiempo. La elección de la versión del protocolo IP afecta al comportamiento de la red móvil, ya que los expertos todavía están optimizando y realizando cambios en la arquitectura de red y en los dispositivos para soportar el protocolo IPv6. El objetivo del proyecto consiste en comparar y evaluar las diferentes versiones del protocolo IP utilizado, en gran medida, para acceder a la red de internet. La principal conclusión del proyecto es que IPv6 realmente se comporta como se espera y genera ahorros en la señalización, aunque los datos IP generados son mayores. Sin embargo, aún queda mucho trabajo por hacer, ya que sólo las páginas más importantes y las aplicaciones más utilizadas por los usuarios funcionan bien sobre el protocolo IPv6.
954

Protecting IP at the Border : A Study of Customs Enforcement Mechanism for Protection of Intellectual Property Rights in the Eurasian Economic Union

Martirosyan, Nelli January 2020 (has links)
No description available.
955

Garanties de performance pour les flots IP dans l'architecture Flow-Aware Networking / Flow-level performance guarantees for IP traffic in the Flow-Aware Networking architecture

Augé, Jordan 27 November 2014 (has links)
La thèse s'intéresse à la réalisation d'une architecture de Qualité de Service en rupture avec les approches classiques, permettant d'offrir des garanties de bout en bout pour le trafic. L'approche Flow-Aware Networking considère le trafic au niveau des flux applicatifs, pour lesquels des modèles de trafic simples mais robustes conduisent à une relation fondamentale entre ressources offertes par le réseau, la demande générée, et la performance obtenue. En particulier, l'architecture de routeur Cross-Protect propose la combinaison d'un ordonnancement fair queueing et d'un contrôle d'admission afin d'assurer de manière implicite la performance des flots streaming et élastique, sans nécessiter ni marquage ni procotole de signalisation. Dans un tel contexte, nous considérons le dimensionnement des buffers au sein des routeurs, l'introduction d'un ordonnancement de type fair queueing dans le réseau et son impact sur la performance des protocoles TCP, ainsi que la réalisation d'un algorithme de contrôle d'admission approprié. Pour terminer, une déclinaison de cette architecture pour le réseau d'accès est proposée. / The thesis deals with the realization of a Quality of Service architecture that breaks with traditional approaches, and allows end-to-end performance guarantees for the traffic. The Flow-Aware Networking approach considers the traffic at the flow level, for which simple but robust traffic models lead to a fundamental relationship between the resources offered by the network, the demand and the obtained performance. In particular, the Cross-Protect router architecture proposes the combination of a fair queueing scheduler, and an admission control so as to implicitly ensure the performance of both streaming and elastic flows, without the need for any marking nor signalization protocol. In such a context, we consider the sizing of router buffers, the introduction of fair queueing scheduling inside the network and its impact on the performance of TCP protocols, as well as the realization of a suitable admission control algorithm. Finally, a declination of this architecture for the access network is proposed.
956

Evaluation et optimisation de la performance des flots dans les réseaux stochastiques à partage de bande passante / Evaluation and optimization of flow performance in stochastic bandwidth-sharing networks

Ben Cheikh, Henda 22 May 2015 (has links)
Nous étudions des modèles mathématiques issus de la théorie des files d’attente pour évaluer et optimiser les performances des mécanismes de partage de ressources entre flots dans les réseaux. Dans une première partie, nous proposons des approximations simples et explicites des principales métriques de performance des flots élastiques dans les réseaux à partage de bande passante opérant sous le mode ”équité équilibré”. Nous étudions ensuite le partage de bande passante entre flux élastiques et flux de streaming en supposant que le nombre de ces derniers est limité par un mécanisme de contrôle d’admission et proposons des approximations de performance basées sur une hypothèse de quasi stationnarité. Les résultats de simulation montrent le bon niveau de précision des approximations proposées.Dans une deuxième partie, nous étudions le compromis entre délai et énergie dans les réseaux à partage de bande passante dont les noeuds peuvent réguler leur vitesse en fonction de la charge du système. En supposant que le réseau est initialement dans un état de congestion, on s’intéresse à la politique optimale d’allocation de débit permettant de le vider à coût minimal. L’analyse de la politique stochastique optimale via la théorie des processus de décision markoviens étant extrêmement difficile, nous proposons de l’approximer en utilisant un modèle fluide déterministe qui peut être résolu grâce à des techniques de contrôle optimal. Pour le cas d’un seul lien partagé par plusieurs classes de trafic, on montre que la politique optimale correspond à la règle cμ et on propose une expression explicite de la vitesse optimale. Enfin, dans une troisième partie, on s’intéresse aux plateformes de Cloud Computing dans le cadre du modèle SaaS. En supposant un partage équitable des ressources physiques entre machines virtuelles s’exécutant de manière concurrente, nous proposons des modèles de file d’attente simples pour prédire les temps de réponse des applications. Les modèles proposés prennent explicitement en compte le comportement des différentes classes d’application (tâches interactives, de calcul ou permanentes). Les expérimentations menées sur une plateforme réelle montrent que les modèles mathématiques obtenus permettent de prédire les temps de réponse avec une bonne précision. / We study queueing-theoretic models for the performance evaluation and optimization of bandwidth-sharing networks. We first propose simple and explicit approximations for the main performance metrics of elastic flows in bandwidth-sharing networks operating under balanced fairness. Assuming that an admission control mechanism is used to limit the number of simultaneous streaming flows, we then study the competition for bandwidth between elastic and streaming flows and propose performance approximations based on a quasi-stationary assumption. Simulation results show the good accuracy of the proposed approximations. We then investigate the energy-delay tradeoff in bandwidth-sharing networks in which nodes can regulate their speed according to the load of the system. Assuming that the network is initially congested, we investigate the rate allocation to the classes that drains out the network with minimum total energy and delay cost. We formulate this optimal resource allocation problem as a Markov decision process which proves tobe both analytically and computationally challenging. We thus propose to solve this stochastic problem using a deterministic fluid approximation. For a single link sharedby an arbitrary number of classes, we show that the optimal-fluid solution follows thewell-known cμ rule and give an explicit expression for the optimal speed. Finally, we consider cloud computing platforms under the SaaS model. Assuming a fair share of the capacity of physical resources between virtual machines executed concurrently, we propose simple queueing models for predicting response times of applications.The proposed models explicitly take into account the different behaviors of the different classes of applications (interactive, CPU-intensive or permanent applications). Experiments on a real virtualized platform show that the mathematical models allow to predict response times accurately
957

Návrh testů komunikace se skupinovým adresováním v IP / Design of IP Multicast Communication Tests

Stehura, Igor January 2008 (has links)
This masters thesis is about mutlicast. There are explained 2nd and 3th layers of the ISO/OSI model multicast addressing. Routers in a network use multicast routing protocols to optimally route multicast packet through the network, this is also in this project. These multicast protocols are DVMRP, protocol PIM in his two modes, PIM Sparse Mode and PIM Dense Mode. Protocol DVMRP uses protocol IGMP, which is described as well. At practical section of this masters thesis is presented connections, by which tests was executed.
958

[en] NEW NETWORK SOLUTIONS AND NEXT GENERATION ENTERTAINMENT SERVICES / [pt] NOVAS SOLUÇÕES DE REDES E SERVIÇOS DE ENTRETENIMENTO DE ÚLTIMA GERAÇÃO

CARLOS ALBERTO GAROFALO 28 December 2005 (has links)
[pt] O principal objetivo desta dissertação consiste na proposta de implementação de uma rede de telecomunicações utilizando novas tecnologias, enfatizando as aplicações de entretenimento. As soluções adotadas foram orientadas pelas características econômicas verificadas nas áreas nobres das regiões metropolitanas brasileiras e também pelas novas tecnologias de roteamento, chaveamento, armazenamento e distribuição local. A avaliação do custo de investimento e operacional da rede, bem como a formulação de um modelo de negócios associado a uma estrutura de serviços oferecidos foram apresentadas e desenvolvidas. A construção de um plano de negócio hipotético para avaliar a relação custo-benefício resultante da utilização da infra-estrutura da rede proposta associado ao modelo e estrutura dos serviços elaborados foi implementado e executado. Quatro alternativas de implementação de rede foram avaliadas. / [en] The present dissertation is aiming at proposing a telecommunications network implementation using some new technologies where the emphasis is put on entertainment applications. The adopted solutions try to offer a selection grid that qualitatively cope with the economic level of some selected noble metropolitan areas in Brazil and rely in new routing, switching storage and local distribution technologies. The investment evaluation, the operational network costs and the formulation of a business model associated with the respective used service structure is subsequently introduced and described. Next, a hypothetic business plan service model is launched in order to evaluate the cost-benefit ratio between the network infrastructure proposed working together with its new service model and its new structure. Four possible alternatives of network implementation were evaluated and commented.
959

Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors? / Undersökning av effektiviteten hos smygande kapningar mot offentliga ruttinsamlare : Är AS-Path Prepending tillräckligt för att dölja från offentliga ruttinsamlare?

Wang, Kunyu January 2023 (has links)
BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. However, by using AS-Path Prepending, a well-known traffic engineering technique, hijackers could adjust the influence scope of hijacks to potentially avoid Public Route Collectors. This thesis investigates fist, whether AS-Path Prepending is sufficient to hide from Public Route Collector, and second whether the hijacker can predict its hijack’s stealthiness by simply comparing the AS path length with the victim. Last, we investigate the non-hijacker-controlled parameters, which are the geographical locations and victim prepending times if the victim also enable AS-Path Prepending for traffic engineering in our study. Our results show that on one hand, AS-Path Prepending benefits stealthy hijacks to route collectors. While on the other hand, it is not sufficient to completely hide from route collectors only using it. By simply comparing the AS paths length, the hijacker’s prediction is constructive but not practical. And non-hijacker-controlled parameters indeed can significantly affect the stealthiness of hijacking. / BGP-kapning är ett hot mot nätverksorganisationer eftersom traditionella BGP-protokoll inte har utformats med säkerheten i åtanke. För närvarande bedrivs forskning för att bekämpa kapning genom att upptäcka kapning i realtid från offentliga ruttinsamlare. Genom att använda AS-Path Prepending, en välkänd trafikteknik, kan kapare dock justera kapningarnas inflytande för att eventuellt undvika offentliga ruttinsamlare. I den här avhandlingen undersöks för det första om AS-Path Prepending är tillräckligt för att dölja sig för Public Route Collector och för det andra om kaparen kan förutsäga hur smygande kapningen är genom att helt enkelt jämföra AS Path-längden med offrets. Slutligen undersöker vi de parametrar som inte kontrolleras av kaparen, dvs. geografiska platser och offrets prependingtider om offret också aktiverar AS-Path Prepending för trafikteknik i vår studie. Våra resultat visar att AS-Path Prepending å ena sidan gynnar smygande kapningar av ruttinsamlare. Å andra sidan räcker det inte för att helt och hållet dölja sig för ruttinsamlare om man bara använder det. Genom att helt enkelt jämföra AS-vägarnas längd är kaparens förutsägelser konstruktiva men inte praktiska. Parametrar som inte kontrolleras av kaparen kan faktiskt påverka kapningens smygande på ett betydande sätt.
960

TNIP1 regulates myddosome dynamics during IL-1β signaling

Gerpott, Fenja Helga Ursel 03 May 2023 (has links)
Die Interleukin 1β (IL-1β) vermittelte Signaltransduktion ist für die akute Entzündung von entscheidender Bedeutung, muss aber gleichzeitig streng reguliert werden. Wie setzt das intrazelluläre IL-1β-Signalnetzwerk den extrazellulären Nachweis von IL-1β effizient in eine präzise und angemessene zelluläre Reaktion um? Welche Kontrollmechanismen kommen zum Einsatz, um eine angemessene Antwort zu gewährleisten und eine Hypo- oder Hyperantwort zu verhindern? Diese Arbeit charakterisiert die IL-1β-vermittelte Signalwegdynamik in EL4-Zellen mithilfe der Immunpräzipitations-Massenspektrometrie (IP-MS), konkret von MyD88, IRAK4 und IRAK1. Statistischer Analysen identifizierten das Interaktom dieser Proteine nach 15-, 30- und 60-minütiger IL-1β-Stimulation, sowie Proteine, die potenziell an der Runterregulierung des IL-1β-Signalwegs beteiligt sind. Um zu verstehen, wie das IL-1β-Signalwegnetzwerk die Translationsmaschinerie in EL4 Zellen beeinflusst, um eine angemessene Reaktion zu gewährleisten, untersuchte ich den IL-1β-abhängigen Proteinumsatz mittels gepulste stabile Isotopenmarkierung durch Aminosäuren in der Zellkultur (pSILAC) in Kombination mit Azidohomoalanin (AHA)- Klickchemie und MS nach IL-1β-Stimulation. Das Ergebnis aller Proteomik-Untersuchungen war die Identifizierung des TNFα-induzierten Proteins 3 (Tnfaip3) interagierendes Protein 1 (TNIP1) als potenziellen Kandidaten für die Herunterregulierung des IL-1β-Signalwegs. Nach IL-1β-Stimulation kolokalisiert TNIP1 mit allen Myddosomen-Proteinen sowie mit der Deubiquitinase Tnfaip3. Mittels CRISPR/Cas9 erzeugte ich eine TNIP1-KO-EL4 Zelllinie. Nach IL-1β Stimulation zeigten TNIP1-KO-Zellen vermehrt phosphoryliertes p65, aber verringertes phosphoryliertes JNK sowie eine langfristig verringerte IL-2-Sekretion. Daher ist TNIP1 nicht nur an der Herunterregulierung des NF-κB-Signalwegs beteiligt, sondern aktiviert auch den MAPK-Signalweg. / Interleukin 1β (IL-1β)-mediated signal transduction is crucial for acute inflammation, but at the same time needs tight regulation. The IL-1β-mediated signal transduction is encoded by the spatial and temporal dynamics of downstream signaling networks. How does the intracellular IL-1β signaling network efficiently convert the extracellular detection of IL-1β into a precise and proportionate cellular response? What control mechanisms apply in order to ensure a proportionate response and pre- vent a hypo- or hyper response? This study characterizes the IL-1β mediated signaling dynamics using immunoprecipitation purification mass spectrometry (IP-MS). specifically, of MyD88, IRAK4, and IRAK1. Statistical analyses identified the interactome of these proteins after 15-, 30-, and 60-minute of IL-1β stimulation, as well as proteins potentially involved in IL-1β signaling downregulation using pathway annotation analysis. Further, in order to understand how the IL-1β signaling network affects the translational machinery in EL4 cells to ensure a proportionate response, , I investigated IL-1β-dependent protein turnover in EL4 cells. Specifically, I applied pulsed stable isotope labeling by amino acids in the culture (pSILAC) combined with azidohomoalanine (AHA)-click chemistry and MS after 30-, 60-, 120- and 240-min of IL-1β stimulation. The result of these proteomics approaches was the identification of TNFα induced protein 3 (Tnfaip3) interacting protein 1 (TNIP1) as a potential candidate in IL-1β signal downregulation. TNIP1 co-localizes with all myddosome proteins and the deubiquitinase Tnfaip3 after IL-1β stimulation. I generated a TNIP1 KO EL4 cell line using CRISPR/Cas9. After IL-1β stimulation, TNIP1 KO cells show increased levels of phosphorylated p65, but decreased levels of phosphorylated JNK as well as decreased levels of long-term IL-2 secretion. Therefore, TNIP1 is not only involved in downregulatory NF-κB signaling but activates MAPK pathway.

Page generated in 0.04 seconds