• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 495
  • 208
  • 135
  • 93
  • 75
  • 74
  • 47
  • 41
  • 28
  • 18
  • 16
  • 16
  • 15
  • 14
  • 10
  • Tagged with
  • 1371
  • 490
  • 354
  • 353
  • 252
  • 191
  • 167
  • 150
  • 149
  • 116
  • 116
  • 112
  • 101
  • 98
  • 97
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
961

[en] FAULT TOLERANCE OF MOBILITY AGENTS OF PROTOCOL MOBILE IP / [pt] TOLERÂNCIA À FALHA DOS AGENTES DE MOBILIDADE DO PROTOCOLO MOBILE IP

LUCIANO DA SILVA SANTOS 16 December 2005 (has links)
[pt] O crescimento da Internet, tanto do ponto de vista do número de usuários como dos serviços oferecidos, e o rápido progresso da tecnologia de comunicação sem fio, tornou possível uma demanda crescente por sistemas sem fios que permitam o acesso a Internet. Porém, um dos principais fatores desafiadores para o desenvolvimento desta nova forma de acesso é a mobilidade das estações móveis. A fim de resolver todos os problemas relacionados à introdução da mobilidade nesta nova forma de acesso, a Internet Engineering Task Force (IETF) através de pesquisas definiu o Mobile IP como o protocolo padrão para esse novo cenário. Embora este protocolo receba inúmeras contribuições que visam melhorar o seu desempenho tanto nas questões de handoff e de segurança dos registros dos usuários, este protocolo não recebe a mesma atenção para a questão da falha dos seus Agentes de Mobilidade. Estes agentes suportam as conexões das estações móveis integrando as redes sem fio com as redes IP amplamente difundida. Portanto, o objetivo desta dissertação é apresentar uma proposta de tolerância à falha dos Agentes de Mobilidade a fim de contribuir nesta linha de pesquisa. / [en] The growth of the Internet, as much of the point of view of the number of users as of the offered services, and the fast progress of the wireless communication technology, it became possible a demand for wireless systems that allow the access the Internet. However, one of the main challenging factors for the development this new access way is the mobility of the mobile stations. In order to solve all of the problems related to the introduction of the mobility in this new access form, the Internet Engineering Task Forces (IETF) through researches it defined Mobile IP as the standard protocol for that new scenery. Although this protocol receives countless contributions that seek to improve it so much acting in the handoff subjects and of safety of the users' registrations, this protocol doesn't receive the same attention for the subject of the fault of their Mobility Agents. These agents support the connections of the mobile stations integrating the wireless networks with IP netowrks spread. Therefore, the objective of this dissertation is to present a proposal of fault tolerance of the Mobility Agents in order to contribute in this research line.
962

[pt] ANÁLISE DO IMPACTO DO AUMENTO DAS TAXAS DE TRANSMISSÃO NO DESEMPENHO E NA CONFIABILIDADE SISTEMAS DE COMUNICAÇÕES ÓPTICAS / [en] IMPACT OF ULTRA HIGH BIT RATE IN THE PERFORMANCE AND CONFIABILITY IN OPTICAL SYSTEMS

MARCOS BOMFIM DO NASCIMENTO 25 June 2015 (has links)
[pt] O objetivo desta Dissertação é apresentar a análise do comportamento de protocolos e dos métodos de proteção em sistemas ópticos para as futuras redes de altas taxas de transmissão. A demanda por banda de transmissão em redes ópticas vem aumentando sobremaneira nas últimas décadas, principalmente, devido à disseminação do acesso e da utilização da Internet e aos novos tipos de aplicações que ela utiliza, com compartilhamento de vídeos e aplicações em nuvem. Esse aumento de tráfego tem impulsionado fortemente o desenvolvimento de tecnologias de sistemas ópticos que procuram garantir o atendimento a essa demanda. Várias frentes de estudos buscam obter taxas de transmissão de bits mais altas por canais (100Gbps, 400Gbps e 1Tbps), utilizando-se de tecnologias avançadas como o formato de modulação multinível, fibras com baixa perda e área de transmissão efetiva mais larga, amplificação híbrida EDFA/Raman e tecnologias de detecção digital coerente. A taxa máxima de transmissão em sistemas ópticos está saindo do atual 10Gbps e indo na direção dos 40Gbps e 100Gbps, já comercialmente oferecidos, e dos 400Gbps e 1Tbps ainda em desenvolvimento. E esse aumento na taxa de transmissão gera uma necessidade de avaliação do comportamento dos protocolos e métodos de proteção atuais quando aplicados a essas novas redes ultra-rápidas. A mudança para taxas de transmissão tão altas pode requerer diferentes estratégias de operação, e a razão é que os efeitos de retardo de propagação alteram significantemente o controle de fluxo do tráfego. / [en] The aim of this Dissertation is to present an analysis of the behavior of protocols and protection methods in optical communication systems for the ultra high bit rate networks. The demand for optical networking transmission bandwidth is increasing greatly in recent decades, mainly due to the spread of access to and the use of the Internet and new types of services, with video sharing and cloud applications. This increase in traffic has driven strongly the development of optical systems technologies that seek to ensure compliance with this demand. Several fronts of studies seeking to obtain rates from higher bits per channel (100Gbps, 400Gbps and 1Tbps), using advanced technologies such as multilevel modulation format, fibers with low loss and wider effective transmission area, hybrid EDFA/Raman amplification and digital coherent detection technologies. The maximum transmission rate in optical systems is coming out of the current 10Gbps and 40Gbps and going towards the 100Gbps, already commercially offered, and still developing 400Gbps and 1Tbps. This increase in transmission rate generates a need for evaluation of the behavior of current protection protocols and methods when applied to these new ultra-fast networks. The change to so high transmission rates may require different operating strategies, and the reason is that the effects of propagation delay alter significantly the control traffic flow.
963

Security Analysis of Ethernet in Cars

Talic, Ammar January 2017 (has links)
With the development of advanced driving assistance systems, the amount of data that needs to be transmitted within a car has increased tremendously. Traditional communication bus based systems are unable to meet today’s requirements; hence automotive Ethernet is being developed and standardized. Ethernet has for many years been the de facto standard in interconnecting computers. In that time several vulnerabilities of the networking protocol stack implementations and even the protocols themselves have been discovered. The knowledge from exploiting computer networks can be applied to the automotive domain. Additionally, vehicle manufacturers tend to implement their own stacks, due to copyleft reasons; hence the chances of implementation faults increases as opposed to using well-tested open source solutions. Since the line between security and safety in cars is almost nonexistent, security has to be properly addressed. This thesis investigates the security of automotive Ethernet and its accompanying protocols. It starts with an introduction to computer and automotive networking and protocols. After a solid foundation is laid, it investigates what makes up automotive Ethernet, its application in the field, and the automotive specific components relying on it. After looking at related work, a data network security audit and analysis as defined by the open-source security testing methodology is performed. The system is graded with risk assessment values. Weak points are identified and improvements suggested. The impact of the proposed improvements is shown by reevaluating the system and recalculating the risk assessment values. These efforts further the ultimate goal of achieving increased safety of all traffic participants. / Med utvecklingen av avancerade körningsassisterande system har mängden data som behöver sändas inom en bil ökat enormt. Traditionella kommunikationsbussbaserade system kan inte uppfylla dagens krav. Därmed utvecklas och standardiseras Ethernet för fordon. Ethernet har i många år varit de facto-standarden i sammankopplandet mellan datorer. Under den tiden har flera sårbarheter hos nätverksprotokolls implementeringar och protokoll själva upptäckts. Det finns anledning att tro att kunskapen från att utnyttja datanätverk kan tillämpas på fordonsdomänen. Att tillägga är att fordonstillverkare tenderar att genomföra sina egna staplar. På grund av copyleft skäl, ökar chanserna för implementeringsfel i motsats till att använda testade open source-lösningar. Eftersom människors säkerhet hos bilar är extremt viktigt, måste även dess system hanteras ordentligt. Denna avhandling undersöker säkerheten för Ethernet och kompletterande protokoll hos bilar. Den börjar med en introduktion till datorers och bilars nätverk och protokoll. Efter en stabil grund fastställts, undersöker den vad som utgör Ethernet hos bilar, dess tillämpning inom fältet, och de bilspecifika komponenterna den beror av. Efter att ha tittat på relaterat arbete utförs en säkerhetsgranskning och analys av datanätverk som definieras av säkerhetsmetoden för open-source. Systemet värderas med riskbedömningsvärden. Svaga punkter identifieras och förbättringar föreslås. Effekten av de föreslagna förbättringarna framgår utav omvärdering av systemet och omräkning av riskbedömningsvärdena. Dessa bedömningar leder till det yttersta målet för ökad säkerhet för alla trafikanter.
964

CheesePi: Delay Characterization through TCP-based Analysis from End-to-End Monitoring

Portelli, Rebecca January 2016 (has links)
With increasing access to interconnected IP networks, people demand a faster response time from Internet services. Traffic from web browsing, the second most popular service, is particularly time-sensitive. This demands reliability and a guarantee of delivery with a good quality of service from ISPs. Additionally, the majority of the population do not have the technical background to monitor the delay themselves from their home networks, and their ISPs do not have a vantage point to monitor and diagnose network problems from the users’ perspective. Hence, the aim for this research was to characterise the “in-protocol” network delay encountered during web browsing from within a LAN. This research presents TCP traffic monitoring performed on a client device as well as TCP traffic monitoring over both the client-end and the server-end devices separately observing an automated web client/server communication. This was followed by offline analysis of the captured traces where each TCP flow was dissected into: handshake, data transfer, and teardown phases. The aim behind such extraction was to enable characterisation of network round-trip delay as well as network physical delay, end host processing delay, web transfer delay, and packets lost as perceived by the end hosts during data transfer. The outcome of measuring from both end devices showed that monitoring from both ends of a client/server communication results to a more accurate measurement of the genuine delay encountered when packets traverse the network than when measuring from the client-end only. Primarily, this was concluded through the ability to distinguish between the pure network delay and the kernel processing delay experienced during the TCP handshake and teardown. Secondly, it was confirmed that the two RTTs identified in a TCP handshake are not symmetrical and that a TCP teardown RTT takes longer than the TCP handshake RTT within the same TCP flow since a server must take measures to avoid SYN flooding attacks. Thirdly, by monitoring from both end devices, it was possible to identify routing path asymmetries by calculating the physical one-way delay a packet using the forward path in comparison to the physical delay of a packet using the reverse path. Lastly, by monitoring from both end devices, it is possible to distinguish between a packet that was actually lost and a packet that arrived with a higher delay than its subsequent packet during data transfer. Furthermore, utilizing TCP flows to measure the RTT delay excluding end host processing gave a better characterisation of the RTT delay as opposed to using ICMP traffic. / Med ökande tillgång till den sammankopplade IP-nätet, krävs det en snabbare responstid från Internettjänster. Trafik från surfning, den näst mest populära tjänsten är särskilt tidskänsliga. Detta kräver tillförlitlighet och en garanti för data leverans med en god servicekvalitet från Internetleverantörer. Dessutom har de flesta av befolkningen inte den tekniska bakgrunden för att övervaka fördröjning sig från sina hemmanätverk, och deras Internetleverantörer har ingen utsiktspunkt för att övervaka och diagnostisera nätverksproblem från användarnas perspektiv. Därför syftet med denna forskning är att karakterisera “in-protokoll”  fördöljingen i nätet, som påträffas under surfning inifrån ett LAN. Denna forskning visar TCP-trafik monitoring som utförs på en klientenhet, samt separat TCP-trafik monitoring över både klient-end och serve-end enheter, för att observera en automatiserad webbklient / server-kommunikation. Detta följs av offline analys av de infångade tracer där varje TCP flöde dissekerades in: handskakning, dataöverföring, och nedkoppling faser. Syftet bakom sådan utvinning är att möjliggöra karakterisering av nätverk fördröjning samt nätverkets fysiska fördröjning, behandlingsfördröjning, webböverföringsfördröjning och förlorade paket som uppfattas av end-device under dataöverföring. The outcome of measuring from both end devices showed that monitoring from both ends of a client/server communication results to a more accurate measurement of the genuine delay encountered when packets traverse the network than when measuring from the client-end only. Primarily, this was concluded through the ability to distinguish between the pure network delay and the kernel processing delay experienced during the TCP handshake and teardown. Secondly, it was confirmed that the two RTTs identified in a TCP handshake are not symmetrical and that a TCP teardown RTT takes longer than the TCP handshake RTT within the same TCP flow since a server must take measures to avoid SYN flooding attacks. Thirdly, by monitoring from both end devices, it was possible to identify routing path asymmetries by calculating the physical one-way delay a packet using the forward path in comparison to the physical delay of a packet using the reverse path. Lastly, by monitoring from both end devices, it is possible to distinguish between a packet that was actually lost and a packet that arrived with a higher delay than its subsequent packet during data transfer. Furthermore, utilizing TCP flows to measure the RTT delay excluding end host processing gave a better characterisation of the RTT delay as opposed to using ICMP traffic. Resultatet av mätningarna från både slut-enheter visar att övervakning från båda ändar av en klient / server-kommunikation resulterar  en noggrannare mätning av fördröjningar som uppstår när paketen färdas över nätverket än vid mätning från den enda klienten. Främst avslutades detta genom förmågan att skilja mellan den rena nätfördröjningen och kernel bearbetning under TCP handskakning och nedkoppling. För det andra bekräftades att de två RTT som identifierats i en TCP handskakning inte är symmetriska och att TCP nedkoppling RTT är längre än TCP handskakning RTT inom samma TCP flödet, eftersom servern  måste vidta åtgärder för att undvika SYN översvämning attacker. För det tredje, genom att övervaka från båda avancerade enheter, var det möjligt att identifiera path asymmetrier genom att beräkna den fysiska envägsfördröjningen av ett paket på framåtriktade banan i jämförelse med den fysiska fördröjningen för ett paket på den omvända banan. Slutligen genom att övervaka från båda end enheter, är det möjligt att skilja mellan ett paket som faktiskt förlorades och ett paket som kom med en högre fördröjning än dess efterföljande paket under dataöverföring. Dessutom utnyttjande av TCP flöden för att mäta RTT exkluderat end-nod porocessering gav en bättre karakterisering av RTT fördröjning jämfört med att ICMP-trafik.
965

SIPman : A penetration testing methodology for SIP and RTP

Wallgren, Elin, Willander, Christoffer January 2022 (has links)
Background. SIP and RTP are two protocols that are widely used, and they play an important role in VoIP services. VoIP is an integral part of many communication services, e.g., Microsoft Teams, Skype, Discord, and communications over cellular networks (VoLTE and VoWiFi). Since these technologies are so widely used, a high level of security is paramount. Objectives. The aim of this study is threefold: (1) To investigate if it is possible to create a penetration testing methodology for SIP and RTP, where the target group is penetration testers with no previous knowledge of these protocols. (2) To identify previously discovered vulnerabilities and attacks. (3) Due to the lack of domain experts, a methodology of this kind will hopefully help penetration testers without prior knowledge, easing them into a new work area. Further, the aim is to increase awareness of potential vulnerabilities in such systems. Methods. Through a literature review, threat modeling, and exploratory penetration testing on three different testbeds, several vulnerabilities and attacks were identified and validated. From the results, a methodology was compiled. For evaluation purposes, it was evaluated by a third party, who tested it on a testbed and gave feedback. Results. The results from our research show that SIP and RTP are susceptible to a wide array of different attacks even to this day. From our literature study, it was determined that most of these attacks have been known for a long time. Using exploratory penetration testing, we managed to verify most of these attacks on three different systems. Additionally, we discovered a few novel attacks that we did not find in previous research. Conclusions. Our literature study suggests that SIP and RTP based systems are relatively susceptible to multiple attacks. Something we also validated during the exploratory testing phase. We successfully executed multiple existing attacks and some new attacks on three different testbeds. The methodology received mostly positive feedback. The results show that many of the participants appreciated the simplicity and concrete model of the methodology. Due to the low number of participants in the evaluation, an improvement to the study and results would be to increase the population and also have multiple novice penetration testers test several different systems. An increase in the number of testbeds would also further support the results and help generalize the methodology. / Bakgrund. SIP och RTP  är två protokoll som är vitt använda och spelar en väldigt viktig roll i VoIP-tjänster. VoIP utgör en viktig del i många kommunikationstjänster, t.ex. Microsoft Teams, Skype och Discord, men även i kommunikation över mobilnätet (VoLTE och VoWiFi). Eftersom dessa teknologier används i så stor utsträckning, är säkerhet av största vikt. Syfte. Syftet med denna studie är trefaldig: (1) Undersöka om det är möjligt att utforma en penetration testningsmetod för SIP och RTP, för en målgrupp av penetrationstestare utan förkunskaper kring dessa protokoll. (2) Att identifiera sårbarheter och attacker från tidigare studier. (3) På grund av brist på kompentens inom området penetrationstestning och telekommunikation kan en sådan här metod förhoppningsvis hjälpa till att introducera penetrationstestare utan tidigare erfarenhet till det här specifika området. Ytterligare är också målet att att öka medvetheten när det kommer till sårbarheter i sådana system. Metod. Genom en literaturstudie, hotmodellering och utforskande penetrationstestning på tre olika testmiljöer har ett flertal sårbarheter och attacker identifieras och utförts. Från resultatet utformades en metod för penetrationstesning, som sedan evaluerades genom att en tredje part testade metoden och gav återkoppling som rör metodens format och struktur. Resultat. Resultaten från vår studie visar att SIP och RTP är sårbara för en rad olika attacker än idag. Resultaten från vår litteraturstudie visar att många av dessa attacker har varit kända under en lång tid. Vi lyckades verifiera de flesta av dessa attacker genom utforskande penetationstestning på tre olika system. Dessutom lyckades vi identifiera ett antal nya attacker som inte tidigare nämnts i forskning inom området. Slutsatser. Resultaten från vår litteraturstudie visar att system som använder sig av SIP och RTP är relativt sårbara för en mängd olika attacker. Detta bekräftades i den utforskande testningen, där ett flertal kända samt nya attacker utfördes framgångsrikt. Den interna evalueringen i studien visar på att metoden kan appliceras framgångsrikt på ett flertal olika system, med begränsningen att endast tre system testats. Resultaten från den externa evalueringen, där penetrationstestare blev tillfrågade att utvärdera och testa metoden visar att de hade en relativt positiv inställning till metoden. För att ytterligare underbygga detta påstående krävs en större population, både för testningen och utvärderingen. Det krävs också att en större mängd testmiljöer används för att kunna generalisera metoden.
966

The SoftDecom Engine

Benitez, Jesus, Guadiana, Juan, Torres, Miguel, Creel, Larry 10 1900 (has links)
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California / The software decommutator was recently fielded at White Sands to address the requirements of a new missile test program. This software decommutator is rewritten as a simple C program Function or Class with a simple interface. The function and an Interface Control Definition (ICD) comprise the SoftDecom Engine (SDE). This paper addresses how an SDE can deliver Enterprise Wide Portability, not only that of the SDE, but more importantly a test program!s Verification & Validation (V&V). The crux of the portability issue is reduced to defining the interface of the SDE. In the simplest manifestation only two interfaces are needed and one is a given. The input structure is defined by the telemeter minor frame with time appended if desired. The output structure is no more than an array containing the parameters required. The ICD could be generalized into a standard for most applications, but that isn!t necessary, as the structures are simple, hence easy to adapt to anyway. This new paradigm!s importance will flourish on industries irreversible migration to faster and more complex telemeters. The paper reviews the relative ease that software exhibits when addressing very complex telemeters. With confidence it may be said “ if the telemeter format can be described in writing, it can be processed real time”. Also discussed are tasks that normally require specialized or customized and expensive equipment for example, merged streams, complex simulations and recording and reproducing PCM (sans recorder). Hopefully, your creativity will be engaged as ours has been.
967

OPERATOR INTERFACES FOR CONTROLLING THE SERIAL STREAMING TELEMETRY CHANNEL VIA A COMMAND AND CONTROL LINK

Laird, Daniel T. 10 1900 (has links)
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada / The Central Test and Evaluation Incentive Program, (CTEIP) is developing Integrated Network Enhanced Telemetry (iNET) to extend serial streaming telemetry (SST) with a command and control link. Command link interfaces link remote Advanced Range Telemetry (ARTM) transmitters (Tx) and receivers (Rx), developed under the ARTM CTEIP project, via graphical user interfaces (GUI). The communication channel links the iNET Tx on a vehicle network (vNET) and the iNET Rx on a ground station network (gNET) via a single GUI. The command link is an essential part of the pending iNET Technology Demonstration.
968

TELEMETRY AND COMMAND FRAME ROUTING IN A MULTI-MISSION ENVIRONMENT

Bester, Manfred, Stroozas, Brett 10 1900 (has links)
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada / In a modern ground control network for space communications, secure peer-to-peer TCP/IP network socket connections are typically used to transfer real-time telemetry and command frames between satellite operations centers and remote ground stations. Reliable and timely reconfiguration of data paths for upcoming pass supports becomes rather complex when many spacecraft and ground stations are involved. This paper describes a routing software application that was developed to facilitate switching of telemetry and command data paths between multiple ground stations and spacecraft command and control systems, and to forward telemetry streams to multiple client applications in parallel. Fully automated configuration and monitoring of the data flows is accomplished via a remote control interface that is tied into a pass scheduling system. The software is part of the SatTrack Suite and currently supports multi-mission flight operations, including those of the recently launched THEMIS constellation mission at Space Sciences Laboratory, University of California at Berkeley.
969

Analytic models of TCP performance

Kassa, Debassey Fesehaye 10 1900 (has links)
Thesis (MSc)--University of Stellenbosch, 2005. / ENGLISH ABSTRACT: The majority of tra c on the Internet uses the Transmission Control Protocol (TCP) as a transport layer protocol for the end-to-end control of information transfer. Measurement, simulation and analytical models are the techniques and tools that can be used to understand and investigate the Internet and its performance. Measurements can only be used to explore existing network scenario or otherwise become costly and in exible with the growth and complexity of the Internet. Simulation models do not scale with the growth of network capacities and the number of users. Computationally e cient analytical models are therefore important tools for investigating, designing, dimensioning and planning IP (Internet Protocol) networks. Existing analytical models of TCP performance are either too simple to capture the internal dynamics of TCP or are too complex to be used to analyze realistic network topologies with several bottleneck links. The literature shows that the xed point algorithm (FPA) is a very useful way of solving analytical models of Internet performance. This thesis presents fast and accurate analytical models of TCP performance with the FPA used to solve them. Apart from what is observed in experimental literature, no comprehensive proof of the convergence and uniqueness of the FPA is given. In this thesis we show how the FPA of analytical models of reliable Internet protocols such as TCP converges to a unique xed point. The thesis speci es the conditions necessary in order to use the FPA for solving analytical models of reliable Internet protocols. We also develop a general implementation algorithm of the FPA of analytical models of TCP performance for realistic and arbitrary network topologies involving heterogenous TCP connections crossing many bottleneck links. The models presented in this thesis give Internet performance metrics, assuming that only basic network parameters such as the network topology, the number of TCP connections, link capacity, distance between network nodes and router bu er sizes are known. To obtain the performance metrics, TCP and network sub{models are used. A closed network of :=G=1 queues is used to develop each TCP sub-model where each queue represents a state of a TCP connection. An M=M=1=K queue is used for each network sub{model which represents the output interface of an IP router with a bu er capacity of K 􀀀��������1 packets. The two sub-models are iteratively solved. We also give closed form expressions for important TCP performance values and distributions. We show how the geometric, bounded geometric and truncated geometric distributions can be used to model reliable protocols such as TCP. We give models of the congestion window cwnd size distribution by conditioning on the slow start threshold ssthresh distribution and vice-versa. We also present models of the probabilities of TCP timeout and triple duplicate ACK receptions. Numerical results based on comparisons against ns2 simulations show that our models are more accurate, simpler and computationally more e cient than another well known TCP model. Our models can therefore be used to rapidly analyze network topologies with several bottlenecks and obtain detailed performance metrics. / AFRIKAANSE OPSOMMING: Die meerderheid van die verkeer op die Internet gebruik die Transmission Control Protocol (TCP) as `n vervoer laag protokol vir die einde-tot-einde kontrole van inligting oordrag. Meting, simulasie en analitiese modelle is die tegnieke en gereedskap wat gebruik kan word om die Internet te ondersoek en verstaan. Meting kan slegs gebruik word om bestaande netwerke scenarios te verken. Meting is duur en onbuigsaam met die groei en samegesteldheid van die Internet. Simulasie modelle skaal nie met die groei van netwerk kapasiteit en gebruikers nie. Analitiese modelle wat berekening e ektief is is dus nodige gereedskap vir die ondersoek, ontwerp, afmeting en beplanning van IP (Internet Protocol) netwerke. Bestaande analitiese TCP modelle is of te eenvoudig om die interne dinamiek van die TCP saam te vat of hulle is te ingewikkeld om realistiese netwerk topologie met heelwat bottelnek skakels te analiseer. Literatuur toon dat die xed point algorithm (FPA) baie handig is vir die oplos van analitiese modelle van Internet verrigting. In hierdie tesis word vinnige en akkurate analitiese modelle van TCP verrigting opgelos deur FPA weergegee. Buiten wat deur eksperimentele literatuur aangedui word is daar geen omvattende bewyse van die konvergensie en uniekheid van die FPA nie. In hierdie tesis word aangedui hoe die FPA van analitiese modelle van betroubare Internet protokolle soos die TCP konvergeer na `n unieke vaste punt. Hierdie tesis spesi seer die voorwaardes benodig om die FPA te gebruik vir die oplos van analitiese modelle van realistiese Internet protokolle. `n Algemene uitvoer algoritme van die FPA van analitiese modelle van TCP vir realistiese en arbitr^ere netwerk topogra e insluitende heterogene TCP konneksies oor baie bottelnek skakels is ontwikkel. Die model in hierdie tesis gee Internet verrigting metodes met die aanname dat slegs basiese netwerk parameters soos netwerk topologie, die aantal TCP konneksies, die konneksie kapasiteit, afstand tussen netwerk nodusse en die roete bu er grotes bekend is. Om die verrigting metodes te verkry, word TCP en netwerk sub-modelle gebruik. `n Geslote netwerk van :=G=1 rye is gebruik om elke TCP sub-model, waar elke ry 'n toestand van `n TCP konneksie voorstel, te ontwikkel. `n M=M=1=K ry is gebruik vir elke netwerk sub-model wat die uitset koppelvlak van `n IP roetemaker met `n bu er kapasiteit van K 􀀀������� 1 pakkies voorstel. Die twee submodelle word iteratief opgelos. Geslote vorm uitdrukkings vir belangrike TCP verrigting waardes en verspreidings word gegee. Daar word getoon hoe geometriese, begrensde geometriese en geknotte geometriese verspreidings gebruik kan word om betroubare protokolle soos die TCP te modelleer. Modelle van die kongestie venster cwnd grootte verspreiding word gegee deur die kondisionering van die stadige aanvang drempel ssthresh verspreiding en andersom. Modelle van die voorspelling van TCP tyduit en trippel duplikaat ACK resepsie word weergegee. Numeriese resultate gebaseer op vergelykings met ns2 simulasies wys dat ons modelle meer akkuraat, eenvoudiger en berekeningsgewys meer e ektief is as ander wel bekende TCP modelle. Ons modelle kan dus gebruik word vir vinnig analise van netwerk topologie met verskeie bottelnekke en om gedetailleerde verrigting metodes te bekom.
970

Utveckling av ett öppet Home Automation-protokoll för användning över IP-nätverk / Development of an open Home Automation protocol for use over IP networks

Johnsson, Kim, Turfors, Christoffer, Ericson, Eric January 2010 (has links)
<p>Detta arbete tar upp utvecklingen av ett nytt protokoll för användning inom Home Automation över IP-nätverk, med stor vikt på flexibilitet och enkelhet. Vi valde att utveckla ett nytt protokoll för Home Automation då en granskning av dagens protokoll visar att dessa inte är tillräckligt öppna eller flexibla för att passa alla enheter som används eller alla scenarion som kan uppstå.</p><p>I våra litteraturstudier samlades information in som skapade grunderna för vårt protokoll och gav oss en större inblick i teknikerna bakom dagens tekniker inom home automation. Detta gav oss även möjlighet att senare jämföra vårt färdiga protokoll med redan existerande protokoll för att se om vi lyckats skapa något som kan användas. Metoden vi valde för att utveckla protokollet är en generell designmetod där vi efter granskningen av tidigare protokoll tar fram ett antal punkter som det nya protokollet skall uppnå. Det visade sig dock vara problematiskt att få fram svar om vissa protokoll så vi frångick metoden genom att istället utveckla protokollet utefter ett antal olika scenarion som det bör kunna hantera.</p><p>Resultatet av arbetet är ett protokoll som uppfyllde nästan alla mål vi satt upp för det. I de fall vi inte lyckades med att uppfylla målen har vi möjliggjort för framtida expanderingar.</p> / <p>This report covers the development of a new protocol for use in Home Automation over IP networks, with focus on flexibility and simplicity. We chose to develop a new protocol for Home Automation because a review of current protocols suggests that these aren't open or flexible enough to suit every device in use or every scenario that might be applicable.</p><p>In our literature studies we gathered information for use as the basis of our protocol and give us more insight into the technologies behind current home automation protocols. This also gave us the opportunity to compare our finished protocol with existing protocols. The method we chose for developing the protocol is a generic design method where after reviewing existing protocols, we establish a number of goals for the new protocol. It did however turn out to be difficult to acquire relevant information about some of the protocols. Because of this we used a slightly different approach, basing the new protocol on a number of scenarios we want it to be able to handle.</p><p>The result is a protocol which satisfied almost every goal we established. For the few it didn't, we made it possible to satisfy them with future expansions.</p>

Page generated in 0.1124 seconds