Spelling suggestions: "subject:"[een] NETWORKING"" "subject:"[enn] NETWORKING""
31 |
The Influence of Social Networking Websites on Youth.Tekin, Sinem 18 December 2009 (has links)
Faculty of Criminology, Justice and Policy Studies
|
32 |
Analysis, design and implementation of a Web prototype of social networking for students.García Cívico, Ana Belén January 2012 (has links)
The idea would be to unify it into a system where people from different countries can provide information on their hometowns, helping people who are interested in them. The system created is a collaborative Web system in which people can access and edit contents by entering information about their hometowns, and this information will help other people who decide to move to the different cities.
|
33 |
An Engineer's Guide to TMoIPHoffman, Richard W., III 10 1900 (has links)
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA / As telemetry transport systems move inexorably closer to a unified telemetry-over-IP approach, the operators and engineers who have traditionally deferred to a separate communications group can benefit from a more comprehensive understanding of the intricacies of the transport medium and protocol. Ethernet, and more specifically IP network hardware, has gained increased robustness, as well as much of the reliability enhancing functionality of more venerable transport solutions, but with these increasingly integrated feature sets comes an emphasized demand on the telemetry systems operator to be able to configure the telemetry transport network devices in more dynamic environments. This paper will seek to serve as a handbook for the telemetry community, guiding discussions of the strengths, weaknesses, legacy, and future outlook of this transport methodology both within and without the groups involved in most range telemetry transport environments.
|
34 |
SILENT NETWORKING USING FUZZY LOGIC FOR POWER SAVING IN NETWORKED DEVICESSingh, Prashant 29 March 2012 (has links)
A lot of work has been done in developing energy efficient network and user devices to reduce the power consumption of nodes and devices in networks. This thesis proposes an innovative approach using fuzzy logic for power saving and extending the life time of network nodes and user devices.
Using the concept of silent networking we will define an actionable silent period-this is the period during which the network node or the user device does not expect to originate, receive or relay any traffic. The decision of switching the network interface or user device in the silent mode depends on the history of the network activity. Secondly, if the actionable silent period is high enough, then we can switch the entire interface in power down mode leaving just the timer ON to wake up the interface at the end of silent period.
Fuzzy logic is used in mapping the history of the network interface and based on the fuzzy rules that we define, the actionable silent period for interfaces is formulated. Experimental analysis using simulations has been done to view the power saving that can be achieved using this method. Furthermore, a methodology for extending the lifetime of the networked devices is formulated. Using this innovative approach we can save a considerable amount of energy and proportionally increase the lifetime of the networked devices.
|
35 |
Social work and social networksTrevillion, Steven January 1998 (has links)
An exploration of the relationship between patterns of social interaction and social work practice which incorporates thirteen publications. The thread running throughout is the way in which new forms of social care practice are made possible by cross-boundary linkages. A 'Critical Review' sets the context and analyses the works. This is followed by the first published work which applies anthropological models to the study of social marginalisation. The second publication introduces the social network concept and investigates patterns of reciprocity and dependency in social care. The next section of the thesis consists of a 'commentary' on the Griffiths and Wagner Reports. This is followed by a closely related work arguing that there is a fundamental opposition between market and network models of social and community care. The thesis then looks at the ways the culture concept can be used to illuminate the cross-boundary practices associated with community care. The concept of culture and its relationship to cross-boundary working is developed more fully in the next section where it is argued that collaboration culture is paradoxical because it incorporates both respect for difference and a commitment to collective action and that resolving this paradox through collaborative work is a complex and skilled activity. The next section introduces a comparative dimension and suggests that studies of collaboration could be based on looking at the ways in which modern welfare systems try to solve the problem of potential fragmentation and lack of coherence. The work which follows on from this makes use of discourse analysis and network analysis to compare and contrast the rhetoric of partnership and collaboration with the way in which individuals think about their day-to-day cross-boundary work. This raises questions about the changing nature of working relationships in the field of social care and is followed by an investigation into the nature and effects of globalisation on social work in Europe. 'The Co-operation Concept in a Team of Swedish Social Workers' is an attempt to develop a cross-national framework for the analysis of community care focused on the cross-boundary networks of a team of hospital based social workers in Stockholm. The thesis then returns to somewhat broader concerns by means of a work which investigates the contribution of theories of social interaction to theories of social work. These concerns permeate the penultimate section on networking but in a more applied and specific way. The book which constitutes this section of the thesis argues that there is a distinctive theory of networking and that it can be applied to the whole range of social welfare and social care specialisms. The final work explores the impact of globalisation on the ways in which social workers currently experience their roles and develop their sense of professional identity.
|
36 |
The making of Thai multinationals : the internationalisation process of Thai firmsPananond, Pavida January 2001 (has links)
No description available.
|
37 |
Customizable Services for Application-layer Overlay NetworksZhao, Yu 17 July 2013 (has links)
Application-layer overlay networks have emerged as a powerful paradigm for providing network services. While most approaches focus on providing a pre-defined set of network services, we provide a mechanism for network applications to deploy customizable data delivery services. We present the design, implementation, and evaluation of application-defined data delivery services that are executed at overlay nodes by transmitting messages marked with service identifiers. In our approach, a data delivery services is specified as an XML specification that define a finite-state machines that respond to network events, and perform a set of network primitives. We implemented a mechanism to execute these XML specifications in the HyperCast overlay middleware, and have evaluated this mechanism quantitatively on an Emulab testbed. The experiments show that our approach is effective in realizing a variety of data delivery services without incurring unreasonable performance overhead.
|
38 |
Improving Dependability for Internet-scale ServicesGill, Phillipa 11 December 2012 (has links)
The past 20 years have seen the Internet evolve from a network connecting academics, to a critical part of our daily lives. The Internet now supports extremely popular services, such as online social networks and user generated content, in addition to critical services such as electronic medical records and power grid control. With so many users depending on the Internet, ensuring that data is delivered dependably is paramount. However, dependability of the Internet is threatened by the dual challenges of ensuring (1) data in transit cannot be intercepted or dropped by a malicious entity and (2) services are not impacted by unreliability of network components. This thesis takes an end-to-end approach and addresses these challenges at both the core and edge of the network. We make the following two contributions:
A strategy for securing the Internet's routing system. First, we consider the challenge of improving security of interdomain routing. In the core of the network, a key challenge is enticing multiple competing organizations to agree on, and adopt, new protocols. To address this challenge we present our three-step strategy that creates economic incentives for deploying a secure routing protocol (S*BGP). The cornerstone of our strategy is S*BGP's impact on network traffic, which we harness to drive revenue-generating traffic toward ISPs that deploy S*BGP, thus creating incentives for deployment.
Empirical study of data center network reliability. Second, we consider the dual challenge of improving network reliability in data centers hosting popular content. The scale at which these networks are deployed presents challenges to building reliable networks, however, since they are administered by a single organization, they also provide opportunity to innovate. We take a first step towards designing a more reliable network infrastructure by characterizing failures in a data center network comprised of tens of data centers and thousands of devices.
Through dialogue with relevant stakeholders on the Internet (e.g., standardization bodies and large content providers), these contributions have resulted in real world impact. This impact has included the creation of an FCC working group, and improved root cause analysis in a large content provider network.
|
39 |
Customizable Services for Application-layer Overlay NetworksZhao, Yu 17 July 2013 (has links)
Application-layer overlay networks have emerged as a powerful paradigm for providing network services. While most approaches focus on providing a pre-defined set of network services, we provide a mechanism for network applications to deploy customizable data delivery services. We present the design, implementation, and evaluation of application-defined data delivery services that are executed at overlay nodes by transmitting messages marked with service identifiers. In our approach, a data delivery services is specified as an XML specification that define a finite-state machines that respond to network events, and perform a set of network primitives. We implemented a mechanism to execute these XML specifications in the HyperCast overlay middleware, and have evaluated this mechanism quantitatively on an Emulab testbed. The experiments show that our approach is effective in realizing a variety of data delivery services without incurring unreasonable performance overhead.
|
40 |
NOMAD - A Hybrid Mobile Ad Hoc and Disruption Tolerant Routing Protocol for Tactical Military NetworksHolliday, Peter Joshua, Information Technology & Electrical Engineering, Australian Defence Force Academy, UNSW January 2009 (has links)
There has been much research in recent years within the general field of mobile ad hoc networks (MANET) with many proposals submitted to the IETF for consideration. Delay or Disruption Tolerant Networking (DTN) is a relatively new field for routing, concerned with networks that experience long transmission delay or periods of disruption. Military forces around the globe have applied one or the other networking paradigms with varying degrees of success to their own problems of mobility at the lower tactical level (Brigade and below). The fundamental reason for this limited success is that many of the desired tactical scenarios at this level require a network that is not exclusively ad hoc or exclusively disrupted, but rather a network that dynamically adapts to a variety of mobility situations ranging from relatively stable, almost enterprise like, to completely disrupted. Synchronous MANET protocols have limited disruption tolerance at layer 3, and DTN routing protocols, which are further up the network stack, implement hop by hop asynchronous protocols that are unable to take advantage of prolonged network stability. The primary contribution of this thesis is NOMAD, a new hybrid routing protocol for military mobile ad hoc and disrupted networks. NOMAD is unique in that it operates as a proactive synchronous link state MANET protocol when the network is connected, but is able to seamlessly transition into asynchronous DTN mode when required. The results outlined in this thesis indicate that the hybrid NOMAD protocol provides a substantial improvement over standard synchronous MANET protocols. This thesis also makes a significant contribution with respect to synthetic mobility model generation. Mobility models are essential for the correct evaluation of any routing protocol. A mobility modelling tool called SWarMM (Synthetic Warfare Mobility Modelling) was also developed as part of this thesis. SWarMM provides an agent based simulation tool for generating credible synthetic mobility models for use with the discrete network simulation tools, such as OPNET and NS2.
|
Page generated in 0.0364 seconds