• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 91
  • 63
  • 25
  • 21
  • 15
  • 10
  • 6
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 296
  • 49
  • 33
  • 31
  • 29
  • 27
  • 24
  • 23
  • 23
  • 22
  • 22
  • 22
  • 21
  • 21
  • 21
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

GERAP : gerenciamento de redes de alta performance / GERAP - high performance netwoks management

Lima, Maria de Fatima Webber do Prado January 1997 (has links)
Este trabalho apresenta um estudo dos mecanismos de policiamento de tráfego ATM (Asynchronous Transfer Mode) mais conhecidos e uma analise das condições de seu gerenciamento utilizando o protocolo SNMP (Simple Network Management Protocol). Para este fim foram considerados os objetos gerenciados integrantes de MIBs (Management Information Base) propostas por vários grupos de trabalho com o objetivo de averiguar a viabilidade de gerenciar o processo de policiamento de trafego mediante manipulação de tais objetos. Realizando este gerenciamento pode-se acompanhar o estado da rede e utilizar estas informações no planejamento da capacidade da rede, pois muitas vezes, o congestionamento não ocorre apenas por excesso de trafego e sim pelo mau dimensionamento dos componentes da rede de computadores. Foram estudados diversos mecanismos de controle de trafego e congestionamento. Estes mecanismos pertencem basicamente a dois procedimentos sugeridos pelo Fórum ATM: controle dos mecanismos de use/rede e controle de realimentação de fluxo. Os algoritmos estudados no processo de controle dos mecanismos de use/rede foram: balde furado, balde furado virtual, balde furado com memória, janelas saltitantes, janelas deslizantes, contadores de pico, escalonamento virtual, balde furado de estado continuo. No processo de controle de realimentação do fluxo existem dois mecanismos básicos: o credit-based e o rate-based. Como o segundo mecanismo foi melhor aceito internacionalmente, surgiram vários algoritmos que seguiam seus princípios. Entre eles pode-se citar: controle de fluxo baseado na taxa, controle de taxa explicita, VS/VD (Virtual Source Virtual Destination), PRCA (Proportional Rate Control Algorithm), EPRCA (Enhanced Proporcional Rate Control Algorithm), ERICA (Explicit Rate Indication for Congestion Avoidance) e CAPC (Congestion Avoidance using Proportional Control). Este trabalho estuda os dois mecanismos básicos assim como os algoritmos que seguem a filosofia rate-based. As MIBs inspecionadas para este trabalho foram: MIB da RFC 1695 [AHM 94], MIB dos objetos suplementares [LY 96], MIB da especificação UNI 3.1 do Fórum ATM[CHA 96], MIB da interface M4 do Fórum ATM [ATM 96] MIB da empresa Bay Networks [BAY 96] e MIBs da empresa Cisco [WAN 96] [CHA 96a], [GRO 96], [GRO 96a], [RBH 96] e [BAK 96]. Em resultado ao estudo dos mecanismos de controle de trafego e congestionamento e a análise das MIBs selecionadas, foram construídas tabelas que tentam relacionar os parâmetros necessários para controlar os mecanismos de tráfego e congestionamento com os objetos das MIBs selecionadas. A cada parâmetro de controle é verificado se existe um objeto gerenciado ou uma combinação de objetos que podem fornecer o valor do parâmetro. A partir desta análise é verificado se os objetos gerenciados podem monitorar os mecanismos de tráfego e congestionamento. / This work presents a study of the best known ATM traffic policing mechanism and an analysis of management conditions using the SNMP (Simple Network Management Protocol). For this reason the managed objects were considerated pertaining to MIBs (Management Information Base) proposed by many working groups. This work inquires the possibility of managing the traffic policing process using the objects of this selected MIBs. Realizing this management, it can follow the network state and to utilize these informations in the planning of network capacity, because many times, the congestion only not happen for traffic excess but it occurs by worse dimension of the computer networks components. It was studied many traffic and congestion control mechanisms. These mechanisms belong to two procedures proposed by the ATM Forum: usage/network parameter control and feedback control mechanism. The algorithms studied for the usage/network parameter control were: leaky bucket, virtual leaky bucket, buffered leaky bucket, jumping window, moving window, peak counters and generic cell rate algorithm. The feedback control has two variations: credit-based and rate-based. The second mechanism was better accepted internationally, and many algorithms followed its principles. The algorithms were: rate based flow control, explicit rate control, VS/VD (Virtual Source / Virtual Destination), PRCA (Proportional Rate Control Algorithm), EPRCA (Enhanced Proporcional Rate Control Algorithm), ERICA (Explicit Rate Indication for Congestion Avoidance) e CAPC (Congestion Avoidance using Proportional Control). This work studies the two basic mechanism and the rate-based algorithms. The inspected MIBs for this work were: RFC I695's MIB [AHM 94], definitions of supplemental managed objects for ATM management [LY 96], ATM Forum ATM UNI 3.1 Specification's MIB [CHA 96], ATM Forum M4 interface's MIB [ATM 96] , Bay Networks enterprise's MIB [BAY 96] and Cisco enterprise's MIB [WAN 96] [CHA 96a], [GRO 96], [GRO 96a], [RBH 96] e [BAK 96]. As a result of the study of the traffic and congestion control mechanisms and the analysis of selected MIBs, table were built that try to relate the necessary parameters to control traffic and congestion mechanisms with the managed objects. Each control parameter is examined if it has a managed object or a object arrangement that can supply the parameter value. This analysis will verify if managed objects can control traffic and congestion control.
22

GERAP : gerenciamento de redes de alta performance / GERAP - high performance netwoks management

Lima, Maria de Fatima Webber do Prado January 1997 (has links)
Este trabalho apresenta um estudo dos mecanismos de policiamento de tráfego ATM (Asynchronous Transfer Mode) mais conhecidos e uma analise das condições de seu gerenciamento utilizando o protocolo SNMP (Simple Network Management Protocol). Para este fim foram considerados os objetos gerenciados integrantes de MIBs (Management Information Base) propostas por vários grupos de trabalho com o objetivo de averiguar a viabilidade de gerenciar o processo de policiamento de trafego mediante manipulação de tais objetos. Realizando este gerenciamento pode-se acompanhar o estado da rede e utilizar estas informações no planejamento da capacidade da rede, pois muitas vezes, o congestionamento não ocorre apenas por excesso de trafego e sim pelo mau dimensionamento dos componentes da rede de computadores. Foram estudados diversos mecanismos de controle de trafego e congestionamento. Estes mecanismos pertencem basicamente a dois procedimentos sugeridos pelo Fórum ATM: controle dos mecanismos de use/rede e controle de realimentação de fluxo. Os algoritmos estudados no processo de controle dos mecanismos de use/rede foram: balde furado, balde furado virtual, balde furado com memória, janelas saltitantes, janelas deslizantes, contadores de pico, escalonamento virtual, balde furado de estado continuo. No processo de controle de realimentação do fluxo existem dois mecanismos básicos: o credit-based e o rate-based. Como o segundo mecanismo foi melhor aceito internacionalmente, surgiram vários algoritmos que seguiam seus princípios. Entre eles pode-se citar: controle de fluxo baseado na taxa, controle de taxa explicita, VS/VD (Virtual Source Virtual Destination), PRCA (Proportional Rate Control Algorithm), EPRCA (Enhanced Proporcional Rate Control Algorithm), ERICA (Explicit Rate Indication for Congestion Avoidance) e CAPC (Congestion Avoidance using Proportional Control). Este trabalho estuda os dois mecanismos básicos assim como os algoritmos que seguem a filosofia rate-based. As MIBs inspecionadas para este trabalho foram: MIB da RFC 1695 [AHM 94], MIB dos objetos suplementares [LY 96], MIB da especificação UNI 3.1 do Fórum ATM[CHA 96], MIB da interface M4 do Fórum ATM [ATM 96] MIB da empresa Bay Networks [BAY 96] e MIBs da empresa Cisco [WAN 96] [CHA 96a], [GRO 96], [GRO 96a], [RBH 96] e [BAK 96]. Em resultado ao estudo dos mecanismos de controle de trafego e congestionamento e a análise das MIBs selecionadas, foram construídas tabelas que tentam relacionar os parâmetros necessários para controlar os mecanismos de tráfego e congestionamento com os objetos das MIBs selecionadas. A cada parâmetro de controle é verificado se existe um objeto gerenciado ou uma combinação de objetos que podem fornecer o valor do parâmetro. A partir desta análise é verificado se os objetos gerenciados podem monitorar os mecanismos de tráfego e congestionamento. / This work presents a study of the best known ATM traffic policing mechanism and an analysis of management conditions using the SNMP (Simple Network Management Protocol). For this reason the managed objects were considerated pertaining to MIBs (Management Information Base) proposed by many working groups. This work inquires the possibility of managing the traffic policing process using the objects of this selected MIBs. Realizing this management, it can follow the network state and to utilize these informations in the planning of network capacity, because many times, the congestion only not happen for traffic excess but it occurs by worse dimension of the computer networks components. It was studied many traffic and congestion control mechanisms. These mechanisms belong to two procedures proposed by the ATM Forum: usage/network parameter control and feedback control mechanism. The algorithms studied for the usage/network parameter control were: leaky bucket, virtual leaky bucket, buffered leaky bucket, jumping window, moving window, peak counters and generic cell rate algorithm. The feedback control has two variations: credit-based and rate-based. The second mechanism was better accepted internationally, and many algorithms followed its principles. The algorithms were: rate based flow control, explicit rate control, VS/VD (Virtual Source / Virtual Destination), PRCA (Proportional Rate Control Algorithm), EPRCA (Enhanced Proporcional Rate Control Algorithm), ERICA (Explicit Rate Indication for Congestion Avoidance) e CAPC (Congestion Avoidance using Proportional Control). This work studies the two basic mechanism and the rate-based algorithms. The inspected MIBs for this work were: RFC I695's MIB [AHM 94], definitions of supplemental managed objects for ATM management [LY 96], ATM Forum ATM UNI 3.1 Specification's MIB [CHA 96], ATM Forum M4 interface's MIB [ATM 96] , Bay Networks enterprise's MIB [BAY 96] and Cisco enterprise's MIB [WAN 96] [CHA 96a], [GRO 96], [GRO 96a], [RBH 96] e [BAK 96]. As a result of the study of the traffic and congestion control mechanisms and the analysis of selected MIBs, table were built that try to relate the necessary parameters to control traffic and congestion mechanisms with the managed objects. Each control parameter is examined if it has a managed object or a object arrangement that can supply the parameter value. This analysis will verify if managed objects can control traffic and congestion control.
23

APPLICATION OF EMERGING COMMUNICATION TECHNOLOGIES TO THE CREATION OF A "VIRTUAL RANGE"

Kight, William D., Pfister, Robert E. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada / This paper addresses the creation of a large virtual-range environment whereby multiple, geographically dispersed, test ranges may operate in concert to support test operations. The most significant benefit of the virtual range environment is the time-sharing of costly processing resources. Other benefits include improved reliability and responsiveness of inter-range data transfer. This paper will focus on existing and near-term technology that may be applied to create a virtual-range and will address the technological and economic advantages and disadvantages of TDM vs. ATM approaches.
24

TELEMETRY TRANSMISSION USING INVERSE MULTIPLEXING AND ASYNCHRONOUS TRANSFER MODE (ATM)

Eslinger, Brian, McCombe, Joleen 10 1900 (has links)
International Telemetering Conference Proceedings / October 27-30, 1997 / Riviera Hotel and Convention Center, Las Vegas, Nevada / The growing need to transmit larger telemetry streams from the receiving site to the processor location over greater distances is requiring newer and more creative techniques. This paper reports efforts to use Asynchronous Transfer Mode (ATM) technology and inverse multiplexing to provide an economical system to interface telemetry streams into the public network for reliable transmission. Cost savings are available immediately for programs that are willing to meet the synchronization criteria today. Lab testing has shown the feasibility of using cost efficient techniques for data transmission. This document describes the investigation that is currently underway that could provide a significant change to the way telemetry data is transmitted from receiver sites to data processing sites. Instead of using dedicated lines with dedicated bandwidth regardless of the program being supported, the approach that has been tested in a lab environment would allow the dynamic allocation of bandwidth using ATM over a variety of carrier services. The combination of ATM and inverse multiplexing allows telemetry data rates above 1.5 Megabits per second (Mbps) to be transmitted over multiple T1 (1.544 Mbps) lines. Previously, the only choice when data rates exceeded 1.5 Mbps was to use an entire DS-3 (45 Mbps). Now it is possible to transmit intermediate sized data rates (1.5 to 8 Mbps) by bonding multiple T1s to provide the desired data throughput.
25

Bit-plane differential EZW for the compression of video for available bit-rate channels

Wyman, Richard Hayden January 1999 (has links)
No description available.
26

Advanced error management in high-speed communication networks

Green, Robert James January 2000 (has links)
No description available.
27

Application of learning algorithms to traffic management in integrated services networks

Hall, Jason Lee January 1999 (has links)
No description available.
28

Constitutive activation of the ATM DNA damage response pathway in cancer represents a deregulated pathway

Din, Shahida January 2014 (has links)
Constitutive activation of the ATM dependent DNA damage response and repair pathways have been reported in pre-malignant and malignant human tissues and may undermine the efficacy of genotoxic cancer therapies. Therefore, ATM inhibitors may overcome resistance to current cytotoxics and potentiate the effects of radiotherapy. A colorectal cancer model was investigated to develop a framework for the rational use of ATM inhibitors. HCT116 p21-/- cells display constitutive activation of the ATM DNA damage response but display a defect in the ionising radiation induced S-phase checkpoint, termed radioresistant DNA synthesis. This radioresistant phenotype is associated with increased basal levels of Cdc25A protein, deficient DNA damage-induced degradation of Cdc25A and Chk2 mis-localisation. HCT116 p21-/- and SW620 cells, which exhibit basal Chk2 threonine-68 phosphorylation, were unable to abrogate the S-phase checkpoint when treated with an ATM inhibitor, suggesting that the ATM– Chk2 arm is non-functional in these cells: inhibition of ATM did not potentiate the efficacy of ionising irradiation. To assess activation of the pathway a tumour microarray was created using 179 treatment naïve sporadic colorectal cancers; 152 were of the microsatellite stable phenotype. Phosphorylated Chk2 threonine-68 was present in 22 % of microsatellite-stable colorectal tumours and 33 % of tumours with the microsatellite instability phenotype. In a colorectal cancer cell line model constitutive activation of the ATM DDR pathway reflected an attenuated ATM-Chk2 axis and inhibition of ATM in these circumstances was unable to potentiate the efficacy of ionising irradiation. Basal Chk2 threonine-68 phosphorylation may reflect a deregulated ATM DNA damage response pathway and/or checkpoint adaption and therefore use of an ATM inhibitor in this background may have limited efficacy. A predictive model is proposed that integrates functionality of the ATM-Chk2 axis, p53 mutation status and defects in DNA repair pathways when considering ATM inhibitor therapy. Ultimately, molecular phenotyping and functional analysis of processes deregulated in cancer will permit individualisation of current treatment modalities, improving their efficacy and limiting patient toxicity.
29

Suporte de qualidade de serviço para aplicações TCP/IP sobre redes ATM

Silva, Jorge Nelson Vieira da January 1998 (has links)
Tese de mestr.. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 1998
30

Recycling Multicast ATM Switches

Hall, Daniel Francis January 2006 (has links)
The majority of ATM switches that have been proposed only support unicast (point-to-point) connections. Those supporting multicast (point-to-multipoint) connections tend to perform poorly, with acceptable multicast performance only achievable using an excessive amount of hardware. Because of the growing importance of multicast traffic, there is the demand for multicast switch designs which offer both low hardware complexity and high performance. This research investigates a class of multicast ATM switches called recycling switches which can satisfy both requirements. Recycling switch performance is studied using a simulated network model. The major performance parameters measured are the loss rate, mean delay, and delay variance of cells crossing through the switch under uniform and bursty traffic patterns. The reason recycling is not more widely used in multicast switches is the perception that it can lead to some multicast cells receiving lower quality of service than others. This research demonstrates a new priority-based approach to designing recycling multicast ATM switches which addresses this problem while maintaining low complexity and excellent scalability. / Masters Thesis

Page generated in 0.025 seconds