Spelling suggestions: "subject:"border"" "subject:"corder""
491 |
Border Trade in China- A Case Study of Yunnan and HeilongjiangShyi, Jenn-Gwo 16 February 2005 (has links)
In this thesis, I take Yunnan and Heilongjiang as a sample to discuss the border trade in China. I find that there are obvious difference between southern and northern border trade because of the demand and supply of natural resource, the industrial structure, the structure of import and export, the step of economic growth of the neighbor countries, as well as the open policy and the foreign relationship among those countries.
|
492 |
Internal Security And The New Border Management Model Of The Eu: Migration-security NexusHajipouran Benam, Cigdem 01 February 2011 (has links) (PDF)
This is a thesis about the changing internal security conceptualizations and the new border management model of the European Union (EU), its effects on third countries and resultant power relations. Although migration is a fact as old as human history, the way the issue is represented varies in time. Especially after 1970s, with the influence of recession experienced in Europe, migration has been formulated as a tool that should be managed well, which otherwise would pose a serious problem for the host countries. Indeed, lately it has evolved to being a security &bdquo / problem
|
493 |
Border Gateway Protocol : Implementationer på stubnätverkKarlsson, Jimmy January 2010 (has links)
<p>Arbetet tar upp BGP-multihoming för mindre organisationer. Den jämför ett kommersiell alternativ mot open source-alternativ. Detta är för att se vad som krävs en av open source-lösning för ge konkurrens på routermarknaden, samt besparingar för organisationer som ska använda denna lösning.Praktiska och teoretiska jämförelser görs där Cisco-lösningar jämförs med OpenBGPD. Datan utifrån dessa tester används för att svara på problemfrågan. Sammanfattningsvis har open source produkter en fördel hårdvarumässigt på grund av lägre kostnader medan kommersiella har stora fördelar då de förlitar sig på nyare standarder.</p>
|
494 |
Crossing borders despite conflict : The role of communication routesMohlin, Henrik, Muratovic, Fazila January 2007 (has links)
<p>Can cross-border interaction: interpersonal, economic, and otherwise, help ease relations between neighbouring political entities facing conflicts of interest and other differences?</p><p>1. How and why are border crossing communication routes created and maintained?</p><p>2. Under what circumstances are they used and how?</p><p>3. In what ways do they alter the conditions of a conflict between the parties that they link?</p><p>4. How do governments relate to the communication route and in what ways do they fit it into their policies?</p><p>Seeking to reconcile the theories of the international system advanced by Hedley Bull and John W. Burton, we conduct a comparative case study, based on contemporary media and scholarship, of the situations regarding Senegal and the Gambia, as well as the two de facto (if not de jure) republics of Cyprus to answer these questions. Having sought to estimate the causes and effects of border crossing, we find that host factors, in particular divergent economies and the utilization of international partners, may in fact come to stem from the issues of border-crossing activity and contribute to complicating existing conflicts rather than resolve them.</p>
|
495 |
BGP Extended Community Attribute for QoS MarkingKnoll, Thomas Martin 09 June 2008 (has links) (PDF)
This document specifies a simple signalling mechanism for inter-domain QoS marking using a BGP Extended Community QoS Attribute. Class based packet forwarding for delay and loss critical services is currently performed in an individual AS internal manner. The new QoS marking attribute makes the QoS class setup within the IP prefix advertising AS known to all access and transit ASes. This enables individual (re-)marking and forwarding treatment adaptation to the original QoS class setup of the respective IP prefix. The attribute provides the means to signal QoS markings on different layers, which are linked together in QoS class sets. It provides inter-domain and cross-layer insight into the QoS class mapping of the source AS with minimal signalling traffic.
|
496 |
A Concept of inter-AS Priority Signaling using BGP AttributesKnoll, Thomas Martin 04 February 2009 (has links) (PDF)
The increasing number of delay and loss critical
services in packet networks require differentiated packet
handling in the forwarding plane. Quality of Service (QoS)
guarantees can be given for networks using resource reservation
and admission control. However, such strategies require complex
control plane extensions and might lead to higher operation
expenditures.
Network operators therefore often use over-provisioning and
traffic differentiation to offer cheaper class of service quality in
their internet protocol (IP) packet networks.
Priority marking and forwarding of packetized data traffic
can be realized mainly using different layer two and three
mechanisms. The number of differentiated classes and their
autonomous system (AS) internal implementation is at the
operator’s choice.
This paper proposes a concept of cross-domain and cross-layer
priority signaling between packet switched networks to be used
at the inter-AS peering points. It makes use of the Border
Gateway Protocol (BGP) as the predominantly used routing
protocol for AS peering communication. A new BGP-4 path
attribute is used to convey the structured priority information.
The new concept ensures that all receiving AS peers are
consistently and comprehensively informed about the QoS
handling within the IP prefix originating AS. Based on this
information, all ASes can perform close QoS treatment
approximation in a cross-domain and cross-layer manner.
The approach is now work in progress at the IETF.
|
497 |
BGP Class of Service InterconnectionKnoll, Thomas Martin 04 February 2009 (has links) (PDF)
This document focuses on Class of Service Interconnection at inter-
domain peering points. It specifies two new non-transitive
attributes, which enable adjacent peers to signal Class of Service
Capabilities and certain Class of Service admission control
Parameters. The new "CoS Capability Attribute" is deliberately kept
simple and denotes the general EF, AF Group and BE forwarding support
across the advertising AS. The second "CoS Parameter Attribute" is
of variable length and contains a more detailed description of
available forwarding behaviours using the PHB id Code encoding. Each
PHB id Code is associated with rate and size based traffic
parameters, which will be applied in the ingress AS Border Router for
admission control purposes to a given forwarding behaviour. The denoted Class of Service forwarding support is meant as the AS
externally available (transit) Class of Service support.
|
498 |
Cross-Domain and Cross-Layer Coarse Grained Quality of Service Support in IP-based NetworksKnoll, Thomas Martin 17 November 2009 (has links) (PDF)
Mit der zunehmenden Popularität des Internets steigt die Anzahl der Nutzer und vor
allem die Anzahl zeit- und verlustkritische Dienste – wie zum Beispiel „Voice over IP“,
Videoübertragungen und netzbasierte Spiele. Das Internet ist dabei der Zusammenschluss
von ca. 30.000 Betreibernetzen, die mit Hilfe des „Internet Protocol (IP)“ derzeit
ohne jede Dienstgüteunterstützung den Datenverkehraustausch realisieren. Massive
Überdimensionierung der Netzkapazitäten führen zu einer Netzauslastung von nur ca.
10% und entsprechend guter Übertragungsqualität. Mit steigendem Verkehrsaufkommen
wird in dieser Dissertation erwartet, das die Netzbetreiber infolge des Kostendrucks
nicht schritthaltend den überhöhten Netzausbau aufrechterhalten können und
somit Qualitätseinbußen zu erwarten sind. Innerhalb der Betreiber wird bereits jetzt
Verkehrstrennung betrieben, jedoch am Übergabepunkt verworfen und im besten Fall
im Nachbarnetz durch aufwendige Analyse erneut vorgenommen.
Im Rahmen dieser Arbeit wurde deshalb ein domänen- und schichtenübergreifendes
Konzept zur Realisierung grob-granularer Dienstgüte in IP-Netzen entworfen, zur
Standardisierung bei der „Internet Engineering Task Force (IETF)“ vorgeschlagen,
implementiert und in Auszügen simuliert und getestet.
Dabei werden die Verkehrsklasseninformationen mehrere Netzschichten in transitiven
Nachrichtenelementen des „Border Gateway Protocol (BGP)“ signalisiert und schichtenübergreifend
assoziiert.
Die vorliegende Dissertation beinhaltet im wesentlichen drei Teile:
1. Eine umfassende Zusammenstellung von vorhandenen Dienstgütekonzepten
einschließlich der bereits existierenden QoS-Funktionselemente in verfügbaren
Netzelementen,
2. Die detaillierte Spezifikation des neuen Konzeptes und
3. den Ergebnissen der Simulations- und Implementierungsaktivitäten zum Nachweis
der Funktion und Skalierbarkeit des Entwurfes.
Zwei wesentliche Erkenntnisse und Forderungen sind durch die Bearbeitung des
Themas erwachsen. Die Einfachheit der Konzeptstruktur und die Einfachheit der
angestrebten Dienstgüteunterstützung. Die angestrebte Dienstgüte beschränkt sich
deshalb auf die primitive Verkehrstrennung in mehrere Klassen, die in den Weiterleitungsknoten
getrennt abgelegt und mit verschiedenem Vorrang behandelt werden.
|
499 |
Policing the border : politics and place in the work of Miguel Méndez, Marisela Norte, and Leslie Marmon Silko /Pritchard, Démian. January 2003 (has links)
Thesis (Ph. D.)--University of California, San Diego, 2003. / Vita. Includes bibliographical references (leaves 338-354).
|
500 |
Un-deterring fences, why is Gaza still attacking?!El Nakhala, Doaa' Hamdi 03 February 2012 (has links)
Many contemporary states and historic political entities walled their borders stressing the idea that these barriers would protect their homelands from external threats and thus, achieve security. Although this security argument has prevailed, the political science literature fails to offer a systematic empirical examination of the relationship between barriers and cross-border threats. This research attempts to bridge this gap by answering the question: What are the actual security outcomes of physical barriers on borders? And thus, under what conditions do barriers succeed/fail to achieve security? This paper posits that, in some cases, building barriers on borders to stop non-state actors’ attacks escalate conflict. It demonstrates that when militants have supply institutions, they will manage to increase their attacks and shift to new tactics despite the barrier. It also studies the Israeli Gaza Strip Fence and offers an analysis based on patterns of the relationships between features of the barrier and the Gaza attacks. these patterns are derived from a quantitative dataset built by the researcher and are also supplemented by qualitative data about the case. / text
|
Page generated in 0.1044 seconds