551 |
Fault-tolerant ring embedding in De Bruijn networksRowley, Robert A. 02 December 1993 (has links)
Graduation date: 1994
|
552 |
Analysis of transaction throughput in P2P environmentsChokkalingam, Arun. Speegle, Gregory D. Donahoo, Michael J. Gipson, Stephen L. Green, Gina, January 2005 (has links)
Thesis (M.S.)--Baylor University, 2005. / Includes bibliographical references (p. 78-81).
|
553 |
Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networksAtkins, William Dee, January 2007 (has links) (PDF)
Thesis (M.S.)--University of Missouri--Rolla, 2007. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
|
554 |
Concurrent Multi-Path Real-Time Transmission Control ProtocolJayaraman, Anand 01 January 2007 (has links)
In this thesis, a new transport protocol, the Concurrent Multi-Path Real-time Transmission Control Protocol (cmpRTCP) is proposed. The proposed protocol has been designed to handle real-time streams (video and audio) over IP-networks. One of the key strengths of this protocol lies in its ability to intelligently exploit the availability of multiple paths between multi-homed hosts for concurrent transmission of unicast real-time streams. This work describes the architecture and operation of cmpRTCP in detail. In addition, the limitations of currently used transport protocols in handling real-time streams are also discussed. These limitations of other protocols have played a vital role in the design process of the proposed protocol. Experiments to evaluate the performance of cmpRTCP against other protocols and the results obtained therein are also documented in this work. Results show that cmpRTCP is a best effort protocol that tries to maximize the amount of data that is successfully delivered to the destination in a timely manner under varying drop and delay conditions of the network.
|
555 |
Multi-objective routing optimization for multiple level priority and preemption in multi-tiered networksFarmer, Jason Z. January 2006 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: Multi-tiered; routing; optimization; multi-objective; networks. Includes bibliographical references (leaves 77-78).
|
556 |
OptoNet- a non-directional infrared communication link for local area networksLiu, Dongtai 05 December 1990 (has links)
This thesis work researches the theory and application
of systems performing omnidirectional, non-direct
path optical data communication (ONP systems). Such
systems are characterized by 1) the communication involves
a local, usually circular area; 2) Obstacles are allowed
between a transmitter and the receivers. This is in
contrast to the point-to-point and line-of-sight
communications performed by almost all existing infrared
data communication or transmission systems. The
elimination of the point-to-point limitation makes ONP
systems suitable for optical local area networking.
The feasibility of ONP systems employing infrared
LEDs and silicon photo detectors has been analyzed and the
performance of such systems predicted. The analysis shows
that indoor ONP systems are both feasible and practical.
Only a few LEDs are required to cover the entire area of a
large room.
Efforts have been made in finding rules for optimal
design of the ONP systems. A set of design criteria and
curves have been established.
The theoretical analysis has been verified in a
successful experiment done with OptoNet, an ONP infrared
datalink for local area networks. This experimental system
consists of two identical communication units employing
FSK modulation and microprocessor controllers. The
experiment has demonstrated that the ONP optical data
communications can be realized by relatively simple
electronic hardware. / Graduation date: 1991
|
557 |
Service-Driven NetworkingXiao, Jin January 2010 (has links)
This thesis presents our research on service-driven networking, which is a general design framework for service quality assurance and integrated network and service management in
large scale multi-domain networks. The philosophy is to facilitate bi-party open participation among the users and the
providers of network services in order to bring about better service customization and quality assurance, without sacrificing the autonomy and objectives of the individual
entities. Three primary research topics are documented: service composition and adaptation, self-stabilization in uncoordinated environment, and service quality modeling. The work involves
theoretical analysis, algorithm design, and simulations as evaluation methodology.
|
558 |
Service-Driven NetworkingXiao, Jin January 2010 (has links)
This thesis presents our research on service-driven networking, which is a general design framework for service quality assurance and integrated network and service management in
large scale multi-domain networks. The philosophy is to facilitate bi-party open participation among the users and the
providers of network services in order to bring about better service customization and quality assurance, without sacrificing the autonomy and objectives of the individual
entities. Three primary research topics are documented: service composition and adaptation, self-stabilization in uncoordinated environment, and service quality modeling. The work involves
theoretical analysis, algorithm design, and simulations as evaluation methodology.
|
559 |
Flexible access control for campus and enterprise networksNayak, Ankur Kumar 07 April 2010 (has links)
We consider the problem of designing enterprise network security systems
which are easy to manage, robust and flexible. This problem is challenging. Today,
most approaches rely on host security, middleboxes, and complex interactions between
many protocols. To solve this problem, we explore how new programmable networking
paradigms can facilitate fine-grained network control. We present Resonance, a
system for securing enterprise networks , where the network elements themselves en-
force dynamic access control policies through state changes based on both flow-level
information and real-time alerts. Resonance uses programmable switches to manipulate
traffic at lower layers; these switches take actions (e.g., dropping or redirecting
traffic) to enforce high-level security policies based on input from both higher-level security
boxes and distributed monitoring and inference systems. Using our approach,
administrators can create security applications by first identifying a state machine to
represent different policy changes and then, translating these states into actual network
policies. Earlier approaches in this direction (e.g., Ethane, Sane) have remained
low-level requiring policies to be written in languages which are too detailed and are
difficult for regular users and administrators to comprehend. As a result, significant
effort is needed to package policies, events and network devices into a high-level application.
Resonance abstracts out all the details through its state-machine based
policy specification framework and presents security functions which are close to the
end system and hence, more tractable.
To demonstrate how well Resonance can be applied to existing systems, we consider
two use cases. First relates to "Network Admission Control" problem. Georgia
Tech dormitories currently use a system called START (Scanning Technology for Automated
Registration, Repair, and Response Tasks) to authenticate and secure new
hosts entering the network [23]. START uses a VLAN-based approach to isolate new
hosts from authenticated hosts, along with a series of network device interactions. VLANs
are notoriously difficult to use, requiring much hand-holding and manual configuration.
Our interactions with the dorm network administrators have revealed that this existing
system is not only difficult to manage and scale but also inflexible, allowing only
coarse-grained access control. We implemented START by expressing its functions
in the Resonance framework. The current system is deployed across three buildings
in Georgia Tech with both wired as well as wireless connectivities. We present an
evaluation of our system's scalability and performance. We consider dynamic rate
limiting as the second use case for Resonance. We show how a network policy that
relies on rate limiting and traffic shaping can easily be implemented using only a few
state transitions. We plan to expand our deployment to more users and buildings
and support more complex policies as an extension to our ongoing work.
Main contributions of this thesis include design and implementation of a flexible
access control model, evaluation studies of our system's scalability and performance,
and a campus-wide testbed setup with a working version of Resonance running. Our
preliminary evaluations suggest that Resonance is scalable and can be potentially
deployed in production networks. Our work can provide a good platform for more
advanced and powerful security techniques for enterprise networks.
|
560 |
CAD-HOC a CAD like tool for generating mobility benchmarks in ad-hoc networks /Shah, Subodh, January 2001 (has links) (PDF)
Thesis (M.S.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains xiii, 90 p.; also contains graphics. Vita. Includes bibliographical references (p. 85-89).
|
Page generated in 0.0201 seconds