• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 424
  • 45
  • 34
  • 26
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 572
  • 572
  • 572
  • 271
  • 200
  • 138
  • 132
  • 95
  • 72
  • 54
  • 53
  • 51
  • 48
  • 48
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

A dual-agent approach for securing routing protocols

Gaines, Brian Lee, January 2007 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
142

Modeling the bandwidth sharing behavior of congestion controlled flows /

Li, Kang. January 2002 (has links)
Thesis (Ph. D.)--OGI School of Science & Engineering at OHSU, 2002. / Includes bibliographical references.
143

MAC and routing protocols for multi-hop cognitive radio networks

Kondareddy, Yogesh Reddy, Agrawal, Prathima, January 2008 (has links) (PDF)
Thesis (M.S.)--Auburn University, 2008. / Abstract. Vita. Includes bibliographical references (p. 42-44).
144

Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm

Jayakeerthy, Arunkumar Thippur, Lim, Alvin S., January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 70-73).
145

The optimisation and performance evaluation of routing protocols in cognitive radio based wireless mesh networks

Kola, Lesiba Morries January 2017 (has links)
Thesis (MSc.) -- University of Limpopo, 2017 / The notion of ubiquitous computing, Internet of things (IoT), big data, cloud computing and other emerging technologies has brougt forward the innovative paradigms and incredible developments in wireless communication technologies. The Wireless Mesh Networks (WMNs) technology has recently emerged as the promising high speed wireless technology to provide the last mile broadband Internet access and deliver flexible and integrated wireless communication solutions. The WMNs has the potential to enable people living in rural, peri-urban areas and small businesses to interconnect their networks and share the affordable Internet connectivity. The recent multimedia applications developed, such as voice over Internet protocol (VoIP), online gaming, cloud storage, instant messaging applications, and video sharing applications require high speed communication media and networks. These applications have witnessed enormous growth in the recent decade and continue to enhance communication amongst the users. Hence, the WMNs must have adequate capacity to support high bandwidth and real-time and multimedia applications. While the wireless communications networks are dependent on the radio frequency (RF) spectrum, the traditional wireless technologies utilise the RF spectrum bands inefficiently, resulting in sporadic and underutilisation of the RF spectrum. This inefficient usage of RF spectrum calls for novel techniques to leverage the available RF spectrum amongst different players in the wireless communication arena. There have been developments on integration of the WMNs with cognitive ratios to allow unlicensed users of RF spectrum to operate in the licensed portions of spectrum bands. This integration will provide the required bandwidth to support the required high speed broadband communication infrastructure. In this dissertation, we focus our research on the routing layer in a multi-hop wireless network environment. We addressed the routing challenges in both the WMNs and the cognitive radio based wireless mesh networks (CR-WMNs). The primary focus was to identify the routing protocols most suitable for the dynamic WMN environment. Once identified, the routing protocol was then ported to the CR-WMN environment to evaluate its performance given all the dynamics of cognitive radio environment. vi We further proposed the routing protocol called the extended weighted cumulative expected transmission time (xWCETT) routing protocol for the CR-WMNs. The design of our proposed xWCETT routing protocol is based on the multi-radio multi-channel architecture as it gives the base framework matching the cognitive radio environment. The xWCETT integrates features from the Ad-hoc On-demand Distance Vector (AODV) routing protocol and the weighted cumulative expected transmission time (WCETT) routing metric. The xWCETT was implemented using the Cognitive Radio Cognitive Network (CRCN) patch ported in network simulator (NS2) to incorporate the shared and dynamic spectrum access features. We compared the performance of our proposed xWCETT routing protocol with the AODV, dynamic source routing (DSR), the optimised link source routing (OLSR), Destination Sequences Distance Vector (DSDV), and the CRCN-WCETT routing protocols. The extensive simulation and numerical results show that the proposed xWCETT protocol obtained on average, around 10% better performance results in the CR-WNNs as compared to its routing counterparts. The comparative analysis and evaluation was performed in terms of the average end-to-end latency, throughput, jitter, packet delivery ratio, as well as the normalised routing load. The performance results obtained indicates that the proposed xWCETT routing protocol is a promising routing solution for dynamic CR-WMNs environment. / National Research Foundation (NRF)
146

The performance of interval routing in general networks

謝紹康, Tse, Siu-hong, Savio. January 1997 (has links)
published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy
147

Quality of service support in mobile Ad Hoc networks

Shao, Wenjian., 邵文簡. January 2006 (has links)
published_or_final_version / abstract / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
148

Quality of service routing with path information aggregation

Tam, Wing-yan., 譚泳茵. January 2006 (has links)
published_or_final_version / abstract / Electrical and Electronic Engineering / Master / Master of Philosophy
149

Consul: A communication substrate for fault-tolerant distributed programs.

Mishra, Shivakant. January 1992 (has links)
As human dependence on computing technology increases, so does the need for computer system dependability. This dissertation introduces Consul, a communication substrate designed to help improve system dependability by providing a platform for building fault-tolerant, distributed systems based on the replicated state machine approach. The key issues in this approach--ensuring replica consistency and reintegrating recovering replicas--are addressed in Consul by providing abstractions called fault-tolerant services. These include a broadcast service to deliver messages to a collection of processes reliably and in some consistent order, a membership service to maintain a consistent system-wide view of which processes are functioning and which have failed, and a recovery service to recover a failed process. Fault-tolerant services are implemented in Consul by a unified collection of protocols that provide support for managing communication, redundancy, failures, and recovery in a distributed system. At the heart of Consul is Psync, a protocol that provides for multicast communication based on a context graph that explicitly records the partial (or causal) order of messages. This graph also serves as the basis for novel algorithms used in the ordering, membership, and recovery protocols. The ordering protocol combines the semantics of the operations encoded in messages with the partial order provided by Psync to increase the concurrency of the application. Similarly, the membership protocol exploits the partial ordering to allow different processes to conclude that a failure has occurred at different times relative to the sequence of messages received, thereby reducing the amount of synchronization required. The recovery protocol combines checkpointing with the replay of messages stored in the context graph to recover the state of a failed process. Moreover, this collection of protocols is implemented in a highly-configurable manner, thus allowing a system builder to easily tailor an instance of Consul from this collection of building-block protocols. Consul is built in the x-Kernel and executes standalone on a collection of Sun 3 work-stations. Initial testing and performance studies have been done using two applications: a replicated directory and a distributed wordgame. These studies show that the semantic based order is more efficient than a total order in many situations, and that the overhead imposed by the checkpointing, membership, and recovery protocols is insignificant.
150

Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation

Kay, James T. 06 1900 (has links)
Approved for public release, distribution unlimited / This thesis will focus on academia, specifically the Naval Postgraduate School, and its requirement to implement an education program that allows facilitators to properly inform future students on the gradual implementation of Internet Protocol version 6 (IPv6) technology while phasing out Internet Protocol version 4 (IPv4) from the current curriculum as the transition to IPv6 progresses. The DoD's current goal is to complete the transition of all DoD networks from IPv4 to IPv6 by fiscal year 2008. With this deadline quickly approaching, it is imperative that a plan to educate military and DoD personnel be implemented in the very near future. It is my goal to research and suggest a program that facilitators can use that will show the similarities, changes, advantages, and challenges that exist for the transition. / US Marine Corps (USMC) author.

Page generated in 0.0703 seconds