• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 425
  • 45
  • 34
  • 26
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 573
  • 573
  • 573
  • 272
  • 201
  • 138
  • 132
  • 95
  • 72
  • 54
  • 53
  • 51
  • 48
  • 48
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Resource allocation, call admission, and media access control protocols for wireless multimedia networks

Levine, David A. 05 1900 (has links)
No description available.
202

Routing and multicasting in satellite IP networks

Ekici, Eylem 05 1900 (has links)
No description available.
203

Simulation of lower layers of communication protocols using Ada

Goel, Ashu January 1988 (has links)
From the smallest microcomputer to the largest mainframe computer, data communication capabilities are and will be a major factor in the success and usefulness of the computer systems. The need for larger systems to process data created on the small computers, the need to move subsets of data to small computers access larger computers for other capabilities, and the need for growth in hardware capability are all major reasons that data communication is so important to today's technology.As data communication is the backbone of today's technology, it will play a leading role in governing the changes in the technology of the future. Hence the knowledge of data communication becomes a very important aspect.In this thesis emphasis has been given to simulate the lower layers of communication protocols using Ada as the base language. The language Ada is chosen because of it's capability of providing parallel processing, which is an inherent property of the data communication. Ada is a complex, general purpose programming language that provides an excellent concurrent programing facility called task, that is based on rendezvous concept.Simulation is an excellent way to teach & understand concepts, which otherwise becomes infeasible to understand. Now a days more and more communication details is embedded in the hardware, and hence what is going inside the computer, to provide communication between two computers or just plain data communication, is becoming transparent to the user. However, this does not eliminate the need to know about the functional characteristics of the protocols, which are the rules to provide an effective and reliable communication environment, rather the need to understand protocols is increasing as more and more computer vendors are coming out with their own products. Thanks to the ISO (International Standard Organization), which has come with the standard for the Computer to Computer Communication, but still protocol analysis and design will play a very important role. The field of protocol conversion has grown tremendously in order to provide communication across heterogeneous systems using message communication will to the field of protocol which now a days is an different protocols.Here in this study, communication backbone is simulated in Ada using its concurrent processing capabilities and it is tried to show how a data or aMessage communication will actually take place. This study can serve as a blue print to improve this in order to cater to the field of protocol analysis and protocol conversion, which now a days is an important facet of the data communication industry. / Department of Computer Science
204

A controller area network simulation application program for Microsoft Windows

Lambert, Aric Brian January 1995 (has links)
My thesis is to design a Controlled Area Network (CAN) simulator For Microsoft Windows. In a modern world we deal with complex mechanical systems that require special electronic control to guarantee ultimate safety and efficiency. These electronic control systems are responsible for monitoring subsystems within the mechanical systems. A good example of this is the motor vehicles that are being driven on the road today. These vehicles have been designed with increased safety and efficiency, such as electronic controlled anti lock breaks, fuel injection, and power control steering. To run all of these components, the car needs a very well designed protocol to be able to control series of messages being passed from one subsystem to another. To determine which message being passed has higher priority than any other messages. To deal with such circumstances, the Controlled Area Network (CAN) was designed. The purpose of the CAN simulator is to gather statistical information concerning the arbitration, message transfer, error detection, error signaling, and retransmision. The CAN simulating model will consist of one to sixty nodes. Each node is considered as a subsystem for the CAN simulator. The subsystems will be characterized as the breaks, engine, transmission, or any part of a car which needs to be connected to the CAN system. Each node will send one to ten messages through the CAN system. The CAN system will take the messages from the nodes and place them into an Arrival queue. Each node will have its own Arrival queue, and no nodes can have two messages on the bus at the same time. The messages will be sorted in the queues in the order of the time needed to be released onto the bus. There will be an internal clock that will monitor the time for when the messages are needed to be placed onto the bus. If there is a situation where two messages need to be sent at the same time, the arbitrator will determine the priority of the messages to be placed onto the bus. Once the message is on the bus, it will go to a transfer queue. Periodically, there will be an error signal sent with the message that will be detected by the error detection, and it will be required that the message to be retransmitted. At critical points on the simulation, statistical information will be gathered for an analyzation. Some examples of information to be analyzed are 1) verification of the simulation performance on a single node with a single message, 2) network load which is a rate of a utilized bus time to the total bus time, 3) network throughput which is a total number of messages that are transmitted per second, and 4) average response time which will be the average time taken by all messages to gain bus access.PLATFORM DESCRIPTIONThe computer to be used in this project will be an Intel Pentum 100 with 16 megs RAM, two 853 megabyte harddrive, and a 17 inch super VGA monitor. The user interface will be windows 3.1 application. The compiling language to be used will be Microsoft Visual C++. / Department of Computer Science
205

An investigation of selected local area network access control protocols /

Jacobsen, Alan. January 1984 (has links)
No description available.
206

Satellite specific multiple access control algorithms for packet data /

Hale, Ben Bruce. Unknown Date (has links)
This thesis investigates the ability of dynamic algorithms to adequately share limited satellite channel resources between explicit user demands for bandwidth, anticipated bandwidth demands from users, and signalling traffic transmitted from user terminals. In particular it investigates the design of multiple access control protocols and the way their features affect the performance of higher layer protocols, and the efficiency of using the underlying resources. / Thesis (PhDTelecommunications)--University of South Australia, 2007.
207

Modelling and analysis of the resource reservation protocol using coloured petri nets /

Villapol Blanco, Maria Elena. Unknown Date (has links)
The Resource Reservation Protocol (RSVP) is one of the proposals of the Internet Engineering Task Force (IETF) for conveying Quality of Service (QoS) related information in the form of resource reservations along the communication path. The RSVP specification (i.e. Request for Comments 2205) provides a narrative description of the protocol without any use of formal techniques. -- abstract. / Thesis (PhD)--University of South Australia, 2003.
208

Application of reliable host-based multicast to large scale simulations

Grandy, Richard Stephen, January 2007 (has links) (PDF)
Thesis (M.S. in computer science)--Washington State University, December 2007. / Includes bibliographical references (p. 61-69).
209

In support of routing solutions in plug and play optical node network /

Das, Shovan, January 2007 (has links)
Thesis (M.S.)--University of Texas at Dallas, 2007. / Includes vita. Includes bibliographical references (leaves 163-166)
210

A pattern-based approach to the specification and validation of web services interactions

Li, Zheng. January 2007 (has links)
Thesis (MSc) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2006. / A thesis submitted to Faculty of Information and Communication Technologies, Swinburne University of Technology for the degree of Master of Science by Research, 2007. Typescript. Bibliography p. 107-112.

Page generated in 0.0747 seconds