• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 38
  • 9
  • 8
  • 6
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 68
  • 68
  • 68
  • 21
  • 15
  • 14
  • 12
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

End-to-end delay margin based traffic engineering

Ashour, Mohammed January 2007 (has links)
No description available.
42

Design and implementation of a network controller for a local area network

Chatterjee, Aditya Narayan January 1986 (has links)
Resource Management is an extremely important concern for the network manager. Of the bus, ring and the star network topologies, usually employed in a local area network, the bus topology provides the highest reliability. However, peer-to-peer protocols usually followed in such a topology, make it extremely difficult to incorporate resource management features at a lower level of network architecture. This thesis presents design considerations for a session-level network controller, to be implemented on a local area network with a bus topology. The controller, will provide essential resource management, and attempt to improve the throughput of the network. The design is based on a single-board computer, and a streamlined operating system is also included in the design. It is claimed that such an environment will be ideal for networking tasks, like the controller presented. The design is software-oriented, though device selection is discussed, both for the controller and its network interface. The local area network used for the development of this project is a sixteen hundred node campus network at Virginia Tech ( using LocalNet 20) supplied by SYTEK, Inc. / M.S.
43

Adaptive polling for SNMP protocol

Teng, Un Tung 01 January 1999 (has links)
No description available.
44

QoS management in ATM with delays and cell-drops

Wang, Jun 01 January 1999 (has links)
No description available.
45

Roam : a resource offering agency and mobility for efficient network and system management

Bruce, Steven Douglas 01 April 2002 (has links)
No description available.
46

Towards Large-Scale IoT Management: A Metadata-Oriented Approach

Hao, Luoyao January 2025 (has links)
Internet of Things (IoT) has significantly altered how we operate and interact with physical devices. With billions of connected devices generating vast amounts of data, enormous opportunities have emerged for IoT systems to leverage this data and optimize functionalities. However, this massive influx of devices introduces challenges in interpreting, managing, and utilizing IoT data, devices, and systems. Although the generated data dominates the volume of IoT data, the metadata, i.e., data about the data, is equally critical but, unfortunately, often neglected. Metadata describes devices and data, playing a crucial role in building reliable IoT management systems, improving data analysis and decision-making, and facilitating interoperability between heterogeneous systems. Metadata provides the necessary contexts and instructions to make sense of devices and enables IoT systems to unlock their full potential. This dissertation demonstrates how metadata can address the management complexities of large-scale IoT systems, where numerous independently developed devices interoperate and integrate. This is particularly significant as these systems expand beyond a single home or enterprise to span multiple domains. The proposed metadata-oriented IoT management system constructs an overlay on top of today's operational IoT devices. It prioritizes flexible descriptors over fixed identifiers and implements a suite of solutions that includes an IoT metadata name resolver, providing the backbone infrastructure across geographically distributed systems; an attribute-based distributed access control solution for fine-grained and distributed authorization; a policy server with identity-independent policy specifications to enhance system dependability by separating the management workflows from the operation; and a stringent firewall solution that responds to IoT network behavior to secure the systems. Together, these components empower IoT environments that are discoverable and accessible with granularity, safely operable, and robustly programmable on a large scale, thereby extending the functional scope beyond individual smart systems to integrate into broader, more complex networked environments. This dissertation is organized as follows. First, we delve into the exploration and categorization of metadata in general, highlighting their significance for managing large-scale computer systems, including file systems and the Web infrastructure. Centered on IoT metadata, we illustrate the challenges and opportunities associated with various facets of existing IoT solutions. We discuss the design principles and system implementation challenges for a reliable, efficient, and federated IoT management system, leading to the fundamentals of Metadata-Oriented IoT Systems (MOIS). Second, we present the Name Resolver (MOIS-NR), the core infrastructure component of the MOIS system. MOIS-NR resolves IoT names as flexible queries, translating them into specific device metadata via an array of APIs. MOIS-NR organizes a federated set of hierarchically distributed directories. Computational nodes, such as IoT gateways, run discovery agents and mechanisms that collect device metadata to update these directories. Essential device metadata, which includes attributes, descriptive profiles, and recognized network behaviors, empowers the functionalities of MOIS-AC, MOIS-PS, and MOIS-FW, as described below. Third, we introduce the Access Control (MOIS-AC), which retrieves metadata from MOIS-NR, primarily device attributes, to facilitate informed authorization decisions. MOIS-AC is a systematic, attribute-based access control solution that allows for distributed attribute provisioning with fine granularity. It utilizes metadata to enhance the access control solution, which in turn governs and authorizes access to the metadata itself. The system is bifurcated into two phases: initially granting access to metadata, including the exposure of device APIs, and subsequently utilizing a capability-based approach to obtain a token for extended services or device access. Fourth, we detail the Policy Server (MOIS-PS). MOIS-PS stores and assesses policies derived from authorities, regulatory agencies, developer communities, and manufacturers, integrating them into IoT management stages. Policies delineate desired and prohibitive behaviors of IoT applications and devices, ensuring operations remain within a normative range, thereby promoting security, safety, and energy conservation. For example, a policy might restrict room temperature settings from dipping below 60 degrees Fahrenheit. MOIS-PS employs a relationship-based design, as opposed to identity-based policies, which allows for device replacement, system upgrades, or software updates without needing the specific devices to be known to the system beforehand. This approach enhances the compatibility, scalability, and reusability of the policies. Serving as the guardian of the system, MOIS-PS ensures that all connected devices operate within predefined and accepted boundaries, thereby offering a unified platform for policy enforcement. Finally, we outline the Firewall (MOIS-FW). MOIS-FW is a real-time firewall solution incorporating dynamic DNS observation and packet filtration based on DNS responses or static projected traffic behaviors. Here, metadata, predominantly network behavioral profiles, is extracted from MOIS-NR and embedded into firewall strategies. Unlike traditional firewalls, MOIS-FW employs a more aggressive and proactive way, defaulting to a whitelist approach and discarding suspicious packets. It also provides an interactive endpoint to involve administrators in the packet control, i.e., whitelist an endpoint or forward a packet. This dynamic and real-time solution is bolstered by the P4 technology through its runtime control. To summarize, this dissertation develops a metadata-oriented approach to streamline the design and building blocks of IoT management systems. It introduces a comprehensive set of mechanisms designed to address challenges in device management, name resolution, cross-domain data access, fine-grained authorization, interoperability, and safe operation. By establishing a management plane that overlays the operational workflows, the MOIS solution stack includes, but is not limited to, cleanly decoupled subsystems for metadata-based name resolution and device discovery, distributed access control, policy enforcement, and a dynamic firewall. These components are capable of functioning independently or can be integrated seamlessly to provide a holistic solution for large-scale IoT management. This approach provides IoT system developers and administrators with a foundational and systematic strategy for managing IoT devices as a reliably interconnected and automated ecosystem.
47

Easy Net Admin: Inventory tool for network administrators

Reddy, Rohini Mopu 01 January 2004 (has links)
The purpose of this project was to develop a tool / utility for network administrators to maintain information about all the systems operated by the College of Natural Sciences at California State University, San Bernardino.
48

Governance of virtual private networks using COBIT as framework

Sherry, Zaida 04 1900 (has links)
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007. / The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
49

Technoeconomic aspects of next-generation telecommunications including the Internet service

Unknown Date (has links)
This research is concerned with the technoeconomic aspects of modern and next-generation telecommunications including the Internet service. The goal of this study thereof is tailored to address the following: (i) Reviewing the technoeconomic considerations prevailing in telecommunication (telco) systems and their implicating futures; (ii) studying relevant considerations by depicting the modern/next-generation telecommunications as a digital ecosystem viewed in terms of underlying complex system evolution (akin to biological systems); (iii) pursuant to the digital ecosystem concept, co-evolution modeling of competitive business structures in the technoeconomics of telco services using dichotomous (flip-flop) states as seen in prey-predator evolution; (iv) specific to Internet pricing economics, deducing the profile of consumer surplus versus pricing model under DiffServ QoS architecture pertinent to dynamic- , smart- and static-markets; (v) developing and exemplifying decision-making pursuits in telco business under non-competitive and competitive markets (via gametheoretic approach); (vi) and modeling forecasting issues in telco services addressed in terms of a simplified ARIMA-based time-series approach, (which includes seasonal and non-seasonal data plus goodness-fit estimations in time- and frequency-domains). Commensurate with the topics indicated above, necessary analytical derivations/models are proposed and computational exercises are performed (with MatLabTM R2006b and other software as needed). Extensive data gathered from open literature are used thereof and, ad hoc model verifications are performed. Lastly, results are discussed, inferences are made and open-questions for further research are identified. / by Renata Cristina Tourinho Sardenberg. / Thesis (Ph.D.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
50

Network-layer reservation TDM for ad-hoc 802.11 networks

Duff, Kevin Craig January 2008 (has links)
Ad-Hoc mesh networks offer great promise. Low-cost ad-hoc mesh networks can be built using popular IEEE 802.11 equipment, but such networks are unable to guarantee each node a fair share of bandwidth. Furthermore, hidden node problems cause collisions which can cripple the throughput of a network. This research proposes a novel mechanism which is able to overcome hidden node problems and provide fair bandwidth sharing among nodes on ad-hoc 802.11 networks, and can be implemented on existing network devices. The scheme uses TDM (time division multiplexing) with slot reservation. A distributed beacon packet latency measurement mechanism is used to achieve node synchronisation. The distributed nature of the mechanism makes it applicable to ad-hoc 802.11 networks, which can either grow or fragment dynamically.

Page generated in 0.2174 seconds