• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Methodology for Characterization and Performance Analysis of Connection-Based Network Access Technologies

Novak, David C. 26 April 2001 (has links)
Network administration has become more difficult as the number of Internet users has grown and customer usage patterns have changed over time. Rapidly increasing subscriber bases, data intensive applications (such as streaming audio and video), heavy Web browsing, and large file downloads require significant resources and may tax existing network bandwidth. Reliability and quality of service are becoming serious issues for service providers across the country. Due to the dynamic nature of the information technology (IT) sector in general, it is difficult to predict future network usage patterns or what types of applications may be available, and how these applications may be used over time. This research presents a methodology to facilitate capacity planning and to improve the evaluation of network performance for connection-based networks using the Virginia Tech modem pool as a test bed. The abstract research question is can innovative business strategies be employed in lieu of, or in addition to, traditional management practices such as adding capacity in order to improve the performance of a dialup network? Examples of such strategies or business rules may include limiting the duration of an online session or limiting the number of times a given customer can dial into the pool in a specified time period. A complete network traffic characterization is conducted based on service time and interarrival time variables. A longitudinal analysis is performed to examine how traffic patterns have changed over time. Finally, a simulation model is utilized to examine how imposing different business rules during peak-periods of operation can reduce the blocking probability and improve the overall level-of-service. The potential contribution of this research appears to be significant based on the lack of existing literature. / Ph. D.
2

Cybercrimes / Delitos Informáticos

Villavicencio Terreros, Felipe A. 12 April 2018 (has links)
In recent times, due to the development of information technology,a new form of crime called informational crimes has developed. in relation to this new type of crime, a special criminal law was issued, whose purpose is to prevent and punish illegal activities that affect computer systems and datas, secret communications, and other legal goods that are affected withthis type of crime, such as equity, public faith and sexual freedom. / En los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos informativos. en relación a esta nueva forma delictiva, se ha emitido una Ley penal especial cuya finalidad es prevenir y sancionar las conductas ilícitas que afectan los sistemas y datos informáticos, así como el secreto de las comunicaciones, y los demás bienes jurídicos que resulten afectados con esta modalidad delictiva, como son el patrimonio, la fe pública y la libertad sexual.

Page generated in 0.0329 seconds