• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 16
  • 2
  • Tagged with
  • 22
  • 22
  • 22
  • 6
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Traffic engineering in multi-service networks routing, flow control and provisioning perspectives /

Park, Sangkyu. January 2002 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2002. / Vita. Includes bibliographical references. Available also from UMI Company.
12

Securing open source Virtual Private Networks a study in Linux security /

Valella, William. January 2001 (has links)
Thesis (M.S.)--University of Florida, 2001. / Title from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
13

Evaluation of virtual private network impact on network performance

Nawej, Mukatshung Claude 09 1900 (has links)
The aim of the study is to investigate what impact the use of VPN has on network performance. An empirical investigation using quantitative research methods was carried out. Two sample scenarios were involved in the study: scenario without VPN and scenario with VPN. In both scenarios, three applications were used in turns, an HTTP, an FTP, and a CBR. FTP was configured to use window size and packet size, while CBR used connection rate and packet size. On the other side, the number of connection was the only parameter used for HTTP. These applications were injected in a 100 Mbps fixed link of an NS2 simulation environment. Throughput and delay averages were measured respectively for the two scenarios and values compared using Student’s t-test. While the TCP and HTTP throughputs were found decreasing, the UDP throughput was not affected by the presence of this VPN. Concerning the delay; the TCP, UDP and HTTP delay were found increasing. / Electrical Engineering / M. Tech. (Electrical Engineering (Computer Systems))
14

Application possibilities of agricultural information portals

08 January 2009 (has links)
D. Litt. et Phil. / Today, more and more organisations are adopting the use of the Internet and webbased technologies in the management of and provision of access to information and knowledge resources and services in digital formats. However, it appears that innovative use of the web is more pronounced in corporate organisations. For example, corporate organisations are using portals or sophisticated websites to conduct electronic commerce via the web and provide access to both internal and external information resources and services, accessed via the Internet, intranets, and extranets. The view of the researcher is that innovative use of the Internet and web-based technologies, such as portals, should not be the domain of the corporate world alone. The focus of this thesis is, therefore, to establish the potential application possibilities of portals in other types of organisations, especially agricultural research organisations in the Southern African Development Community (SADC) region. The main research problem addressed in this thesis was What is the nature and application possibility of agricultural information portals in the provision of webbased, value-added information services for researchers? To address the above research problem, literature relating to the historical development of the Internet and the World Wide Web, intranet and extranet applications in organisations, as well as portals and their applications, was reviewed. In addition, a study was made of international trends regarding the provision of access to digital agricultural information resources and services via the web, and a questionnaire survey was conducted to establish whether it was necessary to use portals to provide access to digital-based agricultural information resources and services in agricultural research organisations in the SADC region. ii Resulting from the literature reviews, the study of websites of international agricultural organisations, and the survey on the need for portals in agricultural research organisations in the SADC region, the study established that: · There are several potential applications of portals in agricultural research organisations. This led to the definition of the nature and major components of the type of portal that could serve the needs of researchers in agricultural research organisations. · There is a need for portals in agricultural research organisations in the SADC region. The current use of the web in these organisations in the region is largely limited to the development of brochureware types of websites, providing access to information contained in the organisations’ brochures. Therefore, there is need to upgrade from basic Web sites to advanced sites or portals, and the study concluded that in this regard there is a need for clear guidelines to assist agricultural research organisations to plan the deployment of their information portals. Currently, most organisations are using ad hoc approaches when developing their Web sites. The dissertation, furthermore, develops the definition of an agricultural information portal as a web-based application that is accessed via the intranet or extranet and provides a personalised and adaptive interface that enables agricultural researchers to discover, track, and interact with colleagues and other people, software applications, information resources, services and tools relevant to their research interests and work. Taking into account the major components and definition of an agricultural information portal, the study proposes guidelines for use in planning the deployment of portals in agricultural research organisations. The proposed guidelines are independent of specific portal design or development methodology, application domains, and techniques.
15

VPN over a wireless infrastructure evaluation and performance analysis /

Munasinghe, Kumudu S. January 2005 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2005. / A thesis submitted in fulfillment of the requirements for the award of the degree Master of Science (Honours) to the University of Western Sydney on March 2005. Includes bibliography.
16

A prototype to discover and penetrate access restricted web pages in an Extranet

Van Jaarsveld, Rudi 13 October 2014 (has links)
M.Sc. (Information Technology) / The internet grew exponentially over the last decade. With more information available on the web, search engines, with the help of web crawlers also known as web bots, gather information on the web and indexes billions of web pages. This indexed information helps users to find relevant information on the internet. An extranet is a sub-set of the internet. This part of the web controls access for a selected audience to a specific resource and are also referred to as restricted web sites. Various industries use extranets for different purposes and store different types of information on it. Some of this information could be of a confidential nature and therefore it is important that this information is adequately secured and should not be accessible by web bots. In some cases web bots can accidently stumble onto poorly secured pages in an extranet and add the restricted web pages to their indexed search results. Search engines like Google, that are designed to filter through a large amount of data, can accidently crawl onto access restricted web pages if such pages are not secured properly. Researchers found that it is possible for web crawlers of well known search engines to access poorly secured web pages in access restricted web sites. The risk is that not all web bots have good intentions and that some have a more malicious intent. These malicious web bots search for vulnerabilities in extranets and use the vulnerabilities to access confidential information. The main objective of this dissertation is to develop a prototype web bot called Ferret that would crawl through a web site developed by a web developer(s). Ferret will try to discover and access restricted web pages that are poorly secured in the extranet and report the weaknesses. From the information and findings of this research a best practice guideline will be drafted that will help developers to ensure access restricted web pages are secured and invisible to web bots.
17

Factors influencing the adoption of virtual desktop infrastructure (VDI) within South African banking sector.

Sekwakwa, Matthews. January 2016 (has links)
M. Tech. Business Information Systems / The banking sector allocates a great deal of their annual budget to Information Technology. To maintain and optimise activities such as software licensing, data security, business continuity and upgrading of computer hardware and general technology infrastructure to meet new organisational requirements, huge financial resources are deployed. One innovative approach to meeting these demands is using virtual desktop technology to extend the computer life, reduce IT costs, improve security and increase availability of technology. One may surmise from the experiences of these companies that if banks replace the current personal computers with virtual desktops they may realise the same benefits. With the introduction of Virtual Desktop Infrastructure (VDI) technology; the premise is that it will alleviate these issues currently faced by banks as all these functions can be done in one place instead of doing it on every individual PC. This study seeks to explore factors of VDI adoption and its impact in terms of reducing cost, hardware and software management, remote access, improved data security and recovery, better compliance and reduced energy consumption.
18

Implementation of an FPGA based accelerator for virtual private networks.

January 2002 (has links)
Cheung Yu Hoi Ocean. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 65-70). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Aims --- p.2 / Chapter 1.3 --- Contributions --- p.3 / Chapter 1.4 --- Thesis Outline --- p.3 / Chapter 2 --- Virtual Private Network and FreeS/WAN --- p.4 / Chapter 2.1 --- Introduction --- p.4 / Chapter 2.2 --- Internet Protocol Security (IPSec) --- p.4 / Chapter 2.3 --- Secure Virtual Private Network --- p.6 / Chapter 2.4 --- LibDES --- p.9 / Chapter 2.5 --- FreeS/WAN --- p.9 / Chapter 2.6 --- Commercial VPN solutions --- p.9 / Chapter 2.7 --- Summary --- p.11 / Chapter 3 --- Cryptography and Field-Programmable Gate Arrays (FPGAs) --- p.12 / Chapter 3.1 --- Introduction --- p.12 / Chapter 3.2 --- The Data Encryption Standard Algorithm (DES) --- p.12 / Chapter 3.2.1 --- The Triple-DES Algorithm (3DES) --- p.14 / Chapter 3.2.2 --- Previous work on DES and Triple-DES --- p.16 / Chapter 3.3 --- The IDEA Algorithm --- p.17 / Chapter 3.3.1 --- Multiplication Modulo 2n + 1 --- p.20 / Chapter 3.3.2 --- Previous work on IDEA --- p.21 / Chapter 3.4 --- Block Cipher Modes of operation --- p.23 / Chapter 3.4.1 --- Electronic Code Book (ECB) mode --- p.23 / Chapter 3.4.2 --- Cipher-block Chaining (CBC) mode --- p.25 / Chapter 3.5 --- Field-Programmable Gate Arrays --- p.27 / Chapter 3.5.1 --- Xilinx Virtex-E´ёØ FPGA --- p.27 / Chapter 3.6 --- Pilchard --- p.30 / Chapter 3.6.1 --- Memory Cache Control Mode --- p.31 / Chapter 3.7 --- Electronic Design Automation Tools --- p.32 / Chapter 3.8 --- Summary --- p.33 / Chapter 4 --- Implementation / Chapter 4.1 --- Introduction --- p.36 / Chapter 4.1.1 --- Hardware Platform --- p.36 / Chapter 4.1.2 --- Reconfigurable Hardware Computing Environment --- p.36 / Chapter 4.1.3 --- Pilchard Software --- p.38 / Chapter 4.2 --- DES in ECB mode --- p.39 / Chapter 4.2.1 --- Hardware --- p.39 / Chapter 4.2.2 --- Software Interface --- p.40 / Chapter 4.3 --- DES in CBC mode --- p.42 / Chapter 4.3.1 --- Hardware --- p.42 / Chapter 4.3.2 --- Software Interface --- p.42 / Chapter 4.4 --- Triple-DES in CBC mode --- p.45 / Chapter 4.4.1 --- Hardware --- p.45 / Chapter 4.4.2 --- Software Interface --- p.45 / Chapter 4.5 --- IDEA in ECB mode --- p.48 / Chapter 4.5.1 --- Multiplication Modulo 216 + 1 --- p.48 / Chapter 4.5.2 --- Hardware --- p.48 / Chapter 4.5.3 --- Software Interface --- p.50 / Chapter 4.6 --- Triple-DES accelerator in LibDES --- p.51 / Chapter 4.7 --- Triple-DES accelerator in FreeS/WAN --- p.52 / Chapter 4.8 --- IDEA accelerator in FreeS/WAN --- p.53 / Chapter 4.9 --- Summary --- p.54 / Chapter 5 --- Results --- p.55 / Chapter 5.1 --- Introduction --- p.55 / Chapter 5.2 --- Benchmarking environment --- p.55 / Chapter 5.3 --- Performance of Triple-DES and IDEA accelerator --- p.56 / Chapter 5.3.1 --- Performance of Triple-DES core --- p.55 / Chapter 5.3.2 --- Performance of IDEA core --- p.58 / Chapter 5.4 --- Benchmark of FreeSAVAN --- p.59 / Chapter 5.4.1 --- Triple-DES --- p.59 / Chapter 5.4.2 --- IDEA --- p.60 / Chapter 5.5 --- Summary --- p.61 / Chapter 6 --- Conclusion --- p.62 / Chapter 6.1 --- Future development --- p.63 / Bibliography --- p.65
19

Validity and accuracy issues in electronic commerce with specific reference to VPN's

13 August 2012 (has links)
M.Comm. / Business have traditionally relied on private leased lines to link remote office together so that distant workers could share information over a Wide Area Network (WAN). However, while providing a high degree of privacy, leased lines are expensive to set up and maintain. The Internet is fast becoming a requirement for supporting business operations in the global economy. The major concern in using a public network, like the Internet, for data exchange is the lack of security. The Internet was designed to be an "open" network, accessible to anyone with low or none security consideration. Virtual Private Networks (VPN) using Point-to-Point Tunneling Protocol (PPTP) has emerged as a relatively inexpensive way to solve this problem. The primary objective of this dissertation is to evaluate validity and accuracy issues in electronic commerce using VPN as a secure medium for data communication and transport over the Internet. The inherent control features of PPTP were mapped to data communication control objectives and the control models show how these address validity, completeness and accuracy. After analysing and evaluating the inherent control features of PPTP, the overall result is that: PPTP enables a valid communication link to be established with restricted access (validity); the PPTP communication link remains private for the full time of the connection (validity); data can be sent accurately and completely over the PPTP connection and remains accurate during transmission (accuracy); and all data sent is completely received by the receiver (accuracy). By deploying a Point-to-Point Tunneling Protocol for virtual private networking, management can mitigate the risk of transmitting private company and business data over the Internet. The PPTP analysis and evaluation models developed intend to give the auditor a control framework to apply in practice. If the auditor needs to perform a data communication review and finds that a virtual private network has been established using PPTP, the control models can assist in providing knowledge and audit evidence regarding validity and accuracy issues. The auditor should however, not review PPTP in isolation. Validity and accuracy control features inherent to TCP/IP and PPP should also be considered as well as controls on higher levels, e.g. built-in application controls.
20

The internet as a strategic business management tool

14 August 2012 (has links)
M.Comm. / This study was conducted with the intent of understanding and evaluating the commercial use and possibilities that the Internet offers, as well as the strategic approach businesses should take when commencing with electronic commerce on the Internet. The potential value of Intranets and Extranets has also been examined briefly. The Internet is a very useful mechanism for marketing as well as sales of products or services on a domestic or international basis. Various other commercial possibilities and uses exist for the Internet, as well as for its derivatives — the Intranet and Extranet. In the fiercely competitive market of today, companies research, develop and invest resources in various methods and tools in the hope to gain competitive advantage over their rivals. The Internet, Intranet and Extranet, used in isolation or conjunction, pose an extremely attractive alternative to gaining competitive advantage in a specific sector or market niche.The success of the Internet as a business tool depends directly on the overall business strategy that is driving the approach. For optimum success the main business strategy must be aligned with the Information Technology Strategy, and especially include thorough consideration as well as planning when implementing the Internet or one of its derivatives as a business tool.

Page generated in 0.0646 seconds