• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 1
  • 1
  • Tagged with
  • 15
  • 15
  • 12
  • 9
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Gerenciamento de memória através da utilização de tabelas de dispersão em um módulo híbrido com suporte ao protocolo CAN (Controller Area NetWork) e ao padrão 802.15.4 ZigBee /

Estremote, Marcos Antonio January 2017 (has links)
Orientador: Nobuo Oki / Resumo: A utilização de redes de comunicação sem fio deixou de ser uma ferramenta opcional para tornar-se uma necessidade no monitoramento de residências, automóveis, controles de processos automatizados e comunicação entre as pessoas. Tratando-se de redes de transdutores cabeadas, as redes CAN (Controller Area Network) são utilizadas em automóveis modernos, instrumentação médica, em veículos táticos, na automação de processos, no transporte metropolitano e em sistemas de controle de fábricas. A maioria das estruturas críticas de sistemas de controle fazem uso do CAN em algum ponto na rede, para conectar sensores que se encontram distantes e controlar atuadores de um sistema, ou para conectar vários controladores que utilizam uma interface em comum. O padrão sem fio, IEEE 802.15.4, comercialmente conhecido como “ZigBee”, foi projetado para operar em baixas taxas de dados, com segurança e facilidade de configurações de rede. Esta tese tem como objetivo desenvolver um sistema heterogêneo utilizando microcontroladores ATMEGA em que, o modelo do protocolo CAN e o padrão IEEE 802.15.4 estejam acoplados. Este módulo será capaz de gerenciar e monitorar sensores e atuadores utilizando CAN e, através do padrão sem fio 802.15.4, comunicar-se com os outros módulos da rede. O interfaceamento entre os pacotes da rede de controle de área (CAN) com a rede ZigBee é realizado através da implementação de tabelas de dispersão (Hash Tables) para o gerenciamento e otimização da memória utilizada. As anál... (Resumo completo, clicar acesso eletrônico abaixo) / Doutor
12

Gerenciamento de memória através da utilização de tabelas de dispersão em um módulo híbrido com suporte ao protocolo CAN (Controller Area NetWork) e ao padrão 802.15.4 ZigBee / Memory management through the use of hash tables in a hybrid module with support for the Controller Area NetWork (CAN) protocol and the ZigBee 802.15.4 standard

Estremote, Marcos Antonio [UNESP] 24 February 2017 (has links)
Submitted by MARCOS ANTONIO ESTREMOTE null (estremot@gmail.com) on 2017-11-03T20:18:22Z No. of bitstreams: 1 Tese Estremote.pdf: 11274082 bytes, checksum: d68bb503cd676b58bcfab15d1c39ba5c (MD5) / Approved for entry into archive by LUIZA DE MENEZES ROMANETTO (luizamenezes@reitoria.unesp.br) on 2017-11-13T17:35:07Z (GMT) No. of bitstreams: 1 estremote_ma_dr_ilha.pdf: 11274082 bytes, checksum: d68bb503cd676b58bcfab15d1c39ba5c (MD5) / Made available in DSpace on 2017-11-13T17:35:07Z (GMT). No. of bitstreams: 1 estremote_ma_dr_ilha.pdf: 11274082 bytes, checksum: d68bb503cd676b58bcfab15d1c39ba5c (MD5) Previous issue date: 2017-02-24 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / A utilização de redes de comunicação sem fio deixou de ser uma ferramenta opcional para tornar-se uma necessidade no monitoramento de residências, automóveis, controles de processos automatizados e comunicação entre as pessoas. Tratando-se de redes de transdutores cabeadas, as redes CAN (Controller Area Network) são utilizadas em automóveis modernos, instrumentação médica, em veículos táticos, na automação de processos, no transporte metropolitano e em sistemas de controle de fábricas. A maioria das estruturas críticas de sistemas de controle fazem uso do CAN em algum ponto na rede, para conectar sensores que se encontram distantes e controlar atuadores de um sistema, ou para conectar vários controladores que utilizam uma interface em comum. O padrão sem fio, IEEE 802.15.4, comercialmente conhecido como “ZigBee”, foi projetado para operar em baixas taxas de dados, com segurança e facilidade de configurações de rede. Esta tese tem como objetivo desenvolver um sistema heterogêneo utilizando microcontroladores ATMEGA em que, o modelo do protocolo CAN e o padrão IEEE 802.15.4 estejam acoplados. Este módulo será capaz de gerenciar e monitorar sensores e atuadores utilizando CAN e, através do padrão sem fio 802.15.4, comunicar-se com os outros módulos da rede. O interfaceamento entre os pacotes da rede de controle de área (CAN) com a rede ZigBee é realizado através da implementação de tabelas de dispersão (Hash Tables) para o gerenciamento e otimização da memória utilizada. As análises realizadas de tempo de inserção, remoção e comunicação de dados, com o auxílio da técnica computacional de tabelas de dispersão para o armazenamento das informações, mostram que este procedimento favorece a comunicação entre os protocolos de redes industriais com os protocolos de redes sem fios. A economia de memória do microcontrolador com a utilização das tabelas de dispersão proposta nesta tese chegou a ser em média 750% superior do que as que não se utilizam das tabelas de dispersão. / The use of wireless communication networks is not an optional tool and become a requirement in automated systems, such as monitoring home, automobiles, automated process control and communication between people. In another aspect, wired networks, such as CAN networks, are used in modern automobiles, medical instrumentation, tactical vehicles, process automation, metropolitan transport and manufactory control systems. Many critical structures in control system use CAN network at some point, to connect sensors that are far away and to control system actuators, or to connect several controllers that use a common interface. The wireless IEEE standard 802.15.4, commercially known as “ZigBee”, is designed to operate at low data transfer rates, with security and facility of network configurations. This thesis aims to develop a heterogeneous system using ATMEGA microcontrollers in which the CAN protocol model and the IEEE standard 802.15.4 are coupled. This module is capable of managing and monitoring sensors and actuators using CAN and, through the IEEE standard 802.15.4, communicating with the other modules in network. The interface between the CAN network packets with the ZigBee network is performed through the implementation of Hash Tables to manage and optimize the memory used. The analysis of time of insertion, delete and data communication, with the aid of the computational technique of hash tables for the storage of information, show that this procedure favors the communication between the protocols of industrial networks with protocols of wireless networks . The memory economy of the microcontroller with the the hash tables proposed in this thesis was on average 750% higher than those without the hash tables.
13

Dealing with Network Partitions and Mergers in Structured Overlay Networks

Shafaat, Tallat Mahmood January 2009 (has links)
Structured overlay networks form a major classof peer-to-peer systems, which are touted for their abilitiesto scale, tolerate failures, and self-manage. Any long livedInternet-scale distributed system is destined to facenetwork partitions. Although the problem of network partitionsand mergers is highly related to fault-tolerance andself-management in large-scale systems, it has hardly beenstudied in the context of structured peer-to-peer systems.These systems have mainly been studied under churn (frequentjoins/failures), which as a side effect solves the problemof network partitions, as it is similar to massive nodefailures. Yet, the crucial aspect of network mergers has beenignored. In fact, it has been claimed that ring-based structuredoverlay networks, which constitute the majority of thestructured overlays, are intrinsically ill-suited for mergingrings. In this thesis, we present a number of research papers representing our work on handling network partitions and mergers in structured overlay networks. The contribution of this thesis is threefold. First, we provide a solution for merging ring-based structured overlays. Our solution is tuneable, by a {\em fanout} parameter, to achieve a trade-off between message and time complexity. Second, we provide a network size estimation algorithm for ring-based structured overlays. We believe that an estimate of the current network size can be used for tuning overlay parameters that change according to the network size, for instance the fanout parameter in our merger solution.Third, we extend our work from fixing routing anomalies to achieving data consistency. We argue that decreasing lookup inconsistencies on the routing level aids in achieving data consistency in applications built on top of overlays. We study the frequency of occurence of lookup inconsistencies and discuss solutions to decrease the affect of lookup inconsistencies.
14

Darknet file sharing : application of a private peer-to-peer distributed file system concept

Ledung, Gabriel, Andersson, Johan January 2010 (has links)
Peer-to-peer network applications has been a tremendous success among end users and has therefore received much attention in academia and industry, as have illegal public file sharing in media. However, private peer-to-peer file sharing between family, friends and co-workers have attracted little interest from the research community. Existing approaches also limit the users by not allowing for native interaction with userspace applications. In this paper we ex- -plore how private file sharing can be made safe, fast and scalable without constraining the users in this aspect. We demonstrate the concept of a private file sharing application utilizing a decentralized peer-to-peer network overlay by creating a prototype with extreme program- ming as methodology. To maximize the freedom of users the network is accessed through a virtual file-system interface. The prototype proves this to be a valid approach and we hope readers can use this paper as a platform for further developments in this area. / Fildelningsapplikationer som använder peer-to-peer teknik har varit en enorm framgång blandslutanvändare och har därmed erhållit mycket uppmärksamhet från akademi och indus- tri, liksom olaglig fildelning fått inom media. Däremot har inte privat fildelning mellan vän- ner, arbetskamrater och kollegor tilldelats samma uppmärksamhet från forskningssamfundet. Nuvarande tillämpningar begränsar användaren genom att inte tillåta naturlig interaktion med användarapplikationer. I denna uppsats utforskar vi hur privat fildelning kan göras snabb, skalbar och säker utan att begränsa användaren ur den aspekten. Vi demonstrerar ett koncept- för privat fildelning som nyttjar decentraliserad peer-to-peer arkitektur m.h.a en prototyp som tagits fram med extreme programming som metodologi. För att maximera användarnas frihet nyttjas ett virtuellt filsystem som gränssnitt. Prototypen visar att vår tillämpning fungerar i praktiken och vi hoppas att läsaren kan använda vårt arbete som en plattform för fortsatt utveckling inom detta område.
15

Komprese záznamů o IP tocích / Compression of IP Flow Records

Kaščák, Andrej January 2011 (has links)
My Master's thesis deals with the problems of flow compression in network devices. Its outcome should alleviate memory consumption of the flows and simplify the processing of network traffic. As an introduction I provide a description of protocols serving for data storage and manipulation, followed by discussion about possibilities of compression methods that are employed nowadays. In the following part there is an in-depth analysis of source data that shows the structure and composition of the data and brings up useful observations, which are later used in the testing  of existing compression methods, as well as about their potential and utilization in flow compression. Later on, I venture into the field of lossy compression and basing on the test results a new approach is described, created by means of flow clustering and their subsequent lossy compression. The conclusion contains an evaluation of the possibilities of the method and the final summary of the thesis along with various suggestions for further development of the research.

Page generated in 0.0446 seconds