Spelling suggestions: "subject:"1nternet -- managemement"" "subject:"1nternet -- managementment""
1 |
Buffer management in the future InternetPillai, Divya Balakrishna January 2007 (has links)
A dissertation submitted in fulfilment of the requirements for the degree of Master of Science (Computer Science) Department of Computer Science, Faculty of Science and Agriculture, University of Zuluand, 2007. / With the rapid development of new applications, comes the drive to modify the current Internet to accommodate real-time multimedia applications. The current Internet uses a single queue per output port to buffer packets destined for that port. This often causes congestion leading to packet loss and delay. Real-time applications are delay and Joss sensitive. Therefore, there is a need to develop a buffer management system that will effectively accommodate both real-time and non-real-time applications.
In an attempt to efficiently allocate and manage output buffers of a router in the fixture Internet, in this research we have developed a buffer management scheme known as Dynamic Threshold Buffer Allocation Scheme (DTBAS). This scheme uses complete sharing with virtual partitioning. Pre-emption (i.e. removal of queued packets) is used to minimise congestion of high priority packets. Dynamic thresholds are used to determine the start and end of pre-emption. To further alleviate the congestion of high priority (real-time) packets, high priority OUT-packets are randomly dropped during the pre-emption period. To add some fairness to the scheme, low priority (non-real-time) packets are assigned a minimum buffer volume.
Simulation was conducted to evaluate the performance of the proposed scheme. The scheme was also compared with the Complete Sharing and Complete Partitioning schemes. It was found that DTBAS had the lowest average packet loss rate for real-time applications compared to other schemes. It was also found that DTBAS efficiently utilises its buffer space.
|
2 |
IuK-Technik und internationale Unternehmensführung : Kommunikation - Koordination - Konfiguration /Röh, Carsten. January 2003 (has links)
Univ., Diss. u.d.T.: Röh, Carsten: Neue Informations- und Kommunikationstechnik und organisatorische Aspekte der internationalen Unternehmensführung--Bamberg, 2003, Kommunikation - Koordination - Konfiguration.
|
3 |
Paid prioritization and its implications on network neutrality. / CUHK electronic theses & dissertations collectionJanuary 2013 (has links)
Wang, Jingjing. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 58-62). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese.
|
4 |
Intelligent traffic monitoring, analysis and classification. / CUHK electronic theses & dissertations collectionJanuary 2008 (has links)
The second problem that is addressed in the thesis is about traffic analysis and classification. Accurate identification of network applications is important to many network activities. Traditional port-based technique has become much less effective since many new applications no longer use well-known fixed port numbers. In this thesis, we propose a novel profile-based approach to identify traffic flows belonging to the target application. In contrast to classifying traffic based on statistics of individual flows in previous studies, we build behavioral profiles of the target application, which describe dominant communication patterns of the application. Based on the behavior profiles, a two-level matching is used in identifying new traffic. We demonstrate the effectiveness of our method on campus traffic traces. Our results show that one can identify the popular P2P applications with very high accuracy. / This thesis represents new intelligent methods for monitoring and classifying network traffic. Internet traffic flow measurement is vitally important for network management, accounting and performance studies. Cisco's NetFlow is a widely deployed flow measurement solution that uses a configurable static sampling rate to control processor and memory usage on the router and the amount of reporting flow records generated. But during flooding attacks the memory and network bandwidth consumed by flow records can increase beyond what is available. Currently available countermeasures have their own problems In this thesis, we propose an entropy based adaptive flow aggregation algorithm. Relying on information-theoretic techniques, the algorithm efficiently identifies the clusters of attack flows in real time and aggregates those large number of short attack flows into a few metaflows. Compared to currently available solutions, our solution not only alleviates the problem in memory and export bandwidth, but also significantly improves the accuracy of legitimate flows. We evaluate our system using both synthetic trace file and real trace files from the Internet. / Hu, Yan. / Adviser: Dah-Mino Chen. / Source: Dissertation Abstracts International, Volume: 70-06, Section: B, page: 3600. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 128-135). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
|
5 |
Network management for community networksWells, Daniel David 26 March 2010 (has links)
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access Point (CAP) is located at each site within the community network. This provides the hosts and servers at that site with access to services on the community network and the Internet, it is the site's router. The CAP provides a web based interface (CAPgui) which allows configuration of the device and viewing of simple monitoring statistics. The Access Concentrator (AC) is the default router for the CAPs and the gateway to the Internet. It provides authenticated and encrypted communication between the network sites. The AC performs several monitoring functions, both for the individual sites and for the upstream Internet connection. The AC provides a means for centrally managing and effectively allocating Internet bandwidth by using the web based interface (ACgui). Bandwidth use can be allocated per user, per host and per site. The system is maintainable, extendable and customisable for different network architectures. The system was deployed successfully to two community networks. The Centre of Excellence (CoE) testbed network is a peri-urban network deployment whereas the Siyakhula Living Lab (SLL) network is a rural deployment. The results gathered conclude that the project was successful as the deployed system is more robust and more manageable than the previous systems.
|
6 |
O comitê gestor da internet no Brasil: gestão, segurança e comunicaçãoChama, Débora Corrêa [UNESP] 22 August 2008 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:24:03Z (GMT). No. of bitstreams: 0
Previous issue date: 2008-08-22Bitstream added on 2014-06-13T18:20:08Z : No. of bitstreams: 1
chama_dc_me_bauru.pdf: 751938 bytes, checksum: a3a03e4a41c2f4af6694d0f4dbd31951 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / O Comitê Gestor da Internet no Brasil é o tema desta pesquisa, que tem por objetivo analisá-lo nas dimensões: gestão, através do modelo de governança eletrônica, adotado no Brasil e segundo os padrões da governança mundial da Internet; comunicação, através da análise das atividades desenvolvidas por este Comitê, no que diz respeito à produção de indicadores de caráter estratégico sobre a Internet brasileira; e segurança quanto à sua utilização, destacando os aspectos de confidencialidade, integridade, ética e disponibilidade da informação, aspecto também destacado no trabalho de gestão empreendido pela entidade aqui analisada. A Internet é um meio de comunicação capaz de sediar modelos de compartilhamento de informações que vêm transformando rapidamente as relações interpessoais de maneira significativa. Neste sentido, é um veículo que traz questões importantes para reflexão de pesquisadores da área de comunicação, no tocante a seus efeitos em diversos aspectos da vida social, cultural e política na sociedade da informação. Há uma expansão constante do número de internautas no mundo e no Brasil. Dados do Comitê Gestor da Internet apontam o total de usuários da rede no país em 2007: são aproximadamente 45 milhões de indivíduos incluídos digitalmente, que representam 34% da população. Os brasileiros em questão estão adentrando no ciberespaço, consumindo e produzindo informações, entretenimento, produtos e serviços. O Brasil é considerado, hoje, a segunda comunidade mundial presente no Orkut. O volume cultural produzido no ciberespaço, além de apresentar transformações em aspectos de sociabilidade e hábitos de consumo, traz também novas dimensões e problemas, como os cibercrimes, por exemplo, que surgem com o crescimento da utilização da Internet. São poucos os estudos acadêmicos brasileiros que analisam e apontam... / Internet Charge Comiteé is the theme of this research, which strives to analyze it in the following aspects: management, through the model of e-governancy, adopted in Brazil; communication, analysis of the developed activities by this Comitée, regarding strategic indicators on the brazilian Internet and security when handling its use, highlighting the issues of confidentiality, integrity, ethics and information availability, an aspect that is also highlighted in the management work charged by the entity analyzed here. The Internet is a communication tool able to group information share models that are quickly transforming interpersonal relation in a significant way. It is a tool that brings us important questions for researchers in the communication area, to reflect upon its effects in various aspects in the social, cultural and political life in the age of information. There is a constant expansion in the number of Internet users in Brazil and in the world. Data from the Internet Charge Comiteé show the total of users in the country in 2007: around 45 million of people digitally included, composing 34% of the total population. The brazilians in question are entering the cyberspace, consuming and producing information, entertainment, products and services. Brazil is considered today the world’s second biggest community in Orkut. The cultural quantity produced in cyberspace, other than presenting in sociability aspects and consuming habits, also brings new dimensions of problems, like for example e-crimes, which appear with the growth of Internet utilization. There are few brazilian academical studies which analyze and point out the problems related to management, communication and security in the Internet. This project enters this column, and its methodology is based on the following researches: bibliographical, quantitative and in the qualitative investigation method ...(Complete abstract click electronic address below)
|
7 |
O comitê gestor da internet no Brasil : gestão, segurança e comunicação /Chama, Débora Corrêa. January 2008 (has links)
Orientador: Maria Teresa Miceli Kerbauy / Banca: Danilo Rothberg / Banca: Juliano Maurício de Carvalho / Resumo: O Comitê Gestor da Internet no Brasil é o tema desta pesquisa, que tem por objetivo analisá-lo nas dimensões: gestão, através do modelo de governança eletrônica, adotado no Brasil e segundo os padrões da governança mundial da Internet; comunicação, através da análise das atividades desenvolvidas por este Comitê, no que diz respeito à produção de indicadores de caráter estratégico sobre a Internet brasileira; e segurança quanto à sua utilização, destacando os aspectos de confidencialidade, integridade, ética e disponibilidade da informação, aspecto também destacado no trabalho de gestão empreendido pela entidade aqui analisada. A Internet é um meio de comunicação capaz de sediar modelos de compartilhamento de informações que vêm transformando rapidamente as relações interpessoais de maneira significativa. Neste sentido, é um veículo que traz questões importantes para reflexão de pesquisadores da área de comunicação, no tocante a seus efeitos em diversos aspectos da vida social, cultural e política na sociedade da informação. Há uma expansão constante do número de internautas no mundo e no Brasil. Dados do Comitê Gestor da Internet apontam o total de usuários da rede no país em 2007: são aproximadamente 45 milhões de indivíduos incluídos digitalmente, que representam 34% da população. Os brasileiros em questão estão adentrando no ciberespaço, consumindo e produzindo informações, entretenimento, produtos e serviços. O Brasil é considerado, hoje, a segunda comunidade mundial presente no Orkut. O volume cultural produzido no ciberespaço, além de apresentar transformações em aspectos de sociabilidade e hábitos de consumo, traz também novas dimensões e problemas, como os cibercrimes, por exemplo, que surgem com o crescimento da utilização da Internet. São poucos os estudos acadêmicos brasileiros que analisam e apontam ...(Resumo completo, clicar acesso eletrônico abaixo) / Abstract: Internet Charge Comiteé is the theme of this research, which strives to analyze it in the following aspects: management, through the model of e-governancy, adopted in Brazil; communication, analysis of the developed activities by this Comitée, regarding strategic indicators on the brazilian Internet and security when handling its use, highlighting the issues of confidentiality, integrity, ethics and information availability, an aspect that is also highlighted in the management work charged by the entity analyzed here. The Internet is a communication tool able to group information share models that are quickly transforming interpersonal relation in a significant way. It is a tool that brings us important questions for researchers in the communication area, to reflect upon its effects in various aspects in the social, cultural and political life in the age of information. There is a constant expansion in the number of Internet users in Brazil and in the world. Data from the Internet Charge Comiteé show the total of users in the country in 2007: around 45 million of people digitally included, composing 34% of the total population. The brazilians in question are entering the cyberspace, consuming and producing information, entertainment, products and services. Brazil is considered today the world's second biggest community in Orkut. The cultural quantity produced in cyberspace, other than presenting in sociability aspects and consuming habits, also brings new dimensions of problems, like for example e-crimes, which appear with the growth of Internet utilization. There are few brazilian academical studies which analyze and point out the problems related to management, communication and security in the Internet. This project enters this column, and its methodology is based on the following researches: bibliographical, quantitative and in the qualitative investigation method ...(Complete abstract click electronic address below) / Mestre
|
8 |
Improving internet security via large-scale passive and active dns monitoringAntonakakis, Emmanouil Konstantinos 04 June 2012 (has links)
The Domain Name System (DNS) is a critical component of the Internet. DNS provides the ability to map human-readable and memorable domain names to machine-level IP addresses and other records. These mappings lie at the heart of the Internet's success and are essential for the majority of core Internet applications and protocols.
The critical nature of DNS means that it is often the target of abuse. Cyber-criminals rely heavily upon the reliability and scalability of the DNS protocol to serve as an agile platform for their illicit operations. For example, modern malware and Internet fraud techniques rely upon DNS to locate their remote command-and-control (C&C) servers through which new commands from the attacker are issued, serve as exfiltration points for information stolen from the victims' computers, and to manage subsequent updates to their malicious toolset.
The research described in this thesis scientifically addresses problems in the area of DNS-based detection of illicit operations. In detail, this research studies new methods to quantify and track dynamically changing reputations for DNS based on passive network measurements. The research also investigates methods for the creation of early warning systems for DNS. These early warning systems enables the research community to identify emerging threats (e.g., new botnets and malware infections) across the DNS hierarchy in a timelier manner.
|
9 |
A study of South African computer usersʹ password usage habits and attitude towards password securityFriedman, Brandon January 2014 (has links)
The challenge of having to create and remember a secure password for each user account has become a problem for many computer users and can lead to bad password management practices. Simpler and less secure passwords are often selected and are regularly reused across multiple user accounts. Computer users within corporations and institutions are subject to password policies, policies which require users to create passwords of a specified length and composition and change passwords regularly. These policies often prevent users from reusing previous selected passwords. Security vendors and professionals have sought to improve or even replace password authentication. Technologies such as multi-factor authentication and single sign-on have been developed to complement or even replace password authentication. The objective of the study was to investigate the password habits of South African computer and internet users. The aim was to assess their attitudes toward password security, to determine whether password policies affect the manner in which they manage their passwords and to investigate their exposure to alternate authentication technologies. The results from the online survey demonstrated that password practices of the participants across their professional and personal contexts were generally insecure. Participants often used shorter, simpler and ultimately less secure passwords. Participants would try to memorise all of their passwords or reuse the same password on most of their accounts. Many participants had not received any security awareness training, and additional security technologies (such as multi-factor authentication or password managers) were seldom used or provided to them. The password policies encountered by the participants in their organisations did little towards encouraging the users to apply more secure password practices. Users lack the knowledge and understanding about password security as they had received little or no training pertaining to it.
|
10 |
Význam a využití nemovitých kulturních památek v Karlovarském kraji / Importance and capitalization of cultural monument in Karlovy Vary regionLojín, Lukáš January 2009 (has links)
This thesis is determined by general definition of culture and especially cultural monument, its management and own sources of financing. General lessons have been applied in the case study on five specific cultural monuments in region of Karlovy Vary. It analyzes visit rate, marketing and sources of own financing of those cultural monuments. It contains comparison of outcomes between those objects. Expansion of sources of own financing is important for decreesing of dependence on public funds. For raise of those sources, higher visit rate together with good marketing strategy, are needed.
|
Page generated in 0.1392 seconds