• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 8
  • 4
  • 2
  • 1
  • 1
  • Tagged with
  • 87
  • 87
  • 45
  • 41
  • 29
  • 20
  • 18
  • 17
  • 16
  • 14
  • 14
  • 13
  • 13
  • 13
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Network mobility management for next generation mobile systems

Perera, Algamakoralage Eranga Gayani, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2007 (has links)
The future Internet will need to cater for an increasing number of powerful devices and entire groups of networks to roam in heterogeneous access networks. The current approach towards meeting such requirements, which is to retrofit mobility solutions to different layers of the protocol stack, has given rise to an increasingly fragmented network control layer. Furthermore, retrofitting solutions in an ad-hoc manner to the protocol stack does not provide consistent support from the network to different applications. This lack of a common control layer for facilitating roaming in heterogeneous networking environments represents a crucial challenge both technically and from a user perspective. To this end, a novel mobility architecture forms the basis and the first part of this dissertation. The work on investigating current network mobility solutions and improving these solutions if deemed necessary, in order to reuse within the novel mobility architecture constitutes the second part of this dissertation. The IETF standard protocol for network mobility was implemented and its performance was analysed on a real networking environment. This enabled to identify problems in the standard which affect the handover and routing performance. To address the identified routing and protocol header overheads of the standard network mobility protocol a novel optimal routing framework, OptiNets was proposed. To address the handover latency issues, optimizations to IPv6 network attachment were incorporated and also an access technology independent multiple interface Make-Before-Break handover mechanism was proposed. The viability of the OptiNets framework and the handover optimizations were demonstrated by analysis and by implementation. A more general external factor that affects the performance of mobile networks which is bandwidth scarcity of Wireless Wide Area Networks was addressed, by proposing a bandwidth fuelling architecture for on-board mobile networks. The feasibility of the bandwidth fuelling architecture was analysed by implementing a prototype and evaluating its performance.
72

Creation and distribution of real-time content a case study in provisioning immersive voice communications to networked games /

Nguyen, Cong Duc. January 2006 (has links)
Thesis (Ph.D.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 192-203.
73

An investigation into interoperable end-to-end mobile web service security

Moyo, Thamsanqa January 2008 (has links)
The capacity to engage in web services transactions on smartphones is growing as these devices become increasingly powerful and sophisticated. This capacity for mobile web services is being realised through mobile applications that consume web services hosted on larger computing devices. This thesis investigates the effect that end-to-end web services security has on the interoperability between mobile web services requesters and traditional web services providers. SOAP web services are the preferred web services approach for this investigation. Although WS-Security is recognised as demanding on mobile hardware and network resources, the selection of appropriate WS-Security mechanisms lessens this burden. An attempt to implement such mechanisms on smartphones is carried out via an experiment. Smartphones are selected as the mobile device type used in the experiment. The experiment is conducted on the Java Micro Edition (Java ME) and the .NET Compact Framework (.NET CF) smartphone platforms. The experiment shows that the implementation of interoperable, end-to-end, mobile web services security on both platforms is reliant on third-party libraries. This reliance on third-party libraries results in poor developer support and exposes developers to the complexity of cryptography. The experiment also shows that there are no standard message size optimisation libraries available for both platforms. The implementation carried out on the .NET CF is also shown to rely on the underlying operating system. It is concluded that standard WS-Security APIs must be provided on smartphone platforms to avoid the problems of poor developer support and the additional complexity of cryptography. It is recommended that these APIs include a message optimisation technique. It is further recommended that WS-Security APIs be completely operating system independent when they are implemented in managed code. This thesis contributes by: providing a snapshot of mobile web services security; identifying the smartphone platform state of readiness for end-to-end secure web services; and providing a set of recommendations that may improve this state of readiness. These contributions are of increasing importance as mobile web services evolve from a simple point-to-point environment to the more complex enterprise environment.
74

Analise de desempenho de transmissão de video em redes IEEE 802.11 visando a estruturação de canais de retorno para TV digital / Performance analysis of video transmission in IEEE 802.11 networks aimed at structuring the return channel digital TV

Ribeiro, Thatiane Cristina dos Santos de Carvalho, 1982- 12 August 2018 (has links)
Orientador: Yuzo Iano / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-12T15:19:02Z (GMT). No. of bitstreams: 1 Ribeiro_ThatianeCristinadosSantosdeCarvalho_M.pdf: 2904973 bytes, checksum: e3c67793847764cf8eac05c50f45b48f (MD5) Previous issue date: 2008 / Resumo: A transmissão de vídeo em redes Wireless é abordada pela pesquisa, devido o grande aumento na utilização dessas redes na ultima década. O acesso à banda larga por essas redes é feito de forma eficiente, rápida e com baixo custo de implementação e manutenção da rede. A motivação para o desenvolvimento é utilizar essas redes e a rede IPTV para promover a interatividade e uma forma do canal de retorno para Sistemas de Televisão Digital, que estão sendo implementadas atualmente no Brasil. O canal de Retorno da TV Digital é importante para o sistema, pois um dos objetivos é prover a interatividade entre os usuários. Isso deve ser feito de forma simples com baixo custo e com tecnologia compatível a região do usuário. A simulação trata de um sistema de transmissão unicast que seria semelhante a uma interatividade local e dedicada. O usuário transmite o conteúdo de uma só vez. Os dados que são transmitidos pela provedora de serviços, são armazenados no set-top-box, e só são modificados em caso de novo fluxo de dados, quando há atualização ou acesso a nova área de serviços. Os testes feitos durante a pesquisa, transmitem conteúdo em tempo real e avaliam de forma quantitativa o desempenho das redes IEEE 802.11b e IEEE 802.11g. / Abstract: The streaming video transmission on Wireless networks is concerned in the research due to the large increase in the use of such networks in the last decade. Broadband access for these networks is made efficiently, quickly and with low implementation and maintenance costs of the network. The motivation for developing this research is to use these networks and IPTV network to promote interactivity and a return channel for digital television system, currently being implemented in Brazil. The return channel is important for the Digital TV system, because one of the goals is to provide interactivity for the users. This should be done in a simple, low cost way and with technology compatible in the region of the user. The simulation deals with a unicast transmission system which is similar to a local and dedicated interactivity. The user transmits all the contents at once. The data transmitted by a service provider are stored on set-top box and are modified only in case of new data flow, when there are updates or access to new area of services. The tests performed during the research, it was broadcasted contents in real time and evaluated quantitative the performance of IEEE 802.11b and IEEE 802.11g networks. / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
75

Metodo de analise de trafegos VoIP sobrepostos / Method of analysis of VoIP traffic over

Garcia, Marcos Eduardo Coelho 06 January 2009 (has links)
Orientador: Leonardo de Souza Mendes / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-14T09:31:29Z (GMT). No. of bitstreams: 1 Garcia_MarcosEduardoCoelho_M.pdf: 1970364 bytes, checksum: 9f8f5fa500e4831f5d7be68883a34f05 (MD5) Previous issue date: 2009 / Resumo: O comportamento de tráfegos VoIP em enlaces de rede é abordado neste trabalho. As aplicações VoIP possuem requisitos rígidos de Qualidade de Serviço (QoS) que devem ser previstos no projeto da rede. Neste sentido, é apresentado o Processo Poissoniano Modulado por Markov (MMPP) como um processo de chegadas adequado para caracterizar o comportamento de tráfegos VoIP sobrepostos. É levado em conta que as aplicações VoIP usam o mecanismo Supressão de Silêncio para economizar largura de banda, o que torna o tráfego muito variável e com chegadas em rajadas. Para análise do comportamento do enlace, é utilizado o modelo de fila MMPP/M/1. Para avaliar a viabilidade do modelo, foram feitos estudos comparativos com resultados do simulador ns-2. / Abstract: The behavior of VoIP traffic in network links is addressed in this work. VoIP applications have strict requirements for quality of service (QoS) that should be provided for in the network design. In this sense, the Markov Modulated Poisson Process (MMPP) is displayed as model of process of arrivals that is appropriate to characterize the behavior of superposition of VoIP traffic sources. It is taken into account that VoIP applications use the mechanism Suppression of Silence to save bandwidth, which makes the traffic very variable and with bursty arrivals. In order to analyze the behavior of the link, the MMPP/M/1 queue model is used. To evaluate the viability of the model, comparative studies were made with results of the ns-2 simulator. / Mestrado / Telecomunicações / Mestre em Engenharia Elétrica
76

Uma estrategia de roteamento OSPF adaptativo baseado em estimação de banda / An adaptive OSPF routing strategy based on bandwidth estimation

Pereira, Tatiana Brito 13 August 2004 (has links)
Orientador: Lee Luan Ling / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-04T02:56:17Z (GMT). No. of bitstreams: 1 Pereira_TatianaBrito_M.pdf: 2502862 bytes, checksum: 4f913e9451b6cbf542c6f1335b1619d8 (MD5) Previous issue date: 2004 / Resumo: O crescimento explosivo e a natureza heterogênea da Internet demandam ferramentas ¿inteligentes¿ que permitam aos protocolos de roteamento adaptarem-se à situação corrente da rede (topologia e situação de congestionamento). Ferramentas inteligentes, porém, significam, na maioria das vezes, grande sobrecarga de processamento e comunicação. O presente trabalho apresenta, além de uma nova estratégia de roteamento OSPF adaptativo baseado em estimação de banda, uma plataforma de simulação capaz de expor o desempenho de uma rede de interconexão submetida (ou não) a esta nova estratégia. A avaliação de desempenho é realizada graças a um modelo, desenvolvido no simulador OPNET, que adiciona ao modelo de um roteador os módulos para estimação de banda e atualização de custos. Os módulos (de estimação de banda e de atualização de custo) adicionados permitem que o protocolo OSPF tome suas decisões de roteamento baseando-se nas condições de congestionamento da rede e nos índices de qualidade desejados para os enlaces. Neste ambiente de simulação, a topologia da rede é representada por um grafo e o tráfego, a que estará sujeita a rede, durante o período de simulação, é especificado por funções de distribuição que atuam durante um intervalo determinado em um roteador específico da rede. A possibilidade de se estabelecer diversas funções de geração de tráfego, atuando a partir de diversos pontos da rede em intervalos independentes, garante certa representação do dinamismo do tráfego encontrado nas redes atuais. Como resultado das simulações, temos uma análise do impacto desta estratégia adaptativa em parâmetros de desempenho de rede, em comparação com o impacto do roteamento OSPF tradicional / Abstract: Internet increase and diversity demand ¿smart¿ tools that could make possible to routing protocols self-adapt to network current state (its topology and congestion situation). Smart tools, although, can result in great processing and communication overload. This work presents, besides a new adaptive OSPF routing strategy based on bandwidth estimations, a simulation platform able to expose results of network performance while experimenting (or not) the proposed adaptive routing strategy. The performance analysis is accomplished due to a model, developed in OPNET network simulator, that adds to a router model modules to bandwidth estimation and link cost updating. These additional modules allow OSPF protocol to take its routing decisions based on network link conditions and on desired link qualities. Network topology is represented by a graph and the traffic presented during simulation is specified by distribution functions acting in specific routers during established intervals. The possibility of configuring various traffic generation functions, acting from various network points in independent intervals, ensures certain network traffic dynamic representation. The simulation results offer an analysis of the proposed OSPF adaptive routing strategy, in comparison to the conventional OSPF routing, in terms of network performance parameters / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
77

Towards a model for ensuring optimal interoperability between the security systems of trading partners in a business-to-business e-commerce context

Pather, Maree 25 August 2009 (has links)
A vast range of controls/countermeasures exists for implementing security on information systems connected to the Internet. For the practitioner attempting to implement an integrated solution between trading partners operating across the Internet, this has serious implications in respect of interoperability between the security systems of the trading partners. The problem is exacerbated by the range of specification options within each control. This research is an attempt to find a set of relevant controls and specifications towards a framework for ensuring optimal interoperability between trading partners in this context. Since a policy-based, layered approach is advocated, which allows each trading partner to address localized risks independently, no exhaustive risk analysis is attempted. The focus is on infrastructure that is simultaneously optimally secure and provides optimal interoperability. It should also be scalable, allowing for additional security controls to be added whenever deemed necessary. / Computing / M. Sc. (Information Systems)
78

A framework for promoting interoperability in a global electronic market-space

Pather, Maree 30 June 2005 (has links)
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order):  A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective.  A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework.  A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context.  An open standards-based security model for the global message handler. Conceptually, the framework comprises the following:  An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages).  An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints.  A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations). / Theoretical Computing / PHD (INFORMATION SYSTEMS)
79

Towards a model for ensuring optimal interoperability between the security systems of trading partners in a business-to-business e-commerce context

Pather, Maree 25 August 2009 (has links)
A vast range of controls/countermeasures exists for implementing security on information systems connected to the Internet. For the practitioner attempting to implement an integrated solution between trading partners operating across the Internet, this has serious implications in respect of interoperability between the security systems of the trading partners. The problem is exacerbated by the range of specification options within each control. This research is an attempt to find a set of relevant controls and specifications towards a framework for ensuring optimal interoperability between trading partners in this context. Since a policy-based, layered approach is advocated, which allows each trading partner to address localized risks independently, no exhaustive risk analysis is attempted. The focus is on infrastructure that is simultaneously optimally secure and provides optimal interoperability. It should also be scalable, allowing for additional security controls to be added whenever deemed necessary. / Computing / M. Sc. (Information Systems)
80

A framework for promoting interoperability in a global electronic market-space

Pather, Maree 30 June 2005 (has links)
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order):  A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective.  A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework.  A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context.  An open standards-based security model for the global message handler. Conceptually, the framework comprises the following:  An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages).  An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints.  A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations). / Theoretical Computing / PHD (INFORMATION SYSTEMS)

Page generated in 0.1846 seconds