• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 59
  • 19
  • 16
  • 14
  • 10
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 162
  • 61
  • 42
  • 40
  • 38
  • 38
  • 32
  • 30
  • 28
  • 28
  • 28
  • 27
  • 22
  • 17
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Performance Evaluation of MANET using MPLS

Baig, Mirza Hamid, Kiani, Hassan Shahzad January 2010 (has links)
Mobile Ad Hoc Network (MANET) is special kind of wireless network which does not have any fixed structure. They are paired for specific purpose within some concise time period. As the concept of “Micro Products” with a feature of “Mobility” has gain popularity, the MANET has benefited the mankind in many ways and in number of situations such as Natural Disaster, War Zone, and Medical Camp in far-flung Earthquake hit areas etc. In every situation mobile nodes organized themselves on temporary bases in network topology. Autonomous nodes having wireless infrastructure are interconnected to form an autonomous network and easily establish a connection from one place to another. These mobile nodes act either as routers or as a host. These nodes have routing capabilities for multi hop paths through which these are interconnected. The mobility of nodes needs efficient routing for MANET. So therewith, Multi Protocol Label Switching (MPLS) enhances routing with respect to path and packet forwarding. In our thesis we try to analyze the various effects of MPLS on MANET protocols when integrated with MPLS. Simulations were carried out using OPNET modeler 14.5 for analyzing the MPLS effects on the metrics like route discovery time, packet end-to-end delay and throughput. Moreover case study is also included to present a conceptual model for integrating MPLS with MANET protocols.
102

PERFORMANCE EVALUATION OF MPLS/GMPLS CONTROL PLANE SIGNALING PROTOCOLS

Ngugi, Freelance Bwalya and Lawrence January 2009 (has links)
Multi-Protocol Label Switching (MPLS) emerged as a suitable solution to optimization of Internet Protocol (IP) networks. It improves network efficiency, utilization of resources and resilience in packet switched networks. With MPLS, packet forwarding decisions are made based on label inspection rather than packet header information. While MPLS is native to packet switched networks, Generalized Multiprotocol Label Switching (GMPLS) extends MPLS functionality to networks that support non-packet switched domains such as time, lambda and fiber. GMPLS also offers better resource management through the use of a new protocol; Link Management Protocol (LMP). In this work, a performance evaluation of GMPLS and MPLS control plane signaling protocols was performed. Further, a control plane interworking model for MPLS and GMPLS networks was proposed. Simulations were carried out to examine the performance of signaling protocols in an MPLS network configured with, and without Quality-of-Service (QoS). Conclusions on the performance characteristics of each signaling protocol were made based on the collected results.
103

Investigation of different VPN Solutions

Rehman, Sheikh Riaz Ur January 2009 (has links)
Abstract The rapid growth of e-business in past few years has improved companies efficiency and revenue growth. E-business applications such as e-commerce, remote access has enabled companies to manage processes, lower operating costs and increased customer satisfaction. Also the need rises for the scalable networks that accommodate voice, video, and data traffic. With the increased dependability of networks the security issues are raised and networks become more and more vulnerable to different types of security threats. To overcome security issues different security technologies are in action by vendors and technologists. Also for the survival of many businesses to allow open access to network resources, today’s networks are designed with the requirement of availability to the Internet and public networks, therefore, information confidentiality is the major issue in these networks to ensure that the network resources and user data are as secure as possible. With the requirement of network security, concept of Virtual private network was established. A Virtual Private Network (VPN) can be defined as a network in which connectivity between multiple customers’ sites is deployed on a shared network with the same security as a private network. Different VPN technologies and protocols architectures are available in market among are MPLS VPN architecture, IPSec VPN architecture, and SSL VPN architecture. Like With the introduction of Multiprotocol Label Switching (MPLS), which combines the benefits of Layer 2 switching and Layer 3 routing, it became possible to construct a technology that combines the benefits of an overlay VPN with the benefits of peer-to-peer VPN implementation in which routing is simple. MPLS/VPN is a new and simple technology, which provides simpler to routing and also makes number of topologies easy to implement which are otherwise difficult to implement. All architectures have benefits and drawbacks, also each of them can be implemented separately or in combination of other according to customer security requirement and performance of the network.
104

LAN-refresh och WAN-migrering / LAN-refresh and WAN-migrering

Thor, Kim, Allared, Sofie January 2010 (has links)
This work has been carried out at a company in the region which has about 30000 employeeswith about 400 sites all over the world. The company outsources their network including theLAN refresh and the WAN migration. They needed help with an upgrade of their LAN at theirScandinavian headquarters and to find a new solution for their WAN. The reason why the upgradeof the LAN was needed was that the equipment was too old and did not pass the securityrequirements. They also required a solution to segment their LAN, which consisted of a singlelarge VLAN with 1,300 employees. their WAN solution was made up of tunnels between all officesand the headquarter were used as the central point. They wanted to get away from beingdependent on a central point while redundancy was not always working as it should.The solution to the WAN problem was to use the ISPs backbone based on MPLS. There are two mainsolutions, layer 2 (Ethernet) VPN or layer 3 (IP) VPN. In the case of IP VPN, there are a couple of differentconnectivity options such as a static route, or use a routing protocol (eg OSPF or BGP). The final solutionwas IP VPN with OSPF as routing protocol to the ISP. With regard to the configuration of the OSPF solutionwas that every office became an own OSPF domain, configured with area 0. The report also includesthe implementation of the WAN migration with its problems.The upgrade of the LAN was a lot of planning, documentation and security. The solution for the segmentationwas to create a VLAN per floor. Because of the new software they can have the required securityfeatures.
105

Quality of Service for Broadband Satellite Internet - ATM and IP Services

Kota, S. L. (Sastri L.) 10 January 2003 (has links)
Abstract The current Internet infrastructure must be architected to handle future media-rich, and content rich applications. The success of applications such as video-on-demand, multicast and content distribution depends on Quality of Service and bandwidth guarantees. Over the years, the Internet has encompassed many changes in traffic profiles and applications, in bandwidths and utilization, but the future Internet infrastructure necessitates a very different architecture supporting Quality of Service (QoS). A satellite, distinguished by features such as global coverage, bandwidth flexibility, broadcast, multicast, and reliability, is an excellent candidate to provide broadband integrated Internet access. The aim of this thesis is to explore suitability of satellite technologies for broadband Internet services with significant emphasis on the question of defining, assessing, and developing QoS models for satellite ATM and IP broadband networks with and without onboard processing. For the satellite Internet, Transmission Control Protocol (TCP) performance is degraded due to long propagation delays, link errors, and bandwidth asymmetry. In this thesis, for satellite ATM, fundamental questions such as buffer requirements, TCP/ATM efficiency, fairness, and multiple access are addressed through extensive simulations in a quantitative way. Buffer designs for TCP over satellite ATM Unspecified Bit Rate (UBR) service are performed. A buffer size equal to half the round trip delay-bandwidth product of the TCP connections provides high efficiency for TCP over satellite UBR. An extensive TCP analysis via simulation study for various TCP mechanisms and end system policies show that for satellite environment end system policies are more important than switch drop policies in terms of efficiency and fairness for World Wide Web traffic. A bandwidth allocation scheme is proposed and analytical model for supporting voice and video service over a broadband satellite network is developed. The study results demonstrate that non-contiguous allocation can afford higher gain in uplink utilizations. In this thesis, for the first time, Integrated Services and Differentiated Services based QoS architectures for broadband satellite IP networks are proposed and analyzed. In multimedia applications where User Datagram Protocol (UDP) is used along with TCP, a fair excess bandwidth allocation is not possible because TCP is congestion sensitive whereas UDP is congestion insensitive. An extensive simulation model is developed to study the effect of precedence levels for reserved rate utilization and fairness with different buffer management policies. The simulation results indicate that three levels of precedence are required for better utilization. Multiprotocol Label Switching (MPLS) over Satellite network has been proposed and a simulation model developed to study the throughput performance impacts for TCP and UDP. The traffic engineering of MPLS facilitates efficient and reliable network design to optimize the utilization of network resources and enhance the network QoS. A novel Code Division Multiple Access based Spread ALOHA single code multiple access scheme for broadband satellite return channel is proposed as an alternative to Multifrequency-Time Division Multiple Access based Digital Video Broadcasting-Return Channel via Satellite protocol. It is shown through Monte Carlo simulations that throughput for Spread ALOHA One Long Code equivalent to packet length, is better than Spread ALOHA One Code in which spreading sequence repeats every symbol. The reduction of throughput due to multi-user interference for different number of users is shown. Further research on QoS architectures, performance models for TCP enhancements, interworking functions, interoperability, and standardization efforts is included.
106

Improving Energy Efficiency and Bandwidth Utilization in Data Center Networks Using Segment Routing

Ghuman, Karanjot Singh January 2017 (has links)
In today’s scenario, energy efficiency has become one of the most crucial issues for Data Center Networks (DCN). This paper analyses the energy saving capability of a Data center network using Segment Routing (SR) based model within a Software Defined Network (SDN) architecture. Energy efficiency is measured in terms of number of links turned off and for how long the links remain in sleep mode. Apart from saving the energy by turning off links, our work further efficiently manages the traffic within the available links by using Per-packet based load balancing approach. Aiming to avoid congestion within DCN’s and increase the sleeping time of inactive links. An algorithm for deciding the particular set of links to be turned off within a network is presented. With the introduction of per-packet approach within SR/SDN model, we have successfully saved 21 % of energy within DCN topology. Results show that the proposed Per-packet SR model using Random Packet Spraying (RPS) saves more energy and provides better performance as compared to Per-flow based SR model, which uses Equal Cost Multiple Path (ECMP) for load balancing. But, certain problems also come into picture using per-packet approach, like out of order packets and longer end to end delay. To further solidify the effect of SR in saving energy within DCN and avoid previously introduced problems, we have used per-flow based Flow Reservation approach along with a proposed Flow Scheduling Algorithm. Flow rate of all incoming flows can be deduced using Flow reservation approach, which is further used by Flow Scheduling Algorithm to increase Bandwidth utilization Ratio of links. Ultimately, managing the traffic more efficiently and increasing the sleeping time of links, leading to more energy savings. Results show that, the energy savings are almost similar in per-packet based approach and per-flow based approach with bandwidth reservation. Except, the average sleeping time of links in per-flow based approach with bandwidth reservation decreases less severely as compared to per-packet based approach, as overall traffic load increases.
107

Nové trendy v návrhu datových sítí / New trends in data network design

Hlavatý, Jindřich January 2015 (has links)
are used. In the theoretical part I analyse some basic network protocols and their gradual development, VLANs and Spanning Tree Protocol, MPLS protocol and other. There are described parameters for the design of new networks and the models networks and their various are used, the network with a new architecture and a software-defined network (SDN),too. The practical part deals with designed laboratory exercises for teaching students. The laboratory experiments are always divided into several tasks. They are formed even students ignorant or less familiar with the issue could configure and test it.
108

Nové trendy v návrhu datových sítí / New trends in data network design

Hlavatý, Jindřich January 2015 (has links)
are used. In the theoretical part I analyse some basic network protocols and their gradual development, VLANs and Spanning Tree Protocol, MPLS protocol and other. There are described parameters for the design of new networks and the models networks and their various are used, the network with a new architecture and a software-defined network (SDN),too. The practical part deals with designed laboratory exercises for teaching students. The laboratory experiments are always divided into several tasks. They are formed even students ignorant or less familiar with the issue could configure and test it.
109

Nové metody zajištění kvality služeb v datových sítích / New Methods of Quality of Service Assurance in Data Networks

Hošek, Jiří January 2011 (has links)
The doctoral thesis is focused on a research in the area of the quality-of-service support technologies in data networks. The current modern communication networks cannot operate correctly without an effective tool allowing differentiated treatment for various network traffic classes. Looking at the current trends in this area it turns out that the technology of Differentiated services is currently the most widely used mechanism for QoS assurance in data networks. The major part of this doctoral thesis concerns the design of a novel QoS system which offers a solution for one of the main problems of DiffServ technology. This disadvantage lies in the missing cooperation between the end station and edge node of the DiffServ domain. To overcome this limitation the system proposed introduces an improvement which enables the user application to actively participate in the resource reservation process by direct configuration of the DSCP value in the IP header of its own packets. This functionality is based on the identification of DiffServ configuration parameters available in the edge router. To retrieve the information required from network component the well-known SNMP protocol has been chosen, which has direct access to the components’s configuration stored in the MIB database. On the basis of this theoretical proposal several simulation scenarios have been created and analysed. The results show that the system designed presents an efficient solution for the mentioned problem of DiffServ. They also give good assumptions for the successful implementation of this system into a real environment.
110

Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks

Ögren, Niklas January 2002 (has links)
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999, when MPLS first started in the laboratories, development has continued. Today it is possible to introduce MPLS or tunneled national virtual local area network into an existing network. This requires high speed, fault tolerant, and stable hardware and software. Going beyond the separation of traffic at layer 3 using Virtual Private Networks, i.e., IPSec, we can tunnel layer 2 traffic through a network. Although the first layer 3 VPN products are already in use, layer 2 VPNs still need to be evaluated and brought into regular use. There are currently two ways of tunneling VLANs in a core network: tunneled VLANs (or as Extreme Networks calls them, VMANs) and MPLS. This project showed that it is possible to start with a VLAN-only solution, and then upgrade to MPLS to solve scalability issues. The VMAN solution can not be used at Arrowhead, since there are too many disadvantages in the way Extreme Networks has implemented it. However, a mix of tunneling VMAN in a VLAN core is possible, and enables customer tagging of VLANs in a Layer 2 VPN. Furthermore, the testing of EAPS and per-VLAN Spanning Tree Protocol turned out well, and showed that EAPS should not be used when there is more than one loop.

Page generated in 0.0338 seconds