Spelling suggestions: "subject:"multiservice"" "subject:"multiservices""
1 |
A building of living stones : a community service centre for Mamelodi EastNel, Tamryn 30 November 2010 (has links)
This thesis aims to, from the perspective of architecture and urban place making, examine the potential of a church as a catalytic nodal public building and its corresponding potential to serve and uplift its community through both secular and religious functions. The church itself is nothing other than ‘the gathered congregation’ in a particular place at a particular time. (Moltman 1999:201) It is following this statement that the validity of merely embracing the typology of a building designed for given liturgy is questioned. This thesis hypothesises that all spaces that foster community meeting and ritual have the potential to become ‘church’, additionally that: in a Christian based spatial confi guration, spaces that facilitate this ‘church’ to occur are also sacred spaces. / Dissertation (MArch(Prof))--University of Pretoria, 2010. / Architecture / unrestricted
|
2 |
A Consumer Premises End User Interface for OSA/Parlay ApplicationsMachethe, Thabo 16 February 2007 (has links)
Student Number : 9812990V -
MSc project report -
School of Electrical Engineering -
Faculty of Engineering and the Built Environment / The NGN is a multi-service network which inter-works with the Public Switched
Telephone Network (PSTN), the voice network and the data network provided by
Internet. Through network independent APIs such as OSA-Parlay, the NGN slowly
migrates and converges Telecoms and IT networks, voice and Internet, into a common
packet infrastructure. The OSA/Parlay group defines a softswitch architecture which
provides network independent APIs or SCFs that enable cross network application
development The Parlay softswitch provides connectivity to underlying transport
networks for application providers. The standard specifies the interaction between
application providers and the softswitch. However, the standard does not specify an
interface to regulate the interaction between service providers and the consumer/end user
domain. This means that applications housed in the service provider domain have no
defined interfaces to manage service delivery to the consumer domain. For most service
providers, the lack of a non-standardized API set impedes efforts to decrease application
creation and deployment time. This research investigates the design and implementation
of a standard consumer interface which can be used by application providers within an
OSA/Parlay system to deliver service content to end users. The main objectives with
regard to the functionality provided by the interface include the integration of facilities
which will assist application providers to manage end user access and authentication (to
enable users to establish a secure context for service usage), subscription (to handle the
subscription life cycle), and service usage management (to enable the initiation and
termination of services). The TINA-Consortium (TINA-C) has developed a service
architecture to support the creation and provisioning of services in the NGN. The TINA
architecture offers a comprehensive set of concepts and principles that can be used in the
design of NGN services. The architecture consists of a set of reusable and interoperable
service components encapsulating a rich and well defined set of APIs aimed at supporting
the interaction between application providers and consumers. TINA’s session concepts,
information structures, interfaces and service components can be used to support the
design of a consumer premises end user interface for OSA/Parlay. This research also
aims to explore the feasibility of using the TINA API within an OSA/Parlay system to
support consumer domain service delivery. In order to implement the consumer interface
for Parlay applications, the ability of the TINA service architecture to provide Access and
Authentication management; Subscription and Profile management; and Service Usage
management was investigated. The report documents the design and implementation of
an OSA/Parlay consumer interface utilizing TINA service components and interfaces.
|
3 |
Boundary personnel an exploratory study of their role responsibility and interorganizational behavior /Wharf, Brian. January 1969 (has links)
Thesis (Ph. D.)--Brandeis University, 1969. / Abstracted in DAI-A 31/05, p. 2506, Nov 1970. Includes bibliographical references (leaves 168-173).
|
4 |
Efficient authenticated multi-service group key management for secure wireless mobile multicastMapoka, Trust T., Shepherd, Simon J., Abd-Alhameed, Raed, Anoh, Kelvin O.O. January 2014 (has links)
No
|
5 |
Multi-Service Group Key Establishment for Secure Wireless Mobile Multicast NetworksMapoka, Trust T., Dama, Yousef A.S., AlSabbagh, Haider M., Shepherd, Simon J., Abd-Alhameed, Raed 10 1900 (has links)
Yes / Recently there is high demand in distributing multimedia services over the internet to ubiquitous and computational intelligent mobile subscribers by the service providers (SPs). In this instance, provision of those services must be restricted to authorized subscribers via integration of authentication and group key management (GKM). GKM with diverse group services subscribed dynamically by moving subscribers in wireless networks has been omitted in conventional approaches. However it is expected that significant key management overhead will arise in them due to multi-services co-existing in the same network. In this paper, we propose a scalable decentralized multi-service GKM scheme considering host mobility in wireless environment. In the scheme, authentication of mobile subscribers and key management phases are delegated from the trusted domain key distributor (DKD) to the subgroup controllers known as area key distributors (AKD). The trusted intermediate AKDs can then establish and distribute the service group keys to valid subscribers in a distributed manner using identity-based encryption without involving the domain key distributor (DKD). This alleviates unnecessary delays and possible bottlenecks at the DKD. We show by simulation that the proposed scheme has some unique scalability properties over known schemes in terms of optimized rekeying communication and storage overheads. The security performance studies have shown resilience to various attacks.
|
6 |
Ανάλυση και αποτίμηση της απόδοσης παθητικών οπτικών δικτύων Ethernet για πολυδιάστατη κίνησηΚόκιου, Αντωνία 07 June 2013 (has links)
Η επιθυμία του ανθρώπου για ποιοτική και αδιάκοπη επικοινωνία, έχει ωθήσει την τεχνολογία να κάνει άλματα εξέλιξης. Η συνεχής ανάπτυξη των απαιτήσεων των χρηστών των τηλεπικοινωνιακών δικτύων, καθιστά αναγκαία την ανανέωση των τεχνολογιών και ιδιαίτερα την αύξηση του παρεχόμενου εύρους ζώνης, ώστε να συμβαδίζει με τις ανάγκες τους. Γι’αυτό το λόγο τα τελευταία χρόνια έχουν εμφανιστεί οι οπτικές ίνες, που με τα πλεονεκτήματα που παρουσιάζουν, κερδίζουν ολοένα και περισσότερο τις αγορές και τους καταναλωτές.
Στην παρούσα διπλωματική παρουσιάζονται τα πλεονεκτήματα και οι τεχνολογίες που χρησιμοποιεί ένα δίκτυο βασισμένο σε οπτικές ίνες (παθητικό οπτικό δίκτυο – PON). Εξετάζεται τόσο η τεχνολογία TDMA, όσο και η WDMA στα PONs. Η μελέτη γίνεται πάνω στο πρότυπο ΕΡΟΝ (Ethernet-PON), που ορίστηκε ως το καταλληλότερο συγκριτικά με άλλα παρόμοιά του. Πιο συγκεκριμένα, εξετάζεται η διάθεση εύρους ζώνης στο ανοδικό κανάλι (από τον χρήστη προς το τηλεπικοινωνιακό κέντρο) στα συστήματα ΕΡΟΝ και τι αποτελέσματα και συμπεράσματα μπορούν να ληφθούν.
Αρχικά, αναφέρεται μια προηγούμενη μελέτη ενός ΕΡΟΝ η οποία κάνει χρήση του αλγορίθμου IPACT, της περιορισμένης υπηρεσίας (limited service) του αλγορίθμου και υποστηρίζει μονοδιάστατη ανοδική κίνηση δεδομένων. Το δίκτυο ΕΡΟΝ μοντελοποιείται και προσφέρει αποτελέσματα ύστερα από μαθηματική ανάλυση με χρήση της γλώσσας προγραμματισμού C, καθώς και αποτελέσματα με τη χρήση της γλώσσας προσομοίωσης SIMSCRIPT II.5.
Στη συνέχεια, περιγράφεται και μοντελοποιείται ένα δίκτυο ΕΡΟΝ που κάνει χρήση της σταθερής υπηρεσίας (fixed service) του αλγορίθμου IPACT και υποστηρίζει πολλαπλές κατηγορίες υπηρεσιών ανοδικής κίνησης δεδομένων με διαφορετικές προτεραιότητες. Και σε αυτή την περίπτωση, το δίκτυο ΕΡΟΝ προσφέρει αποτελέσματα τόσο από ένα αναλυτικό μοντέλο, όσο και από ένα μοντέλο προσομοίωσης.
Τέλος, περιγράφεται και μοντελοποιείται ένα δίκτυο όμοιο με το προηγούμενο δίκτυο ΕΡΟΝ, με τη διαφορά να έγκειται στη χρήση της τεχνολογίας WDM στο ΕΡΟΝ. Η μελέτη σε αυτό το τμήμα της εργασίας γίνεται με χρήση επίσης της σταθερής υπηρεσίας (fixed service) του αλγορίθμου IPACT και υποστηρίζει πολλαπλές κατηγορίες υπηρεσιών ανοδικής κίνησης δεδομένων με διαφορετικές προτεραιότητες. Με αυτόν τον τρόπο επιτυγχάνεται μια σημαντική αύξηση του διαθέσιμου εύρους ζώνης του ανοδικού καναλιού που προσφέρεται στους χρήστες. Για άλλη μια φορά παρουσιάζονται αποτελέσματα ύστερα από ανάλυση και προσομοίωση του μοντέλου, με χρήση, όπως και προηγουμένως, της γλώσσας προγραμματισμού C και της γλώσσας προσομοίωσης SIMSCRIPT II.5. Τα συμπεράσματα που εξάγονται, ύστερα από τις παραπάνω μελέτες, είναι άξια προσοχής. / In the past few years technology, in the communication field, has made great progress due to the fact that people desire more and more good quality of service. The continuous demand for development of the subscribers using the telecommunication services, necessitates the technological renewal and especially the increase of the available bandwidth. For this reason, optical fibers have appeared in the networking field and they are becoming more known by the users and in the market every day.
In this dissertation the advantages and the technologies a network, based on optical fiber uses, are presented. An optical fiber network it is also called Passive Optical Network (PON). The TDMA (Time Division Multiplexing Access) and WDMA (Wavelength Division Multiplexing Access) technologies are examined. The study is based on an EPON (Ethernet-PON) standard, which was chosen as the most suitable among others. More specifically, the available upstream (from the users to the Central Office) bandwidth in an EPON model and the results that can be deduced are examined.
In the beginning, a previous study of an EPON which uses the IPACT (Interleaved Polling with Cycle Time) algorithm is reported. The EPON network uses the limited service of the IPACT algorithm and supports a single rate. A specific model of an EPON network is studied and results using the C programming language and the simulation language SIMSCRIPT II.5 are given.
Moreover, an EPON network which uses the fixed service of the IPACT algorithm which supports a multi-rate upstream with different priorities is described and modeled. In this case as well, the EPON model network gives results based on analysis and simulation.
In the end, a same EPON network, as the one described before, is studied and modeled having as a difference that a WDM technology is used. The fixed service of the IPACT algorithm is used and a multi-rate upstream with different priorities are supported again. With this different technology, an important increase in the available upstream bandwidth which is provided to the users is accomplished. Once again, the results are presented after an analysis and a simulation of the model, using the programming language C and the simulation language SIMISCRIPT II.5. The extracted results which the models can offer are worthy of attention.
|
7 |
Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communicationsMapoka, Trust Tshepo January 2015 (has links)
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cyber security in any business is obligatory to restrict access of disseminated services to only authorised personnel. This becomes a vital requirement for a successful commercialisation of exchanged group services. The standard way to achieve cyber security in a wireless mobile multicast communication environment is through confidentiality using Group Key Management (GKM).The existing GKM schemes for secure wireless multicast from literature only target single group service confidentiality; however, the adoption of multiple group service confidentiality in them involve inefficient management of keys that induce huge performance overheads unbearable for real time computing. Therefore, a novel authenticated GKM scheme for multiple multicast group subscriptions known as slot based multiple group key management (SMGKM) is proposed. In the SMGKM, the handovers move across diverse decentralised clusters of homogeneous or heterogeneous wireless access network technologies while participating in multiple group service subscriptions. Unlike the conventional art, the SMGKM advances its security by integrating location based authentication and GKM functions. Both functions are securely offloaded from the Domain Key Distributor (DKD) to the intermediate cluster controllers, Area Key Distributors (AKDs), in a distributed fashion, using the proposed location based authenticated membership list (SKDL). A significant upgrade of fast handoff performance with reduced performance overheads of the SMGKM scheme is achieved. The developed numerical analysis and the simulation results display significant resource economy in terms of reduced rekeying transmission, communication bandwidth and storage overheads while providing enhanced security. The performance of the SMGKM in a high speed environment is also evaluated and has demonstrated that SMGKM outperforms the previous work. Finally, the SMGKM correctness against various attacks is verified using BAN logic, the eminent tool for analysing the widely deployed security protocols. The security analysis demonstrates that SMGKM can counteract the security flaws and redundancies identified in the chosen related art.
|
8 |
Transmission de multimédia dans les réseaux sans fil à qualité de service garantie / Multimedia transmission in wireless network with QoS guaranteeKambou, Samy Jacques André 08 November 2016 (has links)
Cette thèse s'intéresse aux stratégies de transmission de contenu multimédia des réseaux sans fil. L'intérêt d'une stratégie repose sur sa capacité à gérer les ressources selon les objectifs des applications visées. On propose ainsi un schéma de transmission, qui garantit la qualité de service (QdS), quelles que soient les conditions du canal et suivant les spécificités du contenu multimédia. On exploite pour cela les diversités (spatiales, fréquentielles, etc.) du canal radio. A ce titre, l'association MIMO-OFDM apparaît comme une solution idéale pour accroitre les performances du système. On propose ainsi un système MIMO-OFDMA, qui intègre des stratégies inter-couches. Celles-ci se basent sur des techniques d'adaptation de lien pour régler dynamiquement les paramètres du système. On développe en premier un schéma inter-couches PHY 1 APPL, associé à un système MIMO-OFDM mono-utilisateur, qui transmet une vidéo H.264/SVC. L'adaptation de lien permet de définir le jeu de paramètres optimaux, qui minimise la distorsion de la vidéo reçue. On introduit ainsi une politique d'optimisation sous contraintes de puissance et de taux d'erreurs binaires. Pour tenir compte d'aspects de transmission réalistes, on propose un schéma inter-couches PHY/MAC, dédié à un système MIMO-OFDMA, multi-utilisateurs et multi-services. Ce dernier associe un algorithme d'ordonnancement, au paramétrage optimal, pour fournir au maximum d'utilisateurs des débits utiles respectant les exigences des services demandés. Enfin, on combine les deux premières solutions pour définir les paramètres optimaux minimisant la distorsion de la vidéo reçue par utilisateur, tout en garantissant la QdS des autres services. / This thesis focuses on the transmission strategies of the multimedia content in wireless networks. The advantage of a such strategy is its ability to manage the resources, according to the objectives of the targeted applications. We propose a transmission scheme, which guarantees the quality of service (QoS), depending on the channel state information and on the multimedia content specifications. We take advantage of the radio channel diversities (spatial, frequency, etc.). ln fact, the association of MIMO and OFDM techniques appears as effective solution to increase the system performance. For this reason, we propose a MIMO-OFDMA system, which considers cross-layer srtategies based on link adaptation schemes to dynamically adjust the system parameters. Firstly, we develop a PHY/APPL cross-layer strategy, dedicated to a single user of a MIMO-OFDMA system, which transmits an H.264/SVC video. The Iink adaptation scheme allows to define the optimum parameters, which minimize the end-ta-end video distortion by using an optimization algorithm under power and bit error rate constraints. To consider the realistic transmission aspects, we propose a PHY/MAC cross-layer strategy, dedicated to a multi-user, multi-service, MIMOOFDMA system. This scheme combines a scheduling policy with optimal parameterization to provide a satisfied troughput to a maximum number of users, acheiving the required services. Finally, the first two solutions are combined to determine the optimal parameters which minimize the end-ta-end distortion of the received video by user, and also acheive QoS requirements of the other services.
|
9 |
Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications. Multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communicationsMapoka, Trust Tshepo January 2015 (has links)
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cyber security in any business is obligatory to restrict access of disseminated services to only authorised personnel. This becomes a vital requirement for a successful commercialisation of exchanged group services. The standard way to achieve cyber security in a wireless mobile multicast communication environment is through confidentiality using Group Key Management (GKM).The existing GKM schemes for secure wireless multicast from literature only target single group service confidentiality; however, the adoption of multiple group service confidentiality in them involve inefficient management of keys that induce huge performance overheads unbearable for real time computing. Therefore, a novel authenticated GKM scheme for multiple multicast group subscriptions known as slot based multiple group key management (SMGKM) is proposed. In the SMGKM, the handovers move across diverse decentralised clusters of homogeneous or heterogeneous wireless access network technologies while participating in multiple group service subscriptions. Unlike the conventional art, the SMGKM advances its security by integrating location based authentication and GKM functions. Both functions are securely offloaded from the Domain Key Distributor (DKD) to the intermediate cluster controllers, Area Key Distributors (AKDs), in a distributed fashion, using the proposed location based authenticated membership list (SKDL).
A significant upgrade of fast handoff performance with reduced performance overheads of the SMGKM scheme is achieved. The developed numerical analysis and the simulation results display significant resource economy in terms of reduced rekeying transmission, communication bandwidth and storage overheads while providing enhanced security. The performance of the SMGKM in a high speed environment is also evaluated and has demonstrated that SMGKM outperforms the previous work. Finally, the SMGKM correctness against various attacks is verified using BAN logic, the eminent tool for analysing the widely deployed security protocols. The security analysis demonstrates that SMGKM can counteract the security flaws and redundancies identified in the chosen related art.
|
Page generated in 0.052 seconds