• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 104
  • 17
  • 9
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 140
  • 113
  • 110
  • 41
  • 23
  • 21
  • 19
  • 19
  • 15
  • 13
  • 12
  • 12
  • 11
  • 11
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Node and topology management for content distribution in source constraint networks /

Kolazhi, Krishnan. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2007. / Printout. Includes bibliographical references (leaves 89-90). Also available on the World Wide Web.
82

Low-cost delay-constrained multicast routing heuristics and their evaluation

Irava, Venkata Srinivas, January 2006 (has links) (PDF)
Thesis (Ph. D.)--Washington State University, August 2006. / Includes bibliographical references (p. 129-133).
83

A robust wireless multicast protocol

Boinpalli, Vamshi Krishna. January 2005 (has links)
Thesis (M.S)--Ohio University, June, 2005. / Title from PDF t.p. Includes bibliographical references (p. 102-103)
84

A CAM-Based, High-Performance Classifier-Scheduler for a Video Network Processor.

Tarigopula, Srivamsi 05 1900 (has links)
Classification and scheduling are key functionalities of a network processor. Network processors are equipped with application specific integrated circuits (ASIC), so that as IP (Internet Protocol) packets arrive, they can be processed directly without using the central processing unit. A new network processor is proposed called the video network processor (VNP) for real time broadcasting of video streams for IP television (IPTV). This thesis explores the challenge in designing a combined classification and scheduling module for a VNP. I propose and design the classifier-scheduler module which will classify and schedule data for VNP. The proposed module discriminates between IP packets and video packets. The video packets are further processed for digital rights management (DRM). IP packets which carry regular traffic will traverse without any modification. Basic architecture of VNP and architecture of classifier-scheduler module based on content addressable memory (CAM) and random access memory (RAM) has been proposed. The module has been designed and simulated in Xilinx 9.1i; is built in ISE simulator with a throughput of 1.79 Mbps and a maximum working frequency of 111.89 MHz at a power dissipation of 33.6mW. The code has been translated and mapped for Spartan and Virtex family of devices.
85

DESIGNING A NEOTERIC ARCHITECTURE & COMMUNICATION PROTOCOLS FOR CHINESE REMAINDER THEOREM BASED STRUCTURED PEER-TO-PEER NETWORKS WITH COMMON INTERESTS

Maddali Vigneswara, Iswarya 01 December 2021 (has links)
The core motive of this research is to construct a new hierarchical non-DHT based architecture for Peer-to-Peer (P2P) networks that facilitate common interests clustering. DHT based network maintenance is on the high end and it churning management is a complex task here. Providing efficient data querying performance and ensuring minimal churn management effort has interested us to pursue non-DHT route of P2P networking. And at each level of the proposed architecture hierarchy, existing networks are all structured and each such network has the diameter of 1 overlay hop. Such low diameters have immense importance in designing very efficient data lookup algorithms. We shall use a mathematical model based on the Chinese Remainder Theorem (CRT), generally used in cryptography, to define the neighborhood relations among peers to obtain the above-mentioned diameters. To the best of our knowledge, use of CRT in P2P network design is a completely new idea; it does not exist in the literature so far. It is worth mentioning its most important advantage from the viewpoint of speed of communication, that is its diameter, which is only 3 overlay hops. The protocol is not restricted to a single data source, and it incorporates peer heterogeneity as well.
86

Key Management Techniques for Dynamic Secure Multicasting

Koneni, Madhu 21 July 2003 (has links)
Most of the Internet applications today require multicasting. For example, software updates, multimedia content distribution, interacting gaming and stock data distribution require multicast services. All of these applications require privacy and authenticity of the participants. Most of the multicasting groups are dynamic and some of them are large in number. Only those users who belong to the multicasting group should receive the information and be able to decrypt it. New users joining the group should receive information immediately but should not understand the information that was released prior to their joining. Similarly, if users leave the group, they should not receive any further information and should not be able to decrypt it. Keys need to be distributed to the users belonging to the current session and hence some kind of key management is required. Existing schemes for secure multicasting are limited to small and static groups. To allow large and dynamic groups to use the services of multicasting, some protocols have been developed: Multicast Trees, Spanning Tree, Centralized Tree-Based Key Management, Flat-key Management and Distributed Key Management. Some of these schemes are better than others with respect to the speed, memory consumption, and amount of communication needed to distribute the keys. All these schemes are limited in performance with respect to the speed, memory consumption, and amount of communication needed in distributing the keys. In this thesis, a number of public and private key algorithms and key management techniques for secure and dynamic multicasting are studied and analyzed. The thesis is focused on the secure lock method developed by Chiou and Chen, using the Chinese Remainder Theorem. The protocol is implemented for a small group of users and its performance is studied. While, the secure lock method works well for a small group of users and the performance is degraded when the group grows in size. A protocol is proposed for a large and dynamic group, based on the idea of the Chinese Remainder Theorem. A performance study is carried out by comparing our proposed protocol with the existing multicasting protocols. The analysis shows that the proposed protocol works well for large and dynamic groups and gives significantly better performance. / Master of Science
87

Network processors and utilizing their features in a multicast design

Diler, Timur 03 1900 (has links)
Approved for public release, distribution is unlimited / In order to address the requirements of the rapidly growing Internet, network processors have emerged as the solution to the customization and performance needs of networking systems. An important component in a network is the router, which receives incoming packets and directs them to specific routes elsewhere in the system. Network processors and the associated software control the routers and switches and allow software designers to deploy new systems such as multicasting forwarder and firewalls quickly.This thesis introduces network processors and their features, focusing on the Intel IXP1200 network processor. A multicast design for the IXP1200 using microACE is proposed. This thesis presents an approach to building a multicasting forwarder using the IXP1200 network processor layer-3 forwarder microACE that carries out unicast routing. The design is based on the Intel Internet exchange architecture and its active computing element (ACE). The layer-3 unicast forwarder microACE is used as a basic starting point for the design. Some software modules, called micoblocks, are modified to create a multicast forwarder that is flexible and efficient. / Lieutenant Junior Grade, Turkish Navy
88

Secure IP Multicasting with Encryption Key Management

Maharjan, Nadim, Moten, Daryl 10 1900 (has links)
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / This paper presents the design for secure IP multicasting in an iNet environment using public key cryptography. Morgan State University has been conducting research to improve the telemetry network by improving network performance, implementing IP (Internet Protocol) multicasting and providing a stronger security system for the iNet environment. The present study describes how IP multicasting could be implemented to provide more secure communication in the iNet environment by reducing traffic and optimizing network performance. The multicast of data is closely tied to the key management center for secure applications. This paper develops a means of delivering keys between two or more parties showing a relationship between the multicast network and the Key Management Center (KMC). The KMC is an element of the system which distributes and manages session keys among multicast members. A public key encryption method is used to address the distribution of session keys in the multicast network. The paper will present a system level design of multicast and key management with dual encryption of session keys for the iNet system.
89

An efficient and scalable core allocation strategy for multicore systems

Unknown Date (has links)
Multiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better heat dissipation. We introduce a multi-stage power management scheme to reduce the total power consumption by managing the power states of the cores. We simulate three multicore systems, with 16, 32, and 64 cores, respectively, using synthetic workload. Experimental results show that our proposed strategy performs better than Square-shaped, Rectangle-shaped, L-Shaped, and Hybrid (contiguous and non-contiguous) schemes in multicore systems in terms of fragmentation and completion time. Among these strategies, our strategy provides a better heat dissipation mechanism. / by Manira S. Rani. / Thesis (M.S.C.S.)--Florida Atlantic University, 2011. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2011. Mode of access: World Wide Web.
90

Novel techniques for Rayleigh noise suppression and multicast transmission in wavelength division multiplexed passive optical networks. / CUHK electronic theses & dissertations collection

January 2011 (has links)
Centralized light source (CLS) at the central office is an attractive solution for low-cost implementation of WDM-PON, as it eliminates the need of wavelength-specific transmitters and wavelength management at the optical network units (ONU). CLS can be realized by either a carrier-distributed scheme or a remodulation scheme. In both schemes, however, the upstream signal is susceptible to the interferometric crosstalk induced by the beating between the upstream signal and the back-reflected light due to the intrinsic Rayleigh Backscattering (RB), both of which are of the same wavelength. We propose and demonstrate a simple and novel scheme to suppress the RB noise in the carrier-distributed WDM-PON. Differential phase-shift keying (DPSK) is used as the upstream modulation format and the destructive port of the delay-interferometer (DI) is employed to demodulate the upstream DPSK signal. As the spectrum of RB towards the OLT is narrow due to the very narrow spectrum of the distributed carrier, the RB noise can be considerably rejected by the notch filter-like destructive port of the DI at the OLT, which is used simultaneously to demodulate the upstream DPSK signal. The scheme can also be extended to the application in the remodulation-based WDM-PON, as long as the downstream signal has a narrow spectrum (i.e. via reducing downstream modulation depth). A unique feature of the DPSK signal with reduced modulation depth (RMD-DPSK) is that it can be demodulated by DI's destructive port without extinction ratio (ER) degradation, whereas the demodulated signal from DI's destructive port has a very low ER and can be used as the source for upstream remodulation. We also proposed a novel offset-Manchester coding to suppress Rayleigh noise in electrical domain via a postdetection high-pass filter. / Foreseeing the rapidly growing demand for multimedia services and the trend of service convergence, the penetration of optical fiber in access network is an ultimate solution to break the last-mile bottleneck imposed by the 100-year-old copper network. One of the most promising solutions to realize optical access is the passive optical network (PON), in which the network infrastructure is shared by many subscribers and has no active elements between the central office and the customer. Thus a PON requires neither electrical power nor active management, leading to effective reduction in operational expenses. Time-division-multiplexed passive optical networks (TDM-PONs) such as Ethernet PON (EPON) and Gigabit PON (GPON) are being widely deployed in current fiber-based access networks for providing broadband access, offering triple-play services including video, data and voice. In the near future, wavelength-division-multiplexed passive optical network (WDM-PON) can be the enabler of the next-generation optical broadband access that requires large dedicated and symmetric bandwidth, data privacy, and upgrade flexibility. TDM-PONs also can benefit from WDM technologies for capacity upgrade. / With more diverse multimedia and data services available for broadband access, the access network has to be flexible enough to cope with various data or video delivery such as broadcast/multicast services, in addition to the point-to-point traffic. Multicast is more attractive, compared to broadcast, as it allows selective control of the connection for each subscriber individually. Multicast can be easily realized in TDM-PONs as it employs power-splitting at the remote node (RN). However, it is more challenging in WDM-PONs, due to the dedicated connection between the optical line terminal (OLT) and each ONU. Many studies have been carried out to solve this problem. The prior schemes either need relatively complicated multicast control and/or cannot support future proof 10-Gb/s symmetric point-to-point (PtP) transmission. We proposed a novel multicast control scheme for a WDM-PON with 10-Gb/s symmetric bit rate. The multicast data encoded in DPSK format is superimposed onto all PtP channels modulated in inverse return-to-zero format. With an athermal Dr being used at the ONU to demodulate the DPSK signal, the multicast data can be effectively disabled by slight detuning the laser wavelength at OLT, which has negligible effect on the PtP data. The proposed scheme differs from all the previous schemes in that, the multicast control is realized via the inherent wavelength management of WDM systems, rather than via any other additional adjustment such as ER, synchronization, and polarization. v / Xu, Jing. / Adviser: Lian-Kuan Chen. / Source: Dissertation Abstracts International, Volume: 73-06, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references. / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.

Page generated in 0.0891 seconds