• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 54
  • 14
  • 10
  • 7
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 117
  • 117
  • 44
  • 32
  • 26
  • 19
  • 19
  • 19
  • 15
  • 14
  • 14
  • 13
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An analysis of voice over Internet Protocol in wireless mesh networks

Meeran, Mohammad Tariq January 2012 (has links)
<p>This thesis presents an analysis of the impact of node mobility on the quality of service for voice over Internet Protocol in wireless mesh networks. Voice traffic was simulated on such a mesh&nbsp / network to analyze the following performance metrics: delay, jitter, packet loss and throughput. Wireless mesh networks present interesting characteristics such as multi-hop routing, node mobility, and variable coverage that can impact on quality of service. A reasonable deployment scenario for a small organizational network, for either urban or rural deployment, is considered with three wireless mesh network scenarios, each with 26 mesh nodes. In the first scenario, all mesh nodes are stationary. In the second scenario, 10 nodes are mobile and 16 nodes are stationary.&nbsp / Finally, in the third scenario, all mesh nodes are mobile. The mesh nodes are simulated to move at a walking speed of 1.3m per second. The results show that node mobility can increase packet&nbsp / loss, delay, and jitter. However, the results also show that wireless mesh networks can provide acceptable quality of service, providing that there is little or no background traffic generated by other&nbsp / applications. In particular, the results demonstrate that jitter across all scenarios remains within humanacceptable tolerances. It is therefore recommended that voice over Internet Protocol implementations on wireless mesh networks with background traffic be supported by quality of service standards / otherwise they can lead to service delivery failures. On the other hand, voice-only&nbsp / esh networks, even with mobile nodes, offer an attractive alternative voice over Internet Protocol platform. </p>
2

An analysis of voice over Internet Protocol in wireless mesh networks

Meeran, Mohammad Tariq January 2012 (has links)
<p>This thesis presents an analysis of the impact of node mobility on the quality of service for voice over Internet Protocol in wireless mesh networks. Voice traffic was simulated on such a mesh&nbsp / network to analyze the following performance metrics: delay, jitter, packet loss and throughput. Wireless mesh networks present interesting characteristics such as multi-hop routing, node mobility, and variable coverage that can impact on quality of service. A reasonable deployment scenario for a small organizational network, for either urban or rural deployment, is considered with three wireless mesh network scenarios, each with 26 mesh nodes. In the first scenario, all mesh nodes are stationary. In the second scenario, 10 nodes are mobile and 16 nodes are stationary.&nbsp / Finally, in the third scenario, all mesh nodes are mobile. The mesh nodes are simulated to move at a walking speed of 1.3m per second. The results show that node mobility can increase packet&nbsp / loss, delay, and jitter. However, the results also show that wireless mesh networks can provide acceptable quality of service, providing that there is little or no background traffic generated by other&nbsp / applications. In particular, the results demonstrate that jitter across all scenarios remains within humanacceptable tolerances. It is therefore recommended that voice over Internet Protocol implementations on wireless mesh networks with background traffic be supported by quality of service standards / otherwise they can lead to service delivery failures. On the other hand, voice-only&nbsp / esh networks, even with mobile nodes, offer an attractive alternative voice over Internet Protocol platform. </p>
3

System support for multi-service traffic

Dixon, Michael Joseph January 1991 (has links)
No description available.
4

Ethernet/Token-ring bridge design

Golbahar Haghighi, Shapour January 1990 (has links)
No description available.
5

Some aspects of a code division multiple access local area network

Pearce, Richard Sargon January 1987 (has links)
No description available.
6

Toward an internet protocol (version 6) deployable information-centric framework

Heath, Laura 12 January 2015 (has links)
This research defines a new information-centric networking (ICN) framework and associated protocol that is implementable in the existing internet with feasible minimal changes to the existing internet infrastructure. We create a protocol that assigns globally unique data item names and embeds these names, plus associated metadata, into an IPv6 header. This technique allows the use of the existing IPsec suite of protocols to mitigate user privacy and security concerns which exist in other existing non-implementable ICN designs. We demonstrate that this technique allows the use of standard routing and switching methods, which ensures network stability and reachability, and it permits self-assembly into internetworks. Next, we analyze the layer four functionality which must be provided by a general-purpose transport protocol, and we give an initial implementation which is used by our prototype. Lastly, using the Mininet network virtualization suite, we show that using RFC-compliant IPv6 datagrams as the named content allows information-centric routing and switching to be done using unmodified hardware and software, and that it also ensures backwards compatibility with unmodified networks.
7

PG-means : learning the number of clusters in data /

Feng, Yu. Hamerly, Gregory James, January 2006 (has links)
Thesis (M.S.)--Baylor University, 2006. / Includes bibliographical references (p. 50-52).
8

Impact of network security on SDN controller performance

Kodzai, Carlton January 2020 (has links)
Internet Protocol network architectures are gradually evolving from legacy flat networks to new modern software defined networking approaches. This evolution is crucial as it provides the ideal supporting network structure, architecture and framework that supports the technologies that are also evolving in software-based systems like Network Functions Virtualization (NFV). The connectivity requirements resulting from this paradigm shift in technology is being driven by new bandwidth requirements emanating from the huge number of new use cases from 5G networks and Internet of things (IoT) future technologies. Network security remains a key critical requirement of these new modern network architectures to deliver a highly available, reliable service and guaranteed quality of service. Unprotected networks will usually experience service interruptions and cases of system non-availability due to network attacks such as denial-of services and virus attacks which can render key network components unusable or totally unavailable. With the centralized approach of the Software Defined Networking architecture, the SDN controller becomes a key network point that is susceptible to internal and external attacks from hackers and many forms of network breaches. It being the heart of the SDN network makes it a single point of failure and it is crucial that the security of the controller is guaranteed to avoid unnecessary irrecoverable loss of valuable production time, data and money. The SDN controller design should be guided by a robust security policy framework with a very sound remedy and business continuity plan in the event of any form of a security attack. Security designs and research work in SDN controllers have been done with focus on achieving the most reliable and scalable platforms through self-healing and replication processes. In this dissertation the research that was done proposed a security solution for the SDN controller and evaluated the impact of the security solution on the overall SDN controller performance. As part of the research work literature review of the SDN controller and related technology carried out. The SDN controller interfaces were analyzed and the security threats that attack interfaces were explored. With link to a robust security framework a security solution was used in the experiments that analyzed the attacks from the external network sources which focused on securing the southbound interface by use of a netfilter with iptables firewall on the SDN controller. The SDN controller was subjected to denial service attack packets and the impact of the mitigation action observed on the SDN controller resources. Given that the network security layer introduced an additional overhead on the SDN controller's processors the security feature negatively affected the controller performance. The impact of the security overhead will inform on the future designs and possibly achieve a trade-off point between the level of security of the network and overall system performance due to security policies. The research analyzed and determined the performance impact of this crucial design aspect and how the additional loading due to network security affected the SDN controller normal operation.
9

Design Issues in Internet 0 Federation

Sollins, Karen R., Li, Ji 01 1900 (has links)
Internet 0 is proposed as a local area network that supports extremely small network devices with very little capacity for computation, storage, or communication. Internet 0 addresses the issue of connecting very small, inexpensive devices such as lightbulbs and heating vents with their controllers. To achieve this effectively, Internet 0 assumes both that operating between communicating end-nodes should not require third-party support, and that IP will be available all the way to those end-nodes. Several simplifying assumptions are made in Internet 0 to achieve this. The objective of this paper is to explore issues of design in a context where federation of an Internet 0 net either with other Internet 0 nets or the global Internet becomes important. The question we ask is whether the end-node in such an Internet 0 needs to know more or behave differently in such a federated environment, and how one might achieve such federation. We explore three aspects of network design in this study: addressing and routing, traffic collision and congestion control, and security. In each case, based on analysis, we conclude that to reach our goals in a generalizable and extensible fashion, a third party service will be needed to act as an intermediary, and propose that a single service should provide all the required federation services. / Singapore-MIT Alliance (SMA)
10

A CELLULAR PHONE-CENTRIC MOBILE NETWORK ARCHITECTURE FOR WIRELESS SMALL SATELLITE TELEMETRY SYSTEM

Li, Mingmei, Guo, Qing 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / This paper aims to add the information access capabilities to enable user’s mobile terminals in a wireless small satellite telemetry system. The cellular phone-centric mobile network architecture provides wireless communication link; telemetry information is provided to users in a highly personalized form according to the end-user’s range. We choose a reference system-level model of network architecture and compare its performance with common small satellite telemetry network link; evaluation results derived using a known analytical model. The result of original hypotheses, network architecture’s prototype includes both analytical performance evaluation and simulation techniques, are discussed in detail.

Page generated in 0.0726 seconds