Spelling suggestions: "subject:"bnetwork layer"" "subject:"conetwork layer""
1 |
Link-layer and network-layer performance of an undersea acoustic network at Fleet Battle Experiment-IndiaHartfield, Grant I. 06 1900 (has links)
Approved for public release, distribution is unlimited / This thesis is an analysis of the link-layer and network-layer performance of an experimental Seaweb undersea acoustic network. The objective is to statistically determine RTS/CTS handshaking and ARQ retransmission performance during the Fleet Battle Experiment-India, executed in June 2001. Many factors constrain or impair undersea acoustic communications. Analysis of a sample portion of the data reveals insights about the overall throughput, latency, and reliability of the Seaweb network. / Lieutenant, United States Navy
|
2 |
A New Approach For The Scalable Intrusion Detection In High-speed NetworksSahin, Umit Burak 01 December 2007 (has links) (PDF)
As the networks become faster and faster, the emerging requirement is to improve the performance of the Intrusion Detection and Prevention Systems (IDPS) to keep up with the increased network throughput. In high speed networks, it is very difficult for the IDPS to process all the packets. Since the throughput of IDPS is not improved as fast as the throughput of the switches and routers, it is necessary to develop new detection techniques other than traditional techniques. In this thesis we propose a rule-based IDPS technique to detect Layer 2-4 attacks by just examining the flow data without inspecting packet payload. Our approach is designed to work as an additional component to existing IDPS as we acknowledge that the attacks at Layer 5 and above require payload inspection. The rule set is constructed and tested on a real network to evaluate the performance of the system.
|
3 |
Řídící a monitorovací jednotka pro hlavici optického spoje / Control and monitoring unit for optical link stationPodzimek, David January 2010 (has links)
The aim of Master thesis "Control and monitoring unit for optical link station" is a web server, enabling communication microcontroller with the user. The communication is based on TCP/IP model. Work an overview of the various parts of the TCP/IP model. The main part of this work is devoted to the software created. The core of unit are microcontroller C8051F120 and ethernet controller CP2200 made by Silicon Laboratories.
|
4 |
Enhancing IoT Security Using 5G CapabilitiesMakkar, Ankush January 2021 (has links)
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use cases cannot be realized using the current communicationtechnologies due to the QoS (Quality of Service) and business requirements. 5Gnetwork are designed keeping IoT use cases in mind and with the development of 5Gnetwork, it will be easier to implement more secured IoT network and enable differentIoT use cases which are not feasible today.To build the future IoT networks with 5G, it’s important to study and understand 5Gsecurity features. Security is perceived as one of the most important considerationwhile building IoT solutions and to implement 5G network for IoT solutions require anoverall understanding of 5G security features. In the thesis, work have been done toidentify the gap in the current research with respect to 5G security features anddescribe 5G features that will enhance IoT security. After identifying key 5G securityfeatures, the implementation of the identified 5G security features will be describedwith the 5G based smart grid and smart factory use cases. The key finding is howdifferent 5G security capabilities secure IoT communication and another importantfinding is that not all security capabilities are applicable to all IoT use cases. Hence,security capabilities to be used based on the 5G use case requirement.
|
5 |
Safeguarding the functionality of Internet Of Medical Things-based Electronic Devices through a Security AlgorithmShaban, Ryustem, Husein, Ahmad January 2024 (has links)
As the IoMT rapidly expands, severe security risks shadow its profound benefits inpatient monitoring and data management. These devices, integral to critical care like pace-maker shocks and insulin dosing, often sacrifice robust security for functionality due totheir limited capabilities. This critical vulnerability exposes them to exploits that couldhave fatal consequences. This thesis addresses these urgent security gaps by exploring in-novative protection strategies through systematic reviews and simulated penetration testingon a mimicked IoMT environment. Our findings expose pronounced deficiencies withinexisting security frameworks, focusing on Bluetooth LE and Wi-Fi threats, especially theinadequate mechanisms to secure Bluetooth LE connections, commonly used in IoMTdevices and DOS attacks targeted directly to the IoMT devices. In response, two novelsecurity algorithms were designed to enhance the resilience of IoMT systems against cy-ber threats. This algorithm integrates dynamic whitelisting and blacklisting, MAC addressverification, UDID verification, and NFC-based device authentication to curtail unautho-rized access and uphold data integrity. The adopted strategy not only addresses specificsecurity loopholes identified during penetration testing but also establishes a frameworkcapable of adapting to evolving threats. Through this research, we aim to contribute to theongoing discourse on IoMT security, underscoring the critical need for continuous adapta-tion of security measures to protect against emerging vulnerabilities in the rapidly evolvinglandscape of IoT devices. This work aspires to lay the groundwork for future research anddevelopment in IoMT security strategies, fostering a deeper understanding and implemen-tation of adequate security measures within medical technology.
|
6 |
On Design and Analysis of Energy Efficient Wireless Networks with QoSVankayala, Satya Kumar January 2017 (has links) (PDF)
We consider optimal power allocation policies for a single server, multiuser wireless communication system. The transmission channel may experience multipath fading. We obtain very efficient, low computational complexity algorithms which minimize power and ensure stability of the data queues. We also obtain policies when the users may have mean delay constraints. If the power required is a linear function of rate then we exploit linearity and obtain linear programs with low complexity. We also provide closed-form optimal power policies when there is a hard deadline delay constraint.
Later on, we also extend single hop results to multihop networks. First we consider the case, when the transmission rate is a linear function of power. We provide low complexity algorithms for joint routing, scheduling and power control which ensure stability of the queues, certain minimum rates, end-to-end hard deadlines, and/or upper bounds on the end-to-end mean delays. Further we extend these results to the multihop networks where the power is a general monotonically increasing function of rate. For our algorithms, we also provide rates of convergence to the stationary distributions for the queue length process and also approximate end-to-end mean delays. Finally, we provide computationally efficient algorithms that minimize the total power when there is a end-to-end hard deadline delay constraint.
|
7 |
Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless NetworksBiswas, Jayanta 09 1900 (has links) (PDF)
No description available.
|
8 |
Implementace ethernetového komunikačního rozhraní do obvodu FPGA / Implementation of ethernet communication inteface into FPGA chipSkibik, Petr January 2011 (has links)
The thesis deals with the implementation of Ethernet-based network communication interface into FPGA chip. VHDL programming language is used for description of the hardware. The interface includes the implementation of link-layer Ethernet protocol and network protocols such as IPv4, ARP, ICMP and UDP. The final design allows bi-directional communication on the transport-layer level of TCP/IP model. The designed interface was implemented into Virtex5 FPGA chip on development board ML506 by Xilinx.
|
9 |
Vliv přenosových parametrů na spotřebu elektrické energie Zigbee zařízení / Impact of Communication Parameters on Energy Consumption of Zigbee DevicesPopelka, Jan January 2013 (has links)
This thesis deals with the energy research and design a simple wireless sensor networks. The data modules with ZigBee wireless communication technology. The main feature of wireless sensor networks is the minimal energy devices at low cost and maximum data reliability. Furthermore, the work describes firmware for communicating nodes with the ability to change parameters of data transmission and thus affect the energy consumption node. Calculations of energy consumption, compared with measured results and discharge characteristics of the battery packs are included in the final chapters of this work.
|
10 |
Vliv přenosových parametrů na spotřebu elektrické energie Zigbee zařízení / Impact of Communication Parameters on Energy Consumption of Zigbee DevicesPopelka, Jan January 2013 (has links)
This thesis deals with the energy research and design a simple wireless sensor networks. The data modules with ZigBee wireless communication technology. The main feature of wireless sensor networks is the minimal energy devices at low cost and maximum data reliability. Furthermore, the work describes firmware for communicating nodes with the ability to change parameters of data transmission and thus affect the energy consumption node. Calculations of energy consumption, compared with the measured results, the discharge characteristics of the battery packs and lifetime broadcasting node is contained in the final chapters of this work.
|
Page generated in 0.0547 seconds