• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 1
  • Tagged with
  • 9
  • 9
  • 8
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Lazy User Theory and Interpersonal Communication Networks

Hayes, James Dwight 09 May 2012 (has links)
No description available.
2

APPLICATION OF PEER TO PEER TECHNOLOGY IN VEHICULAR COMMUNICATION.

Shameerpet, Tanuja 01 June 2021 (has links)
The primary goal of this thesis is to implement peer to peer technology in vehicular communication. The emerging concept of Vehicular Communication including road side infrastructure is a promising solution to avoid accidents and providing live traffic data. There is a high demand for the technologies which ensure low latency communication. Modern vehicles equipped with computing, communication and storage and sensing capabilities eased the transmission of data. To achieve deterministic bounds on data delivery, ability to be established anywhere quickly, and efficiency of data query we have chosen to implement a structured peer to peer overlay model in a cluster of vehicles. The vehicles in the cluster exchange information with the cluster head. The cluster head acts as a leader of the cluster, it fetches the data from the Road-side unit and other cluster heads. We have implemented Pyramid Tree Model in structured peer to peer models. A pyramid tree is group of clusters organized in a structured format with the data links between the clusters. The core concepts behind the pyramid tree model is clustering the nodes based on interest.
3

A COMMUNICATION LIBRARY FOR PEER-TO-PEER COMMUNICATION IN MESSAGE-DRIVEN PROGRAMS

DAHL, JORGEN L. January 2002 (has links)
No description available.
4

Coordinated Beamforming for Millimeter-wave Terrestrial Peer-to-Peer Communication Networks

Marinkovich, Aaron James Angelo 14 October 2020 (has links)
Terrestrial mobile peer-to-peer millimeter wave networks will likely use beamforming arrays with narrow beams. Aligning narrow beams is difficult. One consideration for aligning narrow beams is co-channel interference. Beams can be aligned either on a per-link basis where co-channel interference is ignored, or on a global basis where co-channel interference is considered. One way to align beams on a global basis is coordinated beamforming. Coordinated beamforming can be defined as alignment of beams on a global basis, so as to jointly optimize the signal-to-interference-plus-noise ratio (SINR) of all links operating in a network. In this work, we explore coordinated beamforming in peer-to-peer networks and demonstrate its efficacy. Networks with varying numbers of links are simulated in scenarios with and without obstructions. The coordinated beamforming schemes presented in this work significantly improve link SINR statistics in these scenarios. Greater improvement was found in networks with higher numbers of links and in networks in terrain with obstructions. / Master of Science / Wireless communication links can interfere with each other. Interference can be mitigated by adjusting the antennas with which the links are formed. One method of mitigating interference is coordinated beamforming. Coordinated beamforming can be defined as a method of adjusting antennas to jointly optimize the strength of the links operating in a network. In this work, we explore coordinated beamforming in terrestrial mobile peer-to-peer communication networks and demonstrate its efficacy. Networks with varying numbers of links are simulated in scenarios with and without obstructions. The coordinated beamforming schemes presented in this work significantly improve link strength statistics in these scenarios. Greater improvement was found in networks with higher numbers of links and in networks in terrain with obstructions.
5

Addressing Network Heterogeneity and Bandwidth Scarcity in Future Wireless Data Networks

Hsieh, Hung-Yun 12 July 2004 (has links)
To provide mobile hosts with seamless and broadband wireless Internet access, two fundamental problems that need to be tackled in wireless networking are transparently supporting host mobility and effectively utilizing wireless bandwidth. The increasing heterogeneity of wireless networks and the proliferation of wireless devices, however, severely expose the limitations of the paradigms adopted by existing solutions. In this work, we explore new research directions for addressing network heterogeneity and bandwidth scarcity in future wireless data networks. In addressing network heterogeneity, we motivate a transport layer solution for transparent mobility support across heterogeneous wireless networks. We establish parallelism and transpositionality as two fundamental principles to be incorporated in designing such a transport layer solution. In addressing bandwidth scarcity, we motivate a cooperative wireless network model for scalable bandwidth utilization with wireless user population. We establish base station assistance and multi-homed peer relay as two fundamental principles to be incorporated in designing such a cooperative wireless network model. We present instantiations based on the established principles respectively, and demonstrate their performance and functionality gains through theoretic analysis, packet simulation, and testbed emulation.
6

Optimization of Transport Security for Securing Peer-to-Peer Communication in Heterogeneous Networks

Chen, Ta-wei January 2005 (has links)
This thesis concerns the security of tomorrow’s peer-to-peer real-time communication in heterogeneous networks. Because of the additional delay caused by inband handshake and the poor compatibilities of some transport protocols, it was determined that existing security protocols such as transport layer security (TLS) and datagram transport layer security (DTLS) are not suitable in such a user scenario and a new security protocol should be designed. This new security protocol is called transport encapsulation security payload (TESP). TESP not only has the advantage of low initialization delay, but also fully supports transport protocols including TCP, UDP, stream control transmission protocol (SCTP), and datagram congestion control protocol (DCCP). Also a security analysis of TESP was carried out and no security flaws were found. / Denna uppsats behandlar säkerheten för morgondagens "peer-to-peer" (P2P) realtidskommunikation i heterogena nät. På grund av den adderade fördröjning som orsakas av inbandssignalering och dålig kompabilitet hos många transportprotokoll, så kan man fastställa att existerande säkerhetsprotokoll, såsom "(Datagram) Transport Layer Security" (TLS och DTLS), inte är lämpade för denna typ av kommunikation och att ett nytt säkerhetsprotokoll bör tas fram. "Transport Encapsulation Security Payload" (TESP) är ett sådant protokoll. TESP har inte bara fördelar såsom låg uppstartsfördröjning, utan har också stöd för många transportprotokoll, t.ex. "Transport Control Protocol" (TCP), "User Datagram Protocol" (UDP), "Stream Control Transmission Protocol" (SCTP) och "Datagram Congestion Control Protocol" (DCCP). Även en säkerhetsanalys av TESP har gjorts, där inga säkerhetsproblem har kunnat påvisas.
7

Achieving eHealth interoperability Via peer-to-peer communication Using JXTA Technology

Hu, Yan, Afzal, Javed January 2010 (has links)
eHealth is an emerging area that boosts up with advancement in Information and Communication Technology (ICT). Due to variety of eHealth solutions developed by different IT firms with no proper shared standards, interoperability issue is then raised. Blekinge County healthcare organizations use two different systems MAGNA CURA and SYStem Cross. The two systems work well in their own scope. But these systems often need to communicate and coordinate for exchange of patients’ information which leads to the problem of interoperability. The aim of this research study is to provide fast and reliable peer-to-peer solution for exchange of patient information so as to achieve interoperability among healthcare organizations. This proposed solution is tested as a middleware between MAGNA CURA and SYStem Cross currently used by Blekinge County healthcare organizations. A qualitative approach including in-depth literature review and a semi-structured face-to-face interview has been used for understanding the context of research problem. We have tested our approach through an executable prototype. The prototype is implemented using JXTA platform. We have learned that Blekinge healthcare is decentralized and heterogonous in nature. For such kind of environment, peer-to-peer communication approach is suggested. According to the test result, the suggested syntactic level interoperability between the two mentioned systems has been achieved.
8

An Adaptable, Fog-Computing Machine-to-Machine Internet of Things Communication Framework

Badokhon, Alaa 01 June 2017 (has links)
No description available.
9

Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol

Suyum, Mryam Teklya January 2023 (has links)
Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket.IO, Node.js, Express.js och PeerJS. De viktigaste prestandaindikatorerna som utvärderades var latens/tur- och returtid (RTT), jitter och paketförlust. Implementationen testades både lokalt och på distans. Prestandatestningen av applikationen utfördes med hjälp av webbplatserna "Chrome webrtc-internals" och "TestRTC", vilka erbjöd detaljerade insikter och statistik om WebRTC-prestanda. Resultaten indikerade att WebRTC erbjuder högpresterande och kostnadseffektiv realtidskommunikation som är kompatibel med andra applikationer som stöder protokollet. Protokollet visade sig ha robusta säkerhetsåtgärder, vara kompatibelt med distribuerade system och erbjuda stark prestanda när det gäller latens, jitter och paketförlust. Studien drog slutsatsen att WebRTC, med sin skalbarhet och förmåga att erbjuda kommunikation i realtid, är ett fördelaktigt val för distribuerade system och webbaserade videochattapplikationer. Resultaten uppmanar till ytterligare undersökningar inom områden som end-to-end-kryptering och integration av artificiell intelligens för att förbättra systemets prestanda och säkerhet. / The aim of this thesis is to analyse and evaluate the performance of the WebRTC protocol, develop a web-based client using JavaScript for distributed systems, and demonstrate the utility of the protocol in a real-world scenario. The study involved the use of various tools and libraries, including Socket.IO, Node.js, Express.js, and PeerJS. Key performance indicators evaluated were latency/round-trip time (RTT), jitter, and packet loss. The implementation was tested both locally and remotely. Performance testing of the application was conducted using the "Chrome webrtc-internals" and "TestRTC" websites, which provided detailed insights and statistics on WebRTC performance. The results indicated that WebRTC offers high-performance and cost-effective real-time communication that is compatible with other applications supporting the protocol. The protocol demonstrated robust security measures, compatibility with distributed systems, and strong performance in terms of latency, jitter, and packet loss. The study concluded that WebRTC, with its scalability and ability to provide real-time communication, is a beneficial choice for distributed systems and webbased video chat applications. The findings encourage further investigations in areas such as end-to-end encryption and the integration of artificial intelligence to enhance system performance and security.

Page generated in 0.1209 seconds