• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1104
  • 379
  • 210
  • 133
  • 95
  • 75
  • 37
  • 19
  • 18
  • 18
  • 15
  • 15
  • 15
  • 15
  • 12
  • Tagged with
  • 2451
  • 610
  • 607
  • 376
  • 324
  • 321
  • 267
  • 257
  • 252
  • 234
  • 226
  • 215
  • 210
  • 204
  • 185
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Avaliação de desempenho de variantes dos Protocolos DCCP e TCP em cenários representativos

Doria, Priscila Lôbo Gonçalves 15 May 2012 (has links)
The Datagram Congestion Control Protocol (DCCP) is a prominent transport protocol that has attracted the attention of the scientific community for its rapid progress and good results. The main novelty of DCCP is the performance priority design, as in UDP, however with congestion control capabilities, as in TCP. Literature about DCCP is still scarce and needs to be complemented to gather enouth scientific elements to support new research properly. In this context, this work joins the efforts of the scientific community to analise, mensure, compare and characterize DCCP in relevant scenarios that cover many real world situations. Three open questions were preliminarly identified in the literature: How DCCP behaves (i) when fighting for the same link bandwidth with other transport protocols; (ii) with highly relevant ones (e.g., Compound TCP, CUBIC) and (iii) fighting for the same link bandwidth with Compound TCP and CUBIC, adopting multimedia applications (e.g., VoIP). In this work, computational simulations are used to compare the performance of two DCCP variants (DCCP CCID2 and DCCP CCID3) with three highly representative TCP variants (Compound TCP, CUBIC and TCP SACK), in real world scenarios, including concurrent use of the same link by protocols, link errors and assorted bandwidths, latencies and traffic patterns. The simulation results show that, under contention, in most scenarios DCCP CCID2 has achieved higher throughput than Compound TCP or TCP SACK. Throughout the simulations there was a tendency of DCCP CCID3 to have lower throughput than the other chosen protocol. However, the results also showed that DCCP CCID3 has achieved significanly better throughput in the presence of link errors and higher values of latency and bandwidth, eventualy outperforming Compound TCP and TCP SACK. Finally, there was a tendency of predominance of CUBIC´ throughtput, which can be explained by its aggressive algorithm (i.e., non-linear) of return of the transmission window to the previous value before the discard event. However, CUBIC has presented the highest packet drop and the lowest delivery rate. / O Datagram Congestion Control Protocol (DCCP) é um proeminente protocolo de transporte que vem atraindo a atenção da comunidade científica pelos seus rápidos avanços e bons resultados. A principal inovação do DCCP é a priorização de desempenho, como ocorre com o UDP, mas com capacidade de realizar controle de congestionamento, como ocorre com o TCP. Entretanto, a literatura sobre o DCCP ainda é escassa e necessita ser complementada para trazer elementos científicos suficientes para novas pesquisas. Neste contexto, este trabalho vem se somar aos esforços da comunidade científica para analisar, mensurar, comparar e caracterizar o DCCP em cenários representativos que incorporem diversas situações de uso. Identificaram-se então três questões alvo, ainda em aberto na literatura: qual é o comportamento do DCCP (i) quando disputa o mesmo enlace com outros protocolos de transporte; (ii) com protocolos de transporte relevantes (e.g., Compound TCP, CUBIC) e (iii) em disputa no mesmo enlace com o Compound TCP e o CUBIC, utilizando aplicações multimídia (e.g., VoIP). Neste trabalho, simulações computacionais são utilizadas para comparar duas variantes do DCCP (CCID2 e CCID3) a três variantes do TCP (Compound TCP, CUBIC e TCP SACK), em cenários onde ocorrem situações de mundo real, incluindo utilização concorrente do enlace pelos protocolos, presença de erros de transmissão no enlace, variação de largura de banda, variação de latência, e variação de padrão e distribuição de tráfego. Os resultados das simulações apontam que, sob contenção, na maioria dos cenários o DCCP CCID2 obteve vazão superior à do Compound TCP, do DCCP CCID3 e do TCP SACK. Ao longo das simulações observou-se uma tendência do DCCP CCID3 a ter vazão inferior à dos demais protocolos escolhidos. Entretanto, os resultados apontaram que o DCCP CCID3 obteve desempenho significativamente melhor na presença de erros de transmissão e com valores maiores de latência e de largura de banda, chegando a ultrapassar a vazão do DCCP CCID2 e do TCP SACK. Por fim, observou-se uma tendência de predominância do protocolo CUBIC no tocante à vazão, que pode ser determinada pelo seu algoritmo agressivo (i.e., não-linear) de retorno da janela de transmissão ao valor anterior aos eventos de descarte. Entretanto, o CUBIC apresentou o maior descarte de pacotes e a menor taxa de entrega.
262

The design of a software architectural framework for tunnelling metering protocols over TCP/IP and low bandwidth packet switched networks with support for proprietary addressing

Von Gordon, Albert Fredrich Johannes 25 October 2007 (has links)
This document discusses the concept of drivers implemented within the context of the REMPLI (Real-Time Energy Management over Power line and Internet, see section 1.8.) network. The process image approach and the tunnelling approach are presented and reasoning is given why the tunnelling approach is preferred. Each of the drivers implemented is associated with a specific metering protocol. This document further discusses the general architecture of such a driver structure. The generic software architecture serves as a framework for integrating serial communication based metering protocols over packet-orientated remote networks and meters, by tunnelling the protocol data units to the remote meters. Principally each Protocol Driver consists of three parts, one part situated at the Application Server, one at the Access Point and one at the Node. This document then gives a description of the general driver structure within the REMPLI network and briefly explains the functions of all the modules contained within the driver structure. An example is used to show how these modules, which make up the software architecture of the Protocol Driver, are used to send an application generated request from the Application Server to the Metering Equipment and sending the response back from the remote Metering Equipment to the Application Server. This dissertation further discusses the need for address translation within the REMPLI network and the need to restrict access to meters by using these addresses and an access control list. This document also discusses the need for a “Keep-alive” signalling scheme, if supported by the underlying protocol and gives a general concept as to how it should be implemented. The role of an Optimization Module is also discussed for low bandwidth networks by means of an M-Bus example. Finally the M-Bus protocol driver implementation is discussed. The results achieved are presented, showing that the driver architecture can successfully be used to tunnel the M-Bus protocol to remote meters, provided the underlying network conforms to the quality of service requirements determined by the implemented metering protocol. The work proposed in this document started off as part of the REMPLI project by the REMPLI team but was completed independently. / Dissertation (MEng (Computer Engineering))--University of Pretoria, 2008. / Electrical, Electronic and Computer Engineering / unrestricted
263

Modelování a simulace spanning-tree protokolů / Modeling and Simulation of Spanning-Tree Protocol

Poláčeková, Simona January 2021 (has links)
This term project deals with the functionality of Spanning Tree protocols, especially the Rapid Spanning Tree Protocol, and the Multiple Spanning Tree Protocol. The primary usage of spanning tree protocols is the prevention of loops within the data link layer, the prevention of a broadcast storm, and also dealing with redundancy in the network. Moreover, the project contains the description of configuration of these protocols on Cisco devices. The main goal of this thesis is to implement the Multiple Spanning Tree protocol into INET framework within the OMNeT++ simulation system. Then, the implemented solution is tested and it's functionality is compared with the referential behavior in a Cisco network.
264

FORENSICS AND FORMALIZED PROTOCOL CUSTOMIZATION FOR ENHANCING NETWORKING SECURITY

Fei Wang (11523058) 22 November 2021 (has links)
<div>Comprehensive networking security is a goal to achieve for enterprise networks. In forensics, the traffic analysis, causality dependence in intricate program network flows is needed in flow-based attribution techniques. The provenance, the connection between stealthy advanced persistent threats (APTs) and the execution of loadable modules is stripped because loading a module does not guarantee an execution. The reports of common vulnerabilities and exposures (CVE) demonstrate that lots of vulnerabilities have been introduced in protocol engineering process, especially for the emerging Internet-of-Things (IoT) applications. A code generation framework targeting secure protocol implementations can substantially enhance security.</div><div>A novel automaton-based technique, NetCrop, to infer fine-grained program behavior by analyzing network traffic is proposed in this thesis. Based on network flow causality, it constructs automata that describe both the network behavior and the end-host behavior of a whole program to attribute individual packets to their belonging programs and fingerprint the high-level program behavior. A novel provenance-oriented library tracing system, Lprov, which enforces library tracing on top of existing syscall logging based provenance tracking approaches is investigated. With the dynamic library call stack, the provenance of implicit library function execution is revealed and correlated to system events, facilitating the locating and defense of malicious libraries. The thesis presents ProFactory, in which a protocol is modeled, checked and securely generated, averting common vulnerabilities residing in protocol implementations.</div>
265

Pokročilý systém umožňující zálohování počítačových dat / Advanced system for computer data back-up

Sobek, Jiří January 2012 (has links)
This master thesis is mainly focused on the backup systems and describes each individual backup techniques in detail. Next main point of this thesis, is explaining functionality of IPv4 and FTP, which are closely related to the topic. Outcome is a backup application written in Java language, which is capable of backup files on FTP server or on local/ network storage area. Backup application also allows settings for automatic backup and restoring files from the storage area. Finally there was made a measurment, where were point out advantages and disadvantages of transfer mediums and where was practically shown a logic of creating the backup system. Goal was a creation of multiplatform backup application.
266

Evaluation of bandwidth management technique using dynamic LSP tunnelling and LDP in MPLS for sustainable mobile wireless networks

Mustapha, O.Z., Hu, Yim Fun, Sheriff, Ray E., Abd-Alhameed, Raed, Ali, M. 08 October 2021 (has links)
No / Fairness in bandwidth resource allocation is highly significance to the advancement of the future generation mobile and wireless technologies. It is likely that restriction of bandwidth due to the employment of some scheduling scheme would not be an appropriate option for the future development of communication systems. However, there is need to consider an implementation that would lead to good network performance and avoid unguaranteed bandwidth delivery. This paper focusses on evaluating the performance of Bandwidth Allocation using Dynamic Label Switching Paths (LSPs) Tunnelling and Label Distribution Protocol (LDP) signalling in Multi-Protocol Label Switching (MPLS) network. This will make provision for bandwidth allocation and reservation possible. An appropriate bandwidth allocation would have a positive impact on throughput as well as the delay. The results of an IP (Internet Protocol) Network without MPLS enabled is compared with MPLS model network. Furthermore, implementation of dynamic and static LSPs models are presented with about 75% decrease in packet delay variation for dynamic LSP when compared from static LSP. In addition, the models of bandwidth estimation, bandwidth allocation, delay and jitter are provided. Performance metrics used in this respect for multimedia services (Voice and Video conferencing) confirm that the modified models are improved in comparison with the baseline, having highest throughput of about 51% increment, and packet delay variation decreases drastically.
267

The Montreal Protocol’s multilateral fund: an environmental and economic success

Tieszen, Brett January 1900 (has links)
Master of Arts / Department of Economics / Wayne Nafziger / Although the ozone layer is vital to life on Earth, as a common resource it has been the subject of rational exploitation. With ozone depletion a global (rather than merely regional) problem, measures to address it have necessarily been international efforts. The international treaty that addressed ozone depletion, the Montreal Protocol (with its subsequent amendments), has widely been hailed as a success. However, the triumphs of the Montreal Protocol are inseparable from its Multilateral Fund, whose creation was a prerequisite for developing nations, including juggernauts China and India, to ratify the Protocol. Since its inception the Fund has supplied over $2.5 billion to initiatives that support the phase-out of ozone-depleting chemicals in developing nations. These projects have increasingly employed market mechanisms to achieve efficient results, and have generated positive profits for participating firms. Funded initiatives have included upgrading capital, educating maintenance workers, production buyouts, public awareness, and institutional strengthening. Aside from ensuring the success of the overall Protocol, this last item will likely be the Multilateral Fund’s most enduring legacy, as inherent shortcomings of the Fund have largely been attributed to its status as a pioneering financial mechanism. The Multilateral Fund has broken new ground in international environmental regulation and shown that success on ecological issues is indeed possible at the global level, leading many to hope that the Fund will serve as a model for future mechanisms to address climate change. While the more complex chemistry and economics of climate change make such a ready duplication of the Multilateral Fund’s success unlikely, the Fund’s role in strengthening institutions that address ecological concerns has undoubtedly smoothed the way for future international environmental action.
268

A framework for promoting interoperability in a global electronic market-space

Pather, Maree 30 June 2005 (has links)
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order): &#61623; A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective. &#61623; A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework. &#61623; A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context. &#61623; An open standards-based security model for the global message handler. Conceptually, the framework comprises the following: &#61623; An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages). &#61623; An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints. &#61623; A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations). / Theoretical Computing / PHD (INFORMATION SYSTEMS)
269

A DYNAMIC MULTI-PROTOCOL INTERFACE FOR TT&C SATELLITE BASEBAND PROCESSOR

Mitchell, Marcella B., Thomas, Alain 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / This paper presents the architecture of a new dynamic multi-protocol network interface implemented on a TT&C satellite baseband processor. Today Ethernet is the main connection of the equipment in a satellite system. Various protocols are necessary to optimize support of data exchange and are implemented using several supports such as Serial lines, Ethernet or Internet. The capability to dynamically switch from one service to another, using the most adapted interface, is the key factor for a multi-mission, multi-satellite system.
270

Study on Telemetry Data Authentication Protocol in Arms Control Verification

Qiang, Huang, Fan, Yang 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / The arms control verification activity is executed between countries, so various telemetry data will be remote-transmitted in the public signal channel and can be easily tampered. In order to secure this data’s authenticity and integrality, the paper has established a Multi-layer Data Authentication Protocol (MDAP) in which the key cryptographic technologies are digital signature and authentication. Meanwhile, overall evaluations of MDAP have been presented. We proved the MDAP is secure.

Page generated in 0.3799 seconds