• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 77
  • 15
  • 14
  • 13
  • 11
  • 9
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 152
  • 35
  • 20
  • 20
  • 20
  • 18
  • 18
  • 17
  • 15
  • 15
  • 14
  • 12
  • 12
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Utvärdering av containerbaserad virtualisering för telekomsignalering / Evaluation of container-based virtualization for telecom signaling

Arvidsson, Jonas January 2018 (has links)
New and innovative technologies to improve the techniques that are already being used are constantly developing. This project was about evaluating if containers could be something for the IT company Tieto to use on their products in telecommunications. Container are portable, standalone, executable lightweight packages of software that also contains all it needs to run the software. Containers are a very hot topic right now and are a fast-growing technology. Tieto wanted an investigation of the technology and it would be carried out with certain requirements where the main requirement was to have a working and executable protocol stack in a container environment. In the investigation, a proof of concept was developed, proof of concept is a realization of a certain method or idea in order to demonstrate its feasibility. The proof of concept led to Tieto wanting additional experiments carried out on containers. The experiments investigated if equal performance could be achieved with containers compared to the method with virtual machine used by Tieto today. The experiment observed a small performance reduction of efficiency, but it also showed benefits such as higher flexibility. Further development of the container method could provide a just as good and equitable solution. The project can therefore be seen as successful whereas the proof of concept developed, and experiments carried out both points to that this new technology will be part of Tieto's product development in the future.
42

Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association / Effektiv, flerkärnig implementation av IPsec Encapsulating Security Payload protokollet för en Security Association

Hellsing, Mattias, Albin, Odervall January 2018 (has links)
As the mobile Internet traffic increases, the workload of the base stations processing this traffic increases with it. To cope with this, the telecommunication providers responsible for the systems deployed in these base stations have looked to parallelism. This, together with the fact that these providers have a vested interest in protecting their users' data from potential attackers, means that there is a need for efficient parallel packet processing software which handles encryption as well as authentication. A well known protocol for encryption and authentication of IP packets is the Encapsulating Security Payload (ESP) protocol of the IPsec protocol suite. IPsec establishes simplex connections, called Security Associations (SA), between entities that wish to communicate. This thesis investigates a special case of this problem where the work of encrypting and authenticating the packets within a single SA is parallelized. This problem was investigated by developing and comparing two multi-threaded implementations based on the Eventdev, an event driven programming library, and ring buffer libraries of Data Plane Development Kit (DPDK). One additional Eventdev-based implementation was also investigated which schedules linked lists of packets, instead of single packets, in an attempt to reduce the overhead of scheduling packets to the worker cores. These implementations were then evaluated in terms of throughput, latency, speedup, and last level cache miss rates. The results showed that the ring buffer-based implementation performed the best in all metrics while the single packet-scheduling Eventdev-based implementation was outperformed by the one using linked lists of packets. It was shown that the packet generation, which was done by the receiving core, was the main limiting factor for all implementations. In addition, the memory resources such as the memory bus, memory controller and prefetching hardware were shown to likely be an area of contention and a possible bottleneck as the packet generation rate increases. The conclusion drawn from this was that a parallelized packet retrieval solution such as Receive Side Scaling (RSS) together with minimizing memory resource contention is necessary to further improve performance.
43

Automating a test method for a hybrid test environment

Eiderbrant, Tobias January 2010 (has links)
Ericsson has a very big and expensive test environment with a lot of GSM AXE equipment. In order to decrease the cost of testing Ericsson has developed a combination of simulated and real hardware, the Hybrid Test Environment (HTE). There is no formal supervision and testing of the HTE system today and this has left the HTE system unstable and the testers have been avoiding using HTE. It is important for Ericsson that the confidence for HTE will increase. The goal of this thesis is to produce a method for testing the HTE system. An automated test tool has been implemented in order to monitor and test the HTE system. During the two weeks that the test tool has been operational it has discovered 4 servers in 3 different HTE rigs that malfunctioned. These servers were fixed and were operational before the end-users could discover any problem.
44

Transformation of Telco business strategy driven by over-the-top services such as WhatsApp, Skype and Netflix: The case of the Czech Republic. / Transformation of Telco business strategy driven by over-the-top services such as WhatsApp, Skype and Netflix: The case of the Czech Republic

Kabusheva, Sabina January 2015 (has links)
The following thesis aims to describe the transformation of telco operators' business strategy evoked by the growing popularity and usage of Internet services like WhatsApp, Skype and Netflix, also known as over-the-top services. The thesis provides comprehensive overview of transformations in the telecom industry that have been taking place globally, explaining the drivers that led to inception of free or cheaper Internet-based services, their business models. It then narrows down to the thorough analysis of the Czech market, capturing the implications that over-the-top services have on business strategy of the major Czech telco players. The analysis is strongly supported by industry reports, statistics and quantitative research. The primary research adds in telco customers' perspectives, usage and value perception of over-the-top services, as well as their satisfaction with respective telco services and their pricing. Derived findings identify major developments and trends in the Czech telco market; they also suggest compelling observations for related businesses.
45

Implementation and evaluation of selected Machine Learning algorithms on a resource constrained telecom hardware platform / Implementation och utvärdering av utvalda maskininlärningsalgoritmer på en resursbegränsad telekom-maskinvaruplattform

Leborg, Sebastian January 2017 (has links)
The vast majority of computing hardware platforms available today are not desktop PCs. They are embedded systems, sensors and small specialized pieces of hardware present in almost every digital product available today. Due to the massive amount of information available through these devices we can find new and exciting ways to apply and benefit from machine learning. Many of these computing devices have specialized, resource-constrained architectures and it might be problematic to perform complicated computations. If such a system is under heavy load or has restricted performance, computational power is a valuable resource and costly algorithms must be avoided. \\This master thesis will present an in-depth study investigating the trade-offs between precision, latency and memory consumption of a selected set of machine learning algorithms implemented on a resource constrained multi-core telecom hardware platform. This report includes motivations for the selected algorithms, discusses the results of the algorithms execution on the hardware platform and offers conclusions relevant to further developments. / Majoriteten av beräkningsplattformarna som finns tillgängliga idag är inte stationära bordsdatorer. De är inbyggda system, sensorer och små specialiserade hårdvaror som finns i nästan alla digitala produkter tillgängliga idag. På grund av den enorma mängden information som finns tillgänglig via dessa enheter kan vi hitta nya och spännande sätt att dra nytta av maskininlärning. Många av dessa datorer har specialiserade, resursbegränsade arkitekturer och det kan vara problematiskt att utföra de komplicerade beräkningar som behövs. Om ett sådant system är tungt belastat eller har begränsad prestanda, är beräkningskraft en värdefull resurs och kostsamma algoritmer måste undvikas. \\ Detta masterprojekt kommer att presentera en djupgående studie som undersöker avvägningarna mellan precision, latens och minneskonsumtion av en utvald uppsättning maskininlärningsalgoritmer implementerade på en resursbegränsad flerkärnig telekom-maskinvaruplattform. Denna rapport innehåller motivationer för de valda algoritmerna, diskuterar resultaten av algoritmerna på hårdvaruplattformen och presenterar slutsatser som är relevanta för vidareutveckling.
46

O prestígio na literatura: um estudo do campo literário brasileiro através do Portugal Telecom / Prestige in the literature: a study of the Brazilian literary field through the Portugal Telecom

Camila Mazi Dacome 01 December 2017 (has links)
Esta dissertação se propõe, em um primeiro momento, analisar o campo literário brasileiro a partir do prêmio literário Portugal Telecom. Por meio do estudo do prêmio, identificam-se alguns elementos que expandem a compreensão do campo, como a posição dos agentes culturais, quais sejam, escritores, editores, curadores, críticos e administradores culturais. Parte-se do pressuposto que o campo é um lugar de disputas, e que cada um desses agentes atua de forma a adquirir ou manter a posição de prestígio. Além disso, os romances premiados no Portugal Telecom fornecem pistas que permitem delinear as tendências narrativas da literatura brasileira do séc. XXI. A hipótese é a de que o prêmio ajuda a consolar um prestígio já adquirido por seus agentes, funcionando duplamente como instrumento de legitimação e confirmação do prestígio / This dissertation proposes, in a first moment, to analyze the Brazilian literary field from the literary award Portugal Telecom. Through the study of the award, we identify some elements that expand an understanding of the field, such as a position of cultural agents, which are writers, editors, curators, critics and cultural administrators. It starts from the assumption that the field is a place of disputes, and that each of the current agents in order to acquire or maintain a prestigious position. In addition, the non - Portugal Telecom award - winning novels, which are more complex than the narrative tendencies of Brazilian literature of the 20th century XXI. A hypothesis and a request for help, a consolation, a prestige already acquired by its agents, functioning doubly as an instrument of legitimation and confirmation of prestige
47

O prestígio na literatura: um estudo do campo literário brasileiro através do Portugal Telecom / Prestige in the literature: a study of the Brazilian literary field through the Portugal Telecom

Dacome, Camila Mazi 01 December 2017 (has links)
Esta dissertação se propõe, em um primeiro momento, analisar o campo literário brasileiro a partir do prêmio literário Portugal Telecom. Por meio do estudo do prêmio, identificam-se alguns elementos que expandem a compreensão do campo, como a posição dos agentes culturais, quais sejam, escritores, editores, curadores, críticos e administradores culturais. Parte-se do pressuposto que o campo é um lugar de disputas, e que cada um desses agentes atua de forma a adquirir ou manter a posição de prestígio. Além disso, os romances premiados no Portugal Telecom fornecem pistas que permitem delinear as tendências narrativas da literatura brasileira do séc. XXI. A hipótese é a de que o prêmio ajuda a consolar um prestígio já adquirido por seus agentes, funcionando duplamente como instrumento de legitimação e confirmação do prestígio / This dissertation proposes, in a first moment, to analyze the Brazilian literary field from the literary award Portugal Telecom. Through the study of the award, we identify some elements that expand an understanding of the field, such as a position of cultural agents, which are writers, editors, curators, critics and cultural administrators. It starts from the assumption that the field is a place of disputes, and that each of the current agents in order to acquire or maintain a prestigious position. In addition, the non - Portugal Telecom award - winning novels, which are more complex than the narrative tendencies of Brazilian literature of the 20th century XXI. A hypothesis and a request for help, a consolation, a prestige already acquired by its agents, functioning doubly as an instrument of legitimation and confirmation of prestige
48

VoIP Operators : From a Carrier Point of View

Sidiropoulou, Christina January 2011 (has links)
Voice over Internet Protocol (VoIP) is a service that has recently gained a lot of attention from the telecommunications (telecom) world since both Internet service providers (ISPs) and telecommunications operators have realized the important advantages that it can offer. Although traditional telephony is well established both in the telecom world and in our daily lives, VoIP is now competing with it by offering cost savings, simplicity, and introducing new ways of communicating. Internet service providers have already started deploying efficient VoIP services for their customers and carriers are transforming their network infrastructures in order to be able to accommodate the requirements of VoIP traffic. There are a lot of essential factors that both providers and carriers have to take into consideration in order to efficiently build and operate VoIP technologies. Proper service planning and well-established monitoring and troubleshooting procedures are vital for successful VoIP service. This thesis focuses on commercial VoIP implementation at the carrier’s side and investigates how a carrier can efficiently maintain and troubleshoot their VoIP infrastructure so as to comply with the Service Level Agreements (SLAs) they have signed with their customers (ISP providers), as well as analyses proactive actions that can betaken for minimizing the resources required for customer support. As an outcome, this thesis presents efficient ways of network planning and monitoring, as well as it provides conclusions regarding what are the efficient methods for troubleshooting the carrier’s VoIP products inboth technical and organizational level. / Röst över Internet Protokoll (VoIP) är en tjänst som nyligen har fått ökad uppmärksamhet inom telekommunikations (telecom) branschen eftersom att både Internetleverantörer (ISPs) och telecom operatörer har insett vilka fördelar som tjänsten erbjuder. Även om traditionell telefoni är väl etablerad i både telecombranschen och vår vardag, så kan VoIP konkurrera genom att erbjuda kostnadsbesparingar, förenkling, och introducera nya sätt att kommunicera på. IP leverantörer har redan påbörjat lansering av effektiva VoIP tjänster till sina kunder och telecom carriers bygger om sin nätverksstruktur för att möta kraven av VoIP traffik. Det finns många faktorer att bejaka för både IP leverantörer och telecom carriers för att effektivt bygga och driva VoIP nätverk. Noggrann produktplanering och väletablerad övervakning samt felsökningsprocedurer är en vital del i en framgångsrik VoIP tjänst. Denna avhandling fokuserar på VoIP implementering hos en telecom carrier och hur en telecom carrier effektivt kan underhålla och felsöka VoIP infrastruktur för att möta de servicenivåavtal de har skrivit med sina kunder (IP leverantörer), samt analysera det förebyggande åtgärder som kan tas för att minimera de resurser som behövs till kundtjänst. Denna avhandling presenteras effektiva tillvägagångssätt för planering och övervakning samt erbjuder effektiva,teknisk och organisationella metoder för felsökning av en telecom carriers VoIP produkter.
49

電信事業建立聯合徵信中心之可行性研析 / A feasibility study on the joint credit information center of telecom operators

曾志強, Tseng, Ben Unknown Date (has links)
近年來,國內因大環境的變遷及電信自由化的推行,電信服務已成為國人日常生活中不可或缺之工具,尚因法規環境未置完善,致使電信人頭電話亦成為電信詐欺的犯罪的工具,電信詐欺不僅造成電信呆帳,並破壞電信事業的電信秩序及健全發展的環境外,同時嚴重影響社會治安、增加社會成本及損害公共利益,更使國家整體之競爭力受到負面的牽引。上述因產業政策不明確及法律制度的不健全,並未與時俱進,使電信犯罪之源頭電信人頭帳戶,無法建立有效的預防機制,故使電信市場成為電信詐欺份子得以犯罪的快樂天堂,並以「有騙無類」的作風行騙老少及國內外,電信詐欺目前已成為我國民怨排行第二名,致使得國內訂立電信聯合徵信制度的需求,成為產業界、輿論界、政界與法學界關心的焦點。 本研究係蒐集分析電信詐欺之特性及其對電信事業及社會成本增加所造成的損傷及影響,並以國外如英、美、日本及新加坡等國電信聯合徵信制度之損失統計及相關的法例及作法,藉由實務上之運作與現行法令的落差,檢視目前國內法律不足之處。同時由憲法位階對人權之秘密通訊之保障,對我國未來電信事業建立聯合徵信中心可行性提出研析與建議。 / Since the liberalization of telecom, telecommunication services become more and more an integral part of everyday life. Unfortunately, as well as telecom fraud through fraudulent accounts has become a serious problem in Taiwan. Due to telecom regulations are not regularly updated, the false account numbers were abused easily by the telecom fraud group, and not only caused telecom operators bad debt and profit lose, but also increased social cost obviously, such as the social security, public benefit and the country competitiveness. There is no effective preventive measure to address telecom fraud. Therefore, this country becomes a paradise for this type of activity. Telecom fraud targets all people, the youth, the elderly and even foreign immigrants, and ranks in the top two in social grievances. The telecom joint credit information system was paid attention by the Public, Industry and Government, which is to build up a effective preventive mechanism by regulation for telecom fraud is a important issue to be solved. Due to the uncertainty industrial policy and the legal system do not harmony with social needs, and not kept pace with the times, so that the source of the fake telecom numbers for telecom fraud criminal are unable to manage and block. In this study, I will analyze the characteristics of telecom fraud and its social cost and impact on the telecom industry and then to discuss the Telecom joint credit regulatory and practices used in other countries such as Britain, the United States, Japan and Singapore. This analysis will compare it with the current domestic legal deficiencies and proposes feasible recommendations.
50

Long Range Channel Predictions for Broadband Systems : Predictor antenna experiments and interpolation of Kalman predictions

Björsell, Joachim January 2016 (has links)
The field of wireless communication is under massive development and the demands on the cellular system, especially, are constantly increasing as the utilizing devices are increasing in number and diversity. A key component of wireless communication is the knowledge of the channel, i.e, how the signal is affected when sent over the wireless medium. Channel prediction is one concept which can improve current techniques or enable new ones in order to increase the performance of the cellular system. Firstly, this report will investigate the concept of a predictor antenna on new, extensive measurements which represent many different environments and scenarios. A predictor antenna is a separate antenna that is placed in front of the main antenna on the roof of a vehicle. The predictor antenna could enable good channel prediction for high velocity vehicles. The measurements show to be too noisy to be used directly in the predictor antenna concept but show potential if the measurements can be noise-filtered without distorting the signal. The use of low-pass filter and Kalman filter to do this, did not give the desired results but the technique to do this should be further investigated. Secondly, a interpolation technique will be presented which utilizes predictions with different prediction horizon by estimating intermediate channel components using interpolation. This could save channel feedback resources as well as give a better robustness to bad channel predictions by letting fresh, local, channel predictions be used as quality reference of the interpolated channel estimates. For a linear interpolation between 8-step and 18-step Kalman predictions with Normalized Mean Square Error (NMSE) of -15.02 dB and -10.88 dB, the interpolated estimates had an average NMSE of -13.14 dB, while lowering the required feedback data by about 80 %. The use of a warning algorithm reduced the NMSE by a further 0.2 dB. It mainly eliminated the largest prediction error which otherwise could lead to retransmission, which is not desired.

Page generated in 0.1176 seconds