• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 5
  • 2
  • 1
  • 1
  • Tagged with
  • 34
  • 34
  • 22
  • 11
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Efficient communications for fine-grain distributed computers

Miller, Philip Robert January 1991 (has links)
No description available.
2

Design and simulation of metropolitan area communications networks

Carrapatoso, E. M. E. M. January 1987 (has links)
No description available.
3

Transmission of time critical data over a packet satellite link

Salleh, Ahmad Zaki Mohd January 1994 (has links)
This thesis presents some new techniques in frame oriented transmission systems with particular emphasis on HDLC (High Level Data Link Control) links. The advent of multimedia and applications requiring high bandwidth has prompted the development of high performance networks. In addition to that, accessibility is also an important issue. Satellite links have become a major contributor in providing access to larger networks where terrestrial connections are not possible due to geographical constraints. The development of VSATs (Very Small Aperture Terminal) has further increased the interest in providing extra-terrestrial links as a means of accessing a network. Because VSAT links are less reliable than terrestrial connections, bandwidth management becomes an important issue. The major problems are identified in this thesis. Frame oriented transmission systems have provided a very efficient method for data transmission. Data from several sources may be multiplexed into a common link. Recently, data networks have been successfully used for the transmission of various types of traffic. This diverse traffic has different QOS requirements such as throughput and delay. Certain types of traffic have an inherent priority. This traffic is referred to as time-critical or temporal. Temporal data has a short lifetime after which the data become useless regardless of whether the data has been corrupted or not. Some data sources such as voice and video, are able to tolerate small amounts of errors provided they are received within their lifetime period. From here we see that there are two very contrasting features of the data types. Conventional packet protocols are designed to ensure data integrity in return for packet delays due to retransmission and congestion control.
4

Optimising signalling rate and internal diversity order for mobile cellular DS-CDMA systems

Allpress, Stephen Alan January 1993 (has links)
No description available.
5

PRACTICAL CLOUD COMPUTING INFRASTRUCTURE

James A Lembke (10276463) 12 March 2021 (has links)
<div>Cloud and parallel computing are fundamental components in the processing of large data sets. Deployments of distributed computers require network infrastructure that is fast, efficient, and secure. Software Defined Networking (SDN) separates the forwarding of network data by switches (data plane) from the setting and managing of network policies (control plane). While this separation provides flexibility for setting network policies affecting the establishment of network flows in the data plane, it provides little to no fault tolerance for failures, either benign or caused by corrupted/malicious applications. Such failures can cause network flows to be incorrectly routed through the network or stop such flows altogether. Without protection against faults, cloud network providers using SDN run the risk of inefficient allocation of network resources or even data loss. Furthermore, the asynchronous nature existing protocols for SDN does not provide a mechanism for consistency in network policy updates across multiple switches.</div><div>In addition, cloud and parallel applications require an efficient means for accessing local system data (input data sets, temporary storage locations, etc.). While in many cases it may be possible for a process to access this data by making calls directly to a file system (FS) kernel driver, this is not always possible (e.g. when using experimental distributed FSs where the needed libraries for accessing the FS only exist in user space).</div><div>This dissertation provides a design for fault tolerance of SDN and infrastructure for advancing the performance of user space FSs. It is divided into three main parts. The first part describes a fault tolerant, distributed SDN control plane framework. The second part expands upon the fault tolerant approach to SDN control plane by providing a practical means for dynamic control plane membership as well as providing a simple mechanism for controller authentication through threshold signatures. The third part describes an efficient framework for user space FS access.</div><div>This research makes three contributions. First, the design, specification, implementation, and evaluation of a method for fault tolerant SDN control plane that is inter-operable with existing control plane applications involving minimal instrumentation of the data plane runtime. Second, the design, specification, implementation and evaluation of a mechanism for dynamic SDN control plane membership that all ensure consistency of network policy updates and minimizes switch overhead through the use of distributed key generation and threshold signatures. Third, the design, specification, implementation, and evaluation of a user space FS access framework that is correct to the Portable Operating System Interface (POSIX) specification with significantly better performance over existing user space access methods, while requiring no implementation changes for application programmers.</div>
6

Towards a Traffic-aware Cloud-native Cellular Core

Amit Kumar Sheoran (11184387) 26 July 2021 (has links)
<div>Advances in virtualization technologies have revolutionized the design of the core of cellular networks. However, the adoption of microservice design patterns and migration of services from purpose-built hardware to virtualized hardware has adversely affected the delivery of latency-sensitive services.</div><div><br></div><div>In this dissertation, we make a case for cloud-native (microservice container packaged) network functions in the cellular core by proposing domain knowledge-driven, traffic-aware, orchestration frameworks to make network placement decisions. We begin by evaluating the suitability of virtualization technologies for the cellular core and demonstrating that container-driven deployments can significantly outperform other virtualization technologies such as Virtual Machines for control and data plane applications.</div><div><br></div><div>To support the deployment of latency-sensitive applications on virtualized hardware, we propose using Virtual Network Function (VNF) bundles (aggregates) to handle transactions. Specifically, we design Invenio to leverage a combination of network traces and domain knowledge to identify VNFs involved in processing a specific transaction, which are then collocated by a traffic-aware orchestrator. By ensuring that a user request is processed by a single aggregate of collocated VNFs, Invenio can significantly reduce end-to-end latencies and improve user experience.</div><div><br></div><div>Finally, to understand the challenges in using container-driven deployments in real-world applications, we develop and evaluate a novel caller-ID spoofing detection solution in Voice over LTE (VoLTE) calls. Our proposed solution, NASCENT, cross validates the caller-ID used during voice-call signaling with a previously authenticated caller-ID to detect caller-ID spoofing. Our evaluation with traditional and container-driven deployments shows that container-driven deployment can not only support complex cellular services but also outperform traditional deployments.</div><div><br></div>
7

Network coding for multicast communications over satellite networks

Jaff, Esua K., Susanto, Misfa, Ali, Muhammad, Pillai, Prashant, Hu, Yim Fun January 2015 (has links)
No / Random packet errors and erasures are common in satellite communications. These types of packet losses could become significant in mobile satellite scenarios like satellite-based aeronautical communications where mobility at very high speeds is a routine. The current adaptive coding and modulation (ACM) schemes used in new satellite systems like the DVBRCS2 might offer some solutions to the problems posed by random packet errors but very little or no solution to the problems of packet erasures where packets are completely lost in transmission. The use of the current ACM schemes to combat packet losses in a high random packet errors and erasures environment like the satellite-based aeronautical communications will result in very low throughput. Network coding (NC) has proved to significantly improve throughput and thus saves bandwidth resources in such an environment. This paper focuses on establishing how in random linear network coding (RLNC) the satellite bandwidth utilization is affected by changing values of the generation size, rate of packet loss and number of receivers in a satellite-based aeronautical reliable IP multicast communication. From the simulation results, it shows that the bandwidth utilization generally increases with increasing generation size, rate of packet loss and number of receivers.
8

Ensuring Network Designs Meet Performance Requirements under Failures

Yiyang Chang (6872636) 13 August 2019 (has links)
<div> <div> <div> <p>With the prevalence of web and cloud-based services, there is an ever growing requirement on the underlying network infrastructure to ensure that business critical traffic is continually serviced with acceptable performance. Networks must meet their performance requirements under failures. The global scale of cloud provider networks and the rapid evolution of these networks imply that failures are the norm in production networks today. Unplanned downtime can cost billions of dollars, and cause catastrophic consequences. The thesis is motivated by these challenges and aims to provide a principled solution to certifying network performance under failures. Network performance certification is complicated, due to both the variety of ways a network can fail, and the rich ways a network can respond to failures. The key contributions of this thesis are: (i) a general framework for robustly certifying the worst-case performance of a network across a given set of uncertain scenarios. A key novelty is that the framework models flexible network response enabled by recent emerging trends such as Software-Defined Networking; (ii) a toolkit which automates the key steps needed in robust certification making it suitable for use by a network architect, and which enables experimentation on a wide range of robust certification of practical interest; (iii) Slice, a general framework which efficiently classifies failure scenarios based on whether network performance is acceptable for those scenarios, and which allows reasoning about performance requirements that must be met over a given percentage of scenarios. We also show applications of our frameworks in synthesizing designs that are guaranteed to meet a performance goal over all or a desired percentage of a given set of scenarios. The thesis focuses on wide-area networks, but the approaches apply to data-center networks as well.</p></div></div></div>
9

Equalizing, Complementary, Heuristic Orientation of Situated Agents

Eunsun C. Smith (5930864) 03 January 2019 (has links)
<div>Cognitive agent architectures embed social learning algorithms and normative frameworks for adopting others’ influenced goals. However, there exists inefficiency in providing continuous, situational decision-making to emerge social, altruistic norms. The thesis reconstructs social-ecological learning mechanisms to functionally and efficiently internalize situational cooperation. By orienting agents to be self-aware of their three-dimensional vectors, i.e., physical, emotional and intellectual in graphical representations, this thesis hypothesizes the parsimonious, action-predictive four emotions that not only link perceptions, action, and cognition by events but also the emotional continuity functional to social-ecological rationality of agents in continuum. Twelve Meridian system is employed to conceptualize the equalizing, complementary, heuristic orientation (ECHO) model. ECHO simulates “naturalistic” cooperation to model embodied, social-ecological orientations by self-organizing emotions to emerge functional social network formations. ECHO delineates the soma links to perceptions, namely Twelve Meridian channels as “direct pipes” that initiates and conduct emotions and consciousness of three dimensional agenthood: physical, emotional, and intellectual desires. ECHO reconstructs emotions as entities to induce systemic, self-organized rule of delegation by integrating agents’ percepts and actuations. By modeling constitutional emotions and consciousness of eight entities, emotions within entities as “individualized emotional processors,” are constructing and integrating purposeful social, altruistic events for the efficacy of situated agents.<br></div>
10

Covert Communication Networks

Nix, Timothy Glen 16 December 2013 (has links)
A covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, on concealment of participation in the network to both other members of the group and external eavesdroppers, and finally on resilience against disconnection. In this dissertation, we describe the challenges and requirements for such a system. We consider the topologies of resilient covert communications networks that: (1) minimize the impact on the network in the event of a subverted node; and (2) maximize the connectivity of the survivor network with the removal of the subverted node and its closed neighborhood. We analyze the properties of resilient covert networks, propose measurements for determining the suitability of a topology for use in a covert communication network, and determine the properties of an optimal covert network topology. We analyze multiple topologies and identify two constructions that are capable of generating optimal topologies. We then extend these constructions to produce near-optimal topologies that can “grow” as new nodes join the network. We also address protocols for membership management and routing. Finally, we describe the architecture of a prototype system for instantiating a CCN.

Page generated in 0.1531 seconds