Spelling suggestions: "subject:"computer bnetwork"" "subject:"computer conetwork""
131 |
On buffer allocation in transport protocolsZissopoulos, Athanassios January 1987 (has links)
No description available.
|
132 |
Modelling and analysis of a computer conferencing systemBaronikian, Haig January 1987 (has links)
No description available.
|
133 |
Modeling the bandwidth sharing behavior of congestion controlled flows /Li, Kang. January 2002 (has links)
Thesis (Ph. D.)--OGI School of Science & Engineering at OHSU, 2002. / Includes bibliographical references.
|
134 |
Unifying the conceptual levels of network security through the use of patternsUnknown Date (has links)
Network architectures are described by the International Standard for
Organization (ISO), which contains seven layers. The internet uses four of these layers,
of which three are of interest to us. These layers are Internet Protocol (IP) or Network
Layer, Transport Layer and Application Layer. We need to protect against attacks that
may come through any of these layers. In the world of network security, systems are plagued by various attacks, internal and external, and could result in Denial of Service (DoS) and/or other damaging effects. Such attacks and loss of service can be devastating for the users of the system. The implementation of security devices such as Firewalls and Intrusion Detection Systems
(IDS), the protection of network traffic with Virtual Private Networks (VPNs), and the
use of secure protocols for the layers are important to enhance the security at each of
these layers.We have done a survey of the existing network security patterns and we have written the missing patterns. We have developed security patterns for abstract IDS, Behavior–based IDS and Rule-based IDS and as well as for Internet Protocol Security (IPSec) and Transport Layer Security (TLS) protocols. We have also identified the need for a VPN pattern and have developed security patterns for abstract VPN, an IPSec VPN and a TLS VPN. We also evaluated these patterns with respect to some aspects to simplify their application by system designers. We have tried to unify the security of the network layers using security patterns by tying in security patterns for network transmission, network protocols and network boundary devices. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2014. / FAU Electronic Theses and Dissertations Collection
|
135 |
Gerencia de redes virtuais privadas de camada 1 / Layer 1 virtual private network managementMalheiros, Neumar Costa, 1981- 29 August 2006 (has links)
Orientador: Edmundo Roberto Mauro Madeira / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-08T13:56:53Z (GMT). No. of bitstreams: 1
Malheiros_NeumarCosta_M.pdf: 2725607 bytes, checksum: f54c00065fc570ea3f84ae73359abcf8 (MD5)
Previous issue date: 2006 / Resumo: Um plano de controle distribuído, como a arquitetura GMPLS (Generalized Multiprotocol Label Switching), permite o aprovisionamento dinâmico de conexões em redes de transporte de camada 1, como redes ópticas ou redes TDM (Time Division Multiplexing). Dessa forma, essas redes podem oferecer serviços mais sofisticados como serviços VPN (Virtual Private Network). Esses serviçõs, então denominados VPN de camada 1 (L1VPN - Layer 1 VPN), permitem que a infra-estrutura de transporte do provedor seja compartilhada entre múltiplas redes clientes. Neste trabalho, é proposta uma arquitetura para gerência de serviços L1VPN. A abordagem foi utilizar o paradigma de Gerência Baseada em Políticas (PBM ? Policy-Based Management) para prover aos clientes um certo nível de controle e gerência sobre suas L1VPNs. Além disso, é apresentada a implementação de um protótipo da arquitetura proposta, assim como uma discussão das implicações de diferentes políticas para a gerência de configuração de serviços L1VPN, a partir de um estudo de caso / Abstract: A distributed control plane architecture as GMPLS enhances transport networks with dynamic connection control. As a result, it allows the provisioning of advanced connectivity services, like Virtual Private Networks (VPNs), on layer 1 switching networks as optical and TDM networks. Such Layer 1 VPN (L1VPN) services enable multiple customer networks to share a single transport network. In this work, an architecture for L1VPN management is proposed. The approach is based on Policy-Based Management (PBM) to provide customers with some level of control and management over their L1VPNs. Furthermore, a prototype implementation of the proposed architecture is presented and from a case study implications of different policies for L1VPN service configuration management are discussed. / Mestrado / Mestre em Ciência da Computação
|
136 |
Investigating the Delivery of Therapeutic Recreation Services on the Internet: a Pilot Study Using Leisure Education for the Prevention of Alcohol AbuseMainville, Sylvie 12 1900 (has links)
This pilot study, grounded in social learning theory, demonstrated that leisure education services can be delivered on the Internet. Participants (n=40) successfully accessed the Web page program and responded to instruments and surveys. The treatment group (n=16) effectively completed four leisure education sessions on-line. Confidentiality, privacy, and anonymity issues were controlled. Responses were monitored and feedback provided as to the complexity of the program and comprehension
of the participants. The leisure education program had no significant effect on posttest measures of alcohol expectancies and leisure motivations. Mean changes frompretest to posttest may indicate trends. The small n and convenience sample may have introduced many extraneous variables. Professional implications include compliance issues (57% experimental mortality rate), technology-related anxiety, and limited professional competency to work in this environment. Future research which examines the provision of leisure education and other components of therapeutic recreation service on-line is
warranted.
|
137 |
Enhancing transmission control protocol performance over wireless networks梁鉅輝, Leung, Kui-fai. January 2002 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
|
138 |
Scheduling and flow control in CMT-SCTPHalepoto, Imtiaz Ali January 2014 (has links)
abstract / Computer Science / Doctoral / Doctor of Philosophy
|
139 |
Functional description and formal specification of a generic gateway.Son, Chang Won. January 1988 (has links)
This dissertation is concerned with the design of a generic gateway which provides an interoperability between dissimilar computer networks. The generic gateway is decomposed with subnetwork dependent blocks and subnetwork independent blocks. The subnetwork dependent block is responsible to communicate with subnetwork nodes. The subnetwork independent block is responsible to interconnect the subnetwork dependent blocks. The communications between subnetwork dependent and independent blocks are done by service access points which defined independently to any specific subnetworks. Formal specification of a generic gateway is provided by LOTOS. The generic gateway specification is tested by a verifiable test method which is proposed in this dissertation. The correctness of the specification has been verified while the specified model is simulated. The major difference between conventional simulation and the verifiable test is in the objective of simulation. In the verifiable test method, the semantical properties are examined during the simulation process. The tester can be either human observer or other process.
|
140 |
Birth@Internet.ca : a narrative analysis of Internet-based birth stories from Canadian womenNuernberger, Kimberley Mae. 10 April 2008 (has links)
No description available.
|
Page generated in 0.302 seconds