• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 191
  • 52
  • 23
  • 9
  • 8
  • 7
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 372
  • 372
  • 249
  • 207
  • 163
  • 121
  • 72
  • 58
  • 52
  • 35
  • 31
  • 30
  • 29
  • 28
  • 28
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Information technology in Hong Kong : a marketing plan for the shared resources concept.

January 1986 (has links)
by Au Yuk Van, Maria Assumpta, Yung, Thomas. / Bibliography: leaves 116-118 / Thesis (M.B.A.)--Chinese University of Hong Kong, 1986
152

Locally connected recurrent neural networks.

January 1993 (has links)
by Evan, Fung-yu Young. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaves 161-166). / List of Figures --- p.vi / List of Tables --- p.vii / List of Graphs --- p.viii / Abstract --- p.ix / Chapter Part I --- Learning Algorithms / Chapter 1 --- Representing Time in Connectionist Models --- p.1 / Chapter 1.1 --- Introduction --- p.1 / Chapter 1.2 --- Temporal Sequences --- p.2 / Chapter 1.2.1 --- Recognition Tasks --- p.2 / Chapter 1.2.2 --- Reproduction Tasks --- p.3 / Chapter 1.2.3 --- Generation Tasks --- p.4 / Chapter 1.3 --- Discrete Time v.s. Continuous Time --- p.4 / Chapter 1.4 --- Time Delay Neural Network (TDNN) --- p.4 / Chapter 1.4.1 --- Delay Elements in the Connections --- p.5 / Chapter 1.4.2 --- NETtalk: An Application of TDNN --- p.7 / Chapter 1.4.3 --- Drawbacks of TDNN --- p.8 / Chapter 1.5 --- Networks with Context Units --- p.8 / Chapter 1.5.1 --- Jordan's Network --- p.9 / Chapter 1.5.2 --- Elman's Network --- p.10 / Chapter 1.5.3 --- Other Architectures --- p.14 / Chapter 1.5.4 --- Drawbacks of Using Context Units --- p.15 / Chapter 1.6 --- Recurrent Neural Networks --- p.16 / Chapter 1.6.1 --- Hopfield Models --- p.17 / Chapter 1.6.2 --- Fully Recurrent Neural Networks --- p.20 / Chapter A. --- EXAMPLES OF USING RECURRENT NETWORKS --- p.22 / Chapter 1.7 --- Our Objective --- p.25 / Chapter 2 --- Learning Algorithms for Recurrent Neural Networks --- p.27 / Chapter 2.1 --- Introduction --- p.27 / Chapter 2.2 --- Gradient Descent Methods --- p.29 / Chapter 2.2.1 --- Backpropagation Through Time (BPTT) --- p.29 / Chapter 2.2.2 --- Real Time Recurrent Learning Rule (RTRL) --- p.30 / Chapter A. --- RTRL WITH TEACHER FORCING --- p.32 / Chapter B. --- TERMINAL TEACHER FORCING --- p.33 / Chapter C. --- CONTINUOUS TIME RTRL --- p.33 / Chapter 2.2.3 --- Variants of RTRL --- p.34 / Chapter A. --- SUB GROUPED RTRL --- p.34 / Chapter B. --- A FIXED SIZE STORAGE 0(n3) TIME COMPLEXITY LEARNGING RULE --- p.35 / Chapter 2.3 --- Non-Gradient Descent Methods --- p.37 / Chapter 2.3.1 --- Neural Bucket Brigade (NBB) --- p.37 / Chapter 2.3.2 --- Temporal Driven Method (TO) --- p.38 / Chapter 2.4 --- Comparison between Different Approaches --- p.39 / Chapter 2.5 --- Conclusion --- p.41 / Chapter 3 --- Locally Connected Recurrent Networks --- p.43 / Chapter 3.1 --- Introduction --- p.43 / Chapter 3.2 --- Locally Connected Recurrent Networks --- p.44 / Chapter 3.2.1 --- Network Topology --- p.44 / Chapter 3.2.2 --- Subgrouping --- p.46 / Chapter 3.2.3 --- Learning Algorithm --- p.47 / Chapter 3.2.4 --- Continuous Time Learning Algorithm --- p.50 / Chapter 3.3 --- Analysis --- p.51 / Chapter 3.3.1 --- Time Complexity --- p.51 / Chapter 3.3.2 --- Space Complexity --- p.51 / Chapter 3.3.3 --- Local Computations in Time and Space --- p.51 / Chapter 3.4 --- Running on Parallel Architectures --- p.52 / Chapter 3.4.1 --- Mapping the Algorithm to Parallel Architectures --- p.52 / Chapter 3.4.2 --- Parallel Learning Algorithm --- p.53 / Chapter 3.4.3 --- Analysis --- p.54 / Chapter 3.5 --- Ring-Structured Recurrent Network (RRN) --- p.55 / Chapter 3.6 --- Comparison between RRN and RTRL in Sequence Recognition --- p.55 / Chapter 3.6.1 --- Training Sets and Testing Sequences --- p.56 / Chapter 3.6.2 --- Comparison in Training Speed --- p.58 / Chapter 3.6.3 --- Comparison in Recalling Power --- p.59 / Chapter 3.7 --- Comparison between RRN and RTRL in Time Series Prediction --- p.59 / Chapter 3.7.1 --- Comparison in Training Speed --- p.62 / Chapter 3.7.2 --- Comparison in Predictive Power --- p.63 / Chapter 3.8 --- Conclusion --- p.65 / Chapter Part II --- Applications / Chapter 4 --- Sequence Recognition by Ring-Structured Recurrent Networks --- p.67 / Chapter 4.1 --- Introduction --- p.67 / Chapter 4.2 --- Related Works --- p.68 / Chapter 4.2.1 --- Feedback Multilayer Perceptron (FMLP) --- p.68 / Chapter 4.2.2 --- Back Propagation Unfolded Recurrent Rule (BURR) --- p.69 / Chapter 4.3 --- Experimental Details --- p.71 / Chapter 4.3.1 --- Network Architecture --- p.71 / Chapter 4.3.2 --- Input/Output Representations --- p.72 / Chapter 4.3.3 --- Training Phase --- p.73 / Chapter 4.3.4 --- Recalling Phase --- p.73 / Chapter 4.4 --- Experimental Results --- p.74 / Chapter 4.4.1 --- Temporal Memorizing Power --- p.74 / Chapter 4.4.2 --- Time Warping Performance --- p.80 / Chapter 4.4.3 --- Fault Tolerance --- p.85 / Chapter 4.4.4 --- Learning Rate --- p.87 / Chapter 4.5 --- Time Delay --- p.88 / Chapter 4.6 --- Conclusion --- p.91 / Chapter 5 --- Time Series Prediction --- p.92 / Chapter 5.1 --- Introduction --- p.92 / Chapter 5.2 --- Modelling in Feedforward Networks --- p.93 / Chapter 5.3 --- Methodology with Recurrent Networks --- p.94 / Chapter 5.3.1 --- Network Structure --- p.94 / Chapter 5.3.2 --- Model Building - Training --- p.95 / Chapter 5.3.3 --- Model Diagnosis - Testing --- p.95 / Chapter 5.4 --- Training Paradigms --- p.96 / Chapter 5.4.1 --- A Quasiperiodic Series with White Noise --- p.96 / Chapter 5.4.2 --- A Chaotic Series --- p.97 / Chapter 5.4.3 --- Sunspots Numbers --- p.98 / Chapter 5.4.4 --- Hang Seng Index --- p.99 / Chapter 5.5 --- Experimental Results and Discussions --- p.99 / Chapter 5.5.1 --- A Quasiperiodic Series with White Noise --- p.101 / Chapter 5.5.2 --- Logistic Map --- p.103 / Chapter 5.5.3 --- Sunspots Numbers --- p.105 / Chapter 5.5.4 --- Hang Seng Index --- p.109 / Chapter 5.6 --- Conclusion --- p.112 / Chapter 6 --- Chaos in Recurrent Networks --- p.114 / Chapter 6.1 --- Introduction --- p.114 / Chapter 6.2 --- Important Features of Chaos --- p.115 / Chapter 6.2.1 --- First Return Map --- p.115 / Chapter 6.2.2 --- Long Term Unpredictability --- p.117 / Chapter 6.2.3 --- Sensitivity to Initial Conditions (SIC) --- p.118 / Chapter 6.2.4 --- Strange Attractor --- p.119 / Chapter 6.3 --- Chaotic Behaviour in Recurrent Networks --- p.120 / Chapter 6.3.1 --- Network Structure --- p.121 / Chapter 6.3.2 --- Dynamics in Training --- p.121 / Chapter 6.3.3 --- Dynamics in Testing --- p.122 / Chapter 6.4 --- Experiments and Discussions --- p.123 / Chapter 6.4.1 --- Henon Model --- p.123 / Chapter 6.4.2 --- Lorenz Model --- p.127 / Chapter 6.5 --- Conclusion --- p.134 / Chapter 7 --- Conclusion --- p.135 / Appendix A Series 1 Sine Function with White Noise --- p.137 / Appendix B Series 2 Logistic Map --- p.138 / Appendix C Series 3 Sunspots Numbers from 1700 to 1979 --- p.139 / Appendix D A Quasiperiodic Series with White Noise --- p.141 / Appendix E Hang Seng Daily Closing Index in 1991 --- p.142 / Appendix F Network Model for the Quasiperiodic Series with White Noise --- p.143 / Appendix G Network Model for the Logistic Map --- p.144 / Appendix H Network Model for the Sunspots Numbers --- p.145 / Appendix I Network Model for the Hang Seng Index --- p.146 / Appendix J Henon Model --- p.147 / Appendix K Network Model for the Henon Map --- p.150 / Appendix L Lorenz Model --- p.151 / Appendix M Network Model for the Lorenz Map --- p.159 / Bibliography --- p.161
153

AI-assisted local area network diagnostic system.

January 1993 (has links)
by Chi-kwong Fong. / Thesis (M.Sc.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaves 30-[31]). / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Data Capture Subsystem --- p.7 / Chapter 3 --- Anomaly Detection Subsystem --- p.10 / Chapter 4 --- Descriptive Language Translation System --- p.14 / Chapter 5 --- Rule-based Analysis Subsystem --- p.20 / Chapter 6 --- Testing Results --- p.22 / Chapter 7 --- Summary --- p.27 / Bibliography --- p.30
154

Selection between UNIX in minicomputer setup and LAN configuration for a medium-sized company considering computerization.

January 1991 (has links)
by Leung Wai-ming, Raymond and Chang Che Son. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1991. / Bibliography: leaves 74-76. / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / LIST OF ILLUSTRATIONS --- p.vi / Chapter / Chapter I. --- INTRODUCTION --- p.1 / General Overview of Medium-sized Companies in Hong Kong --- p.2 / Matters of Concern --- p.6 / Chapters Summary --- p.7 / Chapter II. --- RESEARCH METHODOLOGY --- p.9 / Literate Review --- p.9 / Questionnaire --- p.9 / Observation and Site Visits --- p.10 / Selective Interview --- p.10 / Summary --- p.11 / Chapter III. --- HISTORY OF SYSTEMS --- p.12 / Evolution of local area network (LAN) --- p.12 / Evolution of Unix Systems --- p.14 / Chapter IV. --- COMPUTERIZATION IN MEDIUM-SIZED COMPANIES IN HONG KONG --- p.20 / Requirements and consideration on computerization --- p.20 / Market Trend --- p.23 / PC and PC Installation --- p.24 / UNIX Installation --- p.25 / Chapter V. --- SYSTEM OVERVIEW --- p.29 / LAN System Overview --- p.29 / Advantages in using Unix System --- p.30 / Availability of Application Software --- p.30 / Economic Advantages --- p.30 / Proficient PC Users --- p.31 / Standardization --- p.31 / Psychological Advantages --- p.32 / Disadvantages in using LAN System --- p.32 / Diminishing Performance --- p.33 / Immature Multi-user Applications --- p.33 / Complex System Management --- p.33 / Primitive Database Management System --- p.34 / Intensive Support Required --- p.34 / Unix System Overview --- p.35 / Advantages in using Unix System --- p.36 / Wide Area and Remote Connection --- p.36 / Centralized System Administration --- p.37 / Tight Data Security Control --- p.37 / True Multi-tasking System --- p.38 / Expandability --- p.38 / Technological Advantage --- p.38 / Disadvantages in using LAN System --- p.39 / Lack of Standard --- p.39 / Comparatively fewer Application Softwares Available --- p.39 / High Upgrading Cost --- p.40 / High Initial Investment --- p.40 / High Adminstration Cost --- p.40 / Poor User Interface --- p.42 / Chapter VI. --- SYSTEM DEVELOPMENT AND APPLICATION --- p.43 / Recent Development in LAN System --- p.43 / Wireless LAN System --- p.45 / LAN Application in recent years --- p.47 / Document Management System --- p.49 / Wide Area Networking --- p.49 / "Groupware, Database Server and Multi-media" --- p.51 / Recent Development in Unix System --- p.52 / Unix Institutions --- p.54 / Unix Applications --- p.55 / Chapter VII. --- UNIX/LAN APPLICATION IN MEDIUM-SIZED COMPANIES IN HONG KONG --- p.57 / General Configuration of a LAN-based Application --- p.57 / General Configuration of a Unix-based Application --- p.60 / Chapter VIII. --- FINDINGS --- p.65 / Total System Cost --- p.65 / System Expandability --- p.66 / System Administration --- p.66 / System Security --- p.67 / Office Automation --- p.67 / Data Processing --- p.67 / Summary --- p.68 / Chapter IX. --- CONCLUSION AND RECOMMENDATION --- p.69 / Recommendation : Marriage of UNIX and LAN Systems --- p.70 / Inter-system Connection --- p.70 / Running DOS in UNIX --- p.71 / Running Network Operating System on UNIX machines --- p.71 / Network based on UNIX --- p.72 / BIBLIOGRAPHY --- p.74
155

The design of PABX with LAN architecture.

January 1992 (has links)
Ko Wing Hoi. / Duplicate numbering of leave 67. / Thesis (M.Sc.)--Chinese University of Hong Kong, 1992. / Includes bibliographical references (leaves 71-72). / Chapter 1. --- INTRODUCTION --- p.1 / Chapter 2. --- COMPARISONS OF LAN AND PABX --- p.3 / Chapter 2.1 --- Typical LAN system --- p.3 / Chapter 2.1.1 --- Characteristics of a LAN [1] --- p.3 / Chapter 2.1.2 --- Transmission medium of LAN --- p.5 / Chapter 2.1.3 --- LAN access control methods --- p.6 / Chapter 2.1.4 --- Interfacing to the LAN --- p.8 / Chapter 2.1.5 --- LAN topology --- p.8 / Chapter 2.1.6 --- Switching techniques --- p.9 / Chapter 2 .2 --- Applications of LAN --- p.11 / Chapter 2.2.1 --- Small filestore LAN's --- p.12 / Chapter 2.2.2 --- Wiring replacement LAN's --- p.12 / Chapter 2.2.3 --- Personal computer networks --- p.13 / Chapter 2.2.4 --- General purpose LAN's --- p.13 / Chapter 2 .3 --- Typical PABX system --- p.14 / Chapter 2.3.1 --- PABX topology --- p.15 / Chapter 2.3.2 --- Circuit switching --- p.15 / Chapter 2.3.3 --- Telephony signalling --- p.16 / Chapter 2.3.3.1 --- Pulsing --- p.16 / Chapter 2.3.3.2 --- Subscriber loop signaling [2] --- p.17 / Chapter 2.3.4 --- ISDN (Integrated Services Digital Network) --- p.19 / Chapter 2.4 --- Applications of PABX --- p.21 / Chapter 2.5 --- Comparisons of LAN and PABX --- p.22 / Chapter 3. --- INTEGRATION OF PABX WITH LAN --- p.25 / Chapter 3.1 --- Advantages of integration of PABX with LAN --- p.25 / Chapter 3.1.1. --- LAN-PABX Gateway --- p.28 / Chapter 3.1.2. --- Problems in interconnecting PABX and LAN [6] --- p.29 / Chapter 3.1.3. --- ISDN-PABX [7] --- p.30 / Chapter 3.2 --- Architecture of Integrated LAN and PABX --- p.31 / Chapter 3.3 --- Typical applications --- p.32 / Chapter 4. --- CALL PROCESSING --- p.35 / Chapter 4.1 --- Finite State Diagrams for voice calls --- p.37 / Chapter 4.2 --- SDL representations of voice calls --- p.39 / Chapter 4.3 --- Software implementations of SDL diagrams --- p.40 / Chapter 4.3.1 --- PABX operating system --- p.40 / Chapter 4.3.2 --- Trunk operating system --- p.43 / Chapter 4.3.3 --- Message format --- p.43 / Chapter 4.4 --- Pseudo codes for PABX --- p.45 / Chapter 4.4 --- Pseudo codes for trunks --- p.52 / Chapter 5. --- HARDWARE IMPLEMENTATION --- p.57 / Chapter 5.1 --- TRUNK INTERFACE --- p.58 / Chapter 5.1.1 --- PABX to CO call --- p.58 / Chapter 5.1.2 --- CO to PABX call --- p.59 / Chapter 5.2 --- Subscriber Interface Circuit --- p.59 / Chapter 5.4 --- PSTN Trunk Interf ace --- p.60 / Chapter 6. --- CONCLUSIONS --- p.62 / Acknowledgements --- p.64 / APPENDIX A --- p.65 / CCITT SPECIFICATION AND DESCRIPTION LANGUAGE [15] --- p.65 / APPENDIX B --- p.68 / "SIGNALLING FOR SWITCHING SYSTEMS IN HK [16],[17]" --- p.68 / Chapter B. 1 --- Tone plan --- p.68 / Chapter B. 2 --- Tone levels --- p.68 / Chapter B. 3 --- Ringing frequency and voltage --- p.68 / Chapter B. 4 --- Dial pulse --- p.68 / Chapter B. 5 --- DTMF (Dual-tone multi-frequency) --- p.69 / Chapter B. 6 --- PCM coding --- p.69 / REFERENCES --- p.71
156

A study of application of IBM-compatible personal computer local area networks (PC LANs) among computer professionals in Hong Kong.

January 1990 (has links)
Cheung Wing Kin, Chong Kwok Kwong, Daniel. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1990. / Bibliography: leaf 133. / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iv / LIST OF FIGURES --- p.vii / LIST OF EXHIBITS --- p.viii / LIST OF TABLES --- p.ix / PREFACE --- p.xi / Chapter / Chapter I. --- INTRODUCTION --- p.1 / The World Market of LAN --- p.3 / Local Market of LAN in Hong Kong --- p.7 / The Research --- p.8 / The Significance of Study Findings --- p.9 / Chapter II. --- METHODOLOGY --- p.10 / Target Population --- p.10 / Unit of Analysis --- p.11 / Population Size --- p.12 / Sample Size --- p.14 / Data Collection --- p.15 / Objective --- p.15 / Selection of Data Collection Method --- p.15 / Questionnaires --- p.16 / Design --- p.16 / Contents --- p.18 / Despatch Methods --- p.18 / Research Aids --- p.20 / Summary --- p.20 / Chapter III. --- SURVEY FINDINGS --- p.21 / Despatch and Collection of Questionnaries --- p.21 / Company Data --- p.26 / Classification --- p.26 / Size in Terms of Number of Staff --- p.27 / Degree of Computerization --- p.27 / Number of PC in Use --- p.30 / PC LAN Installed --- p.32 / Hardware Particulars --- p.35 / Type of Computers in Use --- p.35 / PC LAN Hardware in Use --- p.35 / Length of Use of PC LAN --- p.37 / Assessment of Hardware in Use --- p.38 / Software Particulars --- p.39 / PC LAN Software in Use --- p.39 / Applications in Use --- p.39 / Assessment of Software in Use --- p.40 / Criteria in Choosing PC LANs --- p.41 / Job Function --- p.43 / Role in Purchasing --- p.43 / Report --- p.44 / Chapter IV. --- ANALYSIS AND INTERPRETATION OF FINDINGS --- p.45 / Response Rates --- p.45 / Company Data --- p.46 / Classification --- p.46 / Degree of Computerization --- p.48 / Size in Terms of Number of Staff --- p.50 / Number of PC in Use --- p.52 / PC LANs Installed --- p.54 / Hardware Particulars --- p.55 / Type of Computers in Use --- p.55 / PC LAN Hardware in Use --- p.55 / Length of Use of PC LAN --- p.57 / Assessment of Hardware in Use --- p.57 / Software Particulars --- p.57 / PC LAN Software in Use --- p.57 / Applications in Use --- p.59 / Assessment of Software in Use --- p.59 / Observation Relating to the Objectives of the Survey --- p.60 / Objective 1 : PC LAN Market Segment in Hong Kong --- p.60 / Objective 2 : Identify Market Characteristics --- p.63 / Objective 3 : Selection Criteria of LANs --- p.66 / Objective 4 : Gap between what are offered and what are needed --- p.66 / Objective 5 : Major Applications of PC LANs in Hong Kong --- p.71 / Job Function --- p.73 / Role in Purchasing --- p.73 / Report --- p.74 / Chapter V. --- CONCLUSION AND RECOMMENDATION --- p.75 / Conclusion --- p.75 / Extent of Usage of PC LANs in Hong Kong --- p.76 / PC LAN Market Segment in Hong Kong --- p.76 / PC LAN Market Characteristics in Hong Kong --- p.77 / Selection Criteria of PC LANs in Hong Kong --- p.78 / Gap Between what are offered and what are needed for PC LAN in Hong Kong --- p.78 / Major Applications of PC LANs in Hong Kong --- p.79 / Recommendation --- p.79 / Firms Already Installed PC LANs --- p.79 / Firms Not Yet Installed PC LANs --- p.81 / Marketeers --- p.82 / APPENDIX --- p.85 / BIBLIOGRAPHY --- p.133
157

Modelling message-oriented-middleware brokers using autoregressive models for bottleneck prediction

Chew, Zhen Bob January 2013 (has links)
Message brokers are the backbone of modern publish subscribe messaging systems. These brokers can degrade or fail for a variety of reasons. This research specifically looks at the detection, prediction and mitigation of bottlenecks in brokers. The message-oriented-middleware framework here uses either a cluster of brokers on a Local Area Network (LAN) or a federation of brokers on a Wide Area Network (WAN) to route messages, facilitate multicasting and ameliorate demand surges and geographically related faults. Sensors have been constructed to monitor brokers and controllers to run the bottleneck detection algorithms. An overlay manager controls broker and topic pairing. Each topic is assigned a primary and secondary broker. When a failure is predicted, the overlay manager routes messages from the failing broker by switching topics to its secondary broker(s). The application for bottleneck forecasting is to allow us to pre-empt a broker failure and hence reroute messages to other brokers to increase resilience and reliability. The key contributions of this research are an abstract model of message-oriented-middleware broker based on the Apache Qpid message broker coupled with the use of analytical autoregressive exogenous (ARX) models that describes the broker behaviour during bottleneck conditions. The Apache Qpid message broker is a message broker that implements the Advanced Message Queuing Protocol (AMQP) for publish-subscribe messaging. ARX models are autoregressive models where the output depends on the previous output as well as external stimuli. These components are integrated to produce a generalised technique for calibrating broker performance and detection of bottlenecks in the broker. This research show how models were initially constructed using a complete range of input data. As bottlenecks occur only when the broker is heavily loaded, input data during idle periods can cause corruption to the model fit. Models were constructed with segmented input data, with each segment covering the range of one peak period. The segmented input allows the modelling of the broker behaviour only when it is experiencing a bottleneck. The result of this is a much-improved fit of the predictive models. The work here is compared against previous work using Markov-chains for creating predictive models. The results of both approaches are compared and reported.
158

Design of IDOMS : Intelligent Data Object Management System

Waltmire, Michelle Klaassen January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
159

A high speed fault-tolerant multimedia network and connectionless gateway for ATM networks.

January 1997 (has links)
by Patrick Lam Sze Fan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (leaves 163-[170]). / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Fault-tolerant CUM LAUDE NET --- p.7 / Chapter 2.1 --- Overview of CUM LAUDE NET --- p.7 / Chapter 2.2 --- Network architecture of CUM LAUDE NET --- p.8 / Chapter 2.3 --- Design of Router-node --- p.10 / Chapter 2.3.1 --- Architecture of the Router-node --- p.10 / Chapter 2.3.2 --- Buffers Arrangement of the Router-node --- p.12 / Chapter 2.3.3 --- Buffer transmission policies --- p.13 / Chapter 2.4 --- Protocols of CUM LAUDE NET --- p.14 / Chapter 2.5 --- Frame Format of CUM LAUDE NET --- p.15 / Chapter 2.6 --- Fault-tolerant (FT) and Auto-healing (AH) algorithms --- p.16 / Chapter 2.6.1 --- Overview of the algorithms --- p.16 / Chapter 2.6.2 --- Network Failure Scenarios --- p.18 / Chapter 2.6.3 --- Design and Implementation of the Fault Tolerant Algorithm --- p.19 / Chapter 2.6.4 --- Design and Implementation of the Auto Healing Algorithm --- p.26 / Chapter 2.6.5 --- Network Management Signals and Restoration Times --- p.27 / Chapter 2.6.6 --- Comparison of fault-tolerance features of other networks with the CUM LAUDE NET --- p.31 / Chapter 2.7 --- Chapter Summary --- p.31 / Chapter 3 --- Overview of the Asynchronous Transfer Mode (ATM) --- p.33 / Chapter 3.1 --- Introduction --- p.33 / Chapter 3.2 --- ATM Network Interfaces --- p.34 / Chapter 3.3 --- ATM Virtual Connections --- p.35 / Chapter 3.4 --- ATM Cell Format --- p.36 / Chapter 3.5 --- ATM Address Formats --- p.36 / Chapter 3.6 --- ATM Protocol Reference Model --- p.38 / Chapter 3.6.1 --- The ATM Layer --- p.39 / Chapter 3.6.2 --- The ATM Adaptation Layer --- p.39 / Chapter 3.7 --- ATM Signalling --- p.44 / Chapter 3.7.1 --- ATM Signalling Messages and Call Setup Procedures --- p.45 / Chapter 3.8 --- Interim Local Management Interface (ILMI) --- p.47 / Chapter 4 --- Issues of Connectionless Gateway --- p.49 / Chapter 4.1 --- Introduction --- p.49 / Chapter 4.2 --- The Issues --- p.50 / Chapter 4.3 --- ATM Internetworking --- p.51 / Chapter 4.3.1 --- LAN Emulation --- p.52 / Chapter 4.3.2 --- IP over ATM --- p.53 / Chapter 4.3.3 --- Comparing IP over ATM and LAN Emulation --- p.59 / Chapter 4.4 --- Connection Management --- p.61 / Chapter 4.4.1 --- The Indirect Approach --- p.62 / Chapter 4.4.2 --- The Direct Approach --- p.63 / Chapter 4.4.3 --- Comparing the two approaches --- p.64 / Chapter 4.5 --- Protocol Conversion --- p.65 / Chapter 4.5.1 --- Selection of Protocol Converter --- p.68 / Chapter 4.6 --- Packet Forwarding Modes --- p.68 / Chapter 4.7 --- Bandwidth Assignment --- p.70 / Chapter 4.7.1 --- Bandwidth Reservation --- p.71 / Chapter 4.7.2 --- Fast Bandwidth Reservation --- p.72 / Chapter 4.7.3 --- Bandwidth Advertising --- p.72 / Chapter 4.7.4 --- Bandwidth Advertising with Cell Drop Detection --- p.73 / Chapter 4.7.5 --- Bandwidth Allocation on Source Demand --- p.73 / Chapter 4.7.6 --- The Common Problems --- p.74 / Chapter 5 --- Design and Implementation of the Connectionless Gateway --- p.77 / Chapter 5.1 --- Introduction --- p.77 / Chapter 5.1.1 --- Functions Definition of Connectionless Gateway --- p.79 / Chapter 5.2 --- Hardware Architecture of the Connectionless Gateway --- p.79 / Chapter 5.2.1 --- Imposed Limitations --- p.82 / Chapter 5.3 --- Software Architecture of the Connectionless Gateway --- p.83 / Chapter 5.3.1 --- TCP/IP Internals --- p.84 / Chapter 5.3.2 --- ATM on Linux --- p.85 / Chapter 5.4 --- Network Architecture --- p.88 / Chapter 5.4.1 --- IP Addresses Assignment --- p.90 / Chapter 5.5 --- Internal Structure of Connectionless Gateway --- p.90 / Chapter 5.5.1 --- Protocol Stacks of the Gateway --- p.90 / Chapter 5.5.2 --- Gateway Operation by Example --- p.93 / Chapter 5.5.3 --- Routing Table Maintenance --- p.97 / Chapter 5.6 --- Additional Features --- p.105 / Chapter 5.6.1 --- Priority Output Queues System --- p.105 / Chapter 5.6.2 --- Gateway Performance Monitor --- p.112 / Chapter 5.7 --- Setup an Operational ATM LAN --- p.117 / Chapter 5.7.1 --- SVC Connections --- p.117 / Chapter 5.7.2 --- PVC Connections --- p.119 / Chapter 5.8 --- Application of the Connectionless Gateway --- p.120 / Chapter 6 --- Performance Measurement of the Connectionless Gateway --- p.121 / Chapter 6.1 --- Introduction --- p.121 / Chapter 6.2 --- Experimental Setup --- p.121 / Chapter 6.3 --- Measurement Tools of the Experiments --- p.123 / Chapter 6.4 --- Descriptions of the Experiments --- p.124 / Chapter 6.4.1 --- Log Files --- p.125 / Chapter 6.5 --- UDP Control Rate Test --- p.126 / Chapter 6.5.1 --- Results and analysis of the UDP Control Rate Test --- p.127 / Chapter 6.6 --- UDP Maximum Rate Test --- p.138 / Chapter 6.6.1 --- Results and analysis of the UDP Maximum Rate Test --- p.138 / Chapter 6.7 --- TCP Maximum Rate Test --- p.140 / Chapter 6.7.1 --- Results and analysis of the TCP Maximum Rate Test --- p.140 / Chapter 6.8 --- Request/Response Test --- p.144 / Chapter 6.8.1 --- Results and analysis of the Request/Response Test --- p.144 / Chapter 6.9 --- Priority Queue System Verification Test --- p.149 / Chapter 6.9.1 --- Results and analysis of the Priority Queue System Verifi- cation Test --- p.150 / Chapter 6.10 --- Other Observations --- p.153 / Chapter 6.11 --- Solutions to Improve the Performance --- p.154 / Chapter 6.12 --- Future Development --- p.157 / Chapter 7 --- Conclusion --- p.158 / Bibliography --- p.163 / A List of Publications --- p.171
160

Serviços de transferência de arquivos em redes locais. / File transfer services in local area networks.

Tereza Cristina Melo de Brito Carvalho 16 September 1988 (has links)
O principal objetivo deste trabalho é apresentar os aspectos de especificação e implementação dos serviços de transferência de arquivos desenvolvidos para duas redes locais, usadas em ambientes de automação industrial e de automação de escritório, respectivamente. São apresentados, inicialmente, alguns conceitos e os requisitos de especificação que devem ser satisfeitos por estes serviços. À luz desta caracterização, algumas especificações de serviços de transferência de arquivos para redes de computadores são estudadas e analisadas. De acordo com esta análise e com as tendências de padronização de redes de computadores usadas nas aplicações acima mencionadas, é escolhida uma especificação a ser tomada como base na implementação destes serviços. Estes serviços são especificados detalhadamente, considerando as características das redes locais utilizadas. Alguns aspectos de implementação da máquina de protocolo que presta os serviços especificados são discutidos, descrevendo-se o conjunto de processos que constituem tal máquina. Em seguida, são especificados os programas aplicativos desenvolvidos a partir destes serviços de transferência de arquivos, considerando-se os requisitos das aplicações envolvidas. Para avaliar o sistema implementado, alguns testes são definidos, visando verificar a operacionalidade, conformidade e desempenho deste sistema. Os resultados destes test6es são apresentados e discutidos. Finalmente, são feitas considerações sobre o sistema implementado e a especificação tomada como base. Como continuidade do presente trabalho, é sugerida a implementação de outros serviços utilizando a infra-estrutura criada pelo mesmo. / The main purpose of this work is to present aspects on the specification and the implementation of the file transfer services, developed for two local area networks used in manufacturing and office automation. Some concepts and the specification requirements for such services are initially presented. In the light of this introduction some specifications of file transfer services for computer networks are studied and analyzed. Based on this analysis and on the trends in computer networks standardization for the above mentioned applications, a specification is selected as the basis for the file transfer services. These services are then fully specified taking into account the characteristics of the target local area networks. Some implementation aspects of protocol machine which provides the specified services are discussed describes the processes that make up such machine. The application programs developed using these file transfer services are then described. Some tests are conceived the verify the functionalism, conformity and performance of the implemented system. The results of these tests are presented and discussed in some detail. Finally, some considerations on the implemented system and the specification used as basis are presented. As future work the implementation of other services using the framework created is suggested.

Page generated in 0.0948 seconds