• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 191
  • 52
  • 23
  • 9
  • 8
  • 7
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 372
  • 372
  • 249
  • 207
  • 163
  • 121
  • 72
  • 58
  • 52
  • 35
  • 31
  • 30
  • 29
  • 28
  • 28
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Vector processor services for local area networks

Thomas, Scott D. 31 October 2009 (has links)
Vector processors conventionally have been used as an attached processor to a host computer. Within this limited scope, the application programmer must use the host computer in order to benefit from the vector processor resources. By using a local area network, programmers are no longer constrained to a specific host computer. The vector processor may be shared as a network resource. The vector processor service is developed within a distributed environment and, therefore, must address concerns pertinent to distributed system architecture. These issues include implementation methodologies, interprocess communication performance, protocol processing and network throughput, and the level of transparency of the implementations. This thesis presents models that facilitate implementation of the vector processor service over a local area network (LAN). The research investigates the performance of different interprocess communication techniques and alternative transport protocols, specifically TCP and UDP. Additionally, two LAN technologies are examined for the vector processor service, namely Ethernet and Fiber Data Distributed Interface (FDDI). Experiments are performed for a batch application using an Ethernet local area network. Simulations are done for a real-time application utilizing an Ethernet LAN as well as for the same batch application. Additionally, a FDDI local area network is simulated for a real-time application. Results indicate that the model based on remote program execution has better performance because of lower network communication overhead compared to the model based on remote procedure calls. However, the remote procedure call model provides for a more transparent implementation of the vector processor service. This thesis also discusses methods to improve the performance of the vector processor service, including better implementations and transport protocols, alternative remote procedure call protocols, and new multiprocessor architectures. / Master of Science
242

Medium access delay evaluation for distributed queueing dual bus (DQDB) MAC protocol

Pham, Don H. 12 September 2009 (has links)
Distributed Queuing Dual Bus (DQDB) is a media access control (MAC) technique, which is being considered by the IEEE 802.6 for the metropolitan area network (MAN). The DQDB medium access technique has many promising advantages over other access methods. However it has one drawback, which is its unfairness in terms of node-dependent medium access delay. In this paper a mathematic model is formulated to describe this detrimental behavior of DQDB. The access control method is first modeled as a M/G/1 queueing system with a single priority level, then it is remodeled as a non-preemptive priority system with three priority levels. By employing these models, the approximate medium access delay analysis of a DQDB network is investigated for a metropolitan area network containing 50 stations with a channel bandwidth of 150 Mbps. Numerical results are then presented to illustrate the network unfairness performance under various traffic intensities and under different priority levels. The results have been obtained for non-isochronous (asynchronous) traffic. / Master of Science
243

Frequency and Damping Characteristics of Generators in Power Systems

Zou, Xiaolan 25 January 2018 (has links)
A power system stability is essential for maintaining the power system oscillation frequency within a small and acceptable interval around its nominal frequency. Hence, it is necessary to study and control the frequency for stable operation of a power system by knowing the characteristics within a power system. One approach is to understand the effectiveness of frequency and damping characteristics of generators in power systems. Hence, the simulation analysis of IEEE 118-bus power system is used for this study. The analysis includes theoretical analysis with a mathematical approach and simulation studies of swing equation to determine the characteristics of damped single-machine infinite bus, which is represented as a generator connects to a large network system with a small signal disturbance by line losses. Additionally, mathematical derivation of Prony analysis is presented in order to estimate the frequency and damping ratio of the simulation results. In the end, the results demonstrate that the frequency and damping characteristics of generators are highly dependent on the system inertia constant. Therefore, the higher inertia constant is a critical factor to ensure the system is more stable. / Master of Science
244

Segmentering av lokala nätverk - För mikro- och småorganisationer

Hermansson, Christopher, Johansson, Sebastian January 2010 (has links)
<p>Syftet med den här rapporten är att beskriva ett antal olika tillvägagångssätt man kan använda sig av då man har behov av att dela in ett lokalt nätverk i olika segment och med det även kunna reglera trafikflödet mellan segmenten. De lösningar som presenteras i arbetet är inriktade mot mikro- och småföretag.Anledningen till att vi har valt att arbeta med det här området är att vi anser att det är viktigt för organisationer att har en strukturerad och segmenterad design på sitt interna datornätverk.Vi har arbetat genom att i förväg samla in information om olika tekniker som kan tänkas lösa vårt problem, och därefter testat olika scenarion med dessa tekniker. Data har samlats in efter varje genomfört scenario och sammanställts i statistisk form för att kunna avgöra vilken metod som var att föredra.Vi har testat lösningar där man segmenterar nätverket i en lager 2-switch medan man möjliggör och förhindrar trafikflöde mellan segmenten i en router. Även lösningar där man använder en lager 3-switch har testats. På så sätt kan routningen ske direkt i switchen och det blir betydligt mindre belastning i routern. Resultatet visar att då man vill segmentera ett nätverk så är det rekommenderat att man använder sig av VLAN och ACL:er och eventuellt i kombination med en brandvägg.Slutresultatet av rapporten är att en lösning med ”router on a stick” är den billigaste lösningen och troligen den som de flesta mindre företag skulle klara sig med. Vilken lösning man väljer beror dock helt på hur mycket pengar man vill lägga på sitt nätverk samt vad kraven är.</p> / <p>The purpose of this report is to describe a number of approaches that can be used when you are in need of dividing a local area network in a number of segments, and with that also be able to control how data traffic is allowed to traverse between the different segments. The solutions that are presented are focused towards micro and small companies.The reason that we have chosen to work with this matter is that we believe it is important for organizations to have a structured and segmented design of its internal computer network.We have been working by in advance collecting information about various techniques that might solve our problem, and then testing different scenarios using these techniques. Data have been collected after each tested scenario and compiled in statistical form in order to determine which method that was preferable.We have been testing solutions were you segment the network in a layer 2 switch while you allow or deny communication between the segments in a router, and also solutions were you use a layer 3 switch. In that way you can let the routing be performed in the switch, which leads to significantly lower load on the router. The result was that if you are about to segment a local area network it is recommended that you use VLAN and ACL:s, and possibly in combination with a firewall.The final result of this report is that a solution using the “router on a stick”-technique is the cheapest one, and probably the one that most small companies would get along with. However, the solution that you choose depends completely on how much money you want to spend on your network, and also what the needs are.</p>
245

Determinação de um parâmetro para monitoramento do desempenho de mensagens GOOSE do padrão IEC 61850 utilizadas em subestações de energia elétrica / Determination of a parameter for monitoring the performance of GOOSE messages used in electric power substations

Chemin Netto, Ulisses 10 August 2012 (has links)
O desenvolvimento e utilização do padrão IEC 61850 alterou a concepção e operação das subestações de energia elétrica. O desempenho e confiabilidade do sistema de proteção depende da rede de comunicação de dados. Esta pesquisa propõe um parâmetro de dimensionamento e comparação de desempenho para o tempo de transferência das mensagens Generic Object Oriented Substation Event (GOOSE) entre Intelligent Electronic Devices (IEDs). Esse parâmetro foi obtido através do levantamento experimental da curva do tempo de transferência das mensagens GOOSE versus a ocupação percentual da largura de banda dos IEDs. Para a realização dos experimentos foram utilizados três IEDs, um switch Ethernet gerenciável, três microcomputadores do tipo PC, um relógio sincronizador Global Positioning System (GPS), cordões de fibra óptica, cabos do tipo par trançado sem blindagem e aplicativos de software. Os resultados mostraram que a partir de um limiar característico, o qual é distinto para cada IED ensaiado, o tempo de transferência excede o limite máximo permitido pelo padrão IEC 61850. A partir da análise destes dados, foi desenvolvido um sistema preditivo de monitoramento de banda para supervisionar a interface de rede dos IEDs. O sistema preditivo apresentou para a medição de banda um erro relativo médio igual a 0,55% em relação ao aplicativo comercial utilizado na comparação, já a predição feita pela rede neural artificial apresentou um erro de estimativa menor do que 3% para 91,30% das amostras utilizadas, além de modelar adequadamente o comportamento da série temporal que representa a ocupação de banda do IED monitorado. / The development and utilization of IEC 61850 standard changed the design and operation of electric power substations. The performance and reliability of the protection system depends on the data communication network. This research proposes a parameter for dimensioning and comparising the transfer time of Generic Object Oriented Substation Event (GOOSE) messages between different Intelligent Electronic Devices (IEDs). This parameter was obtained from experimental data related to the transfer time of GOOSE messages curve versus IEDs bandwidth percentage occupation. In this context, a laboratory structure was set up in order to carry out these experiments. This structure mainly consists of three IEDs, an Ethernet switch, three personal computers, a GPS Clock, fiber optic cables, unshielded twisted pair cables, as well as support software. The results show the existence of a characteristic threshold, different for each IED tested, after which the transfer time exceeded the total transmission time allowed for the IEC 61850 standard. Based on these results, a predictive bandwidth monitoring system was developed to supervise the IEDs bandwidth interface. The bandwidth measurement has a mean relative error of 0.55% regarding to the commercial software used for comparison. Finally, the forecasting made by the artificial neural network has a relative error of 3% for 91,30% of the samples used in test phase. In addition, that it was able to model the behaviour of the time series that represent the bandwidth occupation.
246

Determinação de um parâmetro para monitoramento do desempenho de mensagens GOOSE do padrão IEC 61850 utilizadas em subestações de energia elétrica / Determination of a parameter for monitoring the performance of GOOSE messages used in electric power substations

Ulisses Chemin Netto 10 August 2012 (has links)
O desenvolvimento e utilização do padrão IEC 61850 alterou a concepção e operação das subestações de energia elétrica. O desempenho e confiabilidade do sistema de proteção depende da rede de comunicação de dados. Esta pesquisa propõe um parâmetro de dimensionamento e comparação de desempenho para o tempo de transferência das mensagens Generic Object Oriented Substation Event (GOOSE) entre Intelligent Electronic Devices (IEDs). Esse parâmetro foi obtido através do levantamento experimental da curva do tempo de transferência das mensagens GOOSE versus a ocupação percentual da largura de banda dos IEDs. Para a realização dos experimentos foram utilizados três IEDs, um switch Ethernet gerenciável, três microcomputadores do tipo PC, um relógio sincronizador Global Positioning System (GPS), cordões de fibra óptica, cabos do tipo par trançado sem blindagem e aplicativos de software. Os resultados mostraram que a partir de um limiar característico, o qual é distinto para cada IED ensaiado, o tempo de transferência excede o limite máximo permitido pelo padrão IEC 61850. A partir da análise destes dados, foi desenvolvido um sistema preditivo de monitoramento de banda para supervisionar a interface de rede dos IEDs. O sistema preditivo apresentou para a medição de banda um erro relativo médio igual a 0,55% em relação ao aplicativo comercial utilizado na comparação, já a predição feita pela rede neural artificial apresentou um erro de estimativa menor do que 3% para 91,30% das amostras utilizadas, além de modelar adequadamente o comportamento da série temporal que representa a ocupação de banda do IED monitorado. / The development and utilization of IEC 61850 standard changed the design and operation of electric power substations. The performance and reliability of the protection system depends on the data communication network. This research proposes a parameter for dimensioning and comparising the transfer time of Generic Object Oriented Substation Event (GOOSE) messages between different Intelligent Electronic Devices (IEDs). This parameter was obtained from experimental data related to the transfer time of GOOSE messages curve versus IEDs bandwidth percentage occupation. In this context, a laboratory structure was set up in order to carry out these experiments. This structure mainly consists of three IEDs, an Ethernet switch, three personal computers, a GPS Clock, fiber optic cables, unshielded twisted pair cables, as well as support software. The results show the existence of a characteristic threshold, different for each IED tested, after which the transfer time exceeded the total transmission time allowed for the IEC 61850 standard. Based on these results, a predictive bandwidth monitoring system was developed to supervise the IEDs bandwidth interface. The bandwidth measurement has a mean relative error of 0.55% regarding to the commercial software used for comparison. Finally, the forecasting made by the artificial neural network has a relative error of 3% for 91,30% of the samples used in test phase. In addition, that it was able to model the behaviour of the time series that represent the bandwidth occupation.
247

The design and implementation of a security and containment platform for peer-to-peer media distribution / Die ontwerp en implimentasie van ’n sekure en begeslote platvorm vir portuurnetwerk mediaverspreiding

Storey, Quiran 12 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2013. / ENGLISH ABSTRACT: The way in which people consume video is changing with the adoption of new technologies such as tablet computers and smart televisions. These new technologies, along with the Internet, are moving video distribution away from satellite and terrestrial broadcast to distribution over the Internet. Services online now offer the same content that originally was only available on satellite broadcast television. However, these services are only viable in countries with high speed, inexpensive Internet bandwidth. The need therefore exists for alternative services to deliver content in countries where bandwidth is still expensive and slow. These include many of the developing nations of Africa. In this thesis we design and develop a video distribution platform that relies on peer-to-peer networking to deliver high quality video content. We use an existing video streaming peer-to-peer protocol as the primary distribution mechanism, but allow users to share video over other protocols and services. These can include BitTorrent, DC++ and users sharing hard drives with one another. In order to protect the video content, we design and implement a security scheme that prevents users from pirating video content, while allowing easy distribution of video data. The core of the security scheme requires a low bandwidth Internet connection to a server that streams keys to unlock the video content. The project also includes the development of a custom video player application to integrate with the security scheme. The platform is not limited to, but is aimed at high speed local area networks where bandwidth is free. In order for the platform to support feasible business models, we provision additional services, such as video cataloging and search, video usage monitoring and platform administration. The thesis includes a literature study on techniques and solutions to secure video entertainment, specifically in a peer-to-peer environment. / AFRIKAANSE OPSOMMING: Die wyse waarvolgens mense video verbruik is aan die verander met die ingebruikneming van nuwe tegnologie soos tabletrekenaars en slim televisiestelle. Hierdie nuwe tegnologie tesame met die Internet maak dat die verspreiding van video al hoe minder plaasvind deur middel van satellietuitsendings en al hoe meer versprei word deur die Internet. Aanlyn-Internetdienste bied deesdae dieselfde inhoud aan as wat voorheen slegs deur beeldsending versprei is. Hierdie dienste is egter slegs lewensvatbaar in lande met hoëspoed- en goedkoop Internetbandwydte. Daar is dus ’n behoefte aan alternatiewe tot hierdie dienste in lande waar bandwydte steeds duur en stadig is. Baie lande in Afrika kan in hierdie kategorie ingesluit word. In hierdie tesis word ’n videoverspreidingsplatform ontwerp en ontwikkel, wat van portuurnetwerke gebruik maak om hoëkwaliteit-beeldmateriaal te versprei. Die stelsel gebruik ’n bestaande portuurnetwerk-datavloeiprotokol as die premêre verspreidingsmeganisme, maar laat gebruikers ook toe om videoinhoud direk met ander gebruikers en dienste te deel. BitTorrent, DC++ en gebruikers wat hardeskywe met mekaar deel word hierby ingesluit. Ten einde die videoinhoud te beskerm ontwerp en implimenteer ons ’n sekuriteitstelsel wat verhoed dat gebruikers die videoinhoud onregmatig kan toe-eien, maar wat terselfdertyd die verspreiding van die data vergemaklik. Hierdie sluit die ontwikkeling van ’n pasgemaakte videospeler in. Die kern van die sekuriteitstelsel benodig ’n lae-bandwydte-Internetverbinding na ’n bediener wat sleutels uitsaai om die videoinhoud te ontsluit. Alhoewel nie daartoe beperk nie, is die platform gemik op hoëspoed-plaaslikegebiedsnetwerke met gratis bandwydte. Om die platvorm aan ’n haalbare sakemodel te laat voldoen het ons vir addisionele dienste soos videokatalogisering met soekfunksies, videoverbruikersmonitering en platvormadministrasie voorsiening gemaak. Die tesis sluit ’n literatuurstudie oor tegnieke en oplossings vir die beskerming van video data, spesifiek in die portuurnetwerke omgeving, in.
248

Segmentering av lokala nätverk - För mikro- och småorganisationer

Hermansson, Christopher, Johansson, Sebastian January 2010 (has links)
Syftet med den här rapporten är att beskriva ett antal olika tillvägagångssätt man kan använda sig av då man har behov av att dela in ett lokalt nätverk i olika segment och med det även kunna reglera trafikflödet mellan segmenten. De lösningar som presenteras i arbetet är inriktade mot mikro- och småföretag.Anledningen till att vi har valt att arbeta med det här området är att vi anser att det är viktigt för organisationer att har en strukturerad och segmenterad design på sitt interna datornätverk.Vi har arbetat genom att i förväg samla in information om olika tekniker som kan tänkas lösa vårt problem, och därefter testat olika scenarion med dessa tekniker. Data har samlats in efter varje genomfört scenario och sammanställts i statistisk form för att kunna avgöra vilken metod som var att föredra.Vi har testat lösningar där man segmenterar nätverket i en lager 2-switch medan man möjliggör och förhindrar trafikflöde mellan segmenten i en router. Även lösningar där man använder en lager 3-switch har testats. På så sätt kan routningen ske direkt i switchen och det blir betydligt mindre belastning i routern. Resultatet visar att då man vill segmentera ett nätverk så är det rekommenderat att man använder sig av VLAN och ACL:er och eventuellt i kombination med en brandvägg.Slutresultatet av rapporten är att en lösning med ”router on a stick” är den billigaste lösningen och troligen den som de flesta mindre företag skulle klara sig med. Vilken lösning man väljer beror dock helt på hur mycket pengar man vill lägga på sitt nätverk samt vad kraven är. / The purpose of this report is to describe a number of approaches that can be used when you are in need of dividing a local area network in a number of segments, and with that also be able to control how data traffic is allowed to traverse between the different segments. The solutions that are presented are focused towards micro and small companies.The reason that we have chosen to work with this matter is that we believe it is important for organizations to have a structured and segmented design of its internal computer network.We have been working by in advance collecting information about various techniques that might solve our problem, and then testing different scenarios using these techniques. Data have been collected after each tested scenario and compiled in statistical form in order to determine which method that was preferable.We have been testing solutions were you segment the network in a layer 2 switch while you allow or deny communication between the segments in a router, and also solutions were you use a layer 3 switch. In that way you can let the routing be performed in the switch, which leads to significantly lower load on the router. The result was that if you are about to segment a local area network it is recommended that you use VLAN and ACL:s, and possibly in combination with a firewall.The final result of this report is that a solution using the “router on a stick”-technique is the cheapest one, and probably the one that most small companies would get along with. However, the solution that you choose depends completely on how much money you want to spend on your network, and also what the needs are.
249

Topics On Security In Sensor Networks And Energy Consumption In IEEE 802.11 WLANs

Agrawal, Pranav 12 1900 (has links) (PDF)
Our work focuses on wireless networks in general, but deals specifically with security in wireless sensor networks and energy consumption in IEEE 802.11 infrastructure WLANs. In the first part of our work, we focus on secure communication among sensor nodes in a wireless sensor network. These networks consists of large numbers of devices having limited energy and memory. Public key cryptography is too demanding for these resource-constrained devices because it requires high computation. So, we focus on symmetric key cryptography to achieve secure communication among nodes. For this cryptographic technique to work, two nodes have to agree upon a common key. To achieve this, many key distribution schemes have been proposed in the literature. Recently, several researchers have proposed schemes in which they have used group-based deployment models and assumed predeployment knowledge of the expected locations of nodes. They have shown that these schemes achieve better performance than the earlier schemes, in terms of connectivity, resilience against node capture and storage requirements. But in many situations expected locations of nodes are not available. We propose a solution which does not use the group-based deployment model and predeployment knowledge of the locations of nodes, and yet performs better than schemes which make the aforementioned assumptions. In our scheme, groups are formed after the deployment of sensor nodes on the basis of their physical locations. Nodes in different groups sample keys from disjoint key pools, so that compromise of a node affects secure links of its group only. Because of this reason, our scheme performs better than earlier schemes as well as the schemes using predeployment knowledge, in terms of connectivity, storage requirement, and security. Moreover, the post-deployment key generation process completes sooner than in schemes like LEAP+. In the second part of our work, we develop analytical models for estimating the energy spent by stations (STAs) in infrastructure WLANs when performing TCP-controlled file downloads. We focus on the energy spent in radio communication when the STAs are in the Continuously Active Mode (CAM), or in the static Power Save Mode (PSM). Our approach is to develop accurate models for obtaining the fractions of times the STA radios spend in idling, receiving and transmitting. We discuss two traffic models for each mode of operation: (i) each STA performs one large file download, and (ii) the STAs perform short file transfers with think times (short duration of inactivity)between two transfers. We evaluate the rate of STA energy expenditure with long file downloads, and show that static PSM is worse than using just CAM. For short file downloads, we compute the number of file downloads that can be completed with a given battery capacity, and show that PSM performs better than CAM for this case. We provide a validation of our analytical models using the NS-2 simulator. Although the PSM performs better than the CAM when the STAs download short files over TCP with think times, its performance degrades as the number of STAs associated to the access point (AP) increases. To address this problem, we propose an algorithm, which we call opportunistic PSM (OPSM). We show through simulations that OPSM performs better than PSM. The performance gain achieved by OPSM increases as the file size requested by the STAs or the number of STAs associated with the AP increases. We implemented OPSM in NS-2.33, and to compare the performance of OPSM and PSM, we evaluate the number of file downloads that can be completed with a given battery capacity and the average time taken to download a file.
250

INSTRUMENTING AN AIRBORNE NETWORK TELEMETRY LINK

Laird, Daniel, Temple, Kip 10 1900 (has links)
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California / The Central Test and Evaluation Investment Program (CTEIP) Integrated Network Enhanced Telemetry (iNET) program is currently testing a wireless local area networking (WLAN) in an L-band telemetry (TM) channel to evaluate the feasibility and capabilities of enhancing traditional TM methods in a seamless wide area network (WAN). Several advantages of networking are real-time command and control of instrumentation formats, quick-look acquisition, data retransmission and recovery (gapless TM) and test point real-time verification. These networking functions, and all others, need to be tested and evaluated. The iNET team is developing a WLAN based on 802.x technologies to test the feasibility of the enhanced telemetry implementation for flight testing.

Page generated in 0.0645 seconds