• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 21
  • 19
  • 10
  • 4
  • 4
  • 4
  • 4
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 83
  • 21
  • 18
  • 13
  • 13
  • 13
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Proposta para utilização de rede de comunicação em uma celula-nivel de aquisição e atuação

Araujo, Olga Fernanda Nabuco de 26 May 1997 (has links)
Orientador: João Mauricio Rosario / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Mecanica / Made available in DSpace on 2018-07-22T10:22:49Z (GMT). No. of bitstreams: 1 Araujo_OlgaFernandaNabucode_M.pdf: 7882644 bytes, checksum: 7f2b7fbc61b4a64e0be4e54748ec5d70 (MD5) Previous issue date: 1997 / Resumo: Neste trabalho procura-se demonstrar a adequabilidade do uso de sistemas de comunicação tipo Fieldbus na Célula de manufatura da Plataforma Industrial de Pesquisa, Experimentação e Formação em Automação, PIPEFA, que é um projeto conjunto entre CTI e Unicamp. Para isto foram descritos os vários sistemas que compõem a Plataforma segundo a ótica do modelo de referência NBS, de modo a se obter uma visão geral do problema. Com foco no sistema de comunicação, foi feita uma explanação das restrições que um sistema deste tipo deve possuir. Dentro deste enfoque, são mostrados três sistemas de comunicação que satisfazem estes requisitos: FIP, Profibus e IEC 1158 (SP-50). É feita então uma proposta do uso de equipamentos que utilizam Profibus, em um dos centros de montagem/desmontagem da PIPEFA / Abstract: This work aims demonstrate the feasibility of using communication systems like Fieldbus in a manufacturing cell. This cell is part of PIPEFA - Industrial Platform for Research, Teaching and Tranining in Automation - project, a joint effort involving CTI and Unicamp. PIPEFA's functionality is described using NBS as reference model. The focus is on the shop floor communication system, in this sense a generic explanation of the restrictions applied to real time systems is exposed. A survey of Fieldbus systems, FIP, IEC 1158 (SP-50) and Profibus, which follow real time system requirements is also presented. Finally the use of Profibus equipment in the PIPEFA's assembly work center is proposed. / Mestrado / Mecanica dos Sólidos e Projeto Mecanico / Mestre em Engenharia Mecânica
62

Laboratorní úlohy pro výuku síťových technologií / Laboratory exercises for network technologies education

Kapusta, Martin January 2019 (has links)
The aim of the diploma thesis is to choose network simulator suitable for network technologies laboratory tasks for educational use. Theoretical part of thesis describes basics of network communication, addressing, reference models. Thesis also describes standards Wi Fi, Ethernet and routing protocol OSPF - technologies which are discussed in laboratory tasks. The practical part of diploma thesis describes a few available network simulators suitable for creating two laboratory tasks. Finally, the NS-3 simulator was chosen. Both laboratory tasks include theoretical introduction, detailed description of source code, individual tasks, expected outputs and control questions which senses understanding of discussed technologies.
63

Feasibility study: Implementation of a gigabit Ethernet controller using an FPGA

Fält, Richard January 2003 (has links)
<p>Background: Many systems that Enea Epact AB develops for theirs customers communicates with computers. In order to meet the customers demands on cost effective solutions, Enea Epact wants to know if it is possible to implement a gigabit Ethernet controller in an FPGA. The controller shall be designed with the intent to meet the requirements of IEEE 802.3. </p><p>Aim: Find out if it is feasible to implement a gigabit Ethernet controller using an FPGA. In the meaning of feasible, certain constraints for size, speed and device must be met. </p><p>Method: Get an insight of the standard IEEE 802.3 and make a rough design of a gigabit Ethernet controller in order to identify parts in the standard that might cause problem when implemented in an FPGA. Implement the selected parts and evaluate the results. </p><p>Conclusion: It is possible to implement a gigabit Ethernet controller using an FPGA and the FPGA does not have to be a state-of-the-art device.</p>
64

Subsurface radioactive gas transport and release studies using the UTEX model

Lowrey, Justin David 15 October 2013 (has links)
Underground nuclear explosions (UNEs) produce anthropogenic isotopes that provide the only definitive means by which to determine whether a nuclear explosion has taken place. Verification of a suspected test under the Comprehensive Nuclear-Test-Ban Treaty (CTBT) includes both on-site and atmospheric sampling of specific noble gas radioisotopes for analysis of origin. It is well-established that the processes of subsurface transport can affect the rate at which such gases will reach the surface. However, the relative abundance of anthropogenic isotopes reaching the surface following transport is currently assumed to rely solely on their direct fission yield, decay rate, and their production from precursor decay, making no account for the influence of transport processes on isotopic ratios. The Underground Transport of Environmental Xenon (UTEX) model has been developed to examine the possible effects of subsurface transport on radioxenon isotopic ratios as well as to consider a number of on-site inspection-related applications. In this work, background on the UTEX model's development, evolution and vetting is presented. This is followed by the characterization and analysis of a number of applications of the model for consideration of CTBT-relevant scenarios. Specifically, the UTEX model's capability to analyze CTBT on-site inspection concept of operations is demonstrated. This is accomplished through an examination of generalized UNE source terms, geological stratigraphy, UNE impact on local geology, natural soil-gas radionuclide backgrounds, atmospheric infiltration, and sampling methodology. It is shown that the processes driving noble gas transport through geological media can significantly skew the ratios of key radioxenon isotopes that are used to help verify whether or not a well-contained underground test has taken place. This result emphasizes the need for a broader understanding of radionuclide signatures used for CTBT verification purposes and the mechanisms that can alter them. / text
65

Feasibility study: Implementation of a gigabit Ethernet controller using an FPGA

Fält, Richard January 2003 (has links)
Background: Many systems that Enea Epact AB develops for theirs customers communicates with computers. In order to meet the customers demands on cost effective solutions, Enea Epact wants to know if it is possible to implement a gigabit Ethernet controller in an FPGA. The controller shall be designed with the intent to meet the requirements of IEEE 802.3. Aim: Find out if it is feasible to implement a gigabit Ethernet controller using an FPGA. In the meaning of feasible, certain constraints for size, speed and device must be met. Method: Get an insight of the standard IEEE 802.3 and make a rough design of a gigabit Ethernet controller in order to identify parts in the standard that might cause problem when implemented in an FPGA. Implement the selected parts and evaluate the results. Conclusion: It is possible to implement a gigabit Ethernet controller using an FPGA and the FPGA does not have to be a state-of-the-art device.
66

Aplikace objasňující základy fungování komunikačních protokolů / Application clarifying basics of operations of communication protocols

Marcin, Michal January 2020 (has links)
The diploma thesis aimed at the study of the topic of communication protocols and several transmission modes, as well as ARQ (Automatic Repeat Request) mechanisms. Subsequently, the task was to design and describe individual scenarios for their simulation. As a part of solving the mentioned task, it was necessary to create an application that allows the emulation of the behaviour of communication protocols without the need for a transmission in the real network a nd the requirements for the edition of the source code. The application was created in the Microsoft Visual Studio 2017 development environment using the C# programming language and .NET framework and it consists of a library and a graphical interface. The output of the solution is the application of a mode simulator of the data transmission in the network with two scenarios with the prepared input situations in the frame of graphical environment together with instructions, additional tasks and sample solutions. The program allows the simulation of the behaviour of communication protocols between the client and the server without the need for a transmission in a real network. In conclusion, the simulator of data transfer was created in the form of the desktop application which contains two scenarios. The first scenario is used to simulate ARQ mechanisms and the second one is active in the simulation of commutation of messages, circuits, packets or cells.
67

Performance of Network and Transport Protocols in the Implementation of a New Cryptocurrency

Hagström, Jesper, Lindblom, Lukas January 2018 (has links)
It has been suggested that some cryptocurrencies have potential to take the role as a global digital payment system. However, as the current technology stands, all cryptocurrencies have shortcomings which are growing when scaling parameters. This emphasizes the importance of fast and reliable data transmissions when implementing network protocols to handle the transactions. However, little research has been conducted to specifically support the development of cryptocurrencies regarding protocol performance comparison. This study will be assisting the development of a new cryptocurrency, proposed by HAJ Enterprise. The report uses a theoretical framework of economic perspectives to investigate if the proposed cryptocurrency could take the role as a form of good money. Furthermore, the main purpose of the study is to identify which existing transport protocol with appurtenant parameters would be the most suitable in an implementation of the proposed cryptocurrency. To answer these questions, the study measures latency, throughput and reliability of protocols in a test simulating a real case of long distance data transmission. These results are then compared to findings from similar studies. From the results, it was suggested that proposed cryptocurrency satisfies the requirements of good money, as intrinsic value was found through the monetary policy. Moreover, it was found that TCP IPv6 showed the best performance regarding data transmission. However, considering the current state of the IPv6 adoption rate into consideration, it is suggested that TCP IPv4 with a packet size in the range of 1024-2048 would be beneficial. Further research in different settings is required for more nuanced results. / Det har föreslagits att kryptovalutor har potential att fungera som ett globalt digitalt betalmedel. Den bakomliggande tekniken medför dock att alla kryptovalutor har brister. Dessa brister är växande när parametrar skalas upp. Detta understryker vikten av snabba och pålitliga överföringar av data och passande val vid implementering av protokoll för att hantera transaktionerna. Forskning inom området för effektiv dataöverföring inom kryptovalutor tillåter fler möjligheter i betraktande av lösningar till storskaliga nätverk. Dessvärre har en begränsad mängd forskning bedrivits som specifikt understödjer utvecklingen av kryptovalutor genom jämförelse av protokollprestanda. Denna studie medverkar i utvecklingen av en ny kryptovaluta, föreslagen av HAJ Enterprise. Rapporten använder ett teoretiskt ramverk av ekonomiska perspektiv på kryptovalutor för att undersöka om den föreslagna kryptovalutan kan klassas som good money. Vidare är det huvudsakliga syftet med studien att identifiera vilka befintliga transportprotokoll, med tillhörande parametrar, som skulle vara mest lämpade att implementera i den föreslagna kryptovalutan. För att besvara dessa frågor mäts fördröjning, genomströmning och tillförlitlighet av protokoll i en testmiljö som simulerar ett verkligt fall med dataöverföring mellan långa avstånd. Dessa resultat jämförs därefter med resultat från liknande studier. Från resultaten kunde rapporten visa att den föreslagna kryptovalutan kan klassificeras som en form av pengar, då inneboende värde kunde identifieras genom kryptovalutans monetära policy. Det var också visat att TCP IPv6 hade bäst prestanda gällande dataöverföring. Men med hänsyn till den globala etablering av IPv6 föreslås TCP IPv4 med en paketstorlek inom en räckvidd mellan 1024 till 2048 byte som mest fördelaktig. Fortsatt forskning inom området och utökade tester inom olika miljöer krävs för ett mer nyanserat resultat.
68

Network Traffic Regulator for Diagnostic Messages in Modular Product / Reglering av nätverkstrafik för diagnoskommunikation i en modulär produkt

Thakrar, Nikhil January 2017 (has links)
The aim of this thesis project is to explore a network traffic regulator using bandwidth management techniques that regulates data traffic with the objective to use the network bandwidth to its maximum capacity while ensuring that the network is not overloaded. The bandwidth in the existing network architecture is shared between two co-existing, distinct data flows for on-board communication and diagnostic communication in an in-vehicle network. The diagnostic communication must not interfere with the more critical on-board communication and it should comply with the remaining bandwidth. In the existing solution, fixed delays are imposed on the data traffic which result in a waste of network capacity. The approach presented in this thesis uses two regulation algorithms for different types of diagnostic services. One regulation algorithm is activated for diagnostic services that require data segmentation and multiple data frames to accommodate the transferred data. This algorithm makes use of the Flow Control parameter Separation Time specified in ISO 15765-1:2011 "Road vehicles -- Diagnostic communication over Controller Area Network (DoCAN)". The other algorithm regulates diagnostic services that generate bursts of single frames where data segmentation is not required and it does so using traffic shaping techniques. The results in this thesis show that the network traffic indeed can be regulated for different diagnostic services by using the two mentioned regulation algorithms. The results also show that data is not lost due to high network utilisation and that the bandwidth is used to its maximum capacity without having to impose fixed delays on the network system. The regulator is adaptive in the sense that it can be used for different vehicle configurations with compatible network systems to ensure quality of service and a robust network system. / I detta examensarbete är målet att utforska en metod för att reglera  nätverkstrafik genom att använda tekniker inom bandbreddshantering  med syfte att utnyttja bandbredden till dess maximala kapacitet utan att överbelasta nätverket. Bandbredden i den nuvarande nätverksarkitekturen delas mellan två dataflöden för onboard kommunikation och diagnostisk kommunikation. Den diagnostiska kommunikationen får inte på någotvis störa onboard kommunkationen och får anpassa sig till den bandbredd som kvarstår. I det existerande systemet införs fixa fördröjningar i nätverkstrafiken vilket medför ett onödigt slöseri på nätverkskapaciteten och som också medför att de diagnostiska tjänsterna tar längre tid att utföra.  Tillvägagångssättet som presenteras i detta arbete använder två regleringsalgoritmer för olika typer av diagnostiska tjänster. En algoritm används för tjänster som kräver datasegmentering och flera dataramar för att skicka data. Den här algoritmen använder parametern Separation Time som är specificerad i ISO standarden 15765-1:2011 "Road vehicles -- Diagnostic communication over Controller Area Network (DoCAN)". Diagnostiska tjänster som istället genererar en skur av enstaka dataramar regleras med en traffic shaping algoritm som heter Token Bucket. Resultaten i detta arbete visar att det går att reglera nätverkstrafiken för olika typer av diagnostiska tjänster genom att använda de två utvecklade algoritmerna. Resultaten visar också att data inte går förlorat vid höga nätverkslaster och att bandbredden används maximalt utan att behöva införa fixa fördröjningar i nätverkssystemet. Regleraren är adaptiv i bemärkelsen att den kan användas för alla tänkbara fordonskonfigurationer med kompatibelt nätverkssystem för att försäkra quality of service och robusthet.
69

Web server pro vestavěné aplikace / Web Server for Embedded Applications

Pirkl, Tomáš January 2007 (has links)
This work discuses Embedded Ethernet systems. Embedded Webserver Platform is designed. This design embrace microkontroler, Ethernet driver, and external SRAM. It includes implementation on PCB with MMC interface and software implementation of MMC driver and FAT file system. Reference model ISO/OSI, reference model TCP/IP, Ethernet and UDP, TCP, IP, HTTP protocol is presented.
70

PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS

Muharish, Essa Yahya M 01 June 2016 (has links)
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories and existing countermeasures based on preventing, detecting, and responding are reviewed. Henceforward, a neural network learning algorithms and statistical analysis are utilized into the designing of our proposed packet filtering system.

Page generated in 0.0503 seconds