• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 416
  • 62
  • 58
  • 48
  • 23
  • 22
  • 14
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • Tagged with
  • 748
  • 250
  • 240
  • 235
  • 203
  • 182
  • 172
  • 119
  • 104
  • 90
  • 81
  • 67
  • 65
  • 60
  • 55
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Methods of congestion control for adaptive continuous media

Tater, Shalini January 2002 (has links)
No description available.
12

High-speed multi-match packet classification using TCAM /

Faezipour, Miad, January 2006 (has links)
Thesis (M.S.) -- University of Texas at Dallas, 2006 / Includes vita. Includes bibliographical references (leaves 68-71)
13

Design and analysis of a dynamically reconfigurable network processor

Troxel, Ian A. January 2003 (has links)
Thesis (M.E.)--University of Florida, 2003. / Title from title page of source document. Includes vita. Includes bibliographical references.
14

Improving Automatic Position Reporting System (APRS) throughput and reliability /

Van Tonder, Hendrik Petrus. January 2005 (has links)
Thesis (MScIng)--University of Stellenbosch, 2005. / Bibliography. Also available via the Internet.
15

OPERATIONAL VALIDATION OF CFDP ON PACKET TELEMETRY AND TELECOMMAND LINKS

Long, Marjorie de Lande, Long, Ian de Lande, Calzolari, Gian Paolo 10 1900 (has links)
International Telemetering Conference Proceedings / October 22-25, 2001 / Riviera Hotel and Convention Center, Las Vegas, Nevada / The Consultative Committee for Space Data Systems (CCSDS) is defining a CCSDS File Delivery Protocol (CFDP) capable of use between systems of multiple endpoints. A number of prototype CFDP implementations have been developed and some interoperability tests performed over UDP links. This paper reports on a study of CFDP running over more realistic packet telecommand and packet telemetry links. An integrated test system was constructed by adapting existing commercial and prototype software. This was used to study a number of scenarios which are likely to be important in early operational use of CFDP in space. This approach has been found to be useful both for testing a protocol during its development and specification and for verifying the impact of new approaches to Space Missions.
16

Enhancing a network coding security scheme to avoid packet dropping in wireless mesh networks / H.L.H.C. Terblanche.

Terblanche, Heila Levina Helena Catharina January 2013 (has links)
With the increase of mobile and smart device usage, the interest in dynamically forming networks is rising. One such type of network isWireless Mesh Networks (WMNs). WMNs are multi-hop networks, with a decentralised nature that can dynamically form into mesh topologies. Network Coding (NC) is a method that is used to increase the efficiency of networks by encoding and decoding data on packet level by means of an XOR operation. NC works well with WMNs because it can exploit WMNs broadcast and opportunistic listening properties. When implementing NC on WMNs the issue of security has to be taken into consideration. Dong et al. identified various security threats for intra-flow NC in WMNs. Intra-flow NC combines packets within individual flows, where the information is divided into different flows called generations, to optimize the decoding process. They identified threats for each component of intra-flow NC for WMNs. These components include forwarding node selection, data packet forwarding and acknowledgement delivery. These threats respectively for each component are wormhole attacks and link quality falsification, packet pollution and packet dropping and acknowledgementdropping, injection and delay. We identified that most security schemes focus on packet pollution attacks in NC, but not on any other threats. Packet dropping is also a major threat in networks that is not addressed. Both packet pollution and packet dropping are threats identified for the data forwarding component of WMNs. The Delayed Authentication with Random Transformations (DART) security scheme addresses packet pollution in intra-flow NC systems. The scheme is based on time asymmetry and checksums. The DART scheme only addresses packet pollution and not any of the other identified threats. The DART scheme was selected to be enhanced to also address packet dropping. To enhance the DART scheme we added additional information to the DART scheme’s checksum packets to detect malicious packet dropping nodes in the network. The information added to the checksum packet took the form of a HealthMatrix, which indicates how many packets a node has received and verified. The new scheme, called the Packet Dropping Detection (PDD) scheme collects the additional information from the checksum packets at the receiver node. The receiver sends the collected information to the source node which then uses the information to identify the malicious nodes in the network. These nodes are then removed from the network. The results show that this new scheme causes a small decrease in throughput – about 2%. The identification of malicious nodes can be used as a diagnostic tool and faulty nodes can be repaired or removed form the network. The advantage to detect malicious packet dropping nodes far outweighs this decrease in throughput. In this dissertation we investigate the effects of packet pollution and packet dropping on NC networks inWMNs. We also enhance an already existing scheme (DART) to add additional packet dropping detection security to it without a great loss in throughput. / Thesis (MIng (Computer and Electronic Engineering))--North-West University, Potchefstroom Campus, 2013.
17

Enhancing a network coding security scheme to avoid packet dropping in wireless mesh networks / H.L.H.C. Terblanche.

Terblanche, Heila Levina Helena Catharina January 2013 (has links)
With the increase of mobile and smart device usage, the interest in dynamically forming networks is rising. One such type of network isWireless Mesh Networks (WMNs). WMNs are multi-hop networks, with a decentralised nature that can dynamically form into mesh topologies. Network Coding (NC) is a method that is used to increase the efficiency of networks by encoding and decoding data on packet level by means of an XOR operation. NC works well with WMNs because it can exploit WMNs broadcast and opportunistic listening properties. When implementing NC on WMNs the issue of security has to be taken into consideration. Dong et al. identified various security threats for intra-flow NC in WMNs. Intra-flow NC combines packets within individual flows, where the information is divided into different flows called generations, to optimize the decoding process. They identified threats for each component of intra-flow NC for WMNs. These components include forwarding node selection, data packet forwarding and acknowledgement delivery. These threats respectively for each component are wormhole attacks and link quality falsification, packet pollution and packet dropping and acknowledgementdropping, injection and delay. We identified that most security schemes focus on packet pollution attacks in NC, but not on any other threats. Packet dropping is also a major threat in networks that is not addressed. Both packet pollution and packet dropping are threats identified for the data forwarding component of WMNs. The Delayed Authentication with Random Transformations (DART) security scheme addresses packet pollution in intra-flow NC systems. The scheme is based on time asymmetry and checksums. The DART scheme only addresses packet pollution and not any of the other identified threats. The DART scheme was selected to be enhanced to also address packet dropping. To enhance the DART scheme we added additional information to the DART scheme’s checksum packets to detect malicious packet dropping nodes in the network. The information added to the checksum packet took the form of a HealthMatrix, which indicates how many packets a node has received and verified. The new scheme, called the Packet Dropping Detection (PDD) scheme collects the additional information from the checksum packets at the receiver node. The receiver sends the collected information to the source node which then uses the information to identify the malicious nodes in the network. These nodes are then removed from the network. The results show that this new scheme causes a small decrease in throughput – about 2%. The identification of malicious nodes can be used as a diagnostic tool and faulty nodes can be repaired or removed form the network. The advantage to detect malicious packet dropping nodes far outweighs this decrease in throughput. In this dissertation we investigate the effects of packet pollution and packet dropping on NC networks inWMNs. We also enhance an already existing scheme (DART) to add additional packet dropping detection security to it without a great loss in throughput. / Thesis (MIng (Computer and Electronic Engineering))--North-West University, Potchefstroom Campus, 2013.
18

Sledování bezpečnosti počítačových sítí / Network security monitor

Morský, Ondřej January 2009 (has links)
This document describes software for network traffic analysis a network security monitoring. The way of processing captured frames in network cards and in protocol drivers is also described here. Second part attends to function of packet capture and network communication analysis software which can also generate traffic. This application is designed for Windows operating systems and is created as modular and easily extensible using DLL libraries. Source code of this application can be found on appended CD.
19

Evaluation and Comparison of MAC Protocols in Wireless Sensor Networks

Kollipara, Sharmila 22 December 2010 (has links)
No description available.
20

Congestion Control for Next-Generation Global Internets

Gao, Yuan 22 November 2002 (has links)
No description available.

Page generated in 0.042 seconds