• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Impact and Analysis of Internet Service using random port

Hsu, Yu-San 12 February 2008 (has links)
Over the last few years, peer-to-peer (P2P) applications have relentlessly grown to represent a formidable component of Internet traffic. In contract to P2P networks witch used well-defined port number, current P2P applications have use of arbitrary ports. As P2P applications continue to evolve, robust and effective methods are methods are needed for P2P traffic identification. Many P2P applications are bandwidth-intensive. Understanding the Internet traffic profile is important for several reasons, including traffic engineering, network service pricing. In this Thesis, we integrated port-based method into original Classifier which is using content-based method only. Therefore, we can improve the recognition rate for Classifier and identify more applications. We also verified our Classifier recognition rate by using the results of Service Control Engine.
2

PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

Rahimi, Nadim January 2022 (has links)
There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. Any authentication method within the IEEE 802.1x that can be adapted to current network complexity to minimize the attack surface related to the network access level is an area of interest. RADIUS has been a well-known leading protocol for a few decades while Diameter is newly developed from RADIUS as an unknown protocol; there is a lack of resources on the practical level. This thesis analyzes and evaluates RADIUS & Diameter protocols regarding authentication timeand their functionalities. The hardware used for the implementation phase consists of two Raspberry Pi as a server and supplicant, one IEEE 8021.x supporting switch (Ubiquity EdgeSwitch 24 Lite) and two Virtual Machinesalong with the software freeRADIUS & freeDiameter. Analyzing the fact for each protocol by literature study and the implementation result of this thesis, Diameter protocol requires more time to process the authentication than RADIUS. However, there were issues on the implementation that have affected the measurement of authentication time for Diameter. Based on the results, Diameter provides reliability, scalability, and more security than RADIUS. RADIUS shows a stable authentication time as promised. The RADIUS protocol is easy to implement and provides stable authentication, while Diameter still needs more software and documentation improvements.
3

Effet de l'intrication brouillée sur la téléportation quantique

Coiteux-Roy, Xavier 12 1900 (has links)
La téléportation quantique promet d'être centrale à de nombreuses applications du futur tels la cryptographique quantique et l'ordinateur quantique. Comme toute mise en œuvre physique s'accompagne inévitablement d'imperfections expérimentales, on étudie la téléportation dans un contexte où la ressource quantique, c'est-à-dire l'intrication, que l'on consomme est brouillée. Pour ce faire, on introduit en premier lieu le formalisme de l'informatique quantique. En seconde partie, on approche les protocoles de téléportation quantique standard, de téléportation avec relais quantiques et de téléportation multi-ports. Notre analyse de la téléportation standard et de la téléportation multi-ports poursuit trois objectifs principaux. Le premier est de comparer l'emploi d'un canal brouillé pour la téléportation d'un état quantique avec l'utilisation de ce même canal pour l'envoi direct de l'état. On trouve ainsi les conditions pour lesquelles les deux protocoles de transmission sont équivalents. Le second but est d'observer le caractère non-local de l'intrication brouillée en regardant quand et comment Alice peut réduire le bruit chez elle à un bruit exclusivement chez Bob. En troisième, on quantifie par une borne inférieure la qualité d'un canal de téléportation en réduisant l'effet de toute intrication brouillée à celui d'un bruit de Pauli à un seul paramètre. On accomplit cette tâche en effaçant au moment approprié l'information classique superflue et en appliquant la wernerisation. Finalement, on analyse la composition de bruits de Pauli et l'effet du taux d'effacement sur la téléportation avec relais quantiques pour mieux comprendre comment se combinent les effets de l'intrication brouillée dans un réseau de téléportation quantique. La suite logique est d'établir des protocoles plus robustes de téléportation quantique qui prennent en compte l'effet de l'intrication brouillée. / Quantum teleportation will be a centerpiece of practical quantum cryptography and quantum computing in a soon to be future. As no physical implementation is perfect, we study quantum teleportation in the context of impaired quantum resources which we call noisy entanglement. In a first part, we introduce how quantum mechanics is formalized by quantum information theory. In the second part, we study standard quantum teleportation, in both the absence and presence of quantum repeaters, as well as port-based teleportation. Our analysis of standard quantum teleportation and port-based teleportation follows three main directions. The first goal is to compare the use of a noisy channel for teleportation to the one of the same channel for direct transmission. We thus find the conditions under which the two cases are equivalent. Our second objective is to observe the non-local properties of noisy entanglement by finding when and how Alice can blame Bob for her noise. Thirdly, we quantify, in the worst-case scenario, the quality of a teleportation channel by reducing the effect of any noisy entanglement to the one of a one-parameter Pauli channel that can be interpreted as a depolarizing channel in most instances. We achieve this task by erasing unneeded classical information at the appropriate time and by twirling either the entanglement or the teleported state. Finally, we analyze the composition of Pauli noises and the impact of the erasure channel parameter on the protocol of teleportation with quantum repeaters. We thus aim to understand how the effects of noisy entanglement cumulate in a teleportation network. The next logical step is to create robust teleportation schemes that take into account the effects of noisy entanglement.

Page generated in 0.0272 seconds