• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 38
  • 13
  • 10
  • 10
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 182
  • 69
  • 47
  • 34
  • 24
  • 24
  • 21
  • 20
  • 19
  • 19
  • 18
  • 17
  • 17
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Simulace zpoždění při přenosu dat mezi stanicemi v IP sítích / Simulation of data transmission latency between nodes in IP networks

Balej, Jiří January 2010 (has links)
This master thesis is focused on the delays incurred in data transmitting over IP networks. The top of the paper is devoted to points, where delay is invoked and causes of the latency. For individual sources of delay are are described the parameters that affect the usual size of latency. The next section describes the types of networks and their typical delay. In the paper are also discussed tools for measuring delay and determining the number of intermediate devices. The thesis contains results of measurements delay time in the real network. For these results are listed conclusions about the delay for one intermediate device. There is also said general ratio of crow-fly distance and calculated distance. The last part deals the simulation of delay in the NS2 program. The results of thesis are scripts that shows the relation of delay and the number of switches, routers, and the length of the path.
152

Správa sítí na bázi protokolu IP / Management of data networks based on IP protocol

Patala, Petr January 2012 (has links)
The objective of this master’s thesis is monitoring and management of computer networks via SNMP protocol and its practical application. The main part describes working with SNMPc program in an experimental network through implementation of its parts into the network and configuration of SNMP agents on routers, switch and end station. This thesis includes the results of traffic testing, disconnected links, effects of traffic load on QoS parameters, making longterm statistics, baselines and alarms. The thesis also includes parametres obtained with SNMP protocol from network nodes and end station.
153

Vysokorychlostní sítě v domácnosti / High-speed Networks in Household

Rosenberg, Michal January 2012 (has links)
The master thesis discusses about the relation between high-speed networks and intelligent system installation features and possibilities of this mutual interaction. Furthermore principles of KNX bus tunneling through IP networks are theoretically analyzed (KNXnet/IP). Practical use of implements KNXnet/IP shows real elements on the test panel. The control is realized by KNX@Home in the Ubuntu environment. Simulation of the real state tunneling KNX bus represent model in Opnet Modeler, which shows how the delays may change due to network load.
154

Analýza výkonnosti v IP průmyslových komunikačních sítích / Performance Analysis in IP-Based Industrial Communication Networks

Beran, Jan January 2010 (has links)
S rostoucím počtem řídicích systémů a jejich distribuovanosti získávájí komunikační sítě na důležitosti a objevují se nové výzkumné trendy. Hlavní problematikou v této oblasti, narozdíl od dřívějších řídicích systémů využívajících dedikovaných komunikačních obvodů, je časově proměnné zpoždění měřicích a řídicích signálů způsobené paketově orientovanými komunikačními prostředky, jako např. Ethernet. Aspekty komunikace v reálném čase byly v těchto sítích již úspěšně vyřešeny. Nicméně, analýzy trendů trhu předpovídají budoucí využití také IP sítí v průmyslové komunikaci pro časově kritickou procesní vyměnu dat. IP komunikace má ovšem pouze omezenou podporu v instrumentaci pro průmyslovou automatizace. Tato výzva byla nedávno technicky vyřešena v rámci projektu Virtual Automation Networks (virtuální automatizační sítě - VAN) zapojením mechanismů kvality služeb (QoS), které jsou schopny zajistit měkkou úroveň komunikace v reálném čase. Předložená dizertační práce se zaměřuje na aspekty výkonnosti reálného času z analytického hlediska a nabízí prostředek pro hodnocení využitelnosti IP komunikace pro budoucí průmyslové aplikace. Hlavním cílem této dizertační práce je vytvoření vhodného modelovacího rámce založeného na network calculus, který pomůže provést worst-case výkonnostní analýzu časového chování IP komunikačních sítí a jejich prvků určených pro budoucí použití v průmyslové automatizaci. V práci byla použita empirická analýza pro určení dominantních faktorů ovlivňujících časového chování síťových zařízení a identifikaci parametrů modelů těchto zařízení. Empirická analýza využívá nástroj TestQoS vyvinutý pro tyto účely. Byla navržena drobná rozšíření rámce network calculus, která byla nutná pro modelování časového chování používaných zařízení. Bylo vytvořeno několik typových modelů zařízení jako výsledek klasifikace různých architektur síťových zařízení a empiricky zjištěných dominantních faktorů. U modelovaných zařízení byla využita nová metoda identifikace parametrů. Práce je zakončena validací časových modelů dvou síťových zařízení (přepínače a směrovače) oproti empirickým pozorováním.
155

Analýza a demonstrace vybraných IPv6 útoků / An Analysis of Selected IPv6 Network Attacks

Pivarník, Jozef January 2013 (has links)
This master's thesis analyses and demonstrates selected IPv6 attacks including two Man-in-the-Middle attacks and one Denial of Service attack - Rogue Router Advertisement, Neighbor Cache Poisoning and Duplicate Address Detection DoS, respectively. In the first part the author presents necessary information related to the issue and provides detailed information on how to realize these attacks in practice using publicly available tools. The second part of the thesis presents various ways of mitigating presented attacks, analyses implementations of some of those countermeasures on Cisco and H3C devices and discussess their applicability.
156

Systém pro správu malé podnikové sítě / Monitoring and Control System for Small Company

Holešinský, Jan January 2014 (has links)
The goal of this thesis is to design and to implement the active and passive monitoring and control system for small company with emphasis on the most automated control and deployment in a production network. System is appropriately designed using the Nette framework and scripting language Perl which is suitable for control computer systems and networks.
157

Modelování L2 protokolů zajišťujících bezsmyčkovost / Modelling of L2 Loop-Preventing Protocols

Hrnčiřík, Matej January 2012 (has links)
This thesis informs about currently used technologies, which provide loop protection on data link layer of computer networks. It clarifies issues of Ethernet networks. Chosen protocols are then closely described. There are presented advantages and disadvantages of chosen protocols and they are compared to other technologies. Practical section describes the initial implementation of IS-IS in OMNeT++ environment, which serves as the basic building block of TRILL protocol. An important issue is to verify correctness of implementation.
158

Reactive Networking using Dynamic Link Exchange Protocol

Nilsson, Kim January 2014 (has links)
This master thesis studies the possibilities of using a radio-router protocol in order to increase the quality of service in dynamic tactical network environments. We cover three radio-router protocols with emphasis on Dynamic Link Exchange Protocol (DLEP). Many applications, such as voice and video communication, have bandwidth and latency requirements which need to be fulfilled in order to provide a sufficient level of quality. This poses a problem in tactical network environments where links are typically dynamic and both bandwidth andlatency can vary. A radio-router protocol can alleviate this problem and also improve the routing in a network by allowing routers to take part of link-layer information. By using a radio link emulator (RLE) developed by Saab we are able to simulate dynamic network environments. We have performed two experiments by combining the RLE and an implementation of a subset ofthe DLEP specification draft. Both experiments simulate typical military network scenarios and allow us to analyse the effects of utilizing link-layerfeedback.Our results show that by using DLEP it is possible to provide better quality of service in highly dynamic conditions. We also show that DLEP can influence Optimized Link State Routing (OLSR) by making OLSR aware of changes in the network topology. This leads to a reduced network convergence time with only a small increase in OLSR overhead.
159

Congestion Identification in a Radio Access Transport Network

Montojo Villasanta, Javier, Maqueda Viñas, Manuel January 2014 (has links)
The convergence of mobile services and Internet has brought a radical change in mobile networks. An all IP network architecture, an evolution of the radio access transport network, is required to support new high-bandwidth services. Unfortunately, existing control mechanisms are insufficient to guarantee end users a high quality of experience. However, coordinating radio and transport network resources is expected to yield a more efficient solution. This thesis project investigates the interactions between the congestion avoidance protocols, explicit congestion notification, and the traffic engineering metrics for latency and bandwidth, when using Open Shortest Path First with traffic engineering (OSPF-TE) as a routing protocol. Using knowledge of these interactions, it is possible to identify the appearance of bottlenecks and to control the congestion in the transport links within a radio access transport network. Augmenting a topology map with the network’s current characteristics and reacting to evidence of potential congestion, further actions, such as handovers can be taken to ensure the users experience their expected quality of experience. The proposed method has been validated in a test bed. The results obtained from experiments and measurements in this test bed provide a clear picture of how the traffic flows in the network. Furthermore, the behavior of the network observed in these experiments, in terms of real-time performance and statistical analysis of metrics over a period of time, shows the efficiency of this proposed solution. / Tjänstekonvergensen av Internet- och mobila tjänster har medfört en radikal förändring i mobilnäten. En ”All IP” nätverksarkitektur, en utveckling av radios transportnät. Utvecklingen krävs för att stödja de nya bredbandiga tjänsterna. Tyvärr är befintliga kontrollmekanismer otillräckliga för att garantera användarens kvalitetsupplevelse. Med att samordna radio- och transportnätverkets resurser förväntar man sig en effektivare lösning. Detta examensarbete undersöker samspelet mellan protokoll för att undvika överlast, direkt indikation av överlast och trafikal statistik för fördröjning och bandbredd med trafikstyrning baserat på fördröjning och bandbredd , vid användning av Open Shortest Path First ( OSPF - TE ) som routingprotokoll. Med hjälp av information om dessa interaktioner, är det möjligt att identifiera uppkomsten av flaskhalsar och för att styra trafikstockningar i transportförbindelser inom ett radioaccess transportnät. En utökad topologikarta med nätverkets aktuella egenskaper kommer att reagera på en potentiell överbelastning. Ytterligare åtgärder, till exempel överlämningar, vidtas i mobilnätet för att säkerställa användarens upplevda kvalitet. Den föreslagna metoden har validerats i en testmiljö. Resultaten från experiment och mätningar i denna testmiljö ger en tydlig bild av hur trafikflödena framskrider i nätverket. Beteendet hos nätverket som observeras i dessa experiment, i termer av realtidsprestanda och statistisk analys av mätvärden över en tidsperiod, visar effektiviteten av denna föreslagna lösning.
160

Connectionless Approach: A Localized Scheme To Mobile Ad Hoc Networks

Ho, Yao 01 January 2009 (has links)
According to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for Mobile Ad hoc NETwork (MANET) applications and Wireless Mesh Network (WMN) applications. A MANET is a self-organizing multi-hop wireless network where all nodes participate in the routing and data forwarding process. Such a network can be easily deployed in situations where no base station is available, and a network must be build spontaneously. In applications such as battlefield communications, national crises, disaster recovery, and sensor deployment, a wired network is not available and ad hoc networks provide the only feasible means of communications and information access. Ad hoc networks have also become commonplace for gaming, conferencing, electronic classrooms, and particularly vehicle-to-vehicle communications. A Wireless mash network (WMN) is collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. Their rapid deployment and ease of maintenance are suitable for on-demand network such as disaster recovery, homeland security, convention centers, hard-to-wire buildings and unfriendly terrains. One important problem with MANET is the routing protocol that needs to work well not just with a small network, but also sustain efficiency and scalability as the network gets expanded and the application transmits data in greater volume. In such an environment, mobility, channel error, and congestion are the main causes for packet loss. Due to mobility of mobile hosts, addressing frequent and unpredictable topology changes is fundamental to MANET research. Two general approaches have been considered: connection-oriented approach and connectionless-oriented approach. In the former, the emphasis is on how to reconnect quickly with low overhead when a broken link occurs. Examples of this approach includes includes [5], [9], [10], [16], [26], [28], [29], [34], [44], and [45]. In contrast, connectionless-oriented approach focuses on minimizing the occurrence of broken links. We proposed one such scheme called Connectionless Approach (CLA) and . In CLA, the network area is divided into non-overlapping grid cells, each serving as a virtual router. Any physical router (i.e., mobile host), currently inside a virtual router, can help forward the data packet to the next virtual router along the virtual link. This process is repeated until the packet reaches its final destination. Since a virtual link is based on virtual routers which do not move, it is much more robust than physical links used in the connection-oriented techniques. Simulation results in our previous works and , based on GloMoSim , indicate that CLA performs significantly better than connection-oriented techniques (i.e., AODV, DSR, LAR, GRID, TMNR, and GPSR). The contribution of this work consists of investigating and developing new Connectionless-Oriented Approach for Mobile Ad Hoc Network. Two of the greatest impacts of this research are as follows. First, the new approach is targeted towards robustly support high mobility and large scale environment which has been adapted for vehicle-to-vehicle environment in . Second, the detailed simulations which compare eight representative routing protocols, namely AODV, DSR, LAR, GRID, TMNR, GPSR, CBF, and CLA, under high-mobility environments. As many important emergent applications of the technology involved high-mobility nodes, very little is known about the existing routing methods perform relative to each other in high-mobility environments. The simulation results provide insight into ad hoc routing protocols and offer guidelines for mobile ad hoc network applications. Next, we enhanced and extend the connectionless-oriented approach. The current connectionless-oriented approach, however, may suffer from packet drops since traffic congestion is not considered in the packet forwarding policy. We address this weakness by considering the connectionless-oriented approach with a collision avoidance routing technique. After that, we investigate techniques to enforce collaboration among mobile devices in supporting the virtual router functionality. Many works have been published to combat such problem - misbehaving nodes are detected and a routing algorithm is employed to avoid and penalize misbehaving nodes. These techniques, however, cannot be applied to the connectionless-oriented approach since any node in the general direction towards the destination node can potentially help forward the data packets. To address the security and cooperation issues for connectionless-oriented approach, we introduce a cooperation enforcement technique called 3CE (3-Counter Enforcement). In addition, wireless mesh networks have become increasingly popular in recent years. Wireless mash network (WMNs) are collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. We propose a paradigm that combines virtual routers and mesh nodes to create a hybrid network call VR-Mesh Network. This hybrid network can reduce number of mesh node needed without decrease the performance of the network.

Page generated in 0.0561 seconds