• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 244
  • 52
  • 33
  • 18
  • 10
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 452
  • 452
  • 203
  • 175
  • 131
  • 103
  • 95
  • 85
  • 70
  • 63
  • 59
  • 48
  • 48
  • 42
  • 41
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Dynamic allocation of resources using machine learning and quantile regression by harnessing the power of software defined networks

Alutaibi, Ahmed 02 May 2022 (has links)
In the last decade, data networks have shifted from the static deployment of resources to a dynamic approach. With the help of Software Defined Networks (SDN) and Network Function Visualization (NFV), information and data about the network can be collected. Also, deployment and allocation of resources can be delegated to a central controller. In this thesis we investigate the power of SDN and how central management of resources can help produce better and efficient data networks. It begins with an introduction to SDN and its capabilities. The added benefits of SDN over traditional network frameworks and topics that SDN contributed most to. We show the power of collecting data using SDN and how it enables different approaches to accomplish the needed task. This was facilitated by the programmability and the separation of the control and data planes. We tackle the simple task of measuring the delay between two communicating devices in the network. The results show that SDN is capable of providing a rich infrastructure to build future networks. Also, it illustrates that using SDN to measure the delay between devices in the network can give accurate results. The differences between the tested techniques is shown and evaluated. After collecting the data from the network, the next step is getting an insight on that data. Next we used collected network bandwidth data to predict future bandwidth usage. We used various prediction models to establish prediction intervals. We created a state of the art metric that evaluates and compares the performance of each model. We show that the network bandwidth is highly predictable and that dynamic allocation of network bandwidth is attainable. The next logical step is to act upon those insight which is investigated next. We establish the same prediction models investigated but instead of prediction intervals we establish upper quantiles. Prediction is done on data center resources data set. The results show that using quantile prediction can give guarantees on resources usage boundaries which implies a guarantee on service level agreements. Allocating just the needed resources, produce a more efficient data center and in turn cuts a lot of the needed energy. Our estimate show that upto 56% of power can be saved without violating the service level agreement. / Graduate
202

A Kangaroo-Based Intrusion Detection System on Software-Defined Networks

Yazdinejadna, Abbas, Parizi, Reza M., Dehghantanha, Ali, Khan, Mohammad S. 15 January 2021 (has links)
In recent years, a new generation of architecture has emerged in the world of computer networks, known as software-defined networking (SDN), that aims to improve and remove the limitations of traditional networks. Although SDN provides viable benefits, it has faced many security threats and vulnerability-related issues. To solve security issues in the SDN, one of the most vital solutions is employing an intrusion detection system (IDS). Merging IDS into the SDN network remains efficient due to the unique features of SDN, such as high manageability, flexibility, and programmability. In this paper, we propose a new approach as a kangaroo-based intrusion detection system (KIDS), which is an SDN-based architecture for attack detection and malicious behaviors in the data plane. Designing a zone-based architecture in the KIDS assists us in achieving a distributed architecture which is scalable in both area and anomaly detection. In the KIDS architecture, the IDS module supplies the flow-based and packet-based intrusion detection components based on monitoring packet parser and Flow tables of the SDN switches. In the proposed approach, the IDS uses consecutive jumps like a kangaroo for announcing the attacks both to the SDN controller and other IDSs, contributing to improved scalability and efficiency. The evaluation of the proposed approach shows an enhanced performance against that of peer approaches in detecting malicious packets.
203

A framework for economic analysis of network architectures

Karakus, Murat 12 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This thesis firstly surveys and summarizes the state-of-the-art studies from two research areas in Software De fined Networking (SDN) architecture: (i) control plane scalability and (ii) Quality of Service (QoS)-related problems. It also outlines the potential challenges and open problems that need to be addressed further for more scalable SDN control planes and better and complete QoS abilities in SDN networks. The thesis secondly presents a hierarchical SDN design along with an inter-AS QoS-guaranteed routing approach. This design addresses the scalability problems of control plane and privacy concerns of inter-AS QoS routing philosophies in SDN. After exploring the roots of control plane scalability problems in SDN, the thesis then proposes a metric to quantitatively evaluate the control plane scalability in SDN. Later, the thesis presents a general framework for economic analysis of network architectures and designs. To this end, the thesis defines and utilizes two metrics, Unit Service Cost Scalability and Cost-to-Service, to evaluate how SDN architecture performs compared to MPLS architecture in terms of unit cost for a service and cost of introducing a new service along with giving mathematical models to calculate Capital Expenditures (CAPEX) and Operational Expenditures (OPEX) of a network. Moreover, the thesis studies the problem of optimal final pricing for services by proposing an optimal pricing scheme for a service request with QoS in SDN environment while aiming to maximize benefits of both service providers and customers. Finally, the thesis investigates how programmable network architectures, i.e. SDN, affect the network economics compared to traditional network architectures, i.e. MPLS, in case of failures along with exploring the economic impact of failures in different SDN control plane models.
204

Study to improve measurement accuracy and resolution of atmospheric radars / 大気レーダーの測定精度と分解能の向上に関する研究

Gan, Tong 24 November 2015 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(情報学) / 甲第19385号 / 情博第595号 / 新制||情||104(附属図書館) / 32399 / 新制||情||104 / 京都大学大学院情報学研究科通信情報システム専攻 / (主査)教授 山本 衛, 教授 津田 敏隆, 教授 佐藤 亨 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
205

Sparse Aperture Measurement in a Non-Ideal Semi-Anechoic Chamber

Vinci, Joseph J. 30 May 2019 (has links)
No description available.
206

Time Division Duplex (TDD) Multi-User Multiple-Input, Multiple-Output (MU-MIMO) Mobile Ad-Hoc Network(MANET)

Peters, Gavin M. 28 October 2019 (has links)
No description available.
207

Fully adaptive radar for detection and tracking

Christiansen, Jonas Myhre January 2020 (has links)
No description available.
208

A Multi-User Coordination Scheme for LTE Indoor Positioning System

Vemuri, Krishna Karthik January 2020 (has links)
No description available.
209

A Design Choice Guideline for Software-Defined Network Control Plane Architecture using Analytical Hierarchical Process

Anis, Sadia Shahnoor 26 January 2021 (has links)
No description available.
210

The Evolvement of the Wireless Industry Capability for Agile Service Production

Curan, Gustav January 2023 (has links)
Along with the dramatic changes that have happened over the years, from the first-generation (1G) of mobile networks to the current fifth-generation (5G) of mobile networks. A wide range of different technologies has been seen as potential possibilities for changing and improving the 5G networks, whereas Software-defined networking (SDN) has been widely regarded as one of the significant enablers for this possibility. At the same time, it has been seen that lowering cost and increasing speed and coverage is not enough for the emerging market. Instead, higher flexibility and increased revenues are desirable and have been seen coming from being able to manage and make use of programmed mobile networks. This thesis investigates the principles and concepts of merging 5G networks with the SDN technology, in which ways those networks can make use of programming to make them more suitable to manage and use. Lastly, it explores the possibility to demonstrate the identified model with the use case for creating virtual private networks. This was mainly done by evaluating and experimenting with 5G networks and the SDN technology together with available tools. Alongside doing so, it was possible to present several principles and concepts suitable for such a programmed mobile network, where some of which were through the utilization of a programming language and a compiler. In addition, it was also possible to discover a compatible SDN controller that seamlessly could be integrated with the other components providing more efficient network management and enhanced usability. To then present the identified model, an implementation could be made by combining the principles and concepts to illustrate a programmed mobile network. The implementation contained two elements, each resembling a virtual private network, with each network further consisting of several user equipments (UEs). Furthermore, it was possible to control the communication between individual UEs and their respective base stations. Several useful pieces of information have thus been gathered in the same place towards answering those research questions, whereas the identified model has also been demonstrated with the use case for creating virtual private networks.

Page generated in 0.2589 seconds