• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 9
  • Tagged with
  • 18
  • 18
  • 18
  • 15
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Incentives in Location-Aware Peer-to-Peer Networks : A Game-Theoretical View

Follegg, Audun January 2012 (has links)
Recently the world wide popularity and utilization of Peer-to-peer (P2P) appli- cations, such as BitTorrent, have experienced a tremendous growth. In addition, studies show that its related traffic accounts for a significant portion of the overall Internet traffic volume. Moreover, the inherently distributed design of P2P net- works in combination with arbitrary peer selection have been shown to introduce traffic control problems for Internet Service Providers (ISPs) as well as causing sig- nificant increases in costly inter-ISP traffic. In order to solve the P2P challenges, a variety of location-aware P2P mechanisms have been published and implemented with varying degrees of success. Although the technical aspects of these mechanisms have been studied quite thoroughly, their adaption and success can arguably only be determined by the entities in power, namely ISPs and its P2P traffic generating customers.In this thesis a game-theoretic approach is pursued in order to capture the economical interactions of both ISPs and its users when presented with a decision of adapting location-aware P2P mechanisms. Specifically, a game-theoretic model is developed, encompassing the variety of ISP and consumer aspects from traffic do- main related costs and P2P performance to Internet access pricing. The model perspective is limited to the decision making between one ISP and its users and it is studied in two steps. First an analytical equilibrium analysis is performed in order to develop general expressions regarding incentivizing actions between the ISP and its users. Finally a numerical analysis is performed, using relevant data found in literature and estimates, in order to identify which strategies that could provide incentives for both ISPs and its users to adapt location-aware P2P mechanisms.
12

Economic analysis of QoS differentiation in OPS networks

Leistad, Fredrik Grøndahl January 2012 (has links)
Quality of Service (QoS) differentiation is the differentiated traffic-handling toachieve multiple service classes of varying quality. In addition to providing serviceguarantees necessary for delay-sensitive, real-time applications, service differentiation can provide increased income for network providers due to price differentiation opportunities. Moreover, with advances in technology, previous QoS schemes based on buffered networks cannot be used in newer, bufferless, optical networks.Current and future technologies were studied to facilitate economic analysis ofQoS differentiation in Optical Packet Switched networks. Empirical data fromrelated studies have been adopted to quantify a relationship between objectivemeasurements of network quality and a user’s willingness to pay for that quality.Models that represent network scenarios with and without service differentiationwere discussed to address the viability of implementation. The model developedsuggests pricing for customer classes based on network parameters before and after implementation, cost of deployment, customer willingness to pay, and businessrequirements such as Return on Investment. It was determined that under certaincircumstances, a network provider may improve revenue via service differentiation.
13

Business Cases for realization and deployment of ITS, with focus on Cooperative Services

Valåmo, Line Bomnes January 2012 (has links)
There is an increasingly interest for implementation of Intelligent Transportation Systems around the world, and in some countries it is already successfully deployed and up and running. The reason for the desire for an ITS network is known user and environmental benefits, which in broad terms include safer road usage, efficiency and being environmental friendly.ITS is defined as a set of many advanced applications which aim at providing innovative services relating to different modes of traffic and transport management. In Norway, a technical solution for adapting ITS is already established after years with research and development, but there is a main factor holding back implementation; the question of who is financially responsible and whether it will benefit, or not, the organization that takes the responsibility.This thesis discusses the questions listed above through a cost benefit analysis and business models based on case studies formed by suggested ITS services. In order to generate business models it was necessary with an overview of interrelationships and responsibilities between various roles and stakeholders. Together with roles and stakeholders, user benefits and needs were posted and used in the case study and cost benefit analysis.Further, after addressing necessary terms and conditions, three case studies are suggested, formed by a special ITS service and the geographical area of Trondheim. These case studies include a model and a cost and revenue analysis used as subject to the cost and benefit analysis in the following chapter. In the cost benefit analysis the three different alternatives are compared against each other to find the most beneficial solution. The result from the cost and benefit analysis is in the end used as groundwork for the proposed business model, with elements for a ITS solution's value proposition, infrastructure, customers and finances.
14

An Inter-Domain Key Management Scheme for ZigBee Networks

Tønseth, Ivar January 2010 (has links)
Wireless networks are increasingly penetrating new range of applications, from industry controllers, to houshold appliances. The wireless standard, IEEE 802.15.4/ZigBee, combines simple operation with low power consumption. This type of network is increasingly utilized as a mechanism to monitor, survey, sense and track. This thesis presents a multi-domain device registration and authentication model built on key pre-distribution mechanisms in order to enable nodes from different operational managements to interact. Little research has been done in the area of inter-domain communication in sensor networks. Even so, this may be an important feature to sensor networks which can open up for new services.Two novel suggestions for a multi-domain model are presented; hierarchical inter-domain random pool (HIDRP), and interactive inter-domain random pool (IIDRP). The HIDRP scheme relies on a single global key-pool containing all keys which will be used by sub-domains, thereby acting as the equivalent of a root CA. The IIDRP scheme on the other hand, is based on the assumption of domains containing keys derived separatly without correlation. Devices from foreign domains will accordingly have no common key-material to which key-establishment can successfully be acomplished. Sharing common keying material happens by the exchange of keys between the coordinator nodes in each domain. The nodes will then be able to derive a shared secret key to enable authentication. Since there are no protocols for inter-domain communication in the ZigBee protocol, the first step will be to provide architectural changes that will enable this function. Furthermore, a procedure to share network keys or link-keys for devices in different domains will have to be designed. In the HIDRP scheme, the numerical analysis was performed to evaluate the key connectivity in relation to the size of keys involved in the distribution. The analysis showed that as the global key pool size increased, the link connectivity decreased. Furthermore, no correlation was shown between key connectivity and the size of the local key pool. Only the size of the global key pool and the key ring affected the link connectivity. In the IIDRP scheme, numerical simulation was performed in order to measure the round-trip-time (RTT) for link-key aquisition in a foreign domain. The results showd that as the number of hops increased between the node and the sink, so did the RTT.
15

Forretningspotensialet til Wi-Fi basert løsning for automatisk måleravlesning / The business potential of Wi-Fi based solutions for automatic meter reading

Holla, Morten Lunde January 2011 (has links)
Fokuset for denne oppgaven har vært å innhente informasjon om avansertemåle- og styringssystem (AMS) for å kunne vurdere potensialet for en Wi-Filøsning for AMS. Dette fordi det allerede i dag finnes store og profesjoneltdrevet Wi-Fi nettverk i mange byer som Trondheim. Derfor er det interessantå se om Wi-Fi kan implementeres i AMS nettverkene for å dra nytte ogmuligens få en økonomisk fordel av å bruke disse Wi-Fi nettverkene somkommunikasjonsbærer for AMS. Det ble derfor innsamlet endel kostnads,teknologi og topologi data for målepunktene. Lovverket som gjelder for AMSble også vurdert. Utifra denne informasjonen ble det funnet at Wi-Fi til litengrad er utnyttet på grunn av at mange selskaper ikke har sett på det som enløsning for AMS. Det ble også funnet at det kan være en kostnadsfordel av åutnytte Wi-Fi nettverkene siden Wi-Fi er en billigere kommunikasjonsbæreri forhold til enkelte andre teknologier som blir brukt. Dog på grunn av at detvar vanskelig å innhente informasjon fra nettselskapene så var det vanskeligå trekke noen klar konklusjon. Likevel ble det ikke funnet noen grunn for atWi-Fi ikke skal kunne benyttes.
16

Design av løsning for automatisk måleravlesning av strøm (AMS) / Design of a Solution for Smart Metering

Steinsland, Tor-Erik January 2011 (has links)
Smart metering should be fully deployed before January 1st 2017 in Norway. The smart meters should be able to report consumption on a hourly basis, meaning that the amount of meter data will increase drastically. This raises some challenges with regards to sharing of meter data. The meter data has to be shared with the power producer, and the regulator has also stated that meter data also should be made available to third parties at the consumers wish. Meter data is important financial data and is also considered as sensitive data, and should be shared in a secure and reliable manner.This thesis gives an introduction to the smart metering technology, as well as the power industry in Norway. Further on, it presents some of the ICT solutions used in the industry today, as well as some proposed future solutions. Based on the proposed solutions and comments received from the industry actors, a test system with minimum centralization of business processes using Web Services technology has been developed. A solution based on the existing system, Nubix, is proposed. The system works as a forwarding hub, meaning that it forwards request from power producers and third parties to the grid owners. By using this solution the development costs can be kept low, and the system can easily be extended if more centralization of meter data and business processes is needed.
17

Design av løsning for automatisk måleravlesning av strøm (AMS) basert på Wi-Fi / Design of Solution for Automatic Meter Reading Based on Wi-Fi

Helland, Per-Kristian, Thorrud, Åshild Kaldahl January 2011 (has links)
Avanserte måle- og styringssystemer (AMS) er et begrep brukt om systemene som skal være med på å fornye strømnettet. Automtisk måleravlesing av strøm er en av oppgavene systemene skal utføre, og dette skal gi muligheter for nye tjenester, mer effektiv drift, nøyaktig fakturering med mer. Planen var å lage en løsning for automatisk strømavlesing som bruker Wi-Fi som kommunikasjonsmedium for å vise at dette er praktisk gjennomførbart. Vi har laget en løsning som henter, lagrer og viser informasjon om strømforbruk fra en strømmåler levert av Kamstrup. Kommunikasjonen skjer over internett med bruk av TCP/IP og benytter standarden DLMS/COSEM som applikasjonsprotokoll for uthenting av informasjon. Vi har utviklet en løsning for et datainnsamlingssystem som kan håndtere mange strømmålere, samt en webløsning som prosesserer og viser relevant informasjon til en tenkt kunde. Oppgaven inneholder en grundig gjennomgang av DLMS/COSEM generelt, hvordan kommunikasjonen fungerer, sikkerhetsmekanismene som finnes og eksempler på meldingsutvekslinger. Dessuten har vi vurdert fordeler og ulemper ved ulike alternativer for kommunikasjonsmedier til bruk i AMS.
18

Fulfilling efficiently SLA availability guarantees in backbone networks

Tiwari, Prakriti January 2014 (has links)
The availability and reliability of backbone networks is important tosociety. However, physical, software and unintentional human errorfailures affect the links and nodes in a backbone network. To overcomesuch failures in the network, recovery mechanisms such as Protectionand Restoration are utilized. Additionally, a concept of Service LevelAgreement (SLA) is introduced between the provider and the user whichdefines and guarantees the network availability requirements and penaltyschemes. In this thesis, fulfilling the SLA availability guarantee efficientlyin a backbone network is investigated.This thesis focuses on the problem of handling end-to-end path failureson backbone networks. Some of the popular existing recovery mechanismsto handle such failures are Dedicated Backup Path Protection (DBPP) andPath Restoration (PR). A high percentage of network survivability canbe achieved by DBPP with a reserved backup path for each provisionedconnection. Unfortunately, it is very costly and resource demanding.Whereas, a PR based solution consumes only the needed resources but itis very slow to recover from failure which might effect the SLA availabilityguarantee. The work in this thesis aims at providing a hybrid networkrecovery model that combines the benefits of both DBPP and PR. Thehybrid model switches between DBPP and PR according to the SLAavailability requirement over a contract period and the current networkconnection state (i.e. the remaining time of the SLA and current sum ofdowntimes (accumulated downtime)).Moreover, an analysis in the failure logs of UNINETT’s backbonenetwork is made to model the probability distribution of the accumulateddowntime that uses PR. A distribution fitting is made for modeling theconnection downtime data taken from UNINETT’s backbone networkwhere Weibull distribution proved to be a good approximation. Additionally,a model for distribution of accumulated downtime that usesDBPP for both non-simultaneous and simultaneous failures of the workingpath and backup path is provided. An in-depth explanation of howthese distributions models can be used in the design of hybrid models ispresented.Two hybrid models were approached in this thesis. The first hybridapproach used the DBPP scheme at the beginning of the SLA durationand then it switches to PR when the calculated SLA risk assessmentshows that the probability of violating the SLA requirement is lower attime t. The second hybrid approach used the PR scheme at the beginningof the SLA duration and then it switches to DBPP when the accumulateddowntime at time t reach near to the threshold of the SLA risk targetsuch that the probability of violating the SLA requirement is higher.The transition line which decides the switching between PR and DBPPare computed for each hybrid approach using the results obtained fromthe accumulated downtime distribution model of PR and DBPP. Thetransition line defined in this thesis provides information about when theconnection should switch between Protection and Restoration mechanismby knowing the network connection state. The computed transition lineswith a 1 percent SLA risk target is verified via discrete event simulationin DEMOS. The SLA risk target is the probability of failing the SLA,however the provider can tune the risk target by using an advancednetwork recovery mechanism (e.g Protection) for more or less time. Thesimulation results showed that the proposed hybrid models work well,fulfilling the SLA availability guarantee efficiently with respect to theresource utilization. In addition, the results also revealed that usingthe PR scheme at the beginning of the SLA contract provides threetimes better resource utilization than using the DBPP scheme at thebeginning. Cost analysis for network providers are made with differentSLA risk targets in order to find the optimal SLA risk target for networkproviders. The results from analysis suggested that the total cost fornetwork providers decreases with the increase of SLA risk target untilthe total cost reaches its minimum, then it starts to increase again.The result of this thesis might contribute to future research on developinga hybrid model to reach particular performance objectives incommunication networks.

Page generated in 0.0404 seconds