Dissertations / Theses on the topic 'Computer Networking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer Networking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Alsebae, Alaa. "Network coding for computer networking." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/72647/.
Full textWright, Chantal E. (Chantal Elise). "Information networking networking for distributed semicondutor techology development." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/40205.
Full textIncludes bibliographical references (p. 57-58).
by Chantal E. Wright.
M.Eng.
Lurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Full textYang, Teng. "Connected Car Networking." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1544728665967784.
Full textKamppi, Tomi. "ICT System for Courses in Computer Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53605.
Full textMuhammad, Arshad. "A gateway solution for accessing networking appliances." Thesis, Liverpool John Moores University, 2009. http://researchonline.ljmu.ac.uk/5946/.
Full textTosun, Ali Saman. "Security mechanisms for multimedia networking." Columbus, OH : Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1054700514.
Full textTitle from first page of PDF file. Document formatted into pages; contains xvi, 135 p.: ill. Includes abstract and vita. Co-advisors: Wu-Chi Feng, Dong Xuan, Dept. of Computer ad information Science. Includes bibliographical references (p. 129-135).
Paradis, Thomas. "Software-Defined Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143882.
Full textRen, Zhen. "Towards Confident Body Sensor Networking." W&M ScholarWorks, 2012. https://scholarworks.wm.edu/etd/1539623606.
Full textYi, Qing. "Power-Aware Datacenter Networking and Optimization." PDXScholar, 2017. https://pdxscholar.library.pdx.edu/open_access_etds/3474.
Full textJun, Jangeun. "Networking in Wireless Ad Hoc Networks." NCSU, 2006. http://www.lib.ncsu.edu/theses/available/etd-08172006-150002/.
Full textKarim, Hawkar. "IoT Networking Using MPTCP Protocol." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.
Full textLiu, Wei. "Generic models for performance evaluation of computer networking protocols." Diss., Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/8209.
Full textEljarn, Hatana Hannan. "Computer mediated communication, social networking sites & maintaining relationships." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/computer-mediated-communication-social-networking-sites-and-maintaining-relationships(14a3c8f9-a6a7-4acd-833f-42b4c9b9bc7d).html.
Full textHu, Jie. "Mobile social networking aided content dissemination in heterogeneous networks." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/386988/.
Full textWallach, Deborah A. (Deborah Anne). "High-performance application-specific networking." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10261.
Full textIncludes bibliographical references (p. 107-112).
by Deborah Anne Wallach.
Ph.D.
Voellmy, Andreas Richard. "Programmable and Scalable Software-Defined Networking Controllers." Thesis, Yale University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3580888.
Full textA major recent development in computer networking is the notion of Software-Defined Networking (SDN), which allows a network to customize its behaviors through centralized policies at a conceptually centralized network controller. The SDN architecture replaces closed, vertically-integrated, and fixed-function appliances with general-purpose packet processing devices, programmed through open, vendor-neutral APIs by control software executing on centralized servers. This open design exposes the capabilities of network devices and provides consumers with increased flexibility.
Although several elements of the SDN architecture, notably the OpenFlow standards, have been developed, writing an SDN controller remains highly difficult. Existing programming frameworks require either explicit or restricted declarative specification of flow patterns and provide little support for maintaining consistency between controller and distributed switch state, thereby introducing a major source of complexity in SDN programming.
In this dissertation, we demonstrate that it is feasible to use arguably the simplest possible programming model for centralized SDN policies, in which the programmer specifies the forwarding behavior of a network by defining a packet-processing function as an ordinary algorithm in a general-purpose language. This function, which we call an algorithmic policy, is conceptually executed on every packet in the network and has access to centralized network and policy state. This programming model eliminates the complex and performance-critical task of generating and maintaining sets of rules on individual, distributed switches.
To implement algorithmic policies efficiently, we introduce Maple, an SDN programming framework that can be embedded into any programming language with appropriate support. We have implemented Maple in both Java and Haskell, including an optimizing compiler and runtime system with three novel components. First, Maple's optimizer automatically discovers reusable forwarding decisions from a generic running control program. Specifically, the optimizer observes algorithm execution traces, organizes these traces to develop a partial decision tree for the algorithm, called a trace tree, and incrementally compiles these trace trees into optimized flow tables for distributed switches. Second, Maple introduces state dependency localization and fast repair techniques to efficiently maintain consistency between algorithmic policy and distributed flow tables. Third, Maple includes the McNettle OpenFlow network controller that efficiently executes user-defined OpenFlow event handlers written in Haskell on multicore CPUs, supporting the execution of algorithmic policies that require the central controller to process many packets. Through efficient message processing and enhancements to the Glasgow Haskell Compiler runtime system, McNettle network controllers can scale to handle over 20 million OpenFlow events per second on 40 CPU cores.
Kemper, Marlyn. "Networking: Choosing A Lan Path to Interconnection." NSUWorks, 1986. http://nsuworks.nova.edu/gscis_etd/628.
Full textDruschel, Peter. "Operating system support for high-speed networking." Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186828.
Full textStrong, Cynthia D. "Addressing the gender gap : teaching preadolescent girls computer networking concepts /." Online version of thesis, 2010. http://hdl.handle.net/1850/12239.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.
Full textMarin, Nogueras Gerard. "Federation of Community Networking Testbeds." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177198.
Full textBerndtsson, Andreas. "VPN Mesh in Industrial Networking." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18160.
Full textDenna examensarbetesrapport beskriver den process, samt presenterar de resultat som har insamlats, när tillgängliga VPN-mesh-lösningar- och utrustning har utvärderats för integrering i Industriella system. Uppgiften var uppdelad i ett flertal delmoment, varvid det första bestod i att summera tidigare utfört arbete inom VPN-mesh-området. De efterföljande delmomenten bestod i att utvärdera tillgängliga VPN-mesh-lösningar, verifiera att den utvärderade utrustningen uppfyller de krav som fastställts av ABB samt verifiera att utrustningen har stöd för transparent integrering i system under drift. Resultatet visar att det finns utrustning som uppfyller ABB’s krav, vilken även kan bli transparent integrerade i system under drift. Resultatet visar även att IPSec bör användas som VPN-protokoll eftersom IPSec kan nyttja krypto-hårdvara medan TLS-baserade VPN-lösningar för tillfället saknar denna funktionalitet. Implementeringen av säkra gateways medför autentisering och auktorisering till nätverket, dock är kostnaden att implementera dessa hög. Den bästa lösningen vore att erbjuda de utvärderade produkterna som möjliga tillägg, istället för att göra dem till standardutrustning vid köp av ett industriellt system.
Sibanda, Phathisile. "Connection management applications for high-speed audio networking." Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1006532.
Full textShumard, Sally L. "A Collaborative PDS Project About Computer Networking in Art Education /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487928649988749.
Full textHo, Tracey 1976. "Networking from a network coding perspective." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/87910.
Full textIncludes bibliographical references (p. 143-149).
Network coding generalizes network operation beyond traditional routing, or store-and-forward, approaches, allowing for mathematical operations across data streams within a network. This thesis considers a number of theoretical and practical networking issues from network coding perspectives. We describe a new distributed randomized coding approach to multi-source multicast network scenarios, in which one or more, possibly correlated, sources transmit common information to one or more receivers. This approach substantially widens the scope of applicability of network coding to three new areas. Firstly, we show that it achieves robust network operation in a decentralized fashion, approaching optimal capacity with error probability decreasing exponentially in the length of the codes. Secondly, in the area of network security, we show how to extend this approach to obtain a low-overhead scheme for detecting the presence of faulty or malicious nodes exhibiting Byzantine (arbitrary) behavior. Thirdly, we show that this approach compresses information where necessary in a network, giving error bounds in terms of network parameters. Another area of our work develops an information theoretic framework for network management for recovery from non-ergodic link failures, based on the very general network coding concept of network behavior as a code. This provides a way to quantify essential management information as that needed to switch among di®erent codes (behaviors) for di®erent failure scenarios. We compare two di®erent recovery approaches, and give bounds, many of which are tight, on management requirements for various network connection problems in terms of network parameters.
by Tracey Ho.
Ph.D.
Sturgeon, Thomas. "Exploratory learning for wireless networking." Thesis, University of St Andrews, 2010. http://hdl.handle.net/10023/1702.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.
Full textThe progression of technology is continuous and the technology that drives interpersonal communication is not an exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible. This thesis answers why collaborative environments are important in today's online productivity. In doing so, it gives the reader a comprehensive background in distributed collaborative environments, answers how collaborative environments are employed in the Department of Defense and industry, details the effects network security has on multicast protocols, and compares collaborative solutions with a focus on security. The thesis ends by providing a recommendation for collaborative solutions to be utilized by NPS/DoD type networks. Efficient multicast collaboration, in the framework of security is a secondary focus of this research. As such, it takes security and firewall concerns into consideration while comparing and contrasting both multicast-based and non-multicast-based collaborative solutions.
Al-Malki, Dana Mohammed. "Development of virtual network computing (VNC) environment for networking and enhancing user experience." Thesis, City, University of London, 2006. http://openaccess.city.ac.uk/18319/.
Full textHe, Chunzhi, and 何春志. "Load-balanced switch design and data center networking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/198826.
Full textpublished_or_final_version
Electrical and Electronic Engineering
Doctoral
Doctor of Philosophy
Abdul, Azeez Khan Mohamed Shoaib Khan. "Redefining Insteon home control networking protocol." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1583654.
Full textThe two main purposes of developing a Home Control Networking protocol are to offer indoor lifestyle sophistication and for the security of our residences. There are numerous protocols based on ZigBee, Z-Wave, Wavenis, X10 and Insteon technologies. These technologies do have good indoor lifestyle sophistication features. Insteon provides wide range of products in this aspect and is the latest and improved version. But the existing Insteon protocol is functional in only smaller Power Line Communication networks. There will be demand for the implementation of Insteon home control networking protocol in larger residential areas and in industrial areas due to its steady growth and popularity. Implementing the existing protocol in larger networks is infeasible because of data collision due to flooding. Therefore, there is a need to redefine and expand the protocol, such that the network could accommodate many devices and increase the size of the network. To achieve the same gradient based routing is implemented that helps to choose a particular path to reach a particular end device. This eventually reduces flooding and useful data packets can be saved from collision. After implementation of gradient based protocol, collision has reduced by 56.63%, delay decreased by 65% and throughput increased by 105.6%.
Mahood, Christian. "Data center design & enterprise networking /." Online version of thesis, 2009. http://hdl.handle.net/1850/8699.
Full textHolman, Jason (Jason William) 1974. "Optical networking equipment manufacturing." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/44603.
Full textIncludes bibliographical references (leaf 70).
Celestica, a global contract manufacturer specializing in printed circuit board assembly and computer assembly, has recently begun manufacturing equipment for the optical networking equipment (ONE) industry. The expansion to include ONE manufacturing requires the development of new skills in handling optical fiber and components, a new supply chain strategy, and a new approach to manufacturing systems control. Celestica is developing a set of standards for ONE manufacturing that will support the rapid development of the new skills required for this industry. This work outlines the standards and explores the specific issues related to manufacturing with optical fiber, including the mechanical reliability and optical performance of various types of optical fibers. An overview of the telecommunications industry is provided, including an analysis of its supply chain structure. Observations are made on trends in the industry and the ways that these trends have affected Celestica in the past, and could impact Celestica in the future. Finally, Celestica's current approach to manufacturing systems control is evaluated, and suggestions are made for improving systems control and project management when manufacturing for such a rapidly evolving industry.
by Jason Holman.
S.M.
M.B.A.
Yu, Weikuan. "Enhancing MPI with modern networking mechanisms in cluster interconnects." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1150470374.
Full textCruz-Zendejas, Rogelio. "IslaNet| An isolated and secure approach to implementing computer networking laboratories." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1527541.
Full textThe SIGITE Computing Curricula suggests that a hands-on laboratory component is essential in teaching networking courses. However there are some drawbacks and limitations including high costs of implementation and maintenance, security risks to the campus network, and a limited number of practical guides that feature both design and implementation. Furthermore, with the advancement of other approaches such as virtualization and simulation it has become increasingly difficult to justify funding a hands-on laboratory.
IslaNet is an isolated and secure approach to implementing computer networking laboratories which produce a low-cost model, focused on hands-on implementation. IslaNet uses various components from other approaches to mitigate, or in some cases, completely eliminate the risks and deficiencies that traditional hands-on laboratories introduce. The laboratory objectives are derived from the SIGITE Computing Curriculum to provide a solid, well developed foundation. IslaNet offers concept, design, and implementation using a unique multi-layer approach.
Yulga, James. "Implementation of Microsoft's Virtual PC in networking curriculum." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/JYulgaPartI2006.pdf.
Full textBihari, Jeevan Jyoti. "Software emulation of networking components." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/935942.
Full textDepartment of Computer Science
Chetty, Marshini. "Making infrastructure visible: a case study of home networking." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41152.
Full textMercer, Logan (Logan James McClure). "Deployment of a next generation networking protocol." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106740.
Full textCataloged from PDF version of thesis. "May 2016."
Includes bibliographical references (pages 72-73).
This thesis presents experimental verification of the performance of Group Centric Networking (GCN), a next generation networking protocol developed for robust and scalable communications in lossy networks where users are localized to geographic areas, such as military tactical networks. In previous work, initial simulations in NS3 showed that GCN offers high delivery with low network overhead in the presence of high packet loss and high mobility. We extend this prior work to verify GCN's performance in actual over-the-air experimentation. In the experiments, we deployed GCN on a 90-node Android phone test bed that was distributed across an office building, allowing us to evaluate its performance over-the-air on real-world hardware in a realistic environment. GCN's performance is compared against multiple popular wireless routing protocols, which we also run on our testbed. These tests yield two notable results: (1) the seemingly benign environment of an office is in fact quite lossy, with high packet error rates between users that are geographically close to one another, and (2) that GCN does indeed offer high delivery with low network overhead, which is in contrast to traditional wireless routing schemes that offer either high delivery or low overhead, or sometimes neither.
by Logan Mercer.
M. Eng.
Reblitz-Richardson, Orion Aubrey 1976. "Architecture for biological model and database networking." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86495.
Full textIncludes bibliographical references (leaves 73-75).
by Orion Aubrey Reblitz-Richardson.
S.B.and M.Eng.
Erazo, Miguel A. "Leveraging Symbiotic Relationships for Emulation of Computer Networks." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/827.
Full textMa, Yongsen. "Improving Wifi Sensing And Networking With Channel State Information." W&M ScholarWorks, 2019. https://scholarworks.wm.edu/etd/1593091976.
Full textKandula, Dheeraj. "End-to-end Behavior of Delay Tolerant Networks with Message Ferries." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-02272008-201512/.
Full textTanwir, Savera. "Network Resource Scheduling and Management of Optical Grids." NCSU, 2007. http://www.lib.ncsu.edu/theses/available/etd-05082007-194445/.
Full textMcKinney, Steven. "Insider Threat: User Identification Via Process Profiling." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-05092008-154325/.
Full textJun, Jangeun. "Capacity Estimation of Wireless Mesh Networks." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-11062002-163505/.
Full textIyer, Vijay R. "A Simulation Study of Wavelength Assignment and Reservation Policies with Signaling Delays." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-11072002-192327/.
Full textNguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Full textThe current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
Svantesson, Björn. "Software Defined Networking : Virtual Router Performance." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13417.
Full textBeckler, Kendra K. "Improved caching strategies for publish/subscribe internet networking." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/100334.
Full textCataloged from PDF version of thesis. "September 2014."
Includes bibliographical references (pages 70-73).
The systemic structure of TCP/IP is outdated; a new scheme for data transportation is needed in order to make the internet more adaptive to modern demands of mobility, information-driven demand, ever-increasing quantity of users and data, and performance requirements. While an information centric networking system addresses these issues, one required component for publish subscribe or content-addressed internet networking systems to work properly is an improved caching system. This allows the publish subscribe internet networking to dynamically route packets to mobile users, as an improvement over pure hierarchical or pure distributed caching systems, To this end, I proposed, implemented, and analyzed the workings of a superdomain caching system. The superdomain caching system is a hybrid of hierarchical and dynamic caching systems designed to continue reaping the benefits of the caching system for mobile users (who may move between neighboring domains in the midst of a network transaction) while minimizing the latency inherent in any distributed caching system to improve upon the content-addressed system.
by Kendra K. Beckler.
M. Eng.