To see the other types of publications on this topic, follow the link: Computer networks Digital watermarking.

Dissertations / Theses on the topic 'Computer networks Digital watermarking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer networks Digital watermarking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tu, Ronghui. "Semi-fragile digital audio watermarking." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26432.

Full text
Abstract:
The digital information has brought many changes to our life in recent decades. With the rapid growth of digital information, a lot of new techniques are coming into being. Digital watermarking is one of them. This thesis presents a semi-fragile audio watermarking scheme which can be applied to content authentication or copyright verification. The major contribution of this thesis is the introduction and implementation of a unified copyright verification and content authentication algorithm for audio signal. In our approach, we embed the watermark in the discrete wavelet domain of an audio by
APA, Harvard, Vancouver, ISO, and other styles
2

Cai, Libin. "Speech quality evaluation using digital watermarking." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27115.

Full text
Abstract:
Speech quality evaluation is a very important research topic. The Mean Opinion Score (MOS) is reliable but the listening test is very expensive, time consuming, and even impractical for some applications. Objective quality evaluation methods require either the original speech or a complicated computation model, which makes some applications of quality evaluation impossible. Different from the perceptual model used by the Perceptual Evaluation of Speech Quality (PESQ), in this thesis, we propose to use digital audio watermarking to evaluate the quality of speech. Based on quantization, watermar
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Huiping. "Digital image watermarking for ownership verification." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/29018.

Full text
Abstract:
The development of the Internet has greatly contributed to the expanded use of digital media, for example, images, audio, video, VRML objects. These media can be duplicated unlimitedly without any quality loss and can also be easily distributed and tempered. This presents problems of digital media security, such as copyright protection and authentication, which creates a pressing need for digital media protection schemes. A new emerging technology, digital watermarking, protects digital media by embedding a robust signal directly into the media, thus providing a promising way to protect the di
APA, Harvard, Vancouver, ISO, and other styles
4

Yip, Shu Kei. "Digital watermarking and data hiding /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ECED%202006%20YIP.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Richard Yuk Ming. "Digital watermarking and data hiding /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LIR.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abdulaziz, Nidhal Kadhim 1958. "Digital watermarking and data hiding in multimedia." Monash University, Dept. of Electrical and Computer Systems Engineering, 2001. http://arrow.monash.edu.au/hdl/1959.1/8047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Chunlin. "A robust region-adaptive digital image watermarking system." Thesis, Liverpool John Moores University, 2012. http://researchonline.ljmu.ac.uk/6122/.

Full text
Abstract:
Digital image watermarking techniques have drawn the attention of researchers and practitioners as a means of protecting copyright in digital images. The technique involves a subset of information-hiding technologies, which work by embedding information into a host image without perceptually altering the appearance of the host image. Despite progress in digital image watermarking technology, the main objectives of the majority of research in this area remain improvements in the imperceptibility and robustness of the watermark to attacks. Watermark attacks are often deliberately applied to a wa
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Zi Yu. "Digital watermarking methods with robustness and reversibility." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3869193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Gaurav. "Robust digital watermarking of multimedia objects." Phd thesis, Australia : Macquarie University, 2008. http://hdl.handle.net/1959.14/28597.

Full text
Abstract:
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008.<br>Bibliography: p. 144-153.<br>Introduction -- Background -- Overview of watermarking -- Natural language watermarking -- Software watermarking -- Semi-blind and reversible database watermarking -- Blind and reversible database watermarking -- Conclusion and future research -- Bibliography.<br>Digital watermarking has generated significant research and commercial interest in the past decade. The primary factors contributing to this surge are widespread use of the Internet wit
APA, Harvard, Vancouver, ISO, and other styles
10

Balci, Salih Eren. "Robust Watermarking Of Images." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1091917/index.pdf.

Full text
Abstract:
Digital image watermarking has gained a great interest in the last decade among researchers. Having such a great community which provide a continuously growing list of proposed algorithms, it is rapidly finding solutions to its problems. However, still we are far away from being successful. Therefore, more and more people are entering the field to make the watermarking idea useful and reliable for digital world. Of these various watermarking algorithms, some outperform others in terms of basic watermarking requirements like robustness, invisibility, processing cost, etc. In this thesis, we stu
APA, Harvard, Vancouver, ISO, and other styles
11

Curreem, Hanif. "A watermarking protocol for digital contents distribution /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20CURREE.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002.<br>Includes bibliographical references (leaves 65-68). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
12

Löytynoja, M. (Mikko). "Digital rights management of audio distribution in mobile networks." Doctoral thesis, University of Oulu, 2008. http://urn.fi/urn:isbn:9789514289378.

Full text
Abstract:
Abstract Nowadays, content is increasingly in digital form and distributed in the Internet. The ease of making perfect copies of the digital content has created a need to develop a means to protect it. Digital rights management (DRM) relates to systems designed to protect the intellectual property rights of the digital content. The DRM systems try to enable a secure distribution of digital content to the users and to prevent the unauthorized copying, usage, and distribution of the content. This is usually done in practice using encryption and digital watermarking techniques. This thesis conce
APA, Harvard, Vancouver, ISO, and other styles
13

Wong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.

Full text
Abstract:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003.<br>Includes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
14

Yuan, Xiao Chen. "Robust and geometric invariant digital image watermarking." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2182875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chao, Hoi Ka. "Application of digital watermarking technology in Java programs." Thesis, University of Macau, 2005. http://umaclib3.umac.mo/record=b1445900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Fu, Ming Sun. "Data hiding watermarking for halftone images /." View abstract or full-text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20FU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
APA, Harvard, Vancouver, ISO, and other styles
18

Parker, Kristen Michelle. "Watermarking with wavelet transforms." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-11062007-153859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jiang, Jing Jing. "Self-synchronization and LUT based client side digital audio watermarking." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2550676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Brian 1972. "Design and analysis of digital watermarking, information embedding, and data hiding systems." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/31086.

Full text
Abstract:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (p. 139-142).<br>Digital watermarking, information embedding, and data hiding systems embed information, sometimes called a digital watermark, inside a host signal, which is typically an image, audio signal, or video signal. The host signal is not degraded unacceptably in the process, and one can recover the watermark even if the composite host and watermark signal undergo a variety of corruptions and attacks as long as these corruptions do n
APA, Harvard, Vancouver, ISO, and other styles
21

Brannock, Evelyn R. "Using the Discrete Wavelet Transform to Haar'd Code a Blind Digital Watermark." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_diss/35.

Full text
Abstract:
Safeguarding creative content in a digital form has become increasingly difficult. It is progressively easier to copy, modify and redistribute digital media, which causes great declines in business profits. For example, the International Federation of the Phonographic Industry estimates that in 2001 the worldwide sales of pirated music CDs were 475 million US dollars. While a large amount of time and money is committed to creating intellectual property, legal means have not proven to be sufficient for the protection of this property. Digital watermarking is a steganographic technique that has
APA, Harvard, Vancouver, ISO, and other styles
22

Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Seeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dikici, Çağatay Baskurt Atilla. "Informed watermarking and compression of multi-sources." Villeurbanne : Doc'INSA, 2008. http://docinsa.insa-lyon.fr/these/pont.php?id=dikici.

Full text
Abstract:
Thèse doctorat : Informatique : Villeurbanne, INSA : 2007.<br>Thèse rédigée en anglais. Titre provenant de l'écran-titre. Bibliogr. p. 139-147. Publications de l'auteur p. 133-134. Index auteurs.
APA, Harvard, Vancouver, ISO, and other styles
25

Yu, Ping Tate Stephen R. "Direct online/offline digital signatures schemes." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gingold, David. "Integrated digital services for cable networks." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/10650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kailasanathan, Chandrapal. "Securing digital images." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041026.150935/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wu, Haotian. "Information hiding for media authentication and covert communication." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sun, Wei. "Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms Development." Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/2890.

Full text
Abstract:
In digital watermarking, a watermark is embedded into a covertext in such a way that the resulting watermarked signal is robust to certain distortion caused by either standard data processing in a friendly environment or malicious attacks in an unfriendly environment. The watermarked signal can then be used for different purposes ranging from copyright protection, data authentication,fingerprinting, to information hiding. In this thesis, digital watermarking will be investigated from both an information theoretic viewpoint and a numerical computation viewpoint. <br /><br /> From the i
APA, Harvard, Vancouver, ISO, and other styles
30

Igumbor, Osedum Peter. "A proxy approach to protocol interoperability within digital audio networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1004852.

Full text
Abstract:
Digital audio networks are becoming the preferred solution for the interconnection of professional audio devices. Prominent amongst their advantages are: reduced noise interference, signal multiplexing, and a reduction in the number of cables connecting networked devices. In the context of professional audio, digital networks have been used to connect devices including: mixers, effects units, preamplifiers, breakout boxes, computers, monitoring controllers, and synthesizers. Such networks are governed by protocols that define the connection management rocedures, and device synchronization proc
APA, Harvard, Vancouver, ISO, and other styles
31

Finchelstein, Daniel Frederic. "Low-power digital processor for wireless sensor networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34109.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Includes bibliographical references (p. 69-72).<br>In order to make sensor networks cost-effective and practical, the electronic components of a wireless sensor node need to run for months to years on the same battery. This thesis explores the design of a low-power digital processor for these sensor nodes, employing techniques such as hardwired algorithms, lowered supply voltages, clock gating and subsystem shutdown. Prototypes were built on both a FPGA and ASIC platform, in ord
APA, Harvard, Vancouver, ISO, and other styles
32

Sreenan, Cormac John. "Synchronisation services for digital continuous media." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kong, I. Kuan. "Robust and high capacity digital image watermarking with discrete wavelet packet and cosing transform." Thesis, University of Macau, 2008. http://umaclib3.umac.mo/record=b1780397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Jiyuan. "A Localized Geometric-Distortion Resilient Digital Watermarking Scheme Using Two Kinds of Complementary Feature Points." DigitalCommons@USU, 2012. https://digitalcommons.usu.edu/etd/1213.

Full text
Abstract:
With the rapid development of digital multimedia and internet techniques in the last few years, more and more digital images are being distributed to an ever-growing number of people for sharing, studying, or other purposes. Sharing images digitally is fast and cost-efficient thus highly desirable. However, most of those digital products are exposed without any protection. Thus, without authorization, such information can be easily transferred, copied, and tampered with by using digital multimedia editing software. Watermarking is a popular resolution to the strong need of copyright protection
APA, Harvard, Vancouver, ISO, and other styles
35

Bulot, Jean-Paul. "Echo cancellation via neural networks." Thesis, Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/15407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hanson, Anthony. "General Purpose Computing in Gpu - a Watermarking Case Study." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc700078/.

Full text
Abstract:
The purpose of this project is to explore the GPU for general purpose computing. The GPU is a massively parallel computing device that has a high-throughput, exhibits high arithmetic intensity, has a large market presence, and with the increasing computation power being added to it each year through innovations, the GPU is a perfect candidate to complement the CPU in performing computations. The GPU follows the single instruction multiple data (SIMD) model for applying operations on its data. This model allows the GPU to be very useful for assisting the CPU in performing computations on dat
APA, Harvard, Vancouver, ISO, and other styles
37

Salotto, Antony. "The design and implementation of a prototype digital video watermarking scheme with dynamic traitor tracing." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/96068.

Full text
Abstract:
Thesis (MEng)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: We design and implement a prototype digital watermarking scheme that uses spread-transform dither modulation to embed hidden binary message signals into uncompressed digital video signals. The hidden messages are intended to identify the original recipient of a particular copy of a digital video, so that in the event that a pirate copy of that video is found, the recipient can be incriminated as a pirate. We test the ability of the watermark signal to survive various modifications to the watermarked video, including lossy
APA, Harvard, Vancouver, ISO, and other styles
38

Christoffersen, Daniel Arthur 1964. "Internetworking the defense data network with an integrated services digital network." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276716.

Full text
Abstract:
The motivation behind this thesis is to develop a procedure for internetworking the Defense Data Network (DDN) with an Integrated Services Digital Network (ISDN). To accomplish this internetworking problem an integrated gateway must be designed to compensate for incompatibilities between the two networks. This thesis approaches this problem by giving a description of the two networks, DDN and ISDN, and also presenting a general approach to gateway design. This information is then combined into a detailed procedure for implementing a gateway to internetwork the DDN and ISDN. This is followed by
APA, Harvard, Vancouver, ISO, and other styles
39

Samuel, Sindhu. "Digital rights management (DRM) : watermark encoding scheme for JPEG images." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-09122008-182920/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sementilli, Philip Joseph Jr 1958. "Linear feature delineation in digital imagery using neural networks." Thesis, The University of Arizona, 1991. http://hdl.handle.net/10150/278012.

Full text
Abstract:
A goal of many image analysis, image understanding and computer vision problems is the delineation of linear features. This thesis addresses the specific problem of operator guided road delineation in aerial photographs. Our solution to this problem applies the classical pattern recognition paradigm of feature extraction followed by pattern classification. The feature extraction process merges features extracted at different levels of a multi-resolution image pyramid to obtain a dichotomization of image coordinates into classes of road pixels and not road pixels. The road center line is estima
APA, Harvard, Vancouver, ISO, and other styles
41

Årnes, Andre. "Risk, Privacy, and Security in Computer Networks." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1725.

Full text
Abstract:
<p>With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network monitoring, incident management, and digital forensics is of increasing importance with the escalation of cybercrime and other network supported serious crimes. New laws and regulations governing electronic communications, cybercrime, and data retention are being proposed, continuously requiring new methods and tools.</p><p>This thesis introduces a novel approach to real-time network risk assessment based on hidden Markov models to represent the likelihood of transitions between security states
APA, Harvard, Vancouver, ISO, and other styles
42

Berglind, Jonathan. "Temporal Convolutional Networks for Forecasting Patient Volumes in Digital Healthcare." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255009.

Full text
Abstract:
Patient volume forecasting is an important tool for staffing clinicians to meet patient demands. In traditional care, the problem has been studied by multiple authors with inconclusive results. Recent advances in using recurrent and convolutional models in the neighbouring area of sequence modeling have not yet been replicated in the area of patient volume forecasting in traditional healthcare. In the growing area of digital care, only one study has attempted the problem to date.In this study, a Long Short-Term Memory Network (LSTM) and a Temporal Convolutional Network (TCN) were implemented a
APA, Harvard, Vancouver, ISO, and other styles
43

Ge, He. "Flexible Digital Authentication Techniques." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5277/.

Full text
Abstract:
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifically, authentication schemes have been proposed that are well-suited for embedded systems, and privacy-respecting pay Web sites. With embedded systems, a person could own several devices which are capable of communication and interaction, but these devices use embedded processors whose computational capabilities are limited as compared to desktop computers. Examples of this scenario include entertainment devices or appliances owned by a consumer, multiple control and sensor systems in an automobil
APA, Harvard, Vancouver, ISO, and other styles
44

Ligozio, Kevin. "Jini distributed key exchange and file transfer service with digital signatures /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hinojosa, Cristelia. "Organizational Information Dissemination Within Collaborative Networks Using Digital Communication Tools." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/996.

Full text
Abstract:
While knowledge is one of an organization’s greatest assets, it remains a challenge to facilitate knowledge transfer between people within an organization. Social influence has been studied in its role of facilitating information diffusion, which is necessary for knowledge transfer to occur. Among this research, tie strength, a quantifiable characteristic of a social network that determines the link between two nodes, has been measured to determine the impact of social influence on knowledge transfer and information dissemination within a social network. Current research that explores the impa
APA, Harvard, Vancouver, ISO, and other styles
46

Yu, Ping. "Direct Online/Offline Digital Signature Schemes." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9717/.

Full text
Abstract:
Online/offline signature schemes are useful in many situations, and two such scenarios are considered in this dissertation: bursty server authentication and embedded device authentication. In this dissertation, new techniques for online/offline signing are introduced, those are applied in a variety of ways for creating online/offline signature schemes, and five different online/offline signature schemes that are proved secure under a variety of models and assumptions are proposed. Two of the proposed five schemes have the best offline or best online performance of any currently known technique
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Jain-Chung J. "Efficient parallel simulations and their application to communication networks." Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/38564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Saini, J. S. "The design and evaluation of digital macro systems with particular reference to local area networks." Thesis, University of Southampton, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Goshi, Sudheer. "Digital Fabric." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/115.

Full text
Abstract:
Continuing advances with VLSI have enabled engineers to build high performance computer systems to solve complex problems. The real-world problems and tasks like pattern recognition, speech recognition, etc. still remain elusive to the most advanced computer systems today. Many advances in the science of computer design and technology are coming together to enable the creation of the next-generation computing machines to solve real-world problems, which the human brain does with ease. One such engineering advance is the field of neuromorphic engineering, which tries to establish closer links t
APA, Harvard, Vancouver, ISO, and other styles
50

Han, Ki Jun. "A high-speed data/voice integrated campus backbone network: Design and simulation." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184297.

Full text
Abstract:
This dissertation is concerned with the design of a high speed fiber optic campus backbone network which not only provides a high bandwidth connection to various LANs, PBXs, ISDNs, supercomputers, and other high speed computing facilities but also offers an integrated service of voice and data. The campus backbone network is based on an optical fiber dual ring structure. A new token ring protocol based on the IEEE 802.5 standard is proposed as the medium access protocol for the backbone network. In the proposed token ring network, the token holder transmits packets in an exhaustive way when no
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!