Dissertations / Theses on the topic 'File transfer protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 34 dissertations / theses for your research on the topic 'File transfer protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sezgin, Veliddin Eran. "File transfer with SNR high-speed transport protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA306590.
Full textGilis, Matteus, David Hörnsten, and David Larsson. "Filöverföring i modern tid : En jämförelse av SMTP, SFTP och HTTP." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45684.
Full textTransferring and receiving computer files are something most of us do on a regularbasis whether it is for private purposes or if it is work related. FTP is a protocolused for this very purpose which was launched during a time when personal computerswere growing increasingly popular in both home and workplace environments.Since then, more protocols have been introduced and today there are a number ofoptions available bringing new and common features alike to the market. The SMTPprotocol, extended with the MIME standard, is currently a widely used alternative tothe pure file transfer protocols due to the user familiarity and past experiences withthese mail services. Sending and receiving files through e-mail does however implysome limitations together with the fact that some security aspects need to be takeninto consideration, particularly for company users handling sensitive data. In thisthesis, three different file transfer protocols (SMTP, SFTP and HTTP) have all beenevaluated in account of their user friendliness as well as their security features. Theresults indicate that HTTP(S) combined with the WebDAV extension can be considereda viable alternative for organizations due to its user friendliness and security.The remaining protocols, SMTP and SFTP, also have their uses where SFTP wouldseem to be an appealing option for advanced users and where SMTP remains a passablealternative for private usage by regular users under the right conditions.
Grobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.
Full textRay, Tim. "CCSDS FILE DELIVERY PROTOCOL (CFDP) – WHY IT’S USEFUL AND HOW IT WORKS." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606731.
Full textReliable delivery of data products is often required across space links. For example, a NASA mission will require reliable delivery of images produced by an on-board detector. Many missions have their own (unique) way of accomplishing this, requiring custom software. Many missions also require manual operations (e.g. the telemetry receiver software keeps track of what data is missing, and a person manually inputs the appropriate commands to request retransmissions). The Consultative Committee for Space Data Systems (CCSDS) developed the CCSDS File Delivery Protocol (CFDP) specifically for this situation. CFDP is an international standard communication protocol that provides reliable delivery of data products. It is designed for use across space links. It will work well if run over the widely used CCSDS Telemetry and Telecommand protocols. However, it can be run over any protocol, and will work well as long as the underlying protocol delivers a reasonable portion of the data. The CFDP receiver will autonomously determine what data is missing, and request retransmissions as needed. The CFDP sender will autonomously perform the requested transmissions. When the entire data product is delivered, the CFDP receiver will let the CFDP sender know that the transaction has completed successfully. The result is that custom software becomes standard, and manual operations become autonomous. This paper will consider various ways of achieving reliable file delivery, explain why CFDP is the optimal choice for use over space links, explain how the core protocol works, and give some guidance on how to best utilize CFDP within various mission scenarios. It will also touch on additional features of CFDP, as well as other uses for CFDP (e.g. the loading of on-board memory and tables).
Roskvist, Filip, and Anton Roskvist. "Optimala inställningar för MTU vid filöverföring : En utredning i Linuxmiljö baserad på protokoll och filstorlek." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19708.
Full textThis report concerns the subject of file transfer. The focal point of the report is to study the effect that the MTU has on the speed of file transfers based on the protocol used and the size of the transferred files. During the course of the work, several experiments have been performed in order to determine this, as well as to find which protocol gives the overall best result based on the circumstances of the file transfers. Various file transfer protocols, file distribution protocols, MTUs and file sizes have been tested in order to find what results in the best file transfer speed over an Ethernet based network. The results show that a high MTU has the best performance when transferring large files, while a standard MTU gives better results for transferring very small files.
Ray, Tim. "Using the CCSDS File Delivery Protocol (CFDP) on the Global Precipitation Measurement mission." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605342.
Full textThe Consultative Committee for Space Data Systems (CCSDS) developed the CCSDS File Delivery Protocol (CFDP) to provide reliable delivery of files across space links. Space links are typically intermittent, requiring flexibility on the part of CFDP. Some aspects of that flexibility will be highlighted in this paper, which discusses the planned use of CFDP on the Global Precipitation Measurement (GPM) mission. The operational scenario for GPM involves reliable downlink of science data files at a high datarate (approximately 4 megabits per second) over a space link that is not only intermittent, but also one-way most of the time. This paper will describe how that scenario is easily handled by CFDP, despite the fact that reliable delivery requires a feedback loop.
Pantoleon, Periklis K. "Reliable content delivery using persistent data sessions in a highly mobile environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FPantoleon.pdf.
Full textMascarenhas, da Veiga Alves Manoel Eduardo. "Characterisation of end-to-end performance for web-based file server respositories." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.
Full textNoghani, Babak S. "Reducing latency on the Internet using Component-Based Download and File-Segment Transfer Protocol." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57567.pdf.
Full textSobek, Jiří. "Pokročilý systém umožňující zálohování počítačových dat." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219449.
Full textAllman, Mark. "Improving TCP performance over satellite channels." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.
Full textGoh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Pailom, Chayutra. "API development for persistent data sessions support." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FPailom.pdf.
Full textChung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.
Full textKeywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
Batista, Luís Augusto Pires. "Telejornalismo na Amazônia: o FTP como instrumento de integração regional." Universidade Federal do Amazonas, 2010. http://tede.ufam.edu.br/handle/tede/4508.
Full textApproved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-07-27T15:09:52Z (GMT) No. of bitstreams: 2 Dissertação - Luis A P Batista.pdf: 26709847 bytes, checksum: 825021f874056d390e50bc5fa98b137a (MD5) Capa.pdf: 223609 bytes, checksum: 8831f2d4b1dd1604ea6ed1e33e2a0bf6 (MD5)
Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-07-27T15:17:55Z (GMT) No. of bitstreams: 2 Dissertação - Luis A P Batista.pdf: 26709847 bytes, checksum: 825021f874056d390e50bc5fa98b137a (MD5) Capa.pdf: 223609 bytes, checksum: 8831f2d4b1dd1604ea6ed1e33e2a0bf6 (MD5)
Made available in DSpace on 2015-07-27T15:17:55Z (GMT). No. of bitstreams: 2 Dissertação - Luis A P Batista.pdf: 26709847 bytes, checksum: 825021f874056d390e50bc5fa98b137a (MD5) Capa.pdf: 223609 bytes, checksum: 8831f2d4b1dd1604ea6ed1e33e2a0bf6 (MD5) Previous issue date: 2010-06-01
Não Informada
This thesis is intended to look into the FTP (File Transfer Protocol) system on the News Broadcasting production from stations belonging to Rede Amazônica (TV Amazonas, TV Rondônia, TV Acre, TV Roraima and TV Amapá), at the Central de Jornalismo (journalism Center) located in the capital of the State of Amazonas and its effects on the routine of the community from the municipality of Manacapuru, which has become not only consumer of information, but also its protector. As a theoretical reference underlying Castells’ (1999, 2001, 2003) approaches, with the theory of network society through access to information; Dizard (2000) with the theory of old and new medias, analyzed on a time-space scale, in the context of the Amazon Region; and Milanesi (1978) with a reflection regarding the impact influence of old and new medias on peripheral areas, in regards to the existence of a central area. The research, an exploratory-descriptive case study, comprises communication as a result of a historical process which, in order to meet the society’s constantly changing demands, produces at the same time, through science, new technologies. The applied investigative techniques consist of document research with quantitative and qualitative data collection survey, by using resources such as questionnaires, semistructured interviews, semi-structured and participative observation. Unpublished and standardized data collected in this study aimed at contributing to the successful scientific knowledge production regarding the Amazon reality, as there is an expectation the results may be used as reference to other areas and investigations.
Esta dissertação investiga o efeito do sistema FTP (File Transfer Protocol ou Protocolo de Transferência de Arquivo) no processo de produção do telejornalismo das emissoras da Rede Amazônica (TV Amazonas, TV Rondônia, TV Acre, TV Roraima e TV Amapá), a partir da Central de Jornalismo sediada na capital do estado no Amazonas e seus efeitos no cotidiano da comunidade do município de Manacapuru, que passou a ser não apenas consumidora de informação, mas também produtora dela. Como referencial teórico embasa a reflexão nas abordagens de Castells (1999, 2001, 2003) com a teoria da sociedade em rede por meio do acesso à informação; Dizard (2000) com a teoria das velhas e novas mídias, analisadas, em uma escala tempo-espaço, ao contexto da região amazônica; e Milanesi (1978) com a reflexão acerca da influência do impacto das velhas e novas mídias em áreas periféricas, em relação à existência de uma área central. A pesquisa, um estudo de caso de caráter exploratório-descritivo, compreende a comunicação como resultado de um processo histórico que para atender as demandas da sociedade em constante transformação, produz em paralelo, por meio da ciência, novas tecnologias. As técnicas de investigação empregadas consistem em pesquisa documental com levantamento de dados quantitativos e qualitativos, pautadas no recurso de questionários, entrevistas semi-estruturadas, observação semi-estruturada e participante. Os dados inéditos levantados e sistematizados neste estudo tiveram por objetivo contribuir com o processo de produção do conhecimento científico acerca da realidade amazônica, na expectativa dos resultados virem a servir como referência para outras áreas e investigações.
Rash, James, Keith Hogie, Ed Criscuolo, and Ron Parise. "RANGE AND SPACE NETWORKING - WHAT’S MISSING." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605586.
Full textA large selection of hardware and software components are readily available for supporting Internet communication in the ground network environment. These components can be used to construct very powerful and flexible communication systems. The Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC has been defining and demonstrating ways to use standard Internet technologies for future space communication. Theses concepts and technologies are also applicable to test range telemetry applications. This paper identifies the network equipment and protocols to support end-to-end IP communication from range sensors and spacecraft instruments to end users. After identifying the end-to-end network hardware and software components, the paper discusses which ones are currently available and lists specific examples of each. This includes examples of space missions currently using Internet technology for end-to-end communication. It also lists missing pieces and includes information on their current status. The goal of this paper is also to stimulate thought and discussion on what steps need to be taken to start filling in the remaining missing pieces for end-to-end range and space network connectivity.
Poyraz, Furkan, and Pavel Sakalouski. "Vilken metod kan användas för att bredda IT-system mot nya marknader? : Framtagning av en utvecklingsprocess med tillämpning i en fallstudie." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215168.
Full textWithin each activity, there is always some kind of project planning when you want to do business in a new market. These types of preparation are done in different ways and the challenge for companies is to make use of the right establishment strategy. To succeed in implementing a project, on the respective market that organizations are working on, one of the success factors is to have a clear and thoughtful approach. The company Beta offers cloud-based customs management services, which provide solutions that help other companies handle their customs issues. Beta is established in the Swedish market and wants to try to offer their IT solutions in Norway. The company therefore has a need to investigate how the Norwegian market looks, if there is an opportunity to broaden their existing system solutions and, if so, how they should go about getting a working system that can communicate with the Norwegian customs office. The report proposes a method that can be used as a basis for expanding a business to new markets. The development process presented should also be generalized, serve as a basis, and used by other companies facing the same challenge as Beta. This report also contains an analysis of the Norwegian market. There is a comparison between parts of the Swedish and Norwegian customs system and a presentation of the changes that need to be made based on differences. As a result, the report provides a clear picture of how one might possibly be able to address similar problems. The project members also present a result describing a solution to Beta's problems.
Hachfi, Fakhreddine Mohamed. "Future of asynchronous transfer mode networking." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2639.
Full textWang, Yingzhuo. "PDF shopping system with the lightweight currency protocol." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2820.
Full textHoran, Stephen, and Ru-hai Wang. "COMPARISON OF FILE TRANSFER USING SCPS FP AND TCP/IP FTP OVER A SIMULATED SATELLITE CHANNEL." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/606821.
Full textThe CCSDS SCPS FP file transfer performance is compared with that of TCP/IP FTP in a simulated satellite channel environment. The comparison is made as a function of channel bit error rate and forward/return data rates. From these simulations, we see that both protocols work well when the channel error rate is low (below 10^-6) and the SCPS FP generally performs better when the error rate is higher. We also noticed a strong effect on the SCPS FP throughput as a function of forward transmission rate when running unbalanced channel tests.
Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textTourki, Kamel. "Conception et optimisation de protocoles de coopération pour les communications sans fil." Nice, 2008. http://www.theses.fr/2008NICE4006.
Full textCooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Iannone, Luigi. "Routage cross-layer et gestion de la mobilité dans les réseaux maillés sans fil." Paris 6, 2006. http://www.theses.fr/2006PA066497.
Full textHaloua, Abderrahmane. "Étude d’un protocole de communication asynchrone faible consommation à lien radio impulsionnel ultra-large bande : implémentation sur silicium des fonctions RF critiques." Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0255.
Full textIn recent years, research has been devoted to the study and development of Wireless Sensor Network (WSN). These research are a response to the increase of the connected objet number in the world with development of smartphones and Internet of things (IoT). Energy consumption in sensor networks is one of the most studied areas. In fact, the optimization of the consumption of the elements making up the sensor networks allows a reduction in the costs associated with their installation, operation and maintenance. Communications in sensor networks represent an important part of their power consumption. In order to reduce the consumption of communications in sensor networks, different levels of optimization are possible. In this context, various IM2NP research projects aimed at reducing transceiver consumption through innovative design were carried out. Much of this work has been devoted to Impulsionnal Radio Ultra-Wide Band (IR-UWB). Moreover, MAC protocols used to manage the communication channel access in wireless sensor networks are also important in optimizing their consumption. The research work proposed in this manuscript, based on the work on impulse radios UWB carried out within the IM2NP, propose an optimization of the consumption of sensor networks on two levels. Firstly, an asynchronous MAC protocol based on radio wake-up radio suitable for UWB communications is proposed as well as its energy study. Following the study of the proposed asynchronous protocol, the design of a low power semi-passive wake-up receiver (WuRx) and a UWB sub-GHz impulse generator is presented and their performance in terms of energy efficiency discussed
Gurkas, Aydin Gulsum Zeynep. "IP mobility enhancements for heterogeneous wireless networks." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0006/document.
Full textOver the last decades, with rapid and tremendous growth of IP networks in mobile and wireless environments, mobility management and session continuity has become a more important issue. As the heterogeneity increases in network environments and gradual spread of Internet of Things wave, the integration of different types of wireless networks in the IP layer became a challenging and inevitable research area. One of the most important issues related to mobility management is related to the fact that the application layer suffers from the changing of IP addresses during the movement of the mobile node. It is expected the network layer and above layers to be aware of movement of mobile nodes. New wave in the improvement ideas on this concept is separating the session identification and the location identification. This avoids the applications to suffer when the IP address changes during the mobility. This new approach needs to introduce a new layer in the TCP/IP protocol stack, on top of the IP layer that will handle the new identifiers correspondent with the current IP address or new complete architecture designs which are inheriting locator/identifier separation idea. According to these concepts, Host Identity Protocol (HIP) is one of the dominant and prominent researches that is proposed by IETF and IRTF. This protocol proposes to solve the locator/identifier split problem by also including the security support. In this thesis, predominantly HIP protocol is examined and new mobility enhancements based on this protocol have been designed and introduced
Chen, Jerry. "Non-repudiation secure file transfer protocol (NRSFTP)." Thesis, 2007. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2007-035.
Full textArtback, Jonathan. "Comparison of Video file transmission : over Dat protocol and Hypertext transfer protocol." Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17937.
Full textShiu, Wei-Sheng, and 許維勝. "File Transfer Protocol Base on Visual Secret Sharing and Application." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47190660675748976909.
Full text國立臺灣科技大學
電子工程系
90
With the growth of Internet and network, the time that people stay on the Internet is increasing. The Internet is a public network of millions of computers, all sharing information. On the Internet, communications move back and forth across public lines and through numerous connections. More and more people pay much attention to the process of data transmission. Files Exchange, Letters Delivery, Transaction on Internet is involved with the personal privacy and security. The frequency of hacker invades the network of enterprise raises constantly. The security on the Internet will be doubted. Is the Internet safe? The enterprise stresses more on the Internet security. If the secret inside enterprise is public, it will cause huge damage to enterprise. When you see a beautiful picture or a practical file on the Internet, you must want to download it to your computer. If you have such requirements, you can use FTP this tool. Through the FTP, you can download or upload some useful system tools. In WWW browser also contain this function, but the speed of transmission is slower. After entering the site, username, and password, you can login the remote server. You can download the files on remote machine at will, but is its organization secure? Can you prove the process of login is secure? As with any public lines, interception is possible. The hackers even change your password and use your ID to enter remote system. These questions we will discuss in this thesis. We will adopt a technique of visual secret sharing to implement remote authentication in this thesis. We will discuss the shortcomings of traditional authentication, the theorem of VSSS, the basic algorithm of encryption to be used in this thesis, how to download the pictures of authentication and so on. Lastly, we will transplant the whole VSSS theorem to a remote authentication of files transmission. File transfer software corresponds to the method proposed in this thesis.
Chen, Chih-yi, and 陳致毅. "Design and Implementation of a QoS file transfer protocol over Hadoop distributed file system." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/10307767125626696193.
Full text國立中山大學
資訊工程學系研究所
98
Cloud computing is pervasive in our daily life. For instance, I usually use Google’s GMail to receive e-mail, Google Document to edit documents online and Google Calendar to make my daily schedule. We can say that Google provides a “Platform as a Service (PaaS)”, which delivers a computing platform as a service, and the platform sustaining lots of cloud applications such as I mentioned above. However, the cloud computing platform of Google is private: we cannot trace its source code and make cloud applications on it! Fortunately, there’s an open source project supported by Apache named “Hadoop”, which has a distributed file system which is very like Google File System (GFS) called “Hadoop distributed file system (HDFS)”. In order to observe the properties of HDFS, we design and implement a HDFS-based FTP server system called FTP-ON-HDFS system, say, a FTP server whose storage is HDFS. There are a web-console for FTP administrator, a FreeRADIUS server and a MySQL database for user authentication, a NameNode daemon on its machine, a SecondaryNameNode on its machine and five DataNode daemons and on five different machines in FTP-ON-HDFS system. Our FTP-ON-HDFS system can tune two QoS parameters: “data block size” and “data replication”. Then, we tuned “data block size” and “data replication” in our system and compared its performance with Hadoop File System (FS) shell command and normal vsftpd. On the other hand, FUSE can mount HDFS from remote cluster to local machine, and make use of the permission of the local machine to manage HDFS. So, we compared the performance of FUSE with HDFS (FUSE-DFS) and our FTP-ON-HDFS system.
Huang, Ta-Jen, and 黃大任. "A File Transfer Protocol for a Voronoi-based Overlay Network Virtual Environment." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/64839431818818900599.
Full text淡江大學
資訊工程學系碩士在職專班
94
This thesis propose a file transfer protocol for VON.This protocol is based on the “IP-based Transformation Mechanism from TCP/IP Network to Voronoi-based Overlap Network” and “A Tree-Like Multicast Search Mechanism on a Voronoi-based Overlay Network Virtual Environment” to construct VON virtual environment. This file transfer protocol supports the peer-to-peer file transmission for sharing the resources with each other. We propose a switch mechanism which uses a characteristic of VON for resuming the file transfer,when the file transmitting is interrupted. According to the simulation result of this thesis, it represents the file switching and resuming transfer mechanism can enhance the speed of file transmission.
"Some results on FPGAs, file transfers, and factorizations of graphs." 1998. http://library.cuhk.edu.hk/record=b5889645.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1998.
Includes bibliographical references (leaves 89-93).
Abstract also in Chinese.
Abstract --- p.i
Acknowledgments --- p.v
List of Tables --- p.x
List of Figures --- p.xi
Chapter Chapter 1. --- Introduction --- p.1
Chapter 1.1 --- Graph definitions --- p.2
Chapter 1.2 --- The S box graph --- p.2
Chapter 1.3 --- The file transfer graph --- p.4
Chapter 1.4 --- "(g, f)-factor and (g, f)-factorization" --- p.5
Chapter 1.5 --- Thesis contributions --- p.6
Chapter 1.6 --- Organization of the thesis --- p.7
Chapter Chapter 2. --- On the Optimal Four-way Switch Box Routing Structures of FPGA Greedy Routing Architectures --- p.8
Chapter 2.1 --- Introduction --- p.9
Chapter 2.1.1 --- FPGA model and S box model --- p.9
Chapter 2.1.2 --- FPGA routing --- p.10
Chapter 2.1.3 --- Problem formulation --- p.10
Chapter 2.2 --- Definitions and terminology --- p.12
Chapter 2.2.1 --- General terminology --- p.12
Chapter 2.2.2 --- Graph definitions --- p.15
Chapter 2.2.3 --- The S box graph --- p.15
Chapter 2.3 --- Properties of the S box graph and side-to-side graphs --- p.16
Chapter 2.3.1 --- On the properties of the S box graph --- p.16
Chapter 2.3.2 --- The properties of side-to-side graphs --- p.19
Chapter 2.4 --- Conversion of the four-way FPGA routing problem --- p.23
Chapter 2.4.1 --- Conversion of the S box model --- p.24
Chapter 2.4.2 --- Conversion of the DAAA model --- p.26
Chapter 2.4.3 --- Conversion of the DADA model --- p.27
Chapter 2.4.4 --- Conversion of the DDDA model --- p.28
Chapter 2.5 --- Low bounds of routing switches --- p.28
Chapter 2.5.1 --- The lower bound of the DAAA model --- p.29
Chapter 2.5.2 --- The lower bound of the DADA model --- p.30
Chapter 2.5.3 --- The lower bound of the DDDA model --- p.31
Chapter 2.6 --- Optimal structure of one-side predetermined four-way FPGA routing --- p.32
Chapter 2.7 --- Optimal structures of two-side and three-side predetermined four-way FPGA routing --- p.45
Chapter 2.7.1 --- Optimal structure of two-side predetermined four-way FPGA routing --- p.46
Chapter 2.7.2 --- Optimal structure of three-side predetermined four-way FPGA routing --- p.47
Chapter 2.8 --- Conclusion --- p.49
Appendix --- p.50
Chapter Chapter 3. --- "Application of (0, f)-Factorization on the Scheduling of File Transfers" --- p.53
Chapter 3.1 --- Introduction --- p.53
Chapter 3.1.1 --- "(0,f)-factorization" --- p.54
Chapter 3.1.2 --- File transfer model and its graph --- p.54
Chapter 3.1.3 --- Previous results --- p.56
Chapter 3.1.4 --- Our results and outline of the chapter --- p.56
Chapter 3.2 --- NP-completeness --- p.57
Chapter 3.3 --- Some lemmas --- p.58
Chapter 3.4 --- Bounds of file transfer graphs --- p.59
Chapter 3.5 --- Comparison --- p.62
Chapter 3.6 --- Conclusion --- p.68
Chapter Chapter 4. --- "Decomposition Graphs into (g,f)-Factors" --- p.69
Chapter 4.1 --- Introduction --- p.69
Chapter 4.1.1 --- "(g,f)-factors and (g,f)-factorizations" --- p.69
Chapter 4.1.2 --- Previous work --- p.70
Chapter 4.1.3 --- Our results --- p.72
Chapter 4.2 --- Proof of Theorem 2 --- p.73
Chapter 4.3 --- Proof of Theorem 3 --- p.79
Chapter 4.4 --- Proof of Theorem 4 --- p.80
Chapter 4.5 --- Related previous results --- p.82
Chapter 4.6 --- Conclusion --- p.84
Chapter Chapter 5. --- Conclusion --- p.85
Chapter 5.1 --- About graph-based approaches --- p.85
Chapter 5.2 --- FPGA routing --- p.87
Chapter 5.3 --- The scheduling of file transfer --- p.88
Bibliography --- p.89
Vita --- p.94
Pradeepa, B. K. "Performance Modelling Of TCP-Controlled File Transfers In Wireless LANs, And Applications In AP-STA Association." Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2121.
Full textGrobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Diss., 2001. http://hdl.handle.net/2263/25154.
Full textWu, Chiung-Ta, and 吳炯達. "The Distributed Parallelized File Transfer Protocols." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/11691467984190907964.
Full text朝陽科技大學
網路與通訊研究所
96
File Transfer Protocol (FTP) is a type of Client-Server. It builds a server in Internet that provides files for users downloading. Traditional file transfer protocol uses a single server to supply users for downloading file. Since the performance of file transmission is limited by the throughput of the single server, FTP is not suitable for the large file downloading. Some scholars proposed distribution file transfer method to improve throughput of the FTP. But most distribution file transfer methods do not consider the quality of network transmission. It can’t produce the balanced division of sub-file size according to the actual transfer performance of network. It can’t speed up time of downloading file effectively. This study proposes two distributed and parallelized the file transmission methods. First method is called Modified Parallelized File Transfer Protocol (MFTP). This method removes Parallelized File Transfer Protocol (P-FTP) centralized control of information server. We use client to find optimum efficacy of transmission a mirror server that replaces P-FTP server. The MFTP improves the P-FTP centralized control of transmission efficiency. Second method is called Distributed Parallelized File Transfer Protocol (DFTP). The DFTP method uses actual delay time of transmission between the client and mirror servers that distributes suitable sub-file size. It can achieve the different transmission rate of each mirror servers, and complete transmission file at the same time. Besides, it also improves the download time of large file in the multiple users. In the simulations, we compare the performance of our methods with other scholars’. In the results, we use client itself to find a suitable mirror server. The client can measure actual performance of delay time of transmission between itself and mirror servers. According as these performances, it gets the most suitable sub-file size for each mirror server. Further, DFTP can disperse the overload of downloading files, and obtain the best transmission time to download large file in the multiple users environments.