To see the other types of publications on this topic, follow the link: Information and telecommunications network.

Dissertations / Theses on the topic 'Information and telecommunications network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information and telecommunications network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Morris, Brian. "The network paradigm : considering the development of an information technology and telecommunications industy in Ballarat, Victoria with a network perspective." Thesis, Federation University Australia, 2002. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/165014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Baojiang. "Essays on Telecommunications Management: Understanding Consumer Switch, Search and Purchase Behaviors." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1149.

Full text
Abstract:
Digitization has been pervasively reshaping the landscape of home-based telecommunication industries. The massive disruptive challenges call for telecom companies to react with efficient strategic managerial policies. Meanwhile, how consumer decision makings and welfare are impacted by such policies often remains complicated and non-transparent to policy makers. My thesis aims at leveraging large-scale empirical data to investigate the impacts of several prevalent firm initiated strategies on both sides of the market, i.e. consumers and firms. The thesis is comprised of three studies focusing on consumer switch, search and purchase behaviors. The first study, centering at consumer switching behaviors, investigates the impact of lock in shortening policies on both firm profits and consumer welfare in home-based telecommunication service market. Using household level data from a large telecommunications service provider, we show that a market level policy that shortens the lock-in period from the status quo can decrease the profits on the firms side more than it increases consumer surplus. This is majorly caused by the substantial acquisition costs associated with user switching and service initiation. As a result if regulators shorten lock-in periods but then firms respond by collaboratively increasing prices to recover their rate of return, the consumers, as the analyses indicate, may be worse off compared to the world in which lock-in periods do not change. Therefore lock-in reduction policy need to be paired with a policy precluding operators from increasing prices too much. The later two studies jointly examine consumer’s search and purchase behaviors in social environment. With a wide scope of services, telecommunication service providers can often leverage their knowledge on consumer’s social environment to reshape consumer choices. We aim to understand how consumers combine different sources of social information, one from friends versus one from the crowd, as a function of how close they are to the point of conversion. We developed a dynamic structural econometric model that jointly describes consumer information search and product purchase while taking into account sequential arrival of information and non-negligible search costs. The model is then instantiated on two connected yet distinct empirical contexts, where consumers shop for movies to watch on home screens. The first empirical context (discussed in the second study in this thesis) lies in an observational setting, where we studied individual level clickstream and transactional data from a Video-on- Demand service platform operated by a large telecommunication service provider. Later in the third study, we created an artificial movie market and leveraged a randomized web experiment to further study the research questions with more solid identification support. We find that, in both contexts, consumers seem to start by browsing products they heard about from friends. The popularity signals become more relevant when consumers getting closer to the point of purchase. The results have important managerial implications to online vendors by suggesting a reasonable strategy of providing the most valuable social information at the right time to enhance consumer shopping experiences.
APA, Harvard, Vancouver, ISO, and other styles
3

Hong, Jun, and 洪珺. "Impact of information on wireless network performance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46585989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lefebvre, Thibaut. "Optimization of information flows in telecommunication networks." Thesis, Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1053/document.

Full text
Abstract:
Dans les réseaux de télécommunications, la demande croissante pour de nouveaux services, comme la diffusion de vidéos en continu ou les conférences en ligne, engendre un besoin pour des dispositifs de télécommunication où le même contenu est acheminé depuis un émetteur unique vers un groupe de récepteurs. Cette évolution ouvre la voie au développement de nouvelles techniques d'acheminement des données, comme le multicast qui laisse un nœud du réseau copier ses données d'entrée puis retransmettre ces copies, ou le codage réseau, qui est une technique permettant à un nœud d'effectuer des opérations de codage à partir de ses données d'entrée. Cette thèse traite de la mise en place de techniques de codage au sein d'un réseau multicast filaire. Nous formalisons certains problèmes qui apparaissent naturellement dans ce contexte grâce à la recherche opérationnelle et à des outils d'optimisation mathématique. Notre objectif est de développer des modèles et des algorithmes afin de calculer, au moins de manière approchée, certaines grandeurs qui ont vocation à être pertinentes dans le cadre de la comparaison de techniques d'acheminement de données dans un réseau de télécommunications. Nous évaluons ainsi, d'un point de vue à la fois théorique et expérimental, l'impact induit par l'introduction de techniques de codage au sein d'un réseau multicast. Nous nous concentrons en particulier sur des critères importants pour un opérateur de télécommunication, comme la maximisation du débit d'information entre une source et un ensemble de destinataires dans le réseau, la minimisation de la congestion sous contrainte de demande, ou la minimisation de la perte de débit ou du coût induit par l'acheminement des données dans un réseau soumis à des pannes<br>In telecommunication networks, the increasing demand for new services, like video-streaming or teleconferencing, along with the now common situation where the same content is simultaneously requested by a huge number of users, stress the need for point to many data transmission protocols where one sender wishes to transmit the same data to a set of receivers. This evolution leads to the development of new routing techniques like multicast, where any node of the network can copy its received data and then send these copies, or network coding, which is a technique allowing any node to perform coding operations on its data. This thesis deals with the implementation of coding techniques in a wired multicast network. We formalize some problems naturally arising in this setting by using operations research and mathematical optimization tools. Our objective is to develop models and algorithms which could compute, at least approximately, some quantities whose purpose is to be relevant as far as forwarding data using either multicast and network coding in telecommunications networks is concerned. We hence evaluate, both in theory and numerically, the impact of introducing coding techniques in a multicast network. We specifically investigate relevant criteria, with respect to the field of telecommunications, like the maximum amount of information one can expect to convey from a source to a set of receivers through the network, the minimum congestion one can guarantee while satisfying a given demand, or the minimum loss in throughput or cost induced by a survivable routing in a network prone to failures
APA, Harvard, Vancouver, ISO, and other styles
5

Broman, Rickard. "A Practical Study of Network Coding in Distributed Storage Systems." Thesis, KTH, Kommunikationsteori, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-136360.

Full text
Abstract:
Highly increased data traffic over the last few years has led to a need to improve the networkefficiency. One way to achieve this is by network coding. In this thesis two codes, namelyreplication code and regenerating codes, have been examined. Most other works in this area hasbeen theoretical, so we created a testbed to perform practical tests. Then these practical resultsare compared to the theoretical results with varying finite field size. It will be shown that thepractical studies verify the theoretical work. Furthermore, we observe the probability ofsuccessful repair after several stages of repair. More so, the achievability of exact repair of a failed node in a tandem network has beenexamined. This has been proven possible, and also the required finite field size is presented.Another issue at focus is the number of transfers required to achieve exact repair in such anetwork. The results show that 2*k transfers is required, which is comparable to functionalrepair.
APA, Harvard, Vancouver, ISO, and other styles
6

Lefebvre, Thibaut. "Optimization of information flows in telecommunication networks." Electronic Thesis or Diss., Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1053.

Full text
Abstract:
Dans les réseaux de télécommunications, la demande croissante pour de nouveaux services, comme la diffusion de vidéos en continu ou les conférences en ligne, engendre un besoin pour des dispositifs de télécommunication où le même contenu est acheminé depuis un émetteur unique vers un groupe de récepteurs. Cette évolution ouvre la voie au développement de nouvelles techniques d'acheminement des données, comme le multicast qui laisse un nœud du réseau copier ses données d'entrée puis retransmettre ces copies, ou le codage réseau, qui est une technique permettant à un nœud d'effectuer des opérations de codage à partir de ses données d'entrée. Cette thèse traite de la mise en place de techniques de codage au sein d'un réseau multicast filaire. Nous formalisons certains problèmes qui apparaissent naturellement dans ce contexte grâce à la recherche opérationnelle et à des outils d'optimisation mathématique. Notre objectif est de développer des modèles et des algorithmes afin de calculer, au moins de manière approchée, certaines grandeurs qui ont vocation à être pertinentes dans le cadre de la comparaison de techniques d'acheminement de données dans un réseau de télécommunications. Nous évaluons ainsi, d'un point de vue à la fois théorique et expérimental, l'impact induit par l'introduction de techniques de codage au sein d'un réseau multicast. Nous nous concentrons en particulier sur des critères importants pour un opérateur de télécommunication, comme la maximisation du débit d'information entre une source et un ensemble de destinataires dans le réseau, la minimisation de la congestion sous contrainte de demande, ou la minimisation de la perte de débit ou du coût induit par l'acheminement des données dans un réseau soumis à des pannes<br>In telecommunication networks, the increasing demand for new services, like video-streaming or teleconferencing, along with the now common situation where the same content is simultaneously requested by a huge number of users, stress the need for point to many data transmission protocols where one sender wishes to transmit the same data to a set of receivers. This evolution leads to the development of new routing techniques like multicast, where any node of the network can copy its received data and then send these copies, or network coding, which is a technique allowing any node to perform coding operations on its data. This thesis deals with the implementation of coding techniques in a wired multicast network. We formalize some problems naturally arising in this setting by using operations research and mathematical optimization tools. Our objective is to develop models and algorithms which could compute, at least approximately, some quantities whose purpose is to be relevant as far as forwarding data using either multicast and network coding in telecommunications networks is concerned. We hence evaluate, both in theory and numerically, the impact of introducing coding techniques in a multicast network. We specifically investigate relevant criteria, with respect to the field of telecommunications, like the maximum amount of information one can expect to convey from a source to a set of receivers through the network, the minimum congestion one can guarantee while satisfying a given demand, or the minimum loss in throughput or cost induced by a survivable routing in a network prone to failures
APA, Harvard, Vancouver, ISO, and other styles
7

Rahim, Shafqat. "Evalution of VOD by using MPLS network." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1225.

Full text
Abstract:
My project aims to develop the solution in iptv for Video-on-Demand to provide users with a world of choices - for more channels to view along with the ability to enjoy what they want, when they want, according to their desires and time constraints. This contribution briefly proposes areas that need familiarity and implementation of network technology that brings forward the requirements of the bearer network for the IPTV service VOD.<br>+4917681112914 you can conatct me on this number.
APA, Harvard, Vancouver, ISO, and other styles
8

Nazar, Arbab. "Evaluation of VoIP Codecs over 802.11 Wireless Networks : A Measurement Study." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3650.

Full text
Abstract:
<p>Voice over Internet Protocol (VoIP) has become very popular in recent days andbecome the first choice of small to medium companies for voice and data integration inorder to cut down the cost and use the IT resources in much more efficient way. Anotherpopular technology that is ruling the world after the year 2000 is 802.11 wirelessnetworks. The Organization wants to implement the VoIP on the wireless network. Thewireless medium has different nature and requirement than the 802.3 (Ethernet) andspecial consideration take into account while implementing the VoIP over wirelessnetwork.One of the major differences between 802.11 and 802.3 is the bandwidthavailability. When we implement the VoIP over 802.11, we must use the availablebandwidth is an efficient way that the VoIP application use as less bandwidth as possiblewhile retaining the good voice quality. In our project, we evaluated the differentcompression and decompression (CODEC) schemes over the wireless network for VoIP.To conduct this test we used two computers for comparing and evaluatingperformance between different CODEC. One dedicated system is used as Asterisk server,which is open source PBX software that is ready to use for main stream VoIPimplementation. Our main focus was on the end-to-end delay, jitter and packet loss forVoIP transmission for different CODECs under the different circumstances in thewireless network. The study also analyzed the VoIP codec selection based on the MeanOpinion Score (MOS) delivered by the softphone. In the end, we made a comparisonbetween all the proposed CODECs based on all the results and suggested the one Codecthat performs well in wireless network.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Qiang, Qiang. "Network efficiency/performance measurement with vulnerability and robustness analysis with application to critical infrastructure." Amherst, Mass. : University of Massachusetts Amherst, 2009. http://scholarworks.umass.edu/dissertations/AAI3372272/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McGovern, Susan C. "Information security requirements for a coalition wide area network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397542.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications)) Naval Postgraduate School, June 2001.<br>Thesis advisor(s): Irvine, Cynthia E. "June 2001." Includes bibliographical references (p. 77-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
11

Geng, Yanhui, and 耿彦辉. "A framework to model the relationship between information and network performance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B43223977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Geng, Yanhui. "A framework to model the relationship between information and network performance." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B43223977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yoon, Janghyun. "A network-aware semantics-sensitive image retrieval system." Diss., Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180459/unrestricted/yoon%5fjanghyun%5f200312%5fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Aruchamy, Logabharathi. "Analysis of Radio Access Network Buffer Filling Based on Real Network Data." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6063.

Full text
Abstract:
The 3G and 4G networks have drastically improved availability and quality in data transmission for bandwidth hungry services such as video streaming and location-based services. As 3G networks are very widely deployed, there exists increased capacity requirement and transport channel allocation to simultaneous users under a particular cell. Due to this reason, adequate resources are not available, which in turn degrades both service quality and user experienced quality. This research aims at understanding the characteristics of buffer filling during dedicated channel (DCH) transmission under fixed bit-rate assumptions on a per-user level taking different services into consideration. Furthermore, the resource utilisation in terms of empty buffer durations and user throughput achieved during dedicated channel transmission are also analysed for different data services existing in the mobile networks. The traces are collected from a real network and characteristics of the traffic are analysed prior to understanding its buffer filling in Radio Network Controller (RNC) during downlink data transmission. Furthermore, the buffer is modelled with some series of assumptions on channel bit-rates and simulations are performed taking single user scenario into consideration, for different services with the help of obtained traces as input to the buffer. This research is helpful in understanding the RNC buffer filling for different services, in turn yielding possible understanding on the existing transport channel switching scenario. With the help of analysing the buffer filling for different services and transport channel utilisation, we learn that most of the data services show low DCH utilisation of approximately around 20% and also found to have 80% of the total DCH session duration with empty buffer, causing sub-optimal radio resource utilization.
APA, Harvard, Vancouver, ISO, and other styles
15

Bródka, Piotr. "Key User Extraction Based on Telecommunication Data." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5863.

Full text
Abstract:
The number of systems that collect vast amount of data about users rapidly grow during last few years. Many of these systems contain data not only about people characteristics but also about their relationships with other system users. From this kind of data it is possible to extract a social network that reflects the connections between system’s users. Moreover, the analysis of such social network enables to investigate different characteristics of its users and their linkages. One of the types of examining such network is key users extraction. Key users are these who have the biggest impact on other network users as well as have big influence on network evolution. The obtained knowledge about these users enables to investigate and predict changes within the network. So this knowledge is very important for the people or companies who make a profit from the network like telecommunication company. The second important issue is the ability to extract these users as quick as possible, i.e. developed the algorithm that will be time-effective in large social networks where number of nodes and edges is equal few millions.
APA, Harvard, Vancouver, ISO, and other styles
16

Lee, Yen-Chi. "Error resilient video streaming over lossy networks." Diss., Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180302/unrestricted/lee%5fyen-chi%5f200312%5fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hossain, Firoz, and Abu-Shadat-Mohammad Sohab. "Mathematical Modelling of Call Admission Control in WCDMA Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2933.

Full text
Abstract:
WCDMA is an interference limited multiple access technique .It is widely used in the 3rd generation mobile networks like UMTS. When a new call arrives in the system to get admission, it checks whether the call is admitted or not based on some parameters like signal to interference ratio (SIR), transmission power of the Node B and the air interface load .If the call is accepted this will increase some interference to the ongoing calls. This new interference would degrade the ongoing calls and this will also add some extra load which may also lead to the exceeding capacity. So that the system has to decide this admission policy in a systematic way that all the users should maintain their communication with guaranteed quality of service. This decision making algorithm belongs to the radio resource management functionalities of the Radio Network Controller (RNC) in a WCDMA based UMTS network. This thesis paper focuses on the mathematical representation of the call admission control in an interference based environment. There is also a comparative study with different methods.
APA, Harvard, Vancouver, ISO, and other styles
18

Venigalla, Thejaswi, and Raj Kiran Akkapaka. "Teletraffic Models for Mobile Network Connectivity." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2441.

Full text
Abstract:
We are in an era marked by tremendous global growth in mobile traffic and subscribers due to change in the mobile communication technology from second generation to third and fourth generations. Especially usage of packet-data applications has recorded remarkable growth. The need for mobile communication networks capable of providing an ever increasing spectrum of services calls for efficient techniques for the analysis, monitoring and design of networks. To meet the ever increasing demands of the user and to ensure on reliability and affordability, system models that can capture the characteristics of actual network load and yield acceptable precise predictions of performance in a reasonable amount of time must be developed. This can be achieved using teletraffic models as they capture the behaviour of system through interpret-able functions and parameters. Past years have seen extremely numerous teletraffic models for different purposes. Nevertheless there is no model that provides a proper frame work to analyse the mobile networks. This report attempts to provide a frame work to analyse the mobile traffic and based on the analysis we design teletraffic models that represent the realistic mobile networks and calculate the buffer under-flow probability.<br>Vi är i en tid präglad av enorm global tillväxt inom mobil trafik och abonnenter på grund av förändringar i den mobila kommunikationsteknikenfrån andra generationen till tredje och fjärde led . Särskilt användningen av paketdataapplikationerhar spelat in en anmärkningsvärd tillväxt . Behovet av mobila kommunikationsnät som kan ge en allt större spektrum av tjänster lyser effektiva metoder för analys , övervakning och utformning av nät . För att möta de ständigt ökande kraven på användaren och för att säkerställa den tillförlitlighet och överkomliga priser , måste systemmodeller som kan fånga egenskaper faktiska belastningen på nätet och ger acceptabla precisa förutsägelser om prestanda i en rimlig tid att utvecklas . Detta kan uppnås med användning av teletrafik modeller som de fångar beteendet hos systemet genom tolka bara funktioner och parametrar . Tidigare år har sett väldigt många teletrafik modeller för olika ändamål . Det är likväl inte modellen som ger en ordentlig ramverk för att analysera de mobilnät. Rapporten försöker ge ett ramverk för att analysera mobiltrafik och baserat på analysen vi designar teletrafik modeller som representerar de realistiska mobilnät och beräkna buffertunderflödesannolikhet .
APA, Harvard, Vancouver, ISO, and other styles
19

Peery, Stephen Seth. "Producer Network Effects for Rural Economic Development: An Investigation into the Economic Development Potential of Information Production as a Firm-Level Effect of Broadband Telecommunications in Rural Areas." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/32854.

Full text
Abstract:
Broadband telecommunications infrastructure is considered to be an economic development necessity by a significant number of policymakers and economic development professionals, particularly in rural areas. Across the United States, a considerable amount of money is being invested in the deployment of broadband networks based, at least in part, on the premise that economic development benefits will obtain. However, there is a general lack of academic theory explaining the mechanism(s) by which broadband telecommunications can produce economic development results. The purpose of this study is to investigate the impacts of broadband at the level of the firm. It adopts as its central working hypothesis the â Producer Networkâ concept originally developed at Virginia Tech, which suggests that economic development benefits may result from Internet users having access to multiple megabits-per-second of symmetrical, affordable bandwidth. It employs a qualitative grounded theory methodology to identify firm-level effects of broadband use. The studyâ s findings revealed that a majority of businesses in the case study communities were using much slower Internet connections than had been hypothesized, were using third-party, off-site web hosting, and did not believe they needed â Big Broadband.â Informants to the study believed that the economic development potential of broadband in the short term depended on the ubiquitous deployment of affordable connectivity, and were more concerned with reliability than bandwidth. The study concludes that the â Producer Networkâ is better understood as a long-term goal than as a model to explain the current firm-level applications of the commodity Internet. It suggests that policymakers should consider broadband not as a panacea for economic development, but as a tool whose potential for impact is influenced by a number of economic, political, social, and cultural forces originating at the community, national, and global levels. Based on the literature review and the field research, it proposes a general model for broadband telecommunications in rural economic development.<br>Master of Public and International Affairs
APA, Harvard, Vancouver, ISO, and other styles
20

Mugga, Charles, and Dong Sun. "Performance comparison of multihoming and mobility protocols in IPv6 heterogeneous network environment." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2800.

Full text
Abstract:
Multihoming and mobility protocols enable computing devices to stay always best connected (ABC) to the Internet in the heterogeneous wireless environment. The ABC concept affords users the ability to choose the best available access networks and devices that best suit their needs, at any given point in time. With the emergence of multi-interfaced terminals, a mobile node may connect to different access networks simultaneously through multiple interfaces. This is called multihoming, and it allows a user to enjoy the best access for each application as well as other benefits such as fault tolerance, ubiquitous access and load balancing. Also, while the mobile node is moving from one wireless network to another, mobility management is important in keeping the node’s communication active during handover events. Therefore, the heterogeneous wireless environment requires the associated management of both multihoming and mobility since the mobile hosts are mobile and multihomed at the same time. Consequently, the purpose of our research is to compare the prevailing multihoming and mobility management protocols and corresponding implementations in the IPv6 heterogeneous wireless environment, and to identify the suitable protocol framework that supports both multihoming and mobility. The research started out with the study of the prominent host-based multihoming and mobility management protocols and solutions in IPv6. It then proceeded with a comparative qualitative review of the identified multihoming and mobility protocols according to their mechanisms, modes of operation, benefits and drawbacks. From the qualitative review, we identified suitable protocols that showed better performance for management of mobility and/or multihoming. Moreover, this provided a basis for defining the relevant simulation metrics for our comparative quantitative simulation analysis. The quantitative analysis was carried out using simulations on the OMNeT++ software platform, with the objective of comparing the performance of the studied multihoming and mobility protocols. Simulation scenarios were designed for mobility and multihoming cases, implemented and run using pertinent simulation protocol models of OMNeT++. The performance evaluation was investigated in terms of handover latency and rehoming time for mobility and multihoming protocols respectively. The simulation survey focused on the following protocols:Mobile IPv6 (MIPv6), Multiple Care-of Address (MCoA), Host Identity Protocol (HIP) and Stream Control Transmission Protocol (SCTP). Both the qualitative analysis and the results from the simulation study have shown that HIP has the best performance for mobility and multihoming management. Accordingly, our research has identified HIP as the best suitable framework that supports both multihoming and mobility management in IPv6 heterogeneous network environment. In addition, this project has demonstrated that multihomed nodes with multiple addresses experience less impact on real-time communication in case network failures or mobile movements compared to single-homed nodes.<br>Charles Mugga: +256790506653, Dong Sun: +8615106959570
APA, Harvard, Vancouver, ISO, and other styles
21

Sheriff, Ray E. "The 2010 Electronics and Telecommunications Research Seminar Series: 9th Workshop Proceedings." University of Bradford, 2010. http://hdl.handle.net/10454/4355.

Full text
Abstract:
yes<br>This is the ninth workshop to be organised under the postgraduate programmes in electrical and electronic engineering (EEE). The workshop concludes the Research Seminar Series, which has provided a platform for disseminating the latest research activities in related technologies through its weekly seminars. The EEE courses cover a broad range of technologies and this is reflected in the variety of topics presented during the workshop. In total, forty-four papers have been selected for the proceedings, which have been divided into eight sections. The workshop aims to be as close to a `real¿ event as possible. Hence, authors have responded to a Call for Papers with an abstract, prior to the submission of the final paper. This has been a novel experience for many, if not all of the contributors. As usual, authors have taken up the challenge with enthusiasm, resulting in a collection of papers that reflects today¿s research challenges.<br>School of Engineering, Design and Technology
APA, Harvard, Vancouver, ISO, and other styles
22

Di, Vincenzo Marco. "Progettazione e sviluppo di algoritmi di "Network clustering" e di analitiche avanzate in ambito telecomunicazioni." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
Dalla naturale competitività del mercato, emerge il bisogno di utilizzare al meglio i dati in proprio possesso in modo da creare guadagno. In quest'ambito si collocano le tecniche di advanced analytics, che mirano ad effettuare complesse analisi su grandi moli di dati in modo da trarre profitto. In questa tesi, sono stati sviluppati due progetti di advanced analytics in collaborazione con ICONSULTING SpA. Il primo, più classico, riguarda l'analisi del comportamento dei partecipanti a un certo evento del 2018, analizzandone il numero, distribuzione delle presenze orarie, provenienze, mezzi di arrivo e ripartenza e zone più frequenti di pernottamento. Il secondo progetto, invece, è stato uno studio di fattibilità circa la possibilità di ottenere partizioni territoriali mediante l'applicazione di algoritmi di network clustering a reti ottenute modellando gli spostamenti degli utenti sul territorio. Entrambi i progetti sono stati svolti in collaborazione con una importante compagnia di telecomunicazioni molto diffusa sul territorio. Per proteggerne la proprietà intellettuale, nel lavoro presentato si sono offuscati tutti i dati e le informazioni sensibili
APA, Harvard, Vancouver, ISO, and other styles
23

Khan, Farhan, and Muhammad Umer Khan and Noman Ellahi. "Ad Hoc Network Nodes Scheduling using DS and FH CDMA." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4784.

Full text
Abstract:
Nowadays most communication networks like GSM, WLan or WiMAX are based on pre-existing infrastructure. These infrastructures are complicated, costly and difficult to deploy in very short time. Whereas Wireless Ad Hoc Networks are infrastructure-free self organizing networks which consist of co-operating nodes. These networks are highly desirable for various emerging applications for military and to extend the range and capacity of infrastructure based wireless networks. One critical issue that we face in Ad Hoc Network is the problem of scheduling. Scheduling algorithms in an Ad Hoc Network allows the nodes to share the wireless channel efficiently. But on the other hand, the scheduling algorithm needs to be easily implementable in a distributed fashion with little, if any, coordination between nodes in the network. Spread spectrum technologies allow interference averaging and therefore are employed in Ad Hoc networks. There are two major types of spread spectrum physical layer, which are frequency hopping (FH) spread spectrum and direct sequence (DS) spread spectrum. FH-CDMA divides the bandwidth into M sub channels, the receiver only sees the interference from the transmitter side which is on the same sub channel whereas in DS-CDMA we increase the spreading code M to decrease the signal to interference plus noise ratio (SINR) requirement. The purpose of research is to study a hybrid spread spectrum based on physical layer, in which the direct sequence signal is also frequency hoped. The DS will reduce the region of dominating interferes, while frequency hopping will be used within this region intelligently and allow the dominating interferes to transmit on different frequencies. First the system bounds on the transmission capacity of the proposed scheme is evaluated, and than a comparative analysis of different multiple access schemes is done with our proposed model with respect to their transmission capacity to evaluate its performance.
APA, Harvard, Vancouver, ISO, and other styles
24

Perednikas, Erdvinas. "Telekomunikacijų tinklo informacijos sistema." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060110_110232-62275.

Full text
Abstract:
In a dynamic, high-growth, highly competitive service environment, a service provider's ability to meet increasing demands for efficiency of network resource allocation, productivity and reliability when provisioning services for customers depends on having up-to-date network inventory information available. An accurate resource inventory management system allows a service provider to improve the control and understanding of its communications infrastructure, expedite the management of customer orders and automate the provisioning of services. The basic goal and final result of presented work is the information system developed for the purposes of network inventory management and accounting tasks which is capable to meet the requirements of “Lietuvos Telekomas”. Presented work covers: · analysis and specification of requirements of “Lietuvos Telekomas” for information system being developed; · analysis and evaluation of some generic conceptual cooperative work models for the purpose to make right decision on data model of IS; · analysis of basic telecommunication services, definition of data structures for the services that are to be modelled; · analysis and specification of those business processes of “Lietuvos Telekomas” that directly involve use of network resources; · analysis of generic functional architecture of transport networks, described in ITU-T recommendation G.805; · introduce of simplified (Black box) transport network model based on physical view to the... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
25

Ali, Muhammad Usman. "Cloud Computing as a Tool to Secure and Manage Information Flow in Swedish Armed Forces Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6139.

Full text
Abstract:
In the last few years cloud computing has created much hype in the IT world. It has provided new strategies to cut down costs and provide better utilization of resources. Apart from all drawbacks, the cloud infrastructure has been long discussed for its vulnerabilities and security issues. There is a long list of service providers and clients, who have implemented different service structures using cloud infrastructure. Despite of all these efforts many organizations especially with higher security concerns have doubts about the data privacy or theft protection in cloud. This thesis aims to encourage Swedish Armed Forces (SWAF) networks to move to cloud infrastructures as this is the technology that will make a huge difference and revolutionize the service delivery models in the IT world. Organizations avoiding it would lag behind but at the same time organizations should consider to adapt a cloud strategy most reliable and compatible with their requirements. This document provides an insight on different technologies and tools implemented specifically for monitoring and security in cloud. Much emphasize is given on virtualization technology because cloud computing highly relies on it. Amazon EC2 cloud is analyzed from security point of view. An intensive survey has also been conducted to understand the market trends and people’s perception about cloud implementation, security threats, cost savings and reliability of different services provided.
APA, Harvard, Vancouver, ISO, and other styles
26

Deputy, Carl William. "Design of telecommunication network for geographic information systems for the Appalachian Council of Governments : a case study /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA273192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Al-Regib, Ghassan. "Delay-constrained 3-D graphics streaming over lossy networks." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/15428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Narasimha, Rajesh. "Application of Information Theory and Learning to Network and Biological Tomography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19889.

Full text
Abstract:
Studying the internal characteristics of a network using measurements obtained from endhosts is known as network tomography. The foremost challenge in measurement-based approaches is the large size of a network, where only a subset of measurements can be obtained because of the inaccessibility of the entire network. As the network becomes larger, a question arises as to how rapidly the monitoring resources (number of measurements or number of samples) must grow to obtain a desired monitoring accuracy. Our work studies the scalability of the measurements with respect to the size of the network. We investigate the issues of scalability and performance evaluation in IP networks, specifically focusing on fault and congestion diagnosis. We formulate network monitoring as a machine learning problem using probabilistic graphical models that infer network states using path-based measurements. We consider the theoretical and practical management resources needed to reliably diagnose congested/faulty network elements and provide fundamental limits on the relationships between the number of probe packets, the size of the network, and the ability to accurately diagnose such network elements. We derive lower bounds on the average number of probes per edge using the variational inference technique proposed in the context of graphical models under noisy probe measurements, and then propose an entropy lower (EL) bound by drawing similarities between the coding problem over a binary symmetric channel and the diagnosis problem. Our investigation is supported by simulation results. For the congestion diagnosis case, we propose a solution based on decoding linear error control codes on a binary symmetric channel for various probing experiments. To identify the congested nodes, we construct a graphical model, and infer congestion using the belief propagation algorithm. In the second part of the work, we focus on the development of methods to automatically analyze the information contained in electron tomograms, which is a major challenge since tomograms are extremely noisy. Advances in automated data acquisition in electron tomography have led to an explosion in the amount of data that can be obtained about the spatial architecture of a variety of biologically and medically relevant objects with sizes in the range of 10-1000 nm A fundamental step in the statistical inference of large amounts of data is to segment relevant 3D features in cellular tomograms. Procedures for segmentation must work robustly and rapidly in spite of the low signal-to-noise ratios inherent in biological electron microscopy. This work evaluates various denoising techniques and then extracts relevant features of biological interest in tomograms of HIV-1 in infected human macrophages and Bdellovibrio bacterial tomograms recorded at room and cryogenic temperatures. Our approach represents an important step in automating the efficient extraction of useful information from large datasets in biological tomography and in speeding up the process of reducing gigabyte-sized tomograms to relevant byte-sized data. Next, we investigate automatic techniques for segmentation and quantitative analysis of mitochondria in MNT-1 cells imaged using ion-abrasion scanning electron microscope, and tomograms of Liposomal Doxorubicin formulations (Doxil), an anticancer nanodrug, imaged at cryogenic temperatures. A machine learning approach is formulated that exploits texture features, and joint image block-wise classification and segmentation is performed by histogram matching using a nearest neighbor classifier and chi-squared statistic as a distance measure.
APA, Harvard, Vancouver, ISO, and other styles
29

Hobring, Linus, and Philip Söderberg. "A sensor network for the Internet of Things Integrated with a bidirectional backend." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2702.

Full text
Abstract:
Internet of Things is rapidly evolving. This thesis includes a study of single-board computers suitable for machine-to-machine communication together with the developing process of a sensor network integrated with a bidirectional communication platform. Raspberry Pi was selected as the single-board computer used in the proposed system. The Message Queuing Telemetry Transport protocol was selected as main communication protocol to handle all exchange of information between the network and the bidirectional communication platform. It was selected because of its reliability, low bandwidth and publish/subscribe architecture. Decision-making procedures were implemented to work with both local sensor data and data from different Message Queuing Telemetry Transport streams, such as GPS data, used to calculate the distance between the user’s smart phone and the office to prepare the workstation, temperature sensors and ambient light sensors controlling Philips HUE light bulbs. The finished sensor network was design to work within office environments to prepare workstations and monitor the work climate. The number of sensors connected to the single-board computer has a major impact in the CPU usage. Measurements and calculations show that 17 connected physical sensors will cause a CPU usage of 96%.
APA, Harvard, Vancouver, ISO, and other styles
30

Shyirambere, Aimee S. "A Reliability and Survivability Analysis of US Local Telecommunication Switches that Experience Frequent Outages." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1365724373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Torkaman, Hossein. "Emulation of IP Core Network for Testing of the Serving GRPS Support Node (SGSN) Routing Application." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3726.

Full text
Abstract:
<p>This thesis aims to investigate a method and tool for emulation of the General Packet Radio Service (GPRS) core network needed as an environment to test the routing functionality. GPRS is the most widely adopted mobile packet data delivery technology in the world. It utilizes an Intranet Protocol (IP)-based core network and involves significant changes to the way the Global System for Mobile communications (GSM) air interface is structured. It also forms the basis of the future structure of mobile network transmission and switching.</p><p>The Serving GPRS Support Node (SGSN) is the most fundamental node in GPRS. Ericsson produces and manages an increasing number of SGSN nodes in the world. One of main functionalities of SGSN node is to forward IP packets according to the destination address in the IP header on IP core network.</p><p>In each new release of SGSN, or when implementation or upgrades have been done on routing application on SGSN, design and test engineers at Ericsson need to emulate the IP core network. This must be done with use of many routers to generate huge amounts of data that can simulate the real world IP core network.</p><p>The major goal of this thesis was to analyze and verifying the use of a suitable and economical solution to emulating IP Core Network of the GPRS system for testing of different functionality of the routing application running in SGSN , instead of building up a physical Core Network with different infrastructure and many routers.</p><p>The method chosen for emulating the IP core network with many routers, and investigated in the thesis, is based on a Cisco simulator called “Dynamips”, which runs many actual Cisco Internetwork Operating Systems (IOS) with many different models of Cisco products in a virtual environment on Windows or Linux platforms. With this simulator, engineers at Ericsson will be able to use this simulator to emulate IP core network easily and efficiently to accomplish system test cases.</p><p>A conclusion of this work is that Dynamips could be used to emulate many complicated IP core network scenarios, with many routers to generate huge amounts of data to simulate the real world IP core network. The emulated system fulfils its purpose for testing of the routing application of SGSN regarding different functionality and characteristics. This is done to ensure and verify that SGSN routing application meets its functional and technical requirements, and also helps to find undiscovered errors as well as helps to ensure that the individual components of routing application on SGSN are working correctly.</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mondal, Sharup Barua &amp Ratan Chandra. "Impact of Node Mobility on the Voice Quality in Mobile Ad-hoc Network (MANET)." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4156.

Full text
Abstract:
Enormous developing electronic technology has brought telecommunication to the sky inspiring popularity. Wireless Network (WN) technology will be emerging so far human. Presently users give the impression loving be connected all the time (everywhere) to the network or Internet through diverse access system, e.g., Universal Mobile Telecommunications System, Mobile Ad-hoc Network (MANET) [9] and Worldwide Interoperability for Microwave Access [30]. In telecommunication; MANET is considered as self-configured unlike nodes creating infrastructure-less network connected by means of WN, as nodes can exchange data packets without a central control [18]. Choosing beyond line of sight (BLOS) communication, MANET can be an intelligent selection, which is flexible for using and cost saving. However, to maintain quality of service (QoS), more or less challenges still have to be resolved [18]. Multimedia as well as VoIP (Voice over Internet Protocol) gaining more popularity as the internet world favored by the huge use of WN (access technologies) [20]. To maintain persistent services in different MANET situation unlike routing protocols (RP) are employed. In this thesis known (MANET) routing protocols OLSR (Optimized Link State Routing) [20], DSR (Dynamic Source Routing) [30] and TORA (Temporally Ordered Routing Algorithm) [14] have been considered for voice traffic as they maintaining dissimilar characteristics in the dissimilar situations as WN factors (like; bandwidth, signal strength, network traffic or load, network size) influencing the voice quality [9]. This thesis work focusing on the impact of node mobility influencing voice quality in unlike RPs in MANET. To decide the best suit RP in the MANET, the OPNET (Optimized Network Engineering Tool) Simulator 16.0 has been brought into play. OLSR is proposed to be best fitting RP for MANETs running VoIP appliance.<br>Enorma utveckla elektroniska tekniken har fört telekommunikation till himlen inspirerande popularitet. Trådlöst nätverk (WN) teknik kommer att utvecklas så långt mänsklig. För närvarande användare ger intryck kärleksfulla vara ansluten hela tiden (överallt) till nätverket eller Internet via olika system för tillträde, till exempel, Universal Mobile Telecommunications System, Mobil Ad-hoc-nätverk (Manet) [9] och Worldwide Interoperability för Microwave Access-[30 ]. I telekommunikation, är Manet betraktas som själv-konfigurerade skillnad noder skapa infrastruktur mindre nätverk som är anslutet via WN, som noder kan utbyta datapaket utan central styrning [18]. Välja bortom synfältet (Blos) kommunikation, kan Manet vara ett intelligent val, som är flexibel för att använda och kostnadsbesparande. Men för att upprätthålla service (QoS), mer eller mindre problem återstår att lösas [18]. Multimedia samt VoIP (Voice over Internet Protocol) allt mer populärt eftersom internet världen gynnas av den enorma användningen av WN (accesstekniker) [20]. För att behålla ihållande tjänster i olika Manet situationen skillnad routing protokoll (RP) är anställda. I denna kända avhandling (Manet) routingprotokoll OLSR (Optimerad Routing Link State) [20], DSR (Dynamic Source Routing) [30] och Tora (Tidsmässigt ordnad routing algoritm) har [14] ansetts för taltrafik som de upprätthålla olika egenskaper i olika situationer som WN faktorer (som, bandbredd, signalstyrka, nätverkstrafik eller last, nätverkets storlek) Att påverka ljudkvaliteten [9]. Detta examensarbete fokuserar på effekterna av nod rörlighet påverka röstkvalitet i motsats till RPS i Manet. För att avgöra det bäst passar RP i Manet, den OPNET (Optimerad Network Engineering Tool) Simulator 16,0 har kommit in i bilden. OLSR föreslås bli bäst passar RP för MANETs köra VoIP-apparaten.<br>Bergvägen 18 5tr 196 31 Kungsängen Sweden Mob: 0046(0)737106987
APA, Harvard, Vancouver, ISO, and other styles
34

Elkotob, Muslim. "Efficient and systematic network resource management." Doctoral thesis, Luleå tekniska universitet, Datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17190.

Full text
Abstract:
The demand for network resources (e.g. forwarding capacity, buffer space) by increasingly used real-time multimedia applications is growing. Moreover, their stringent performance requirements (e.g. delay and jitter bounds) pose challenges on network resource management (RM). RM determines how available resources are modeled and distributed to achieve a performance goal such as assuring forwarding quality to real-time multimedia applications. Improvements to existing RM mechanisms can avoid performance limitations of networks by facilitating more efficient use of scarce resources. For example, in a vehicular to infrastructure (V2I) communication scenario that uses IP Multimedia Subsystem (IMS) lacking RM support for multicast, the 3G downlink quickly becomes a bottleneck although some information is addressed to multiple receivers. The main goal of this thesis is to develop RM algorithms and protocols that improve forwarding capacity utilization and remove performance bottlenecks. An additional goal is to improve the scalability of existing RM mechanisms. Three architectural paradigms are covered to demonstrate the advantages of efficient and systematic network RM: open access networks (OAN), next generation networks (NGN), and heterogeneous access networks (HAN). For OAN, a cross-layer signaling technique called parameter injection was developed. It reduces the signaling overhead and update time for real-time multimedia sessions over Wi-Fi while autonomously selecting the format and CODEC that best match the current resource settings. Within NGN, a resource management protocol is proposed for extending unicast signaling in IMS with multicast capabilities. The contribution uses adaptive and dynamic group size selection to improve resource utilization on the 3G downlink for the signaling and data planes. For HAN, an algorithm is proposed that predicts the best access network for achieving the highest QoE of a real-time multimedia session with the available QoS resources based on regression and statistical learning. In all three paradigms, the provided core contributions serve the common goal of achieving a performance edge in terms of efficiency and systematic operation with a limited amount of network resources.<br><p>Godkänd; 2011; 20110207 (ysko); DISPUTATION Nedanstående person kommer att disputera för avläggande av teknologie doktorsexamen. Namn: Muslim Elkotob Ämnesområde: Mobila system/Mobile Systems Avhandling: Efficient and Systematic Network Resource Management Opponent: Professor Anna Brunström, Institutionen för datavetenskap, Karlstads universitet Ordförande: Docent Christer Åhlund, Institutionen för system- och rymdteknik, Luleå tekniska universitet Tid: Fredag den 18 mars 2011, kl 10.00 Plats: A1514, Luleå tekniska universitet</p>
APA, Harvard, Vancouver, ISO, and other styles
35

Myrberger, Axel, and Essen Benjamin Von. "Classifying True and Fake Telecommunication Signals With Deep Learning." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-297675.

Full text
Abstract:
This project aimed to classified artificiality gener-ated,fake, and authentic,true, telecommunication signals, basedupon their frequency response, using methods from deep learn-ing. Another goal was to accomplish this with the least amountof dimension of data possible. The datasets used contained of anequal amount of measured, provided by Ericsson, and generated,by a WINNER II implementation in Matlab, frequency responses.It was determined that a normalized version of the absolute valueof the complex frequency response was enough information for afeedforward network to do a sufficient classification. To improvethe accuracy of the network we did a hyperparameter search,which allowed us to reach an accuracy of 90 percent on our testdataset. The results show that it is possible for neural networksto differentiate between true and fake telecommunication signalsbased on their frequency response, even if it is hard for a humanto tell the difference.<br>Målet med det här projektet var att klassificera artificiellt genererade signaler, falska, och riktiga, sanna, telekommunikation signaler med hjälp av signalernas frekvens- svar med djup inlärningsmetoder, deep learning. Ett annat mål med projektet var att klassificera signalerna med minsta möjliga antalet dimensioner av datan. Datasetet som användes bestod av till hälften av uppmät data som Ericsson har tillhandahållit, och till hälften av generad data ifrån en WINNER II modell implementerad i Matlab. En slutsats som kunde dras är att en normaliserad version av beloppet av det komplexa frekvenssvaret innehöll tillräckligt med information för att träna ett feedforward nätverk till att uppnå en hög klassificeringssäkerhet. För att vidare öka tillförlitligheten av nätverket gjordes en hyperparametersökning, detta ökade tillförligheten till 90 procent för testdataseten. Resultaten visar att det är möjligt för neurala nätverk att skilja mellan sanna och falska telekommunikations- signaler baserat på deras frekvenssvar, även om det är svårt för människor att skilja signalerna åt.<br>Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
APA, Harvard, Vancouver, ISO, and other styles
36

Buckutė, Dalia. "Telekomunikacijų tinklais perduodamos informacijos kontrolė baudžiamajame procese: teoriniai ir praktiniai aspektai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2007. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2007~D_20070103_191718-45886.

Full text
Abstract:
Lietuvos valstybei atgavus nepriklausomybę, keitėsi ir Lietuvos Respublikos teisės sistema, kuri turėjo atitikti pakitusius socialinius, ekonominius ir politinius šalies poreikius. Siekiant apsaugoti kiekvieno žmogaus teises ir pagrindines laisves, buvo būtina įstatymiškai aiškiai ir konkrečiai sureglamentuoti telekomunikacijų tinklais perduodamos informacijos kontrolę, bei įrašų darymą tiek operatyvinėje veikloje, tiek baudžiamajame procese. Nuo 2003 m. gegužės 01 d. Lietuvoje pradėjo galioti naujas Baudžiamojo proceso kodeksas, kuris daugumos teisininkų atitinka demokratinėje Europoje priimtus teisės principus, o taip pat ir žmogaus teisių ir pagrindinių laisvių apsaugos srityje. Tačiau telekomunikacijų tinklais perduodama informacija gali būti kontroliuojama ne tik remiantis BPK, bet ir vykdant operatyvinę veiklą, remiantis operatyvinės veiklos įstatymu.<br>After receiving the independence of Lithuania, has been changed and Lithuanian low system, which must be in keeping with changed social, economical and political country needs. Trying to protect the rights and the main liberties of every person, it was necessary to regulate the control of information transmitted by telecommunication networks and making records in operative activity and in criminal code. Since May 1st, 2003 a new code started being in force in Lithuania. In opinion of the majority of lawyers this code corresponds to the law principles accepted in democratic Europe, also in the sphere of human rights and protection of the main liberties. However the control of information transmitted by telecommunication networks in Lithuania is possible not only by Code on Criminal Procedure, but also might be regulated by Law on Operational Activities. In this work is paid a considerable attention to an establishment of the ratio of the means of proceedings compulsion provided in the Code on Criminal Procedure of Republic of Lithuania and the methods of the operational activities consolidated in the Law on Operational Activities. An importance of the notion used in the Criminal Proceedings Code of Republic of Lithuania in a definition of separate means of proceeding compulsion as well as necessity of an establishment of the limits of application of compulsion are stressed. Also are discussed contradictions of regulations of control of information transmitted by the... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
37

Satti, Narendra Siva Prasad Reddy, and Saket Vikram Singh. "Analysis of Location based QoE for Mobile video streaming from YouTube in 4G Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1939.

Full text
Abstract:
Mobile Video streaming has become popular with the arrival of high capability smart phones on Mobile Networks. Users are streaming high definition (HD) videos and have high expectations on Mobile Quality of Experience (QoE). Fourth Generation Mobile Networks are being deployed recently in many regions of the world and have capability to efficiently handle high definition video traffic. YouTube is one of the most extensively used Video on Demand Service on smart phones where wide range of people do video streaming. Most of the QoE experiments on 4g networks have been conducted in lab environment but they do not capture the daily routine of user experience on viewing videos. The user experiments in this thesis are conducted in natural life settings to capture Quality of Experience based on context of the user location. User experiments are designed and conducted for collecting Mean Opinion scores (MOS) in four different context based locations and have been collected using Experience Sampling Method (ESM). The Contribution of thesis is applying linear mixed effect Modeling on data collected to develop Quality of Experience (QoE) models of video streaming for Mobile YouTube on 4G Network. This thesis is one of the first works on modeling QoE experience at different context based physical locations in natural settings for mobile YouTube video streaming in 4G networks.
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Trista Shuenying. "Smart parking : Network, infrastructure and urban service." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0138/document.

Full text
Abstract:
Le parking intelligent, permettant aux conducteurs d'accéder aux informations de stationnement sur leurs appareils mobiles, réduit les difficultés des usagers. Tout d'abord, nous mettons en lumière la manière de recueillir les informations de parking en introduisant une architecture de réseaux de capteurs multi-saut, et les modèles d'intensité applicative en examinant la probabilité d'arrivées et de départs de véhicules. Puis nous étudions la stratégie de déploiement des réseaux de capteurs et définissons un problème multi-objectifs, puis nous le résolvons sur deux cartes de parking réelles. Ensuite, nous définissons un service Publish-Subscribe pour fournir aux conducteurs des informations pertinentes. Nous illustrons le système dans des réseaux véhiculaires et mobiles et soulignons l'importance du contenu et du contexte du message au conducteur. Afin d'évaluer la résilience du système, nous proposons un modèle Publish-Subscribe étendu et nous l'évaluons dans différentes circonstances imprévues. Notre travail est basé sur la prémisse que les capteurs de parking sont déployés à une grande échelle dans la ville. Nous considérons une vue d'ensemble des services urbains du point de vue de la municipalité. Ainsi, nous faisons la lumière sur deux thèmes principaux: la collecte d'informations sur le déploiement de capteurs et un modèle étendu de Publish-Subscribe. Notre travail donne un guide avant de démarrer un projet de parking intelligent ou tout service urbain similaire en temps réel. Il fournit également une plate-forme d'évaluation valable pour tester des jeux de données plus réalistes, comme des traces de véhicules ou de trafic réseau<br>Smart parking, allowing drivers to access parking information through their smart-phone, is proposed to ease drivers' pain. We first spotlight the manner to collect parking information by introducing the multi-hop sensor network architecture, and how the network is formed. We then introduce the traffic intensity models by looking at the vehicle's arrival and departure probabilities, following the heavy-tailed distribution. We study the deployment strategy of wireless on-street parking sensor layouts. We define a multiple-objective problem and solve it with two real street parking maps. In turn, we present a Publish-Subscribe service system to provide good parking information to drivers. We illustrate the system with a vehicular network and point out the importance of content and context of a driver’s message. To evaluate the resilience, we propose an extended Publish-Subscribe model, and evaluate it under different unforeseen circumstances. Our work is based on the premise that large-scale parking sensors are deployed in the city. We look at the whole picture of urban service from viewpoint of the municipality. As such, we shed light on two main topics: the information collection on sensor deployment and an extended version of Publish-Subscribe messaging paradigm. Our work gives a guideline from network-related perspectives for city before launching a smart parking or any similar real-time urban service. It also provides a meaningful evaluation platform for testing more realistic datasets, such as real vehicle traces or network traffic
APA, Harvard, Vancouver, ISO, and other styles
39

Lusilao-Zodi, Guy-Alain. "A Bandwidth Market in an IP Network." Thesis, Stellenbosch : University of Stellenbosch, 2008. http://hdl.handle.net/10019.1/1933.

Full text
Abstract:
Thesis (MSc (Mathematical Sciences. Computer Science))--University of Stellenbosch, 2008.<br>Consider a path-oriented telecommunications network where calls arrive to each route in a Poisson process. Each call brings on average a fixed number of packets that are offered to route. The packet inter-arrival times and the packet lengths are exponentially distributed. Each route can queue a finite number of packets while one packet is being transmitted. Each accepted packet/call generates an amount of revenue for the route manager. At specified time instants a route manager can acquire additional capacity (“interface capacity”) in order to carry more calls and/or the manager can acquire additional buffer space in order to carry more packets, in which cases the manager earns more revenue; alternatively a route manager can earn additional revenue by selling surplus interface capacity and/or by selling surplus buffer space to other route managers that (possibly temporarily) value it more highly. We present a method for efficiently computing the buying and the selling prices of buffer space. Moreover, we propose a bandwidth reallocation scheme capable of improving the network overall rate of earning revenue at both the call level and the packet level. Our reallocation scheme combines the Erlang price [4] and our proposed buffer space price (M/M/1/K prices) to reallocate interface capacity and buffer space among routes. The proposed scheme uses local rules and decides whether or not to adjust the interface capacity and/or the buffer space. Simulation results show that the reallocation scheme achieves good performance when applied to a fictitious network of 30-nodes and 46-links based on the geography of Europe.
APA, Harvard, Vancouver, ISO, and other styles
40

Ndlovu, Nkanyiso. "Investigating wireless network deployment configurations for marginalized areas." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/463.

Full text
Abstract:
In recent years, immense effort has been channelled towards the Information and Technological development of rural areas. To support this development, telecommunication networks have been deployed. The availability of these telecommunication networks is expected to improve the way people share ideas and communicate locally and globally, reducing limiting factors like distance through the use of the Internet. The major problem for these networks is that very few of them have managed to stay in operation over long periods of time. One of the major causes of this failure is the lack of proper monitoring and management as, in some cases, administrators are located far away from the network site. Other factors that contribute to the frequent failure of these networks are lack of proper infrastructure, lack of a constant power supply and other environmental issues. A telecommunication network was deployed for the people of Dwesa by the Siyakhula Living Lab project. During this research project, frequent visits were made to the site and network users were informally interviewed in order to gain insight into the network challenges. Based on the challenges, different network monitoring systems and other solutions were deployed on the network. This thesis analyses the problems encountered and presents possible and affordable solutions that were implemented on the network. This was done to improve the network‟s reliability, availability and manageability whilst exploring possible and practical ways in which the connectivity of the deployed telecommunication network can be maintained. As part of these solutions, a GPRS redundant link, Nagios and Cacti monitoring systems as well as Simple backup systems were deployed. v Acronyms AC Access Concentrators AMANDA Automatic Marylyn Network Disk Archiver CDMA Code Divison Multiple Access CGI Common Gateway Interface.
APA, Harvard, Vancouver, ISO, and other styles
41

Tilson, David Albert. "The Interrelationships between Technical Standards and Industry Structures: Actor-Network Based Case Studies of the Mobile Wireless and Television Industries in the US and the UK." online version, 2008. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=case1207164101.

Full text
Abstract:
Thesis (Ph. D.)--Case Western Reserve University, 2008.<br>Department of Information Systems, Weatherhead School of Management. Includes bibliographical references. Available online via OhioLINK's ETD Center.
APA, Harvard, Vancouver, ISO, and other styles
42

Kleinschmidt, João Henrique. "Propostas e analise de estrategias de controle de erros para redes de sensores sem fio." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261209.

Full text
Abstract:
Orientador: Walter da Cunha Borelli<br>Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação<br>Made available in DSpace on 2018-08-12T11:16:43Z (GMT). No. of bitstreams: 1 Kleinschmidt_JoaoHenrique_D.pdf: 1743623 bytes, checksum: dec2fe8a6e5fd8bbcf251d2e24690fa8 (MD5) Previous issue date: 2008<br>Resumo: As redes ad hoc sem fio não necessitam de infra-estrutura fixa e utilizam ondas de rádio para transmissão de dados. Uma rede de sensores sem fio é um tipo especial de rede ad hoc composta por dispositivos sensores de baixo custo e baixa potência. Estas características fazem com que as redes ad hoc e de sensores tenham limitações de energia. Além disso, as informações transmitidas no canal sem fio têm taxas de erro altas. Para melhorar a confiabilidade dos dados enviados no canal sem fio, técnicas como retransmissão ou códigos corretores de erros podem ser usadas. Esta tese analisa e propõe diferentes estratégias de controle de erros para redes de sensores sem fio. São apresentados modelos analíticos e de simulação de técnicas de controle de erros para consumo eficiente de energia em redes de sensores. Estes modelos são adaptados aos padrões IEEE 802.15.1 (Bluetooth) e IEEE 802.15.4 (ZigBee) e são propostos novos esquemas de correção de erros personalizados e adaptativos para estes padrões. Também são propostas estratégias de controle de erros adaptativas usando valor de informação de mensagens baseadas na área de cobertura e entropia. Os resultados são obtidos para diferentes cenários de redes, condições de canal e número de saltos. A escolha do melhor esquema de controle de erros depende da qualidade do canal e da aplicação considerada.<br>Abstract: Wireless ad hoc networks do not necessitate fixed infrastructure and use radio waves for data transmission. A wireless sensor network is a kind of ad hoc network formed by low cost and low power sensor devices. These characteristics made ad hoc and sensor networks very energy limited. Besides, the information transmitted in the wireless channel has high error rates. In order to improve the reliability of the data sent in the channel, techniques such as retransmission and error correcting codes can be applied. This thesis analyzes and proposes different error control strategies for wireless sensor networks. It is presented an analytical and a simulation model of error control techniques for energy consumption and energy efficiency. These models are adapted to the IEEE 802.15.1 (Bluetooth) and IEEE 802.15.4 (ZigBee) standards and novel custom and adaptive error control schemes are proposed. This work also proposes adaptive error control strategies using messages informational value based on coverage area and entropy. The results are obtained for different network scenarios, channel conditions and number of hops. The choice of the best error control scheme depends on the channel quality and the application.<br>Doutorado<br>Telecomunicações e Telemática<br>Doutor em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
43

Demircin, Mehmet Umut. "Robust video streaming over time-varying wireless networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24790.

Full text
Abstract:
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Yucel Altunbasak; Committee Member: Chuanyi Ji; Committee Member: Ghassan AlRegib; Committee Member: Ozlem Ergun; Committee Member: Russell M. Mersereau.
APA, Harvard, Vancouver, ISO, and other styles
44

Lundgren, Andreas. "Implementing Service Model Visualizations : Utilizing Hyperbolic Tree Structures for Visualizing Service Models in Telecommunication Networks." Thesis, Umeå University, Department of Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-24618.

Full text
Abstract:
<p>This paper describes the design, implementation and evaluation of HyperSALmon, a Java™ open source prototype for visualizing service models in telecommunication networks. For efficient browsing and graphical monitoring of service models using SALmon, a service modeling language and a monitoring engine (Leijon et al., 2008), some kind of interactive GUI that implements a visualization of the service model is desired. This is what HyperSALmon is intended to do. The prototype has been designed in accordance with suggestions derived from a current research report of visualization techniques (Sehlstedt, 2008) appropriate for displaying service model data. In addition to these suggestions domain experts at Data Ductus Nord AB has expressed an urge for implementation of further features, some of their suggestions are deduced from research documents (Leijon et al., 2008; Wallin and Leijon, 2007, 2006), while others have been stated orally in direct relation to the prototype implementation work. The main visualization proposal is to use tree structures. Thus, both traditional tree structures and hyperbolic tree structures have been utilized, where the main navigation is set to occur in the hyperbolic tree view. In order to contribute further to this report I provide a discussion addressing problems related to the context of implementing a prototype for service model visualization using open source frameworks that meets the requirements set by the service model network architecture, the domain experts and the suggestions in the research report (Sehlstedt, 2008,page 51-52). Finally, I will present drawn conclusions of the attempted prototype implementation, illustrating potential strengths and weaknesses and consequently introduce suggestions for possible improvement and further development.</p>
APA, Harvard, Vancouver, ISO, and other styles
45

Verett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
46

Persson, Albin, and Jimi Karlsson. "Device and Service Discovery in Bluetooth Networks." Thesis, Blekinge Tekniska Högskola, Institutionen för telekommunikation och signalbehandling, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3621.

Full text
Abstract:
In view of Bluetooth?s growing popularity a lot of research is being done to improve the performance of Bluetooth. Most of the research being performed prerequisites that a connection has already been made. Due to the frequency hopping spread spectrum used by Bluetooth the connection establishment is not as easy as it seams. Two processes have been derived to bridge the frequency discrepancies between devices, inquiry and page. In this thesis, we study the inquiry and page processes and the time it takes to complete a connection with no, one or two voice channels present at the initiating device. We have found the times to complete the processes to be lengthy at best, unreasonably long if there is voice traffic present. Through optimisation, we have decreased the mean time to connect. We propose some changes to the default values of a few time outs and variables, which yields a substantial improvement in performance, especially in the case when there is voice traffic present. The changes are in the software only, no changes in hardware are necessary. After a connection is made a client may want to start using the services of the device it is connected to. This is another topic of this thesis. Bluetooth does not provide means of accessing a service, only discovering it. Thus, there is the need for higher-level protocols for accessing services. We have investigated some of the service discovery protocols currently available.<br>Med tanke på Bluetooth-teknikens växande popularitet bedrivs mycket forskning för att förbättra Bluetooth-teknikens prestanda. Den mesta delen av forskningen förutsätter att en uppkoppling redan skett. På grund av frekvenshoppningstekniken som används i Bluetooth är detta inte så lätt som det låter. För att överkomma frekvensskillnaden mellan enheter används två processer, inquiry och page. I denna uppsats studerar vi inquiry- och page-processerna och studerar tiden det tar att slutföra en uppkoppling med ingen, en eller två tal-kanaler redan uppkopplade. Vi har funnit att tiden det tar är i bästa fall lång, om det finns tal-kanaler uppkopplade är tidsåtgången oacceptabel. Genom optimering av en del variabler och time-outs har vi lyckats reducera uppkopplingstiden, speciellt i fallet med tal-kanaler redan uppkopplade. Våra föreslagna ändringar är endast i mjukvaran, inga hårdvaruändringar är nödvändiga. Efter att uppkopplingen är slutförd kommer användaren att vilja börja använda de tjänster som erbjuds. Detta är en annan del av uppsatsen. Bluetooth-tekniken tillhandahåller inte något sätt att tillgodogöra sig tjänster, bara att upptäcka dem. Därför behövs det protokoll för att lösa detta. Vi har undersökt en del av de så kallade &quot;service discovery&quot;-protokoll som finns tillgängliga idag
APA, Harvard, Vancouver, ISO, and other styles
47

Costa, Carlos Henrique Andrade. "Criptografia quântica em redes de informação crítica - aplicação a telecomunicações aeronáuticas." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-25092008-101016/.

Full text
Abstract:
Ocorre atualmente um movimento de aumento da importância que a manutenção da segurança da informação vem adquirindo em redes de informação de crítica. Ao longo das últimas décadas a utilização de ferramentas criptográficas, especialmente aquelas baseadas em problemas de díficil solução computacional, foram suficientes para garantir a segurança dos sistemas de comunicação. Contudo, o desenvolvimento da nova técnica de processamento de informação conhecida como computação quântica e os resultados téoricos e experimentais apresentados por esta mostram que é possível inviabilizar alguns dos sistemas de criptografia atuais amplamente utilizados. A existência de tal vulnerabilidade representa um fator crítico em redes em que falhas de segurança da informação podem estar associadas a riscos de segurança física. Uma alternativa para os métodos criptográficos atuais consiste na utilização de sistemas quânticos na obtenção de um método criptográfico, o que se conhece como criptografia quântica. Este novo paradigma tem seu fundamento resistente mesmo na presença de capacidade tecnológica ilimitada, incluindo o cenário com disponibilidade de computação quântica. Este trabalho tem como objetivo levantar os impactos que o desenvolvimento da computação quântica têm sobre a segurança dos atuais sistemas criptográficos, apresentar e desenvolver alternativas de protocolos de criptografia quântica disponíveis, e realizar um estudo de caso por meio da avaliação da utilização de criptografia quântica no contexto da Aeronautical Telecommunication Network (ATN). Isto é feito por meio do desenvolvimento de um ambiente de simulacão que permite avaliar o comportamento de um protocolo de criptografia quântica em um cenário em um ambiente com requisitos de missão crítica, como é o caso da ATN.<br>The importance of security maintenance in critical information networks has been rising in recent times. Over the past decades, the utilization of cryptography tools, mainly those based on computationally intractable problems, was enough to ensure the security of communications systems. The development of the new information processing technique known as quantum computation and the theoretical and experimental results showed by this approach demonstrated that could be possible to cripple the current widely used cryptography techniques. This vulnerability represents a critical issue for networks where a security fault could be associated to a safety fault. An alternative for the current cryptography methods consists in the utilization of quantum systems to obtain a new cryptographic method. The new paradigm presented by this approach has solid principles even in the presence of unlimited computational capacity, including the scenario with availability of quantum computation. The aim of this work is the assessment of impacts that the development of quantum computation has over the current cryptographic methods security, the presentation and development of alternatives based on quantum cryptography protocols, and the development of a case study using the case of Aeronautical Telecommunication Network (ATN). This aim is reached by means of the development of a simulation environment that allows the evaluation of a quantum cryptography protocol behavior in an environment with mission critical requirements, like the ATN case.
APA, Harvard, Vancouver, ISO, and other styles
48

Sonnert, Adrian. "Predicting inter-frequency measurements in an LTE network using supervised machine learning : a comparative study of learning algorithms and data processing techniques." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148553.

Full text
Abstract:
With increasing demands on network reliability and speed, network suppliers need to effectivize their communications algorithms. Frequency measurements are a core part of mobile network communications, increasing their effectiveness would increase the effectiveness of many network processes such as handovers, load balancing, and carrier aggregation. This study examines the possibility of using supervised learning to predict the signal of inter-frequency measurements by investigating various learning algorithms and pre-processing techniques. We found that random forests have the highest predictive performance on this data set, at 90.7\% accuracy. In addition, we have shown that undersampling and varying the discriminator are effective techniques for increasing the performance on the positive class on frequencies where the negative class is prevalent. Finally, we present hybrid algorithms in which the learning algorithm for each model depends on attributes of the training data set. These algorithms perform at a much higher efficiency in terms of memory and run-time without heavily sacrificing predictive performance.
APA, Harvard, Vancouver, ISO, and other styles
49

Sims, Zack A. "Deployment, Management, & Operations of Internet Routers for Space-Based Communication." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1429033241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mejdi, Sami. "Encoder-Decoder Networks for Cloud Resource Consumption Forecasting." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291546.

Full text
Abstract:
Excessive resource allocation in telecommunications networks can be prevented by forecasting the resource demand when dimensioning the networks and the allocation the necessary resources accordingly, which is an ongoing effort to achieve a more sustainable development. In this work, traffic data from cloud environments that host deployed virtualized network functions (VNFs) of an IP Multimedia Subsystem (IMS) has been collected along with the computational resource consumption of the VNFs. A supervised learning approach was adopted to address the forecasting problem by considering encoder-decoder networks. These networks were applied to forecast future resource consumption of the VNFs by regarding the problem as a time series forecasting problem, and recasting it as a sequence-to-sequence (seq2seq) problem. Different encoder-decoder network architectures were then utilized to forecast the resource consumption. The encoder-decoder networks were compared against a widely deployed classical time series forecasting model that served as a baseline model. The results show that while the considered encoder-decoder models failed to outperform the baseline model in overall Root Mean Squared Error (RMSE) and Mean Absolute Error (MAE), the forecasting capabilities were more resilient to degradation over time. This suggests that the encoder-decoder networks are more appropriate for long-term forecasting, which is an agreement with related literature. Furthermore, the encoder-decoder models achieved competitive performance when compared to the baseline, despite being treated with limited hyperparameter-tuning and the absence of more sophisticated functionality such as attention. This work has shown that there is indeed potential for deep learning applications in forecasting of cloud resource consumption.<br>Överflödig allokering av resurser I telekommunikationsnätverk kan förhindras genom att prognosera resursbehoven vid dimensionering av dessa nätverk. Detta görs i syfte att bidra till en mer hållbar utveckling. Inför detta prjekt har trafikdata från molnmiljön som hyser aktiva virtuella komponenter (VNFs) till ett IÅ Multimedia Subsystem (IMS) samlats in tillsammans med resursförbrukningen av dessa komponenter. Detta examensarbete avhandlar hur effektivt övervakad maskininlärning i form av encoder-decoder nätverk kan användas för att prognosera resursbehovet hos ovan nämnda VNFs. Encoder-decoder nätverken appliceras genom att betrakta den samlade datan som en tidsserie. Problemet med att förutspå utvecklingen av tidsserien formuleras sedan som ett sequence-2-sequence (seq2seq) problem. I detta arbete användes en samling encoder-decoder nätverk med olika arkitekturer för att prognosera resursförbrukningen och dessa jämfördes med en populär modell hämtad från klassisk tidsserieanalys. Resultaten visar att encoder-decoder nätverken misslyckades med att överträffa den klassiska tidsseriemodellen med avseende på Root Mean Squeared Error (RMSE) och Mean Absolut Error (MAE). Dock visar encoder-decoder nätverken en betydlig motståndskraft mot prestandaförfall över tid i jämförelse med den klassiska tidsseriemodellen. Detta indikerar att encoder-decoder nätverk är lämpliga för prognosering över en längre tidshorisont. Utöver detta visade encoder-decoder nätverken en konkurrenskraftig förmåga att förutspå det korrekta resursbehovet, trots en begränsad justering av disponeringsparametrarna och utan mer sofistikerad funktionalitet implementerad som exempelvis attention.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography