To see the other types of publications on this topic, follow the link: Internet Protocol (Computer network protocol).

Dissertations / Theses on the topic 'Internet Protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet Protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Savage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dechjaroen, Chaiporn. "Performance evaluation of Voice over Internet Protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FDechjaroen.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Felczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nemani, Srinivasa Sankar Carlisle W. Homer. "Investigation of EtherYatri's compatibility with IPV6." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/NEMANI_SRINIVASA_48.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.

Full text
Abstract:
Anycast in next generation Internet Protocol is a hot topic in the research of computer networks. It has promising potentials and also many challenges, such as architecture, routing, Quality-of-Service, anycast in ad hoc networks, application-layer anycast, etc. In this thesis, we tackle some important topics among them. The thesis at first presents an introduction about anycast, followed by the related work. Then, as our major contributions, a number of challenging issues are addressed in the following chapters. We tackled the anycast routing problem by proposing a requirement based probing algorithm at application layer for anycast routing. Compared with the existing periodical based probing routing algorithm, the proposed routing algorithm improves the performance in terms of delay. We addressed the reliable service problem by the design of a twin server model for the anycast servers, providing a transparent and reliable service for all anycast queries. We addressed the load balance problem of anycast servers by proposing new job deviation strategies, to provide a similar Quality-of-Service to all clients of anycast servers. We applied the mesh routing methodology in the anycast routing in ad hoc networking environment, which provides a reliable routing service and uses much less network resources. We combined the anycast protocol and the multicast protocol to provide a bidirectional service, and applied the service to Web-based database applications, achieving a better query efficiency and data synchronization. Finally, we proposed a new Internet based service, minicast, as the combination of the anycast and multicast protocols. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. We show that the minicast service consumes less network resources while providing the same services. The last chapter of the thesis presents the conclusions and discusses the future work.
APA, Harvard, Vancouver, ISO, and other styles
11

Cox, Spencer L. "User Datagram Protocol with Congestion Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1250.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.

Full text
Abstract:

SMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.

In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.

APA, Harvard, Vancouver, ISO, and other styles
13

Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Full text
Abstract:
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
APA, Harvard, Vancouver, ISO, and other styles
14

Deng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.

Full text
Abstract:
Voice over IP (VoIP) is gaining more popularity in today‟s communications. The Session Initiation Protocol (SIP) is becoming one of the dominant VoIP signalling protocol[1, 2], however it is vulnerable to many kinds of attacks. Among these attacks, flood-based denial of service attacks have been identified as the major threat to SIP. Even though a great deal of research has been carried out to mitigate denial of service attacks, only a small proportion has been specific to SIP. This project examines the way denial of service attacks affect the performance of a SIP-based system and two evolutionary solutions to this problem that build on each other are proposed with experimental results to demonstrate the effectiveness of each solution. In stage one, this project proposes the Security-Enhanced SIP System (SESS), which contains a security-enhanced firewall, which evolved from the work of stage one and a security-enhanced SIP proxy server. This approach helps to improve the Quality-of-Service (QoS) of legitimate users during the SIP flooding attack, while maintaining a 100 percent success rate in blocking attack traffic. However, this system only mitigates SIP INVITE and REGISTER floods. In stage two, this project further advances SESS, and proposes an Improved Security-Enhanced SIP System (ISESS). ISESS advances the solution by blocking other SIP request floods, for example CANCEL, OK and BYE flood. JAIN Service Logic Execution Environment (JAIN SLEE) is a java-based application server specifically designed for event-driven applications. JAIN SLEE is used to implement enhancements of the SIP proxy server, as it is becoming a popular choice in implementing communication applications. The experimental results show that during a SIP flood, ISESS cannot only drop all attack packets but also the call setup delay of legitimate users can be improved substantially compared to and unsecured VoIP system.
APA, Harvard, Vancouver, ISO, and other styles
15

Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kay, James T. "Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FKay.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2006.
Thesis Advisor(s): Geoffrey Xie, John Gibson. "June 2006." Includes bibliographical references (p. 47-48). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
17

Chipitsyn, Vitali. "IMPROVEMENT OF OHIO UNIVERSITY COMPUTER NETWORKS WITH INTERNET PROTOCOL VERSION 6." Ohio University / OhioLINK, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1171570908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sargent, Matthew. "On Understanding the Internet Via Edge Measurement." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1432290894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lam, Fung. "Internet inter-domain traffic engineering and optimizatioon /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23273173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Biswas, Md Israfil. "Internet congestion control for variable-rate TCP traffic." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=182264.

Full text
Abstract:
The Transmission Control Protocol (TCP) has been designed for reliable data transport over the Internet. The performance of TCP is strongly influenced by its congestion control algorithms that limit the amount of traffic a sender can transmit based on end-to-end available capacity estimations. These algorithms proved successful in environments where applications rate requirements can be easily anticipated, as is the case for traditional bulk data transfer or interactive applications. However, an important new class of Internet applications has emerged that exhibit significant variations of transmission rate over time. Variable-rate traffic poses a new challenge for congestion control, especially for applications that need to share the limited capacity of a bottleneck over a long delay Internet path (e.g., paths that include satellite links). This thesis first analyses TCP performance of bursty applications that do not send data continuously, but generate data in bursts separated by periods in which little or no data is sent. Simulation analysis shows that standard TCP methods do not provide efficient support for bursty applications that produce variable-rate traffic, especially over long delay paths. Although alternative forms of congestion control like TCP-Friendly Rate Control and the Datagram Congestion Control Protocol have been proposed, they did not achieve widespread deployment. Therefore many current applications that rely upon User Datagram Protocol are not congestion controlled. The use of non-standard or proprietary methods decreases the effectiveness of Internet congestion control and poses a threat to the Internet stability. Solutions are therefore needed to allow bursty applications to use TCP. Chapter three evaluates Congestion Window Validation (CWV), an IETF experimental specification that was proposed to improve support for bursty applications over TCP. It concluded that CWV is too conservative to support many bursty applications and does not provide an incentive to encourage use by application designers. Instead, application designers often avoid generating variable-rate traffic by padding idle periods, which has been shown to waste network resources. CWV is therefore shown to not provide an acceptable solution for variable-rate traffic. In response to this shortfall, a new modification to TCP, TCP-JAGO, is proposed. This allows variable-rate traffic to restart quickly after an inactive (i.e., idle) period and to effectively utilise available network resources while sending at a lower rate than the available rate (i.e., during an application-limited period). The analysis in Chapter five shows that JAGO provides faster convergence to a steady-state rate and improves throughput by more efficiently utilising the network. TCP-JAGO is also shown to provide an appropriate response when congestion is experienced after restart. Variable-rate TCP traffic can also be impacted by the Initial Window algorithm at the start or during the restart of a session. Chapter six considers this problem, where TCP has no prior indication of the network state. A recent proposal for a larger initial window is analysed. Issues and advantages of using a large IW over a range of scenarios are discussed. The thesis concludes by presenting recommendations to improve TCP support for bursty applications. This also provides an incentive for application designers to choose TCP for variable-rate traffic.
APA, Harvard, Vancouver, ISO, and other styles
21

Tsang, Cheuk-kan Ken, and 曾卓勤. "Vertical handoff in heterogeneous wireless networks with mSCTP." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40687636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tsang, Cheuk-kan Ken. "Vertical handoff in heterogeneous wireless networks with mSCTP." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40687636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lakay, Elthea Trevolee. "SIP-based content development for wireless mobile devices with delay constraints." Thesis, University of the Western Cape, 2006. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_9048_1182233050.

Full text
Abstract:

SIP is receiving much attention these days and it seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services. Realizing this, there is the obvious need to provide a certain level of quality comparable to the traditional telephone service signalling system. Thus, we identified the major costs of SIP, which were found to be delay and security. This thesis discusses the costs of SIP, the solutions for the major costs, and the development of a low cost SIP application. The literature review of the components used to develop such a service is discussed, the networks in which the SIP is used are outlined, and some SIP applications and services previously designed are discussed. A simulation environment is then designed and implemented for the instant messaging service for wireless devices. This environment simulates the average delay in LAN and WLAN in different scenarios, to analyze in which scenario the system has the lowest costs and delay constraints.

APA, Harvard, Vancouver, ISO, and other styles
24

Simpson, Bruce. "Multihoming with ILNP in FreeBSD." Thesis, University of St Andrews, 2016. http://hdl.handle.net/10023/8681.

Full text
Abstract:
Multihoming allows nodes to be multiply connected to the network. It forms the basis of features which can improve network responsiveness and robustness; e.g. load balancing and fail-over, which can be considered as a choice between network locations. However, IP today assumes that IP addresses specify both network location and node identity. Therefore, these features must be implemented at routers. This dissertation considers an alternative based on the multihoming approach of the Identifier Locator Network Protocol (ILNP). ILNP is one of many proposals for a split between network location and node identity. However, unlike other proposals, ILNP removes the use of IP addresses as they are used today. To date, ILNP has not been implemented within an operating system stack. I produce the first implementation of ILNP in FreeBSD, based on a superset of IPv6 – ILNPv6 – and demonstrate a key feature of ILNP: multihoming as a first class function of the operating system, rather than being implemented as a routing function as it is today. To evaluate the multihoming capability, I demonstrate one important application of multihoming – load distribution – at three levels of network hierarchy including individual hosts, a singleton Site Border Router (SBR), and a novel, dynamically instantiated, distributed SBR (dSBR). For each level, I present empirical results from a hardware testbed; metrics include latency, throughput, loss and reordering. I compare performance with unmodified IPv6 and NPTv6. Finally, I evaluate the feasibility of dSBR-ILNPv6 as an alternative to existing multihoming approaches, based on measurements of the dSBR's responsiveness to changes in site connectivity. We find that multihoming can be implemented by individual hosts and/or SBRs, without requiring additional routing state as is the case today, and without any significant additional load or overhead compared to unicast IPv6.
APA, Harvard, Vancouver, ISO, and other styles
25

Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
APA, Harvard, Vancouver, ISO, and other styles
26

Holl, David J. "A performance analysis of TCP and STP implementations and proposals for new QoS classes for TCP/IP." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-111419.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.
Keywords: TCP; RED; satellite; PEP; STP; performance enhancing proxy; segment caching; IP-ABR; Internet; bandwidth reservation; IP-VBR; congestion avoidance; bandwidth sharing. Includes bibliographical references (p. 98-99).
APA, Harvard, Vancouver, ISO, and other styles
27

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Full text
Abstract:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.
Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
APA, Harvard, Vancouver, ISO, and other styles
28

Valverde, Lionel J., and Romelo B. Nafarrette. "Secure wireless handoff." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/943.

Full text
Abstract:
Approved for public release, distribution is unlimited
With the rapidly growing demand for portable devices such as laptops, handheld computers and Personal Digital Assistants (PDAs) with wireless networking capabilities, the need for reliable wireless data network communication has also increased. Just like in mobile voice communication, users demand uninterrupted, secure wireless data communication as they move from place to place. Mobile IP satisfies some of these demands - it enables mobile devices with fixed IP addresses to be permanently reachable even as their point of attachment to the network changes. This allows for routing of data packets to and from the mobile device irrespective of its location on the network. While uninterrupted data flow can be achieved with Mobile IP, it introduces additional security vulnerabilities, including data privacy, data integrity and authentication. The goal of this thesis is to investigate such vulnerabilities and explore implementations to overcome them.
Civilian, National Science Foundation
APA, Harvard, Vancouver, ISO, and other styles
29

Rattananon, Sanchai Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "RPX ??? a system for extending the IPv4 address range." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/30210.

Full text
Abstract:
In recent times, the imminent lack of public IPv4 addresses has attracted the attention of both the research community and industry. The cellular industry has decided to combat this problem by using IPv6 for all new terminals. However, the success of 3G network deployment will depend on the services offered to end users. Currently, almost all services reside in the IPv4 address space, making them inaccessible to users in IPv6 networks. Thus, an intermediate translation mechanism is required. Previous studies on network address translation methods have shown that Realm Base Kluge Address Heuristic-IP, REBEKAH-IP supports all types of services that can be offered to IPv6 hosts from the public IPv4 based Internet, and provides excellent scalability. However, the method suffers from an ambiguity problem which may lead to call blocking. This thesis presents an improvement to REBEKAH-IP scheme in which the side effect is removed, creating a robust and fully scalable system. The improvement can be divided into two major tasks including a full investigation on the scalability of addressing and improvements to the REBEKAH-IP scheme that allow it to support important features such as ICMP and IP mobility. To address the first task a method called REBEKAH-IP with Port Extension (RPX) is introduced. RPX is extended from the original REBEKAH-IP scheme to incorporate centralised management of both IP address and port numbers. This method overcomes the ambiguity problem, and improves scalability. We propose a priority queue algorithm to further increase scalability. Finally, we present extensive simulation results on the practical scalability of RPX with different traffic compositions, to provide a guideline of the expected scalability in large-scale networks. The second task concerns enabling IP based communication. Firstly, we propose an ICMP translation mechanism which allows the RPX server to support important end-toend control functions. Secondly, we extend the RPX scheme with a mobility support scheme based on Mobile IP. In addition, we have augmented Mobile IP with a new tunneling mechanism called IP-in-FQDN tunneling. The mechanism allows for unique mapping despite the sharing of IP addresses while maintaining the scalability of RPX. We examine the viability of our design through our experimental implementation.
APA, Harvard, Vancouver, ISO, and other styles
30

Bhatnagar, Arpit. "Internet Protocol (IP) design and implementation for efficient mobility to devices in wireless networks." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/1712.

Full text
Abstract:
The purpose of this thesis was to develop an efficient routing protocol which would provide mobility support to the mobile devices roaming within a network. The routing protocol need to be compatible with the existing internet architecture. The routing protocol proposed here is based on the Mobile IP routing protocol and could solve some of the problems existing in current Mobile IP implementation e.g. ingress filtering problem. By implementing an efficient timeout mechanism and introducing Paging mechanism to the wireless network, the protocol minimizes the number of control messages sent over the network. The implementation of the system is primarily done on three components: 1) Mobile devices that need to gain access to the network, 2) Router which would be providing roaming support to the mobile devices and 3) Database server providing basic authentication services on the system. As a result, an efficient IP routing protocol is developed which would provide seamless mobility to the mobile devices on the network.
APA, Harvard, Vancouver, ISO, and other styles
31

Samiuddin, Asim. "IPAM : a web-based IP/DNS management system /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Augusto, Leonardo Rangel. "Controladores otimos para gerenciamento ativo de filas na arquitetura de serviços diferenciados da Internet." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276179.

Full text
Abstract:
Orientador: Nelson Luis Saldanha da Fonseca
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:39:46Z (GMT). No. of bitstreams: 1 Augusto_LeonardoRangel_M.pdf: 852383 bytes, checksum: f25ba2736c185851498448650c0aef68 (MD5) Previous issue date: 2006
Resumo: A classe de Serviço Assegurado da arquitetura de Serviços Diferenciados (DiffServ) da Internet inclui a provisão de diferenciação de banda passante, o que depende do adequado USG de mecanismos de condicionamento de tráfego e gerenciamento ativo de filas (AQM). Nesta dissertação, propõe-se um controlador ótimo para gerenciamento ativo de filas para a arquitetura Diffserv. Seu projeto considera intrinsecamente a influência de fluxos não adaptativos na dinâmica do controle de congestionamento. Apesar de o controlador obtido ser racional, seu projeto utiliza uma abordagem não-racional, o que aumenta a precisão do modelo. Simulações conduzidas demonstram que o controlador proposto reduz o descarte desnecessário de pacotes, aumentando o goodput e diminuindo a quantidade de RTOs dos emissores TCP.
Abstract: The Assured Service of Differentiated Services Arehitecture (DiffServ) is currently used for providing throughput differentiation in the Internet. For this, traffic policing and active queue management (AQM) mechanisms must be used. In this dissertation, we use a non-rational approach to develop an optimal AQM controller. Its design considers both adaptative and non-adaptative like UDP. Simulations were conducted for comparison with other proposals. Results show that the proposed controller reduces unnecessary packet drops, increases the goodput and reduces the TCP sender's Retransmission Timeouts.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
33

Lam, Fung, and 林峰. "Internet inter-domain traffic engineering and optimizatioon." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31224581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bhattacharya, Sumit. "A Real-Time Bi-Directional Global Positioning System Data Link Over Internet Protocol." Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1121355433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Banh, Mai. "Quantification, characterisation and impact evaluation of mobile IPv6 hand off times." Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070608.094836/index.html.

Full text
Abstract:
Thesis (MEng) - Swinburne University of Technology, Centre for Advanced Internet Architectures, 2005.
[A thesis submitted in total fulfillment of the requirements of for the degree of ] Masters of Engineering by Research, Centre for Advanced Internet Architectures (CAIA), Faculty of Information and Communication Technologies, Swinburne University of Technology, 2005. Typescript. Bibliography p. 153-159.
APA, Harvard, Vancouver, ISO, and other styles
36

Jayaram, Ranjith S. "Performance Evaluation of TEAR, a TCP-friendly Flow Control Protocol, Over the Internet and Wireless Networks." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010717-083717.

Full text
Abstract:

TCP Emulation at Receivers (TEAR) is a TCP-friendly protocol that has been proposed for real-time multimedia flow control. Most best-effort traffic on the Internet is well-served by TCP, the dominant transport protocol. However, many applications with real-time constraints, such as multimedia streaming find TCP's response to congestion quite severe and too drastic to deliver acceptable end-user quality. TEAR was designed in order to provide smoothly varying rate changes for such applications while being friendly to competing TCP flows. In this thesis, weevaluate and verify TEAR's performance over the Internet. We verify TEAR's fairness to TCP, the smoothness of its rate fluctuations and its stability in the presence of network perturbations. We then adapt TEAR to run over wireless networks and consider using round-trip delay instead of packet loss as a congestion indication for wireless networks. We present the results of our experiments with TEAR over commercially deployed wireless networks in South Korea. We recount our experiences with the loss-delay characteristics of these networks. We analyze how TEAR competes with TCP, which is known to suffer from severe degradations in environments where the underlying network is unreliable. We then study TEAR's rate variations and the increased longer-term predictability it provides over wireless networks. Finally, we compare the performance of a reliable protocol we built over TEAR with TCP.

APA, Harvard, Vancouver, ISO, and other styles
37

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTERISK-based system under development at Rhodes University. The practical investigation that focuses on ILANGA is based on performing six varied experiments on the different components of ILANGA. Before the six experiments are performed, basic preliminary security measures and the restrictions placed on the access to the database are discussed. The outcomes of these experiments are discussed and the precise reasons why these attacks were either successful or unsuccessful are given. Suggestions of a theoretical nature on how to defend against the successful attacks are also presented.
APA, Harvard, Vancouver, ISO, and other styles
38

Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.

Full text
Abstract:
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
APA, Harvard, Vancouver, ISO, and other styles
39

Kolan, Prakash Dantu Ram. "System and methods for detecting unwanted voice calls." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Perigo, Levi. "An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/274.

Full text
Abstract:
In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol to be prepared in it becoming the dominant internetworking protocol. The goal of the research was to develop a model for IS specialists to use with MBs in the transition from IPv4 to IPv6. To achieve this goal, the author performed a case study of ADTRAN Inc.'s IPv6 implementation, using the Systems Development Life Cycle (SDLC) framework. The SDLC methodology consists of five phases and was used to support the design, development, and implementation of the ADTRAN Inc. IPv6 solution. For Phase 1, the Research Phase, the author examined business requirements, administered a questionnaire, and recorded participant observation. In Phase 2, the Analysis Phase, the author analyzed the data from Phase 1 and created a functional and nonfunctional requirements list. For Phase 3, the Logical Design Phase, the author developed documentation and diagrams for the IPv6 implementation. In Phase 4, the Physical Design Phase, the author determined what internetworking hardware would be needed and where it should be deployed. For Phase 5, the Implementation Phase, the author completed the IPv6 network implementation. Finally, the author analyzed the data collected from this investigation. The use of the findings, in conjunction with the SDLC methodology, resulted in the ADTRAN Inc. Implementation model, which can be used by MBs of a similar size to ADTRAN Inc., when IPv6 transition initiatives are being considered.
APA, Harvard, Vancouver, ISO, and other styles
41

Huang, Weimin Carleton University Dissertation Engineering Systems and Computer. "Monitoring and modelling multimedia traffic over TCP/IP/ATM networks." Ottawa, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Grigorescu, Eduard. "Reducing internet latency for thin-stream applications over reliable transport with active queue management." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=236098.

Full text
Abstract:
An increasing number of network applications use reliable transport protocols. Applications with constant data transmission recover from loss without major performance disruption, however, applications that send data sporadically, in small packets, also called thin-streams, experience frequently high latencies due to 'Bufferbloat', that reduce the application performance. Active Queue Management mechanisms were proposed to dynamically manage the queues in routers by dropping packets early and reduce these, hence reducing latency. While their deployment to the internet remains an open issue, the proper investigation into how their functioning mechanism impacts latency is the main focus of this work and research questions have been devised to investigate the AQM impact on latency. A range of AQM mechanisms has been evaluated by the research, exploring performance of the methods for latency sensitive network applications. This has explored new single queue AQM mechanisms such as Controlled Delay (CODEL) and Proportional Integral Enhanced (PIE) and Adaptive RED (ARED). The evaluation has shown great improvements in queuing latency when AQM are used over a range of network scenarios. Scheduling AQM algorithms such as FlowQueue CODEL (FQ-CODEL) isolates traffic and minimises the impact of Bufferbloat on flows. The core components of FQ-CODEL, still widely misunderstood at the time of its inception, have been explained in depth by this study and their contribution to reducing latency have been evaluated. The results show significant reductions in queuing latency for thin streams using FQ-CODEL. When TCP is used for thin streams, high application latencies can arise when there are retransmissions, for example after dropping packets by an AQM mechanism. This delay is a result of TCP's loss-based congestion control mechanism that controls sender transmission rate following packet loss. ECN, a marking sender-side improvement to TCP reduces applicationlayer latency without disrupting the overall network performance. The thesis evaluated the benefit of using ECN using a wide range of experiments. The findings show that FQ-CODEL with ECN provides a substantial reduction of application latency compared to a drop-based AQM. Moreover, this study recommends the combination of FQ-CODEL with other mechanisms, to reduce application latency. Mechanisms such as ABE, have been shown to increase aggregate throughput and reduce application latency for thin-stream applications.
APA, Harvard, Vancouver, ISO, and other styles
43

AZIZ, YASSAR, and MUHAMMAD NAEEM ASLAM. "Traffic Engineering with Multi-Protocol Label Switching, Performance Comparison with IP networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för matematik och naturvetenskap, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6019.

Full text
Abstract:
Traffic Engineering (TE) is the stage which deals with geometric design planning and traffic operation of networks, network devices and relationship of routers for the transportation of data. TE is that feature of network engineering which concentrate on problems of performance optimization of operational networks. It involves techniques and application of knowledge to gain performance objectives, which includes movement of data through network, reliability, planning of network capacity and efficient use of network resources. This thesis addresses the problems of traffic engineering and suggests a solution by using the concept of Multi-Protocol Label Switching (MPLS). We have done simulation in Matlab environment to compare the performance of MPLS against the IP network in a simulated environment. MPLS is a modern technique for forwarding network data. It broadens routing according to path controlling and packet forwarding. In this thesis MPLS is computed on the basis of its performance, efficiency for sending data from source to destination. A MATLAB based simulation tool is developed to compare MPLS with IP network in a simulated environment. The results show the performance of MPLS network in comparison of IP network.
YASSAR AZIZ, +46 73 9135296 MUHAMMAD NAEEM ASLAM +46 70 4918985
APA, Harvard, Vancouver, ISO, and other styles
44

Kim, Minchong. "Proportional integrator with short-lived flows adjustment." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-0122104-154529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Villet, Marcel. "The modelling of TCP traffic in MPLS networks." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53658.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: The Internet has experienced tremendous growth in the last three decades and has emerged as a platform to carryall forms of communications including voice, video and data. Along with this growth came the urgency for quality of service (QoS) controls in IP networks as different types of traffics have different service requirements. Although the IP protocol is able to scale to very large networks, it does not provide sufficient functionality for traffic engineering in order to enable QoS control. Multi-protocol label switching (MPLS) is a new routing technology that enhances IP with some QoS concepts from ATM and uses relatively simple packet forwarding mechanisms. MPLS has the ability to perform traffic engineering and QoS control by routing traffic flowson virtual connections called label switched paths (LSPs) which are assigned capacity. A large portion of the traffic carried on the Internet consists of data traffic in the form of TCP traffic. This thesis investigates several TCP models to find the ones most suitable to represent TCP traffic in MPLS networks. The models consist of three types. The first type models a single TCP source and the second type models a fixed number of TCP sources. The third type models an infinite number of TCP sources. The models were evaluated by comparing their throughput predictions and results obtained from simulation experiments that were done with the widely-used simulator ns. We also present a simple derivation of the 1/,;e law for the TCP congestion window size where e is the packet loss probability.
AFRIKAANSE OPSOMMING:In die afgelope drie dekades het die Internet beduidende groei ervaar, soveel so dat dit ontluik het as 'n medium om alle tipes van moderne kommunikasies te hanteer insluitend telefoon, video en data. Hierdie groei het gepaard gegaan met die behoefte na diensvlak (QoS) meganismes in IP netwerke aangesien verskillende tipe kommunikasies verskillende diens vereistes het. Alhoewel die IP protokol skalleerbaar is tot baie groot netwerke, voorsien dit nie voldoende funksionaliteit om QoS beheer toe te pas nie. "Multi-protocol label switching" (MPLS) is 'n nuwe roeterings tegnologie wat IP aanvul met QoS konsepte van ATM en dit maak gebruik van relatief eenvoudige pakkie versendings-meganismes. MPLS het die vermoe om netwerk-verkeer reeling en QoS beheer toe te pas deur verkeers-strome te roeteer op virtuele roetes genaamd "label switched paths" (LSPs) aan wie kapasiteit toegeken is. 'n Beduidende gedeelte van Internet-verkeer bestaan uit TCP-verkeer. Hierdie tesis ondersoek verskillende modelle van TCP om die te vind wat die mees geskik is om TCP verkeer in MPLS netwerke te verteenwoordig. Drie tipes modelle is ondersoek. Die eerste tipe moduleer 'n enkele TCP verkeersbron en die tweede tipe moduleer 'n vasgestelde aantal TCP verkeersbronne. Die derde tipe moduleer 'n oneindige aantal verkeersbronne. Die modelle is geevalueer deur hul voorspellings van die tempo van data transmissie te vergelyk met resultate van simulasies. Die simulasies is gedoen met die veelgebruikte simulator ns. Hierdie tesis bevat ook 'n eenvoudige afleiding vir die 1/,;e wet vir die TCP oorlading venster grootte met e die verlies waarskeinlikheid van 'n netwerk pakkie.
APA, Harvard, Vancouver, ISO, and other styles
46

Santi, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.

Full text
Abstract:
Orientador: Nelson Luis Saldanha da Fonseca
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCP­H2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solu­cionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de de­sempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avalia­dos e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into ac­count the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the control­ler with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
47

Dolphine, Tiago Marchetti. "Plataforma de serviços de infra-estrutura para arquiteturas de mobilidade." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/258965.

Full text
Abstract:
Orientador: Eleri Cardozo
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-14T03:43:39Z (GMT). No. of bitstreams: 1 Dolphine_TiagoMarchetti_M.pdf: 1822376 bytes, checksum: 5425d1b4cf2ca6a35df00dc7dc511d69 (MD5) Previous issue date: 2009
Resumo: Arquiteturas de micromobilidade vêm sendo propostas para atender ao crescente interesse por tecnologias de mobilidade IP. MPA (Mobility Plane Architecture), desenvolvida na FEEC/Unicamp, é uma solução de micromobilidade baseada em tunelamento de pacotes que emprega apenas protocolos bem estabelecidos. Quando estudou-se aplicações para melhoria de desempenho em handover e engenharia de tráfego na arquitetura MPA, verificou-se que estas aplicações necessitavam serviços comuns. Este trabalho descreve a plataforma MIS (Mobility Infrastructure Services) que fornece um conjunto de serviços para suporte ás funcionalidades básicas comuns de aplicações de gerência de rede, engenharia de tráfego e gerência de mobilidade. A plataforma proposta facilita o desenvolvimento de tais aplicações compartilhando soluções às necessidades encontradas na arquitetura de micromobilidade MPA e outras arquiteturas similares. São apresentados o projeto, implementação e testes da plataforma, juntamente com dois estudos de casos em gerência de mobilidade e engenharia de tráfego. Palavras-chave: redes IP móveis, micromobilidade, gerência de rede, engenharia de tráfego
Abstract: Micro-mobility architectures have been proposed to meet the growing interest in technologies supporting mobility in IP networks. MPA (Mobility Plane Architecture), developed at the FEEC/Unicamp, is a micro-mobility solution based on tunneling of packets that employs only well standardized protocols. When applications for supporting seamless handover and traffic engineering in MPA started to be designed, it was noticed that these applications demand a set of common services. This dissertation presents the MIS (Mobility Infrastructure Services) platform which provides a set of services that meet the common basic features demanded by applications of network management, traffic engineering and mobility management. The proposed platform facilitates the development of these applications when they are targeted to MPA and other micro-mobility architectures. This dissertation reports the design, implementation, ant test of the MIS platform, along with two case studies in mobility management and traffic engineering. Keywords: IP mobile networks, micro-mobility, network management, traffic engineering
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
48

Shi, Junxiao, and Junxiao Shi. "Named Data Networking in Local Area Networks." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625652.

Full text
Abstract:
The Named Data Networking (NDN) is a new Internet architecture that changes the network semantic from packet delivery to content retrieval and promises benefits in areas such as content distribution, security, mobility support, and application development. While the basic NDN architecture applies to any network environment, local area networks (LANs) are of particular interest because of their prevalence on the Internet and the relatively low barrier to deployment. In this dissertation, I design NDN protocols and implement NDN software, to make NDN communication in LAN robust and efficient. My contributions include: (a) a forwarding behavior specification required on every NDN node; (b) a secure and efficient self-learning strategy for switched Ethernet, which discovers available contents via occasional flooding, so that the network can operate without manual configuration, and does not require a routing protocol or a centralized controller; (c) NDN-NIC, a network interface card that performs name-based packet filtering, to reduce CPU overhead and power consumption of the main system during broadcast communication on shared media; (d) the NDN Link Protocol (NDNLP), which allows the forwarding plane to add hop-by-hop headers, and provides a fragmentation-reassembly feature so that large NDN packets can be sent directly over Ethernet with limited MTU.
APA, Harvard, Vancouver, ISO, and other styles
49

Kolan, Prakash. "System and Methods for Detecting Unwanted Voice Calls." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5155/.

Full text
Abstract:
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks. However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale. One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony). Mostly, these SPIT calls are from unknown callers who broadcast unwanted calls. There may be unwanted calls from legitimate and known people too. In this case, the unwantedness depends on social proximity of the communicating parties. For detecting these unwanted calls, I propose a framework that analyzes incoming calls for unwanted behavior. The framework includes a VoIP spam detector (VSD) that analyzes incoming VoIP calls for spam behavior using trust and reputation techniques. The framework also includes a nuisance detector (ND) that proactively infers the nuisance (or reluctance of the end user) to receive incoming calls. This inference is based on past mutual behavior between the calling and the called party (i.e., caller and callee), the callee's presence (mood or state of mind) and tolerance in receiving voice calls from the caller, and the social closeness between the caller and the callee. The VSD and ND learn the behavior of callers over time and estimate the possibility of the call to be unwanted based on predetermined thresholds configured by the callee (or the filter administrators). These threshold values have to be automatically updated for integrating dynamic behavioral changes of the communicating parties. For updating these threshold values, I propose an automatic calibration mechanism using receiver operating characteristics curves (ROC). The VSD and ND use this mechanism for dynamically updating thresholds for optimizing their accuracy of detection. In addition to unwanted calls to the callees in a VoIP network, there can be unwanted traffic coming into a VoIP network that attempts to compromise VoIP network devices. Intelligent hackers can create malicious VoIP traffic for disrupting network activities. Hence, there is a need to frequently monitor the risk levels of critical network infrastructure. Towards realizing this objective, I describe a network level risk management mechanism that prioritizes resources in a VoIP network. The prioritization scheme involves an adaptive re-computation model of risk levels using attack graphs and Bayesian inference techniques. All the above techniques collectively account for a domain-level VoIP security solution.
APA, Harvard, Vancouver, ISO, and other styles
50

LI, XUEYUN. "Enabling communication between border router and 6LoWPAN-based WSN for Healthcare." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-14155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography