Dissertations / Theses on the topic 'ISP network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'ISP network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sandford, Peter. "Inferring malicious network events in commercial ISP networks using traffic summarisation." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/9580.
Full textGao, Hongyan. "Network and I/O Characteristics of ISP Mail Servers." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1013197957.
Full textDoležal, Martin. "Implementace vybrané technologie pro ISP." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-234777.
Full textDůbrava, Marek. "Řízení datového toku v ISP síti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242049.
Full textCheema, Ansar Zaman, and Imran Ullah Saqib. "Collaborating ISPs Supporting Various Real-Time Services." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4902.
Full textThese days, internet service providers (ISPs) face the challenge about how to increase profitability while hey must ensure a good quality service at the same time and scale up their network. The study involves previous research papers. On the bases of those papers,the comparison is made between different alternatives. The purpose on this study is to find a solution that combines different methods and configurations about how several ISPs could cooperate. Its implementation includes how different ISPs can configure their networks to cooperate on service provision supporting various real-time services.
Kmoníček, Tomáš. "Aplikace pro monitorování a správu sítě pro ISP." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217877.
Full textChen, Sheng. "Future development trends of optical transport network infrastructure an infrastructural framework for metropolitan-based optical transport networks : a field test of a Chinese ISP and a case study of a Chinese electrical power company /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070822.115714/index.html.
Full textCao, Wei Qiu. "A new Content Distribution Network architecture - PlentyCast." Thesis, KTH, Mikroelektronik och informationsteknik, IMIT, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92592.
Full textMediadistributionsnätverk har funnits några år. De har fått uppmärksamhet i både akademisk forskning och i industrin och kännetecknas av följande frågor: placering av innehållskopior, lokalisering av innehåll och routing, svärm intelligens, överlagrade nätverks självorganisering för denna typ av fördelade system. I denna rapport studeras en ny nätverksarkitektur för innehållsfördelning - PlentyCast. Denna studie fokuserar på tillgångslatens, nätverksskalbarhet, hög innehållstillgång, låg bandbreddskonsumtion, och förbättrad infrastrukturprestanda för Innehållsfördelningsnätverk.
Abrar, Mirza Kashif, and Imran Pervaiz. "Reliability and Load Handling Problem in Internet Service Provider’s Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4228.
Full textThis thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network.
With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network.
The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks.
With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.
Parolek, Pavel. "Bezpečnost bezdrátové sítě poskytovatele internetových služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223791.
Full textPatriksson, Andreas. "Net Neutrality - Do We Care? : A study regarding Swedish consumers' point-of-view upon Net Neutrality." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204467.
Full textNätneutralitet innebär kortfattat att all data som skickas över Internet ska behandlas likvärdigt utav Internetleverantörer (ISP). Under 2016 växte debatten kring nätneutralitet i Sverige då två stycken mobiloperatörer utreddes utav Post- och Telestyrelsen. Båda dessa mobiloperatörer lanserade kampanjer till sina kunder som ansågs strida mot EU:s förordning 2015/2120 rörande nätneutralitet. Ett antal studier har redan gjorts på ämnet nätneutralitet, dock har de flesta haft en infallsvinkel där man tittat på juridiska, finansiella eller tekniska perspektiv. Den här studien har en annan infallsvinkel och riktar sig istället mot konsumenters syn på nätneutralitet. Den ämnar undersöka huruvida konsumenter känner till begreppet nätneutralitet och om de gör det, hur värderar de konceptet? För att undersöka detta konstruerades en online-enkät, innehållandes 12 frågor. 77 personer deltog i enkäten och utav dessa så deltog 10 personer i uppföljande, kvalitativa intervjuer. Intervjuerna var semi-strukturerade och individuella med frågor baserade på individens svar i enkäten. Dessa intervjuer var till för att ge en fördjupad förståelse av konsumenternas syn på nätneutralitet och deras resonemang kring svaren under enkäten. Resultaten visar att konsumenter, deltagande i den här studien, har låg kunskap kring nätneutralitet. Majoriteten utav deltagarna hade inte hört termen eller kände inte till dess mening, vilket gjorde det svårt att dra några slutsatser kring huruvida konsumenterna värderar konceptet. Men när konsumenterna fick ett mer konkret exempel på hur Internetleverantörers datahantering påverkar kundernas Internetanvändande så tycktes konsumenterna förstå vilka implikationer nätneutralitet kan ha på deras eget Internetanvändande. De tycktes således värdera innebörden av nätneutralitet, även om de inte förstod teorin kring konceptet. Studien påvisade också att konsumenter har en stor tilltro till vederbörande myndighet, Post- och Telestyrelsen här i Sverige, när det gäller att se efter Internets öppenhet och mångfald. Det är därför troligt att Post- och Telestyrelsen kommer att behöva informera och utbilda konsumenter rörande nätneutralitet för att få konsumenter att se värdet av och de långsiktiga implikationerna utav det.
Xiong, Ziyi. "Socio-economic Impact of Fiber to the Home in Sweden." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118777.
Full textFiber till hemmet (Fiber-to-the-Home, FTTH) har talats om sedan fiberintroducerades på 1970-talet. Det håller numera på att bli grunden för vårtnya digitala samhälle, och bidra till ekonomiskt välstånd och medföra en mängdaffärsmässiga, sociala och underhållningsmässiga möjligheter tillslutanvändare. Den ökade efterfrågan på höghastighetsnät tas mer och mer påallvar och ett fiberbaserat nät kan hantera dessa ökade krav på grund av dessbreda bandbredd och tillförlitlighet. Idag finns ett praktiskt behov avkvantitativ analys av de socioekonomiska effekterna av fiberbaseradeaccessnät. Denna analys kan användas som en indikator och referens för allaintressenter när de överväger framtida investeringar. Sverige är ett lämpligtmålland för denna analys eftersom den har antagit fiber i några år och defördelar som FTTH har fört verkar redan vara synliga. Det huvudsakligavärdet av denna avhandling ligger i utredningen av kvantifierade bevis för desocioekonomiska effekterna av FTTH utbyggnad i Sverige. Detta har uppnåtts pågrundval av uppgifter från den Post- och telestyrelsen (PTS), Statistiskacentralbyrån (SCB), tidigare liknande studier och information som samlats inpå nätet från aktörer inom fiber, tillsammans med empirisk analys baserad påmultivariate regressionsmodeller. Resultatet visat att fiber har haft enbetydande inverkan på befolkningens utveckling, speciellt netto in- ochutflyttning till en kommun, vilket indikerar attraktionskraft kommunerna isig. Det är därför rimligt att föreslå att kommunerna och de lokalamyndigheterna överväger fiber driftsättning på allvar om de vill lockainvånare att stanna för ytterligare lokal utveckling. Studien analyserar ocksåkonkurrensen på fiberbaserade öppna nät och priserna på 10/10 Mbps symmetriskInternet-tjänst. Resultaten visar att nätverk med flera konkurrerandetjänsteleverantörer har ett bredare utbud av tjänster och ett lägre pris: jufler Internetleverantörer i ett fibernät, desto lägre konsumentpriser. Merspecifikt, för varje ny tjänsteleverantör som finns i nätverket, minskar detgenomsnittliga priset med 5 kronor per månad, och det lägsta priset med cirka7 kronor per månad. Ändå förblir ett antal socioekonomiska effekteromätbara på grund av begränsade tillgängliga data. Rekommendationen är attinförliva fler socioekonomiska effekter i framtida forskning för att dra enmer komplett bild för alla berörda sektorer, och att komplettera data medfärska siffror för 2012 och 2013.
Francois, Frederic. "Policy-driven traffic engineering in energy-aware ISP backbone networks." Thesis, University of Surrey, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.606700.
Full textTrabé, Patrick. "Infrastructure réseau coopérative et flexible de défense contre les attaques de déni de service distribué." Toulouse 3, 2006. http://www.theses.fr/2006TOU30288.
Full textThe goal of Distributed Denial of Service attacks (DDoS) is to prevent legitimate users from using a service. The availability of the service is attacked by sending altered packets to the victim. These packets either consume a large part of networks bandwidth, or create an artificial consumption of victim’s key resources such as memory or CPU. DDoS’ filtering is still an important problem for network operators since illegitimate traffics look like legitimate traffics. The discrimination of both classes of traffics is a hard task. Moreover DDoS victims are not limited to end users (e. G. Web server). The network is likely to be attacked itself. The approach presented in this thesis is pragmatic. Firstly it seeks to control dynamic and distributed aspects of DDoS. Secondly it looks for protecting legitimate traffics and the network against collateral damages. Thus we propose a distributed infrastructure of defense based on nodes dedicated to the analysis and the filtering of the illegitimate traffic. Each node is associated with one POP router or interconnection router in order to facilitate its integration into the network. These nodes introduce the required programmability through open interfaces. The programmability offers applicative level packets processing, and thus treatments without collateral damages. A prototype has been developed. It validates our concepts
Priškin, Jiří. "Vysokofrekvenční obvodový analyzátor s DDS." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218400.
Full textPuniyani, Kriti. "Spatiotemporal Gene Networks from ISH Images." Research Showcase @ CMU, 2013. http://repository.cmu.edu/dissertations/338.
Full textWang, Hong Feng. "IGP traffic engineering : a comparison of computational optimization algorithms." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/20877.
Full textENGLISH ABSTRACT: Traffic Engineering (TE) is intended to be used in next generation IP networks to optimize the usage of network resources by effecting QoS agreements between the traffic offered to the network and the available network resources. TE is currently performed by the IP community using three methods including (1) IGP TE using connectionless routing optimization (2) MPLS TE using connection-oriented routing optimization and (3) Hybrid TE combining IGP TE with MPLS TE. MPLS has won the battle of the core of the Internet and is making its way into metro, access and even some private networks. However, emerging provider practices are revealing the relevance of using IGP TE in hybrid TE models where IGP TE is combined with MPLS TE to optimize IP routing. This is done by either optimizing IGP routing while setting a few number of MPLS tunnels in the network or optimizing the management of MPLS tunnels to allow growth for the IGP traffic or optimizing both IGP and MPLS routing in a hybrid IGP+MPLS setting. The focus of this thesis is on IGP TE using heuristic algorithms borrowed from the computational intelligence research field. We present four classes of algorithms for Maximum Link Utilization (MLU) minimization. These include Genetic Algorithm (GA), Gene Expression Programming (GEP), Ant Colony Optimization (ACO), and Simulated Annealing (SA). We use these algorithms to compute a set of optimal link weights to achieve IGP TE in different settings where a set of test networks representing Europe, USA, Africa and China are used. Using NS simulation, we compare the performance of these algorithms on the test networks with various traffic profiles.
AFRIKAANSE OPSOMMING: Verkeersingenieurswese (VI) is aangedui vir gebruik in volgende generasie IP netwerke vir die gebruiksoptimering van netwerkbronne deur die daarstelling van kwaliteit van diens ooreenkomste tussen die verkeersaanbod vir die netwerk en die beskikbare netwerkbronne. VI word huidiglik algemeen bewerkstellig deur drie metodes, insluitend (1) IGP VI gebruikmakend van verbindingslose roete-optimering, (2) MPLS VI gebruikmakend van verbindingsvaste roete-optimering en (3) hibriede VI wat IGP VI en MPLS VI kombineer. MPLS is die mees algemene, en word ook aangewend in metro, toegang en selfs sommige privaatnetwerke. Nuwe verskaffer-praktyke toon egter die relevansie van die gebruik van IGP VI in hibriede VI modelle, waar IGP VI gekombineer word met MPLS VI om IP roetering te optimeer. Dit word gedoen deur `of optimering van IGP roetering terwyl ’n paar MPLS tonnels in die netwerk gestel word, `of optimering van die bestuur van MPLS tonnels om toe te laat vir groei in die IGP verkeer `of die optimering van beide IGP en MPLS roetering in ’n hibriede IGP en MPLS situasie. Die fokus van hierdie tesis is op IGP VI gebruikmakend van heuristieke algoritmes wat ontleen word vanuit die berekeningsintelligensie navorsingsveld. Ons beskou vier klasse van algoritmes vir Maksimum Verbindingsgebruik (MVG) minimering. Dit sluit in genetiese algoritmes, geen-uitdrukkingsprogrammering, mierkoloniemaksimering and gesimuleerde temperoptimering. Ons gebruik hierdie algoritmes om ’n versameling optimale verbindingsgewigte te bereken om IGP VI te bereik in verskillende situasies, waar ’n versameling toetsnetwerke gebruik is wat Europa, VSA, Afrika en China verteenwoordig. Gebruikmakende van NS simulasie, vergelyk ons die werkverrigting van hierdie algoritmes op die toetsnetwerke, met verskillende verkeersprofiele.
Alila, Patrick. "Complementing network security to the ISO/IEC 27000 standard." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96298.
Full textAbujassar, Radwan Saoud. "Efficient recovery mechanisms over IGP and MANET networks." Thesis, University of Essex, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.558824.
Full textWindisch, Gerd. "Analyse, Modellierung und Verfahren zur Kompensation von CDN-bedingten Verkehrslastverschiebungen in ISP-Netzen." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-220779.
Full textŠišmiš, Lukáš. "Optimalizace IDS/IPS systému Suricata." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445503.
Full textYousef, Mohammed Ali. "Analysis and mitigation of routing loops in IGP networks." Thesis, University of Essex, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.542354.
Full textDubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.
Full textZhao, Fan, Yu Deng, and Xuan Qin. "Relationship and Network in Online B2B Business." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-54209.
Full textGracy, Sebin. "Input and State Observability of Linear Network Systems with Application to Security of Cyber Physical Systems." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT075/document.
Full textThis thesis deals with the notion of Input and State Observability (ISO) in linear network systems. One seeks graphical characterizations using the notion of structural (resp. s-structural) ISO. We first focus on linear time-invariant network systems ,represented by fixed graphs, and provide characterizations for strong structural ISO. Thereafter, we turn our attention to linear time-varying network systems wherein we first narrow our attention to the particular case of fixed graphs (i.e., the structure of the graph remains fixed; the weights along the edges are allowed to vary, thereby giving rise to time-varying dynamics). We show that, under suitable assumptions on the structure of input, output and feedthrough matrices, ISO of a system is equivalent to observability of a suitably defined subsystem. Subsequently, we exploit this equivalence to obtain graphical characterizations of structural (resp. s-structural) ISO.Thereafter, for the LTV setting, we consider the more general case of time-varying graphs and furthermore make no assumptions on the structure of system matrices. We introduce two suitable descriptions of the whole collection of graphs, which are named as dynamic graph and dynamic bipartite graph. Two equivalent characterizations of structural ISO are then stated in terms of existence of a linking and a matching of suitable size in the dynamic graph and in the dynamic bipartite graph, respectively. For strongly structural ISO, we provide a sufficient condition and a necessary condition, both concerning the existence of a uniquely restricted matching of suitable size in the dynamic bipartite graph and in a subgraph of it. When there is no direct feedthrough of the input on the measurements, the two conditions can be merged to give rise to a necessary and sufficient condition.Finally, we present an unbiased recursive algorithm that simultaneously estimates states and inputs. We focus on delay-$ell$ left invertible systems with intrinsic delay $ellgeq 1$, where the input reconstruction is possible only by using outputs up to $ell$ time steps later in the future. By showing an equivalence with a descriptor system, we state conditions under which the time-varying filter converges to a stationary stable filter, involving the solution of a discrete-time algebraic Riccati equation
Grajek, Michał. "Network effects, compatibility, and adoption of standards." Doctoral thesis, Humboldt-Universität zu Berlin, Wirtschaftswissenschaftliche Fakultät, 2005. http://dx.doi.org/10.18452/15205.
Full textThis thesis introduces a structural econometric model of demand exhibiting direct network effects. The structural approach we follow allows us to identify the extent of network effects and compatibility between competing networks. To the best of our knowledge, this is the first model that facilitates the identification in the case of direct network effects. At the same time, it is the first attempt to assess the degree of compatibility in an econometric framework. The model is then applied to investigate demand for mobile telecommunications service and the link between adoptions of ISO 9000 standard and international trade. The estimation results allow us to formulate some interesting policy conclusions.
Ngqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.
Full textGoh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Van, Rhyn Pierre. "Simplified field analysis of ISM-band OFDM-based industrial wireless sensor networks." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/62798.
Full textDie studie ondersoek ‘n nuwe metode om toevertroude oordraginformasietempo (OIT) van tipiese lokale IWM (industriële, wetenskaplike en mediese) band radiodatanetwerke te bepaal, wat gebaseer op ortogonale-frekwensiedeling multipleksering (OFDM), vir spesifieke toepassing in industriële radiosensor-netwerke (IRSNe) wat breëband deurlaatwerking vereis teen `n gespesifiseerde minimum diensvlak (DV) verwysing. Dié nuwe metode is gebaseer is op die waarneming van `n onbekende verskynsel wat vervolgens na verwys word as die diensvlak differensiële gebied (DVDG). Hierdie metode, wat ‘n aanpassing is vanaf die Internasionale Telekommunikasie Unie (ITU) se toetsmetodologie Y.1564, bemoontlik `n simplistiese wyse om `n gespesifiseerde deurlaatbandwydteverwysing tussen toetsnodus en aansluitingpunt (AP) te bepaal in terme van `n spesifieke reikafstand (in meter). `n Analitiese benadering word voorgestel om op `n eenvoudige wyse die verhouding te bepaal tussen die minimum deurlaat diensvlak bandwydteverwysing en die radioskakelbegroting, in desibel (dB). Die hoofbydrae van die studie is om aan die wetenskaplike gemeenskap die analitiese werktuie te voorsien wat benodig word om radionetwerkvermoëns, variasies en werkverrigting te bepaal, nie alleen volgens die aanvaarbare ruisvrye dinamiese bestek (RVDB) parameters nie, maar ook volgens die Y.1564 toetsmetodologie se voorgeskrewe diensvlakooreenkomste met betrekking tot industriële standaarde.
Thesis (PhD)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
Aristotelous, Andreas. "Single Board Computer for Standardized Onboard Vehicle Network." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188774.
Full textDetta examensarbete genomfördes i samarbete med Keolis Sverige AB. Ett av företagets mål är att söka efter möjliga system som ersättning till dyra, specialanpassade hårdvaruenheter och istället övergå till billiga enkortsdatorer. Som ett testfall föreslås ett enkelt program, som genomför identifiering av föraren genom att skanna streckkoden på körkortet (personnummer). Huvudsyftet med projektet är att hitta en lämplig enkortsdator, att implementera den föreslagna föraridentifieringsapplikationen, skicka körkortsnumret/personnumret med tidsstämpel till en webbsida och testa funktionaliteten hos enkortsdator enligt testrutiner som beskrivs av ISO- och IEC-standarder för vägfordon. En parser som analyserar indatasträngen av en streckkodsläsare implementerades i programmeringsspråket C. Streckkodsläsaren skannar en streckkod eller en QR-kod och parsern returnerar innehållet i streckkoden på ASCIIteckenformat. Körkortsnumret samt tidsstämpel publiceras på en webbsida. En webbsida har skapats med Django Web Framework, som är en databasdriven webbplats. Varje gång körkortets streckkod skannas, skickas en POST http-begäransmetod som utförs varvid både körkort och tidsstämpel lagras i en SQLite databas. Varje gång en GET-begäran skickas, lagras data i SQLite databasen och presenteras på webbplatsen. Kommunikationen mellan enkortsdatorn Raspberry Pi och ett Django-ramverk uppnås med hjälp av cURL, som är ett kommandoradsverktyg med öppen källkod, och ett bibliotek för att överföra data med URL-syntax. Uppgifterna på webbplatsen manipuleras i backend. Miljötålighetsprovning med avseende på värme- och fuktighet har utförts för att utvärdera systemets funktionalitet under specifika miljöförhållanden. Testerna specificeras i ISO- och IEC-standarder för vägfordon. Dessa tester visade vilka arbetstemperaturer och vilken luftfuktighet som Raspberry Pi klarar. Det kan konstateras att Raspberry Pi kan användas i passagerarutrymmet, där temperaturen förväntas ligga under 100 Celsius, men inte i motorrummet där temperaturer högre än 100 Celsius kan förekomma. Vidare har Raspberry Pi visat sig fungera vid de nivåer av luftfuktighet som har förkommit i testerna. I de fall där systemet skall användas i miljöer med högre temperaturer bör en dyrare och mer robust inbyggd (embedded) Linux-enkortsdator väljas. Det framtida arbetet bör omfatta vibrations- och elstörningstester för att fullt ut säkerställa att systemet klarar gällande ISO- och IEC-standarder. Dessa typer av test är kostsamma och bör därför genomföras av fordonstillverkare eller andra aktörer som förväntas kunna bära en sådan kostnad.
Azevedo, Marcelo Teixeira de. "Cibersegurança em sistemas de automação em plantas de tratamento de água." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-10012011-121525/.
Full textCurrently, information security is a constant concern of the several institutions and countries that use computing resources for communication and service offering purposes. Protection methods and countermeasures for traditional networks such as firewalls and intrusion detectors are known and ordinarily used. The same goes for control systems and data acquisition (Supervisory Control and Data Acquisition - SCADA). In the beginning, such systems were based on mainframes and closed architecture, i.e., dependent on manufacturers and consequently isolated from other systems. Nowadays, the SCADA systems converge more and more to platforms based on open systems, with its architecture strongly relied on connectivity; thus, it is usual the interconnection of such systems with the corporate network and, in some cases, with Internet itself. From this issue, and with the current technology development in the information security area, a methodology is proposed to implement automation systems in water treatment plants with an emphasis on security, and focused on industrial systems, using automation safety rules ISA 99. The purpose of this essay is, in brief, to study safety rules, methods and methodologies for industrial systems with a focus on water treatment, and to propose a methodology directed to the minimization of safety hazards. For that purpose, it is proposed the evaluation of three water treatment real scenarios so that it is possible to simulate criticality parameters identified in the flow chart and stages of the water treatment. Therefore, a scenario connected to PLC was developed, allowing the simulation of the behavior and the impacts, in addition to an event detector for the result analysis.
Tillberg, Emil. "Controller Area Network : Möjlig CAN-buss lösningar inom entreprenadbranschen." Thesis, Mittuniversitetet, Avdelningen för kvalitets- och maskinteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36881.
Full textThe company engcon Nordic AB produces equipment for the construction industry, where the product called tiltrotator is the heart of their business. To improve the use and simplify the installation, a literature study has been made that looks at two parts, first the function around CAN bus as the basis for a communication system and secondly various higher layer protocols (HLP) built on top of CAN. Why CAN bus was created and how the system works is important to understand in order to look at these overlying layers, called HLP (Higher Layer Protocol), which provides a kind of machine-human interface to work with. Different types of HLP can be J1939, ISOBUS or other. CAN bus is the de facto standard for vehicle networks where ECUs (Electronic Control Unit), called nodes, communicating on a common communication network, called bus. To do this, an ingenious technique has been developed to prioritize messages between nodes, which provides data loss-free arbitration. In CAN an advanced technique for error detection on the communication has been applied, and gives CAN the robustness to be applied in tough environment. As for various HLPs, a large number of these are available in different industries. Every one of these HLP has a common that they try to build a more or less user-friendly interface that can be implemented on top of CAN. For example, in the agricultural industry, the use of ISOBUS is common, which is an industrial standard that goes beyond competition to build a simple, user-friendly system that benefits the customer to the best possible extent. In automation, instead, CANopen is used, which is an open system that allows high interoperability between different units with so-called profiling. One last system used in a number of industries is called CanKingdom and is the most adaptable system in this project. In order to find out more industry-specific information about solutions and problems, an interview study was also conducted within the project. Here, various people were interviewed, active in different companies that are involved in CAN-based systems. This was done to look at relevant problems in their specific area. As a result, four options are specified which the project owner should look at in order to find a system that suits them. It is based on alternatives that either require access to the existing J1939 bus, or to build a more or less adapted model built on ISOBUS, CANopen or CanKingdom.
Betyg: 2019-08-15
Tomaga, Jakub. "Metodika zavedení síťové bezpečnosti v softwarové společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224224.
Full textWaseem, Athar, and A. H. M. Sadath Hossain. "MIMO Channel Equalization and Symbol Detection using Multilayer Neural Network." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2345.
Full textPelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.
Full textFrost, Per. "Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011." Thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138576.
Full textKukla, Michal. "Ray-tracing s knihovnou IPP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237265.
Full textKlíma, Jan. "Bezdrátové komunikační moduly pro mikrokontroléry." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219328.
Full textDoubková, Veronika. "Bezpečnostní rizika podle standardu ISO 27001." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412984.
Full textSilva, Rodrigo. "ITS-based decision making mechanism for opportunistic networking in heterogeneous network environment." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0174.
Full textDemand from different actors for extended connectivity where vehicles can exchange data with other devices have pushed vehicle manufacturers to invest in embedded solutions, which paves the way towards Cooperative Intelligent Transportation Systems (C-ITS). Cooperative vehicles enable the development of an ecosystem of services around them. Due to the heterogeneousness of such services and their specific requirements, for ubiquitous connectivity it is necessary to combine existing wireless technologies, providing applications with a communication architecture that hides such underlying access technologies specificities. Moreover, due to vehicles’ high velocity it is needed a Decision Maker (DM) mechanism capable to take into account the short-term prevision about network environment in order to better manage all flow communications. Based on the Intelligent Transportation Systems (ITS) architecture proposed by International Organization for Standardization (ISO), we proposed the Ant-based Decision Maker for Opportunistic Networking (AD4ON), a modular decision maker mechanism capable to choose the best available access network for each data flow in an heterogeneous and dynamic network environment. The proposed mechanism manages requirements and preferences from different actors, taking into account the short-term prevision about the network environment. Simulations have demonstrated that the AD4ON outperforms current benchmark algorithms, by increasing decision’s stability, reducing the “ping-pong” effect and maximizing flow’s satisfaction. Moreover, we demonstrate that taking into account the short-term prevision, the AD4ON can optimize the algorithm reaction time
Junior, Dagoberto Carvalio. "Uma plataforma para avaliar a degradação da vazão causada por interferência espectral em redes sem fio padrão IEEE 802.11." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-30032011-091330/.
Full textThe spectral interference generates pathologies in wireless communication systems (wireless), such as declines in communication and degradation in flow. The spectrum of RF (radio frequency) is supervised and controlled by government agencies, however the wireless standard IEEE 802.11, known as WLANs (Wireless Local Area Networks), work in unlicensed spectrum bands, known as ISM. These networks are increasingly involved in commercial and residential environments, contributing to issues and ubiquity of Internet access. With the significant increase in these networks, the spectral coverage is increasingly dense. The high density of signals pointing to the saturation of the ISM spectrum, causing mutual interference of IEEE 802.11 networks. The aim of this study is to analyze the coverage of the spectrum, for WLANs, and evaluate the flow falls caused by spectral interferences, varying in space and time. Two scenarios were mapped to examine the degradations, with a low to medium and one with high density and complexity. The purpose of creating these scenarios was to compare the degradation caused by interference in different environments, occupation, use and spread of signals WLANs. Through the results, a life cycle management of the spectrum of standard 802.11 networks was proposed. This cycle helps to evaluate and classify the state of a dense network, not dense, complex and not complex, since changes in occupation of the spectrum - in space and time - are plausible to occur. It is concluded that the impacts of the complete overlap of the channel, sources 802.11, are not sufficient to the substantial degradation of the flow in low to medium complexity. In environments with high density and complexity of the degradation is more evident, especially when there are disturbances coming from two adjacent sources
Jin, Xiao Ling Kathy. "Understanding the sustainability of online question answering communities in China : the case of "Yahoo! Answers China" /." access abstract and table of contents access full-text, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?phd-is-b30082328f.pdf.
Full text"Submitted to Department of Information Systems in partial fulfillment of the requirements for the degree of Doctor of Philosophy." Includes bibliographical references (leaves 88-106)
Šoustar, Jiří. "Modul rozhraní Ethernet pro platformu FITkit." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235428.
Full textPham, Thanh Son. "Autonomous management of quality of service in virtual networks." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP2147/document.
Full textThis thesis presents a fully distributed resilient routing scheme for switch-based networks. A failure is treated locally, so other nodes in the network do not need to undertakespecial actions. In contrast to conventional IP routing schemes, each node routesthe traffic on the basis of the entering arc and of the destination. The resulting constraintis that two flows to the same destination entering in a node by a common archave to merge after this arc. We show that this is sufficient for dealing with all singlelink failure situations, assuming that the network is symmetric and two-link connected.We model the dimensioning problem with an Integer Linear Program which can besolved exactly for small networks. We also propose several heuristics for larger networks.Our method generalizes the methods of Xi et Chao and Li and of Nelakuditiet al. who have proposed similar schemes in the context of IP. Our methods are moreefficient than previous ones. We have also studied the existence of a resilient routingscheme for single node failure situation in switch-based network. We study also thecase of multi-link failure situations and show that requiring the network to be connectedafter any failure does not guarantee the existence of a resilent routing schemeas described above
Kapusta, Martin. "Laboratorní úlohy pro výuku síťových technologií." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400886.
Full textReinecke, Isa [Verfasser], Dirk [Akademischer Betreuer] Fornahl, Dirk [Gutachter] Fornahl, and Jörg [Gutachter] Freiling. "The role of ego-centred networks in entrepreneurship / Isa Reinecke ; Gutachter: Dirk Fornahl, Jörg Freiling ; Betreuer: Dirk Fornahl." Bremen : Staats- und Universitätsbibliothek Bremen, 2018. http://d-nb.info/1165772272/34.
Full textElmes, Katherine. "Networks of Ambiguity in Project-Based Learning: Understanding How Students Experience and Manage Ambiguity in WPI's IQP Experience." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-theses/1255.
Full textReinecke, Isa Verfasser], Dirk [Akademischer Betreuer] [Fornahl, Dirk Gutachter] Fornahl, and Jörg [Gutachter] [Freiling. "The role of ego-centred networks in entrepreneurship / Isa Reinecke ; Gutachter: Dirk Fornahl, Jörg Freiling ; Betreuer: Dirk Fornahl." Bremen : Staats- und Universitätsbibliothek Bremen, 2018. http://nbn-resolving.de/urn:nbn:de:gbv:46-00106688-19.
Full textMihailovic, Andrej. "Mobility support for IP-based wireless networks." Thesis, King's College London (University of London), 2004. https://kclpure.kcl.ac.uk/portal/en/theses/mobility-support-for-ip--based-wireless-networks(b643754c-5730-4c62-a323-f5bf17768e89).html.
Full textChen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.
Full text