Dissertations / Theses on the topic 'Network processors Computer architecture. Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network processors Computer architecture. Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Crowley, Patrick. "Design and analysis of architectures for programmable network processing systems /." Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/6991.
Full textBatra, Shalini. "An efficient algorithm and architecture for network processors." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-07052007-194448.
Full textDiler, Timur. "Network processors and utilizing their features in a multicast design." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FDiler.pdf.
Full textThesis advisor(s): Su Wen, Jon Butler. Includes bibliographical references (p. 53-54). Also available online.
Boivie, Victor. "Network Processor specific Multithreading tradeoffs." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2940.
Full textMultithreading is a processor technique that can effectively hide long latencies that can occur due to memory accesses, coprocessor operations and similar. While this looks promising, there is an additional hardware cost that will vary with for example the number of contexts to switch to and what technique is used for it and this might limit the possible gain of multithreading.
Network processors are, traditionally, multiprocessor systems that share a lot of common resources, such as memories and coprocessors, so the potential gain of multithreading could be high for these applications. On the other hand, the increased hardware required will be relatively high since the rest of the processor is fairly small. Instead of having a multithreaded processor, higher performance gains could be achieved by using more processors instead.
As a solution, a simulator was built where a system can effectively be modelled and where the simulation results can give hints of the optimal solution for a system in the early design phase of a network processor system. A theoretical background to multithreading, network processors and more is also provided in the thesis.
Omundsen, Daniel (Daniel Simon) Carleton University Dissertation Engineering Electrical. "A pipelined, multi-processor architecture for a connectionless server for broadband ISDN." Ottawa, 1992.
Find full textWinig, Robert J. "Conceptual design of a network architecture for a typical manufacturing information system using open systems integration." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07292009-090413/.
Full textMusasa, Mutombo Mike. "Evaluation of embedded processors for next generation asic : Evaluation of open source Risc-V processors and tools ability to perform packet processing operations compared to Arm Cortex M7 processors." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299656.
Full textNätverksprocessorer är en viktig byggsten av informationsteknik idag. I takt med att 5G nätverk byggs ut runt om i världen, många fler enheter kommer att kunna ta del av deras kraftfulla prestanda och programerings flexibilitet. Informationsteknik företag som Ericsson, spenderarmycket ekonomiska resurser på licenser för att kunna använda proprietära instruktionsuppsättnings arkitektur teknik baserade processorer från ARM holdings. Det är väldigt kostam att fortsätta köpa licenser då dessa arkitekturer är en byggsten till designen av många processorer och andra komponenter. Idag finns det en lovande ny processor instruktionsuppsättnings arkitektur teknik som inte är licensierad så kallad Risc-V. Tack vare Risc-V har många propietära och öppen källkod processor utvecklats idag. Det finns dock väldigt lite information kring hur bra de presterar i nätverksapplikationer är känt idag. Kan en öppen-källkod Risc-V processor utföra nätverks databehandling funktioner lika bra som en proprietär Arm Cortex M7 processor? Huvudsyftet med detta arbete är att bygga en test model som undersöker hur väl en öppen-källkod Risc-V baserad processor utför databehandlings operationer av nätverk datapacket jämfört med en Arm Cortex M7 processor. Detta har utförts genom att ta fram en C programmeringskod som simulerar en mottagning och behandling av 72 bytes datapaket. De följande funktionerna testades, inramning, parsning, mönster matchning och klassificering. Koden kompilerades och testades i både en Arm Cortex M7 processor och 3 olika emulerade öppen källkod Risc-V processorer, Arianne, SweRV core och Rocket-chip. Efter att ha testat några öppen källkod Risc-V processorer och använt test koden i en ArmCortex M7 processor, kan det hävdas att öppen-källkod Risc-V processor verktygen inte är tillräckligt pålitliga än. Denna rapport tyder på att öppen-källkod Risc-V emulatorer och verktygen behöver utvecklas mer för att användas i nätverks applikationer. Det finns ett behov av ytterligare undersökning inom detta ämne i framtiden. Exempelvis, en djupare undersökning av SweRV core processor, eller en öppen-källkod Risc-V byggd hårdvara krävs.
Nguyen, Van Minh. "Wireless Link Quality Modelling and Mobility Management for Cellular Networks." Phd thesis, Telecom ParisTech, 2011. http://tel.archives-ouvertes.fr/tel-00702798.
Full textCashman, Neil. "SMART : an innovative multimedia computer architecture for processing ATM cells in real-time." Thesis, University of Sussex, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313965.
Full textFink, Glenn Allen. "Visual Correlation of Network Traffic and Host Processes for Computer Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/28770.
Full textPh. D.
Ritholtz, Lee. "Intelligent text recognition system on a heterogeneous multi-core processor cluster a performance profile and architecture exploration /." Diss., Online access via UMI:, 2009.
Find full textIncludes bibliographical references.
Hassan, Hoda Mamdouh. "A Reference Model and Architecture for Future Computer Networks." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/27916.
Full textPh. D.
Iqneibi, Sami M. Carleton University Dissertation Engineering Electrical. "A blackboard architecture to support network fault diagnosis." Ottawa, 1992.
Find full textTarigopula, Srivamsi Mohanty Saraju. "A cam-based, high-performance classifier-scheduler for a video network processor." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-6045.
Full textGao, Xin. "A space-efficient wireless mesh network : architecture, frequency planning and routing /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20GAO.
Full textLeung, Yiu-cheung. "A reconfigurable neural network for industrial sensory systems /." Hong Kong : University of Hong Kong, 2000. http://sunzi.lib.hku.hk/hkuto/record.jsp?B23234441.
Full textLuan, Hao. "Peer-to-peer content distribution network design /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LUAN.
Full textAyvat, Birol. "An evaluation of best effort traffic management of server and agent based active network management (SAAM) architecture." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FAyvat.pdf.
Full textAgbeko, Joseph. "Evaluation and application of bloom filters in computer network security /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253733230.
Full textMotiwala, Murtaza. "An architecture for network path selection." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43576.
Full textVangal, Sriram R. "Performance and Energy Efficient Building Blocks for Network-on-Chip Architectures." Licentiate thesis, Linköping : Linköpings universitet, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7845.
Full textSrivatsa, Mudhakar. "Security Architecture and Protocols for Overlay Network Services." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.
Full textNottingham, Alastair. "GPF : a framework for general packet classification on GPU co-processors." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006662.
Full textLaTeX with hyperref package
Zhang, Ying Ping. "A study of architecture and performance of IBM Cyclops64 interconnection network." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.37Mb, 66 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428258.
Full textHei, Xiaojun. "End-to-end network measurement and its applications in peer-to-peer networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20HEI.
Full textMcKenzie, Neil R. "The Cranium network interface architecture : support for message passing on adaptive packet routing networks /." Thesis, Connect to this title online; UW restricted, 1997. http://hdl.handle.net/1773/6874.
Full text梁耀祥 and Yiu-cheung Leung. "A reconfigurable neural network for industrial sensory systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31224751.
Full textRuyter, Masood. "The measurement of enterprise architecture to add value to small and medium enterprises." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2293.
Full textSouth Africa has a complex financial and retail service industry with high reliance on the use of IT systems to ensure effectiveness and maintainability. Decision making and improved outcomes may be done through an IT aligned enterprise architecture (EA) strategy. EA is a capability that contributes to the support and success of an organisations' IT. Organisations are currently using EA to better align IT and the business strategy which provides a comprehensive v.ew of the IT system. Thus, EA is increasing in organisations yet the measurement and value of EA is limited to organisations and enterprise architects. The discussions of the benefits and value of EA has been discussed for several years, however there are still no consensus about how the benefits and value of EA can be measured. The lack and clear understanding of the benefits and value of EA needs to consider different aspects of IT as well as the shareholders when measuring the benefits and value of EA to an organisation.
Fan, Bo Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Sharing network measurements on peer-to-peer networks." Publisher:University of New South Wales. Electrical Engineering & Telecommunications, 2007. http://handle.unsw.edu.au/1959.4/40762.
Full textDai, Lillian Lei 1978. "Proactive mobile wireless networks : an infrastructureless wireless network architecture for delay-sensitive applications." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44409.
Full textIncludes bibliographical references (p. 197-213).
Infrastructureless wireless networks are an important class of wireless networks that is best suited for scenarios where there is temporary and localized telecommunication demand. Such networks consist of wireless devices that can form a network autonomously without the need for pre-deployed telecommunication infrastructures such as base-stations and access points. Over the past several decades, significant research and development efforts have been devoted to a particular type of infrastructureless wireless networks called mobile ad hoc wireless networks (MANETs). In addition to autonomous network formation, wireless devices in MANETs have routing capabilities and help one another to forward information in a multihop fashion. The applications envisioned for MANETs include communication during disaster relief, search and rescue, and small tactical unit operations where the existing telecommunication infrastructures may be destroyed or are unavailable. While significant strides have been made in all aspects of MANET networking, adoption of such technology has been limited to date despite its potential. We believe that this lack of adoption is due to a fundamental mismatch between application demands and the MANET network architecture. While the flexibility of anytime and anywhere communication offered by MANETs is appealing, these networks are not designed to provide assured service for delay-sensitive applications such as communication during a search and rescue mission or in a battlefield. In fact, MANETs may be frequently disconnected due to mobility and/or device failure. Such disconnections may persist for an unacceptable length of time, during which, there may be loss of critical time-sensitive information and degraded network performance due to mismatches to routing and transport layer protocols.
(cont.) To provide service assurance in these scenarios, it is insufficient to limit technical improvements to the traditional networking layers (such as power control, coding, or routing) since network disconnections may still occur. We argue that a Proactive Wireless Network Architecture is needed - one that proactively maintains network connectivity in order to provide assured message delivery for applications with high quality of service (QoS) demands. The two key features of a proactive wireless network are: (1) Network disconnection prediction via localization, trajectory prediction, and large-scale channel estimation and (2) Network topology control via the adaptive deployment of additional wireless devices, called helper nodes, and by proactively controlling their movements toward regions of predicted disconnections prior to the occurrence of such disconnections. Hence, unlike MANETs, proactive wireless networks are designed to anticipate and respond to network disconnection events via active connectivity maintenance with helper nodes, thereby preventing network disruptions and message loss. In this dissertation, we present the proposed proactive wireless network architecture, quantify operating scenarios where the proposed network architecture is a sensible choice, and present system-level performance analyses under various helper node deployment schemes.
by Lillian Lei Dai.
Ph.D.
Tarigopula, Srivamsi. "A CAM-Based, High-Performance Classifier-Scheduler for a Video Network Processor." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc6045/.
Full textGrandy, Richard Stephen. "Application of reliable host-based multicast to large scale simulations." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/R_Grandy_122007.pdf.
Full textGin, Andrew. "Building a Secure Short Duration Transaction Network." Thesis, University of Canterbury. Computer Science and Software Engineering, 2007. http://hdl.handle.net/10092/1188.
Full textZhang, Tao. "RADAR: compiler and architecture supported intrusion prevention, detection, analysis and recovery." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-08042006-122745/.
Full textAhamad, Mustaque, Committee Member ; Pande, Santosh, Committee Chair ; Lee, Wenke, Committee Member ; Schwan, Karsten, Committee Member ; Yang, Jun, Committee Member.
Chakravarti, Arjav Jagannath. "Scientific computation on a peer-to-peer network using mobile agents." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1086190904.
Full textTitle from first page of PDF file. Document formatted into pages; contains xvii, 119 p.; also includes graphics. Includes abstract and vita. Advisor: Gerald Baumgartner, Dept. of Computer and Information Science. Includes bibliographical references (p. 111-119).
Akbas, Mustafa Ilhan. "Evaluation Of Core Stateless Guaranteed Fair Network Architecture." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/2/12608027/index.pdf.
Full texts sub-protocols Core-Stateless Virtual Clock (CSVC), Core-Stateless Guaranteed Throughput (CSGT) and Core-Stateless Guaranteed Fairness (CSGF) are presented. Finally, the deficiencies in fairness of CSGF are demonstrated.
Tsietsi, Mosiuoa. "Prototyping a peer-to-peer session initiation protocol user agent /." [S.l. : s.n.], 2008. http://eprints.ru.ac.za/1115/.
Full textMacInnis, Robert F. "A scalable architecture for the demand-driven deployment of location-neutral software services." Thesis, University of St Andrews, 2010. http://hdl.handle.net/10023/1844.
Full textVenkateshwaran, Anjali. "An experimental investigation of dynamically reconfigurable computer network architectures through simulation." Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/43066.
Full textMaster of Science
Gummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Full textShi, Junxiao, and Junxiao Shi. "Named Data Networking in Local Area Networks." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625652.
Full textTsietsi, Mosiuoa Jeremia. "Prototyping a peer-to-peer session initiation protocol user agent." Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1006603.
Full textTönsing, Christoph Erik. "Energy -efficient MAC protocol for wireless sensor networks." Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-09042008-143948/.
Full textTorabkhani, Nima. "Modeling and analysis of the performance of networks in finite-buffer regime." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/51810.
Full textRanjan, Rishi. "Generic Architecture for Power-Aware Routing in Wireless Sensor Networks." Thesis, Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5001.
Full textMehendale, Hrushikesh Sanjay. "Lifenet: a flexible ad hoc networking solution for transient environments." Thesis, Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42781.
Full textHajiarabderkani, Masih. "Adaptive dissemination of network state knowledge in structured peer-to-peer networks." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/6761.
Full textWing, Peter D. "Enhancements to the XNS authentication-by-proxy model /." Online version of thesis, 1990. http://hdl.handle.net/1850/10613.
Full textMiller, Mark Henry Bruce. "The optimum communications architecture for deep level gold mining." Diss., Pretoria : [s.n.], 2000. http://upetd.up.ac.za/thesis/available/etd-01122007-124105/.
Full textLee, Myounghwan. "Quality of service with DiffServ architecture in hybrid mesh/relay networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34694.
Full text