Thèses sur le sujet « Protocole de communication SPI »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Protocole de communication SPI ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Bédard, Normand. « Sécurité d'une application de communication multimédia sous protocole IP dans un contexte médical ». Mémoire, Université de Sherbrooke, 2010. http://savoirs.usherbrooke.ca/handle/11143/1530.
Sharma, Neena. « SERIAL PROTOCOL BRIDGE ». University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352403332.
Aguilar, Teck. « Vers un protocole de routage géographique avec contention et communications coopératives pour les réseaux de capteurs ». Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00612332.
Salazar, Gaitàn Oscar. « Statégies de roaming inter-opérateur dans un réseau mobile hétérogène ». Paris, ENST, 2007. https://pastel.hal.science/pastel-00003796.
In a future, existing wireless access technologies such as WiFi (Wireless Fidelity), WiMAX (Worldwide Interoperability for Microwave Access) and UMTS (Universal Mobile Telecommunication System) will coexist on daily basis. Nevertheless, this daily coexistence does not imply that they will be able to fully interoperate. Thus, my research work focuses on a specific roaming scenario which is formed by heterogeneous wireless access networks managed by different operators. Our main objective is to provide a seamless (for the mobile user) roaming architecture to enable network interoperability under a heterogeneous multi-operator wireless environment, all this without major changes in current wireless architectures. In this regard, we also aim at reducing the roaming signaling exchange caused by the authentication and authorization mechanisms in the network registration and session initiation process while providing robust network security. The results obtained through computer simulation indicated that the use of our approach reduces significantly the network registration and session initiation delay, hence outperforming the traditional Roaming-SIP method. We also confirmed that the wireless delay introduced by the VN increases considerably when increasing the traffic congestion level in the Visiting Networks. Thus, from the simulations results we can state that by reducing the signaling message exchange, and maintaining acceptable congestion levels in the wireless network, hence reducing the wireless transmission delay, we can improved the overall de-lay in both network registration and session initiaition process
Richert, Adam. « Developing a Portable System for Medicine Dosage ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235738.
Projektet som presenteras i denna rapport är tänkt att utveckla ett portabelt elektroniskt system för användning som en medicinsk pillerbehållare. Med funktionaliteten att konfigurera upp till tolv dagligen upprepande alarm är syftet med medicindoseringssystemet först och främst att påminna användaren när de ska ta sin medicin. Lysdioder och användarens egna inspelade röst som notifikationer ska implementeras för att vidare hjälpa användaren att ta rätt medicin vid varje tillfälle. Enheten ska också ha en minneslogg som sparar upp till etthundra missade doseringar, vilket gör det möjligt för auktoriserad sjukvårdspersonal att verifiera användarens följsamhet till medicineringen.En översiktlig beskrivning av funktionaliteten samt det fysiska utseendet av enheten skrevs av projektägaren Victrix AB innan projektet startades. Det som detta projekt täcker är hårdvaruoch mjukvaruutvecklingen, så väl som där tillhörande designval. Projektet siktar på att följa den föreslagna funktionalitetsspecifikationen så nära som möjligt, och samtidigt göra välgrundade val för hårdoch mjukvara med enkelhet, effektivitet, energiförbrukning och tillgänglighet i åtanke. Genom att följa specifikationen är det slutliga målet att frambringa ökad medicinföljsamhet för användare av den med det här projektet utvecklade enheten.Utvecklingen av medicindoseringssystemet föregicks av en befogad bakgrundsstudie utformad genom användningen av kvalitativa forskningsmetoder. Hårdvara att användas för en första prototyp av enheten valdes sedan baserat på den insamlade informationen om existerande teknologier och relaterat arbete. Genom grundliga tester och regelbundet informationsutbyte med kunden konstruerades en prototyp av medicindoseringssystemet baserat på en Arduinomikrokontroller. Prototypen utvärderades att uppfylla 92% av kraven som Victrix ansåg vara av hög prioritet.
Costa, Daniel Gouveia. « Uma arquitetura baseada em SCTP e SIP para suporte a aplica??es VoIP m?veis e a especifica??o formal do seu m?dulo de controle ». Universidade Federal do Rio Grande do Norte, 2006. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15461.
New versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. A communication architecture is proposed herein, integrating SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle voice applications over IP networks with mobility requirements. User localization procedures are specified in the application layer as well, using SIP, as an alternative mean to the mechanisms used by traditional protocols, that support mobility in the network layer. The SDL formal specification language is used to specify the operation of a control module, which coordinates the operation of the system component protocols. This formal specification is intended to prevent ambiguities and inconsistencies in the definition of this module, assisting in the correct implementation of the elements of this architecture
Novas vers?es do protocolo SCTP permitem sua utiliza??o para implementa??o de mecanismos de handover em n?vel de transporte, bem como o fornecimento de um servi?o de transmiss?o de dados parcialmente confi?vel. Integrando o SCTP com o protocolo de inicia??o de sess?es, SIP, al?m de utilizar adicionalmente servi?os de outros protocolos auxiliares, uma arquitetura de comunica??o p?de ser proposta, a fim de atender ?s aplica??es de voz sobre IP com requisitos de mobilidade. S?o especificados ainda os procedimentos de localiza??o de usu?rio em n?vel de aplica??o, utilizando o protocolo SIP, como alternativa aos mecanismos empregados por protocolos tradicionais que suportam mobilidade na camada de rede. A linguagem de especifica??o formal SDL ? utilizada para especificar o funcionamento de um M?dulo de Controle, relacionado ? opera??o coordenada dos protocolos que comp?e a arquitetura. Pretende-se assim evitar ambig?idades e inconsist?ncias na defini??o desse m?dulo, o que pode auxiliar em implementa??es corretas de elementos dessa arquitetura
Shanmugalingam, Sivasothy. « Convergence of web and communication services ». Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00997697.
Lakay, Elthea Trevolee. « SIP-based content development for wireless mobile devices with delay constraints ». Thesis, University of the Western Cape, 2006. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_9048_1182233050.
SIP is receiving much attention these days and it seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services. Realizing this, there is the obvious need to provide a certain level of quality comparable to the traditional telephone service signalling system. Thus, we identified the major costs of SIP, which were found to be delay and security. This thesis discusses the costs of SIP, the solutions for the major costs, and the development of a low cost SIP application. The literature review of the components used to develop such a service is discussed, the networks in which the SIP is used are outlined, and some SIP applications and services previously designed are discussed. A simulation environment is then designed and implemented for the instant messaging service for wireless devices. This environment simulates the average delay in LAN and WLAN in different scenarios, to analyze in which scenario the system has the lowest costs and delay constraints.
Masri, Aladdin. « Vers le contrôle commande distribué des systèmes de production manufacturiers : approche composant pour la prise en compte de l'architecture de communication dans la modélisation ». Phd thesis, Ecole Centrale de Lille, 2009. http://tel.archives-ouvertes.fr/tel-00578841.
El, Saghir Bassam. « A new approach for context-aware management of SIP communications ». Evry, Institut national des télécommunications, 2009. http://www.theses.fr/2009TELE0009.
In recent years, the world telecommunications sector has undergone unprecedented changes driven mainly by the deployment of new communication technologies and services. Telecom operators are suffering from a steady decline in their revenues per user due to fierce competition and market saturation for traditional services. In order to attract new customers and retain existing ones, communication services proposed by these operators need to be aware of the user’s context, which includes information related to the user himself as well as his environment (e. G. His location, current activities and available devices). Unfortunately, interworking proposed context-aware solutions with current and next-generation networks still represents a big challenge for communication service providers as well as operators. This thesis addresses issues related to the development of context-aware communication systems by proposing a network-based agent called INCA (Intelligent Network-based Communication Assistant). INCA provides advanced management of SIP communications based on context information that is retrieved through a dedicated framework for context publication and notification. Its multilayered architecture is based on a generic layer model and implements a plan-centric approach for SIP session management. It also relies on a new context-aware communication model for providing communication adaptation based on user preferences
Mani, Mehdi. « Stratégies d'overlay de service : d'une architecture centalisée vers le Pair-à-Pair ». Paris 6, 2008. http://www.theses.fr/2008PA066188.
Troudi, Rami. « Étude, conception et structure de commande temps réel d'un onduleur multiniveau à partir d'une seule source DC ; applications énergies renouvelables et véhicules électriques ». Thesis, Poitiers, 2021. http://www.theses.fr/2021POIT2262.
Rami Troudi's thesis research work addresses three problematics:- the first is to design a three-phase multilevel inverter for applications based on renewable energies connected to the power grid, or for electric motor drive of electric vehicles. In the first application, the use of multilevel arms greatly limit the coupling inductances with the power grid, while in the second application, the torque delivered by the motor is of better quality.- the second is to design a DC-DC converter structure having only one DC source destinated to supply this multilevel inverter.- the third is the design of a real-time control architecture based on microcontrollers leading to a large capacity of evolution and calculation and an ease industrialization.The thesis manuscript is organized into four chapters.The first chapter presents a state of art of multilevel inverter structures. This technology is becoming an important research topic today. This chapter gives the advantages and disadvantages of each conventional multilevel inverter topology as well as the new topologies with a reduction in the number of components. This chapter also give a reviews of the state of art of chopper structures with one or multiple inputs-outputs (MISO, MIMO and SIMO). This chapter also presents the advantages and the disadvantages of each family of structure with their regulation. The end of the chapter presents the new topologies retained for the multilevel inverter and the SIQO chopper (one input-four outputs).The second chapter is devoted to the presentation of the structure of the proposed multilevel inverter, as well as to the study of its mode of operation, its close control device and its use in a closed loop application. This chapter shows that this structure has the advantage of minimizing losses in power components by having, at any time, few components that conduct the current of each arm, which allows to increase its efficiency. In addition, this chapter shows the simplicity of the used close control of the inverter employing a very simple algorithm. Experimental tests are given at the end of the chapter after the description of the test bed.The third chapter discusses in detail the structure of the SIQO DC-DC converter used to supply the multilevel inverter, its operation mode, its modeling and the development of a multi-input multi-output (MIMO) control. This structure is designed from a coupling of the SEPIC structure with the buck-boost structure and the doubling of each output by a switching system which leads to obtain four outputs from a single DC input. Each structure (SEPIC and buck-boost) manages two outputs with the calculation of two duty cycles. For this, a control synthesis based on an Hinfini method is presented to be robust to the variations of the currents and the changes of the setpoint. The results of the experimental tests are given at the end of the chapter after the description of the test bed.Chapter four discusses the development of one architecture based on multi-microcontroller system. This structure is applied to the control of the three-phase multilevel inverter. This chapter describes all the functions that compose this architecture at the hardware and software level. The distribution of the hardware and algorithmic needs several microcontrollers makes it easier to evolve the demands for additional functions, namely the diagnosis and reconfiguration of an arm, as well as the addition of the active filtering function. This architecture is based on SPI (Serial Peripheral Interface) bus communication which allows rapid exchanges between the microcontrollers and also towards an HMI (human-machine interfaces) system
Bonet, d'Oléon Karen de. « Spécification et validation du protocole de communication KerNet+ ». Nantes, 1991. http://www.theses.fr/1991NANT2066.
Elleuch, Wajdi. « Mobilité des sessions dans les communications multimédias en mode-conférence basées sur le protocole SIP ». Thèse, Université de Sherbrooke, 2011. http://hdl.handle.net/11143/5799.
Hussain, Intesab. « Solving flooding and SPIT based denial of service problems in voice over IP communications ». Thesis, Paris 5, 2013. http://www.theses.fr/2013PA05S007.
Session Initiation Protocol (SIP) is the widely used signaling protocol for voiceand video communication as well as other multimedia applications. Despiteof its flexibility and a common standard that can be leveraged to efficientlycombine a wide array of communication systems and technologies, it is exposedto a number of problems, including the vulnerability to several types of attacksdue to its open nature, in particular, and lack of a clear defense line. Likewise,flooding attack is one of the most destructive attacks targeting both User AgentServer (UAS) and User Agent Client (UAC), leading to a Denial of Service (DoS)in VoIP applications. In particular, INVITE message is considered as one of themajor root causes of flooding attacks in SIP. This is due to the fact that an attackermay send numerous INVITE requests without waiting for responses from theUAS or proxy in order to exhaust their resources. Moreover, SPIT problem inSIP is also a challenging issue which needs proper attention and appropriatesolutions.Most of the solutions proposed to overcome the flooding attacks are eitherdifficult to deploy in practice or require significant changes in the SIP servers.Additionally, the diverse nature of flooding attacks offers a huge challenge toenvisage appropriate prevention mechanisms. In this survey, we present acomprehensive study on flooding attacks against SIP by addressing its differentvariants and analyzing its consequences. We also classify the existing solutionscorresponding to different flooding behaviors, types and targets, and then weperform an extensive investigation of their main weaknesses and strengths.Additionally, we also take into account the underlying assumptions of eachsolution for a better understanding of its limitations. Specifically, we havethoroughly analyzed SPIT problems and few of the existing solutions proposedfor their prevention.The theoretical framework derived from our extensive literature survey led us topropose a solution for handling specific number of SIP requests in a particulartime window. Our proposed "Light Weight Scheme" is implemented in a SERSIP server. The evaluation results presented in this thesis depict the satisfactoryperformance of this approach. In order to cope with SIP flooding attacks, wepropose another solution based on "Strategy Based Proxy". This solution isdesigned for a SIP proxy that calculates the probability of a call being maliciouson the basis of its current experience. The obtained experience is also utilized tocalculate the probabilities of a successful call setup. This approach is useful forboth state-ful and state-less proxy servers.For dealing with SPIT, we have designed a 2-step solution. In first step, weextract the useful information from the VoIP traffic. In second step, we apply aNaive Bayes classifier on the date extracted from first step to determine whetherthe nature of an incoming SIP call is malicious or it is a harmless routine call.With this mechanism, we can detect the SPIT calls from a group of incomingSIP calls. Finally, we presents a detailed discussion and conclusions derivedfrom our case study carried out in this thesis along with future directions andpotential research areas related to VoIP security threats
Launay, Jean-Pierre. « Génération de code de protocole de communication par système expert ». Paris 9, 1995. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1995PA090030.
Saheb, Hakim. « Synthèse d'architecture pour les circuits de communication : application, projet Prometheus ». Phd thesis, Grenoble INPG, 1993. http://tel.archives-ouvertes.fr/tel-00344070.
ANIQUE, EMMANUEL. « Communication de groupe : service et protocole de transport a fiabilite integre ». Paris 6, 1997. http://www.theses.fr/1997PA066201.
Anique, Emmanuel. « Communication de groupe : service et protocole de transport à fiabilité intègre ». Paris 6, 1997. http://www.theses.fr/1997PA066784.
Boidé, Agnès Quentel Jean-Claude. « Proposition d'un protocole d'évaluation de la communication pré-verbale d'enfants avec autisme ». [S.l.] : [s.n.], 2007. http://castore.univ-nantes.fr/castore/GetOAIRef?idDoc=15061.
Fakih, Bilal. « Environnement décentralisé et protocole de communication pour le calcul intensif sur grille ». Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30179/document.
This thesis aims at designing an environment for the implementation of high performance computing applications on Grid platforms. We are interested in applications like loosely synchronous applications and pleasingly parallel applications. For loosely synchronous applications, we are interested in particular in applications in the domains of numerical simulation that can be solved via parallel or distributed iterative methods, i.e., synchronous, asynchronous and hybrid iterative method; while, for pleasingly parallel applications, we are interested in planning problems. Our thesis work aims at designing the decentralized environment GRIDHPC. GRIDHPC exploits all the computing resources (all the available cores of computing nodes) using OpenMP as well as several types of networks like Ethernet, Infiniband and Myrinet of the grid platform using the reconfigurable multi network protocol RMNP. Note that RMNP can configure itself automatically and dynamically in function of application requirements like schemes of computation, i.e., synchronous or asynchronous iterative schemes, elements of context like network topology and type of network like Ethernet, Infiniband and Myrinet by choosing the best communication mode between computing nodes and the best network. We present and analyze a set of computational results obtained on Grid5000 platform for the obstacle and planning problems
Iqbal, Zeeshan. « Self-Organizing Wireless Sensor Networks For Inter-Vehicle Communication ». Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-230.
Now a day, one of the most attractive research topics in the area of Intelligent Traffic Control is
Inter-vehicle communication (V2V communication). In V2V communication, a vehicle can
communicate to its neighbouring vehicles even in the absence of a central Base Station. The
concept of this direct communication is to send vehicle safety messages one-to-one or one-to-
many vehicles via wireless connection. Such messages are usually short in length and have very
short lifetime in which they must reach the destination. The Inter-vehicle communication system
is an ad-hoc network with high mobility and changing number of nodes, where mobile nodes
dynamically create temporary sensor networks and transferring messages from one network to
others by using multiple hops due to limitation of short range.
The goal of the project is to investigate some basic research questions in order to organize such
sensor networks and at the same time highlight the appropriate routing protocol that support
mobile ad hoc networks in an efficient and reliable manner.
In our investigation, we have answered the technical issues in order to construct a V2V
communication system. We have also studied some mobile ad hoc network routing protocols in
detail and then selected the DSR (Dynamic Source Routing) for our V2V communication and
then simulated it according to our system requirements. We are quite satisfied by the result of
DSR, but at the same time much more work is required to come up with an absolute application
for the end user.
Jacobs, Ashley. « Investigating call control using MGCP in conjuction with SIP and H.323 ». Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1006516.
Morin, Elodie. « Interopérabilité de protocole de communication adaptatifs basse-consommation pour des réseaux de capteurs ». Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM022/document.
The growth of various technologies dedicated to sensor networks (WSN) has led to the development of platforms capable of operating in two different technologies, adaptive to transmission contexts. Such platforms open the door to the design of multi-technology networks, which we propose to exploit to reduce overall energy consumption. In order to exploit these multi-technology networks, we describe the main Internet of Things (IoT) technologies, comparing them on an equal footing thanks to the analyzer we developed, and classify them according to the MAC mechanisms they use. We then analyze the link between the application context (latency and frequency of data generation) and the MAC mechanism that consumes the least energy for this application context.We note that the technologies operating with a synchronous MAC mechanism are the most suitable for periodic application traffic with short intervals between data generation. For these traffic patterns, clock drift leads to extensive traffic overhead because of the need to actively maintain synchronization for sparse periodic traffic.Moreover, we notice that, in the existing solutions, the management of sparce application traffic management is based on the use of an always-on platform (in reception mode). We thus propose to exploit the multi-technology platforms to build a synchronous network in which each node distributes its activity over time to globally save energy by replacing the role of the always-on platform, while guaranteeing the delivery of the latency-constrained asynchronous traffic.We notice that during the synchronous network joining phase, the situation of the node attempting to join a synchronous network is similar to the situation of an asynchronous node wanting to deliver data through a synchronous network.Thus, we propose to exploit the synchronous network joining phase to route latency-constrained traffic originating from asynchronous nodes through the synchronous network.However, the currently standardised network attachment procedures are naïve and energy-greedy, which discourages the use of an asynchronous communication mode, based on a succession of network associations/dissociations: we thus propose two approaches to reduce the cost of the TSCH network attachment procedure.The first is based on the use of mathematical sequences wich distribute the periods of activity over time, while minimizing the impact on the latency of the procedure, in order to reduce the overall energy cost of the attachment procedure. The second proposed method exploits the acknowledgement frames (ACK) of TSCH data communications to embed the date of the next synchronization frame transmission on the same physical channel as the ACK frame. Thanks to the development of a simulator of the TSCH joining phase, we show that the proposed protocols achieve better performance, either in terms of joining latency, or in terms of overall energy consumption, than the standard joining protocols used in WSN.Finally, we propose to exploit the mechanisms of the second proposal for sending request frames to a node operating with an asynchronous technology, thus enabling asynchronous traffic to be routed through a synchronous network in bounded latency. We demonstrate the value and feasibility of such a proposal
Hsieh, Ming Chih. « Service provisioning in two open-source SIP implementation, cinema and vocal ». Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1008195.
KMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Gouret, Wilfried. « Implantation de la communication CPL haut débit en embarqué ». Phd thesis, INSA de Rennes, 2007. http://tel.archives-ouvertes.fr/tel-00286944.
Alkhechi, Ahmad Bassel. « Contribution a la modelisation qualitative et quantitative des protocoles de communication : application au protocole xtp ». Paris 6, 1994. http://www.theses.fr/1994PA066007.
STEFFAN, LAURENT. « Conception et specification de protocoles de communication pour applications temps reel ». Nantes, 1988. http://www.theses.fr/1988NANT2046.
Hajjeh, Ibrahim. « Sécurité des échanges. Conception et validation d'un nouveau protocole pour la sécurisation des échanges ». Paris, ENST, 2003. https://pastel.archives-ouvertes.fr/pastel-00001168.
Many security mechanisms have been proposed for wired and wireless networks. Although these mechanisms have answered some security requirements, they remain efficient in a specific context related to the assumptions and the restrictive requirements which have been emitted at the time of their design. Firstly, we define a list of security requirements which make it possible to analyze the most deployed security solutions. Secondly, we propose to extend the SSL/TLS protocol with new services. SSL/TLS is a transparent security solution. Thus, security services providedto applications are the same. SSL/TLS does not meet specific needs to some classes of applications such as internet payment applications. We integrate the Internet Security Association and Key Management Protocol (ISAKMP) in SSL/TLS to provide, among others, identity protection and unification of security associations. In order to extend the use of SSL/TLS towards the Internet payment systems, we integrate a generic signature module in SSL/TLS that generate a non repudiation proof over all exchanged data. This module is interoperable with SSL/TLS and TLS Extensions standards. However, all these proposals suffer from the lack of interoperability with their previous versions. This will make it impossible to satisfy all the security needs through one existing protocol. Thus, we propose to design, validate and develop a new security protocol, which natively integrates the evolutions of the security protocols, in a powerful and elegant way. We called this protocol SEP for Secure and Extensible Protocol
Maxa, Jean-Aimé. « Architecture de communication sécurisée d'une flotte de drones ». Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30102/document.
Advances in miniaturization of embedded systems have helped to produce small Unmanned Aerial Vehicles (UAVs) with highly effective capacity. In order to improve their capability in civilian complex missions (for instance, to bypass an obstruction), it is now possible to deploy UAV swarms, in which cooperative UAVs share different tasks. This type of operations needs a high level of coordination between UAVs and Ground Control Station (GCS) through a frequent exchange of information. The communication capabilities are therefore an important objective to achieve for effective UAV swarm operations. Several communication architectures can be used to allow communication between UAVs and GCS. Ad hoc network is one of them and is an effective and promising solution for multi-UAV systems. Such a network is called UAANET (UAV Ad hoc Network) and is an autonomous system made of a UAV swarm and one or several GCS (Ground Control Station). This network can also be considered as a sub category of the well-known MANET (Mobile Ad hoc network). However, it has some specific features (such as node velocity, specific mobility model) that can impact performance of routing protocols. Furthermore, the nature of the wireless medium, along with the lack of fixed infrastructure, which is necessary to verify node and message authentication, create security breaches. Specifically, given the critical characteristic of the real-time data traffic, message authentication proves to be an important step to guarantee the security of the final UAS (composed of UAV swarm). Security of routing protocols has been widely investigated in wired networks and MANETs, but as far as we are aware, there is no previous research dealing with the security features of UAANET routing protocols. Those existing solutions can be adapted to meet UAANET requirements. With that in mind, in this thesis, we propose a secure and reliable communication architecture for a UAV swarm. In this work, the creation of UAANET has first been concieved. In order to do this, we studied the impact of existing MANET routing protocols into UAANET to assess their performance and to select the best performer as the core of our proposed secure routing protocol. Accordingly, we evaluated those existing routing protocols based on a realistic mobility model and realistic UAANET environment. Based on this first study, we created a secure routing protocol for UAANET called SUAP (Secure UAV Ad hoc routing Protocol). On the one hand, SUAP ensures routing services by finding routing paths between nodes to exchange real time traffic (remote monitoring video traffic). On the other hand, SUAP ensures message authentication and provides detection to avoid wormhole attack. The SUAP routing protocol is a reactive routing protocol using public key cryptography and hash chains. In order to detect wormhole attack, a geographical leash-based algorithm is used to estimate the correlation between the packet traveled distance and the hop count value. We also contribute to the certification of the secure communication system software through a Model-Driven Development (MDD) approach. This certification is needed to validate the operation of the UAV swarm, especially in cases where it is used to exchange control and command traffic. We used Simulink and Stateflow tools and formal verification tools of Matlab Software to design SUAP routing protocol. The evaluation of the effectiveness of SUAP has been executed both through emulation and real experiment studies. Our results show that SUAP ensures authentication and integrity security services and protects against a wormhole attack. It also provides an acceptable quality of service for real-time data exchanges
Beghdad, Rachid. « Étude d'un réseau local filaire/sans fil dédié à la domotique : développement du protocole de liaison de données ». Toulouse 2, 1997. http://www.theses.fr/1997TOU20075.
Technical advances in computer science and telecommunications have led to the design of distributed home automation applications, that imply transfer and coordination of several types of messages (voice, data, pictures). "Home automation" refers to any building new technologies for its equipment, usage, and management. Many research works have focused on the definition of new protocols to face the problem involving service and user mobility in premises. This thesis deals with the context of this study and proposes a topology of a home automation wireless local area network (WLAN). This topology proposes the incorporation of intelligent wireless links to a home automation network. It includes two normalized configurations IEEE 802. 11: a wired one called "infrastructure configuration", and a wireless one called "ad hoc configuration". In order to best manage the problem of access method in the proposed network, the author proposes a MAC layer derived from the future IEEE 802. 11 norm. The study leads to the development of a new LLC (logical link control) protocol supported by the chosen MAC layer, whatever the physical layer (whether wireless or wired). This protocol describes many types of relaying frame schemes in an end-to-end dialog between two mobiles. A formal description of the LLC protocol is provided, which uses the ESTELLE formal description technique
NGUYEN, VU THIENG AN. « Etude d'un protocole de communication utilisant l'acces multiple par repartition de codes. Applications aux liaisons intra-vehicule ». Rennes, INSA, 1997. http://www.theses.fr/1997ISAR0013.
Morin, Christine. « Protocole d'appel de multiprocédure à distance dans le système Gothic : définition et mise en oeuvre ». Phd thesis, Université Rennes 1, 1990. http://tel.archives-ouvertes.fr/tel-00432204.
Scherb, André. « La fable et le protocole : une dialectique fondatrice de processus de création dans la peinture contemporaine ». Paris 8, 2009. http://octaviana.fr/document/152359737#?c=0&m=0&s=0&cv=0.
Our study of the creation process in a selection of contemporary paintings has enabled us to distinguish two forms of thought: a fable and a protocol, where a fable is the emergence of the sense and a protocol, the creation of the work. We tried to highlight their presence during the invention of a painting, and gradually discovered that they spring from a non-verbal source. Our research leans on a personal pictorial practice, on the study of the work of artists, on theoretical papers and on interviews with six contemporary artists: Jean-François Maurige, Shirley Jaffe, Dominique Gauthier, Christian Bonnefoi, Béatrice Bescond and Janladrou. Given that there is a difference between what we make and what we think of making, we have been able to identify the presence of a deep pre-reflective thought ahead of any verbal expression. Thanks to neurosciences, to the complex thought theories (Edgar Morin, Miguel Benasayag), and to cognitive sciences research (Francisco Varela, Claire Petitmengin, Pierre Vermersch), we supposed that the impossibility to reach the totality of our cognitive activity incites us to constantly try to approach the inexpressible by producing a fable, which is then formulated verbally or plastically. The study shows the importance of a thought in action which presents a multitude of immediate micro-decisions during the making of a painting in the absence of internal debate, even if this specific shape of thought seems to be excluded from certain contemporary artistic practices because of a discharge of subjectivity and the exclusion of the body. The finished work reveals a concretized fable and protocol which are plastically expressed and allow the formulation process of the artist to be seen and felt. We assumed that it is this particular process which is captured by the observer and enables his own creative reformulation. The painting should therefore be considered – beyond the deliberate and abstract thought and beyond the object in its strict materiality – as a transformation process of the thought, which offers a temporary capture of the unthinkable
Hoerdt, Mickaël. « Source Specific Multicast (SSM) : Vers un service de communication de groupe inter-domaine extensible ». Université Louis Pasteur (Strasbourg) (1971-2008), 2005. http://www.theses.fr/2005STR13086.
Zouinkhi, Ahmed. « Contribution à la modélisation de produit actif communicant, Spécification et Evaluation d'un protocole de communication orienté sécurité des produits ». Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00594402.
Zouinkhi, Ahmed. « Contribution à la modélisation de produit actif communicant : spécification et évaluation d'un protocole de communication orienté sécurité des produits ». Thesis, Nancy 1, 2011. http://www.theses.fr/2011NAN10010/document.
Monitoring of chemical product storage is a delicate operation in the sense that it requires knowledge of the nature of each stored product, their location, their interaction and possible actions to be implemented in case of emergency. To facilitate the storage management, this thesis proposes to use the concept of ambient where the product has its own information system and wireless communication so as to make it intelligent and autonomous. This thesis proposes and develops a model of internal behavior of active product that allows a distributed approach of active security. This can lead to a communication protocol of application level to embed the active products. This protocol is formally assessed using hierarchical colored Petri nets. Finally, this protocol is implemented in the simulator Castalia/Omnet++ to analyze it in several scenarios and also for the experience when going to scale. The results show the usefulness and feasibility of the concept of active product
Andrey, Laurent. « Protocoles de communication et grammaires attribuées ». Nancy 1, 1993. http://www.theses.fr/1993NAN10083.
Gilbert, Johann. « Étude et développement d'un réseau de capteurs synchronisés à l'aide d'un protocole de communication sans fil dédié à l'Internet des objets ». Thesis, Toulon, 2018. http://www.theses.fr/2018TOUL0012/document.
In the last 20 years, the coming up of Internet of Things and Cloud Computing has conditionedthe need to deploy sensors everywhere to feed databases and analytics. To meet this requirements,new kind of networks have been massively deployed based on the sub-gigahertz frequency which haveunknown effect on human health.Couple the non-invasive aspect of the Visible Light Communication (VLC) with IoT could notonly reduce potential risks for human health but also avoid radio band saturation. However, today'stechniques consist mainly in broadcast data from light sources to receivers which is the opposite of theIoT paradigm. In this study, we will present a new design where the gateway is not a classic photodiodebut a camera.With this camera based method, we are able to design a star network using VLC. Even if the datarate is not the same as standard method, we are now able to collect data emanating from many sensorsat once with only one photoreceptor. This system also includes the ability of discriminate LED matrix,which transfer the same data faster, and single LED. Finally, data rate can be handle autonomouslyby the system to provide an optimal data transfer
Gossner, Olivier. « Jeux répétés et mécanisme de communication ». Paris 6, 1996. http://www.theses.fr/1996PA066168.
Yang, Fei. « Reliable and time-constrained communication in wireless sensor networks ». Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00706211.
Novali, Jean-Marc. « Modeles d'observation pour les architectures multicouches de protocoles de communication ». Toulouse, INSA, 1986. http://www.theses.fr/1986ISAT0039.
Maslekar, Nitin. « Adaptive Traffic Signal Control System Based on Inter-Vehicular Communication ». Rouen, 2011. http://www.theses.fr/2011ROUES046.
Hahm, Oliver. « Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols ». Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX090/document.
The Internet of Things aims to seamlessly integrate billions of so-called Smart Objects into traditional Internet infrastructures.From the hardware perspective, Smart Objects emerged when tiny, cheap computers became available, combining energy efficient micro-controllers, low-power radio transceivers, and sensors as well as actuators interacting with the physical world, often powered by batteries.Typically, Smart Objects are thus heavily constrained in terms of CPU, memory and energy resources.Furthermore, wireless links used for communication among Smart Objects or towards the Internet are often slow, subject to high packet loss, and may require spontaneous store-and-forward among peer Smart Objects to ensure connectivity.Such characteristics pose challenges, on one hand in terms of software running on Smart Objects, and on the other hand in terms of network protocols Smart Objects use to communicate.In consequence, novel evaluation methods and experimental tools are needed to study Smart Object networks in vivo, new software platforms are needed to efficiently operate Smart Objects, and innovative networking paradigms and protocols are required to interconnect Smart Objects.This thesis addresses these challenges by introducing new tools for large scale testbed-driven experimental research, a novel operating system (RIOT) applicable to a wide variety of connected Smart Objects, and several new mechanisms leveraging information-centric networking which significantly improve energy-efficiency compared to state-of-the-art network protocols in the Internet of Things
Chassot, Christophe. « Contribution aux protocoles et aux architectures de communication de bout en bout pour la QdS dans l'internet ». Habilitation à diriger des recherches, Institut National Polytechnique de Toulouse - INPT, 2005. http://tel.archives-ouvertes.fr/tel-00012152.
Hisarciklilar, Onur. « Formes et structures des annotations sémantiques pour supporter la communication en conception collaborative asynchrone ». Phd thesis, Grenoble INPG, 2008. http://tel.archives-ouvertes.fr/tel-00419297.
Ambroise, Matthieu. « Hybridation des réseaux de neurones : de la conception du réseau à l’interopérabilité des systèmes neuromorphiques ». Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0394/document.
HYBRID experiments allow to connect a biological neural network with an artificial one,used in neuroscience research and therapeutic purposes. During these three yearsof PhD, this thesis focused on hybridization in a close-up view (bi-diretionnal direct communication between the artificial and the living) and in a broader view (interoperability ofneuromorphic systems). In the early 2000s, an analog neuromorphic system has been connected to a biological neural network. This work is firstly, about the design of a digital neural network, for hybrid experimentsin two multi-disciplinary projects underway in AS2N team of IMS presented in this document : HYRENE (ANR 2010-Blan-031601), aiming the development of a hybrid system for therestoration of motor activity in the case of a spinal cord lesion,BRAINBOW (European project FP7-ICT-2011-C), aiming the development of innovativeneuro-prostheses that can restore communication around cortical lesions. Having a configurable architecture, a digital neural network was designed for these twoprojects. For the first project, the artificial neural network emulates the activity of CPGs (Central Pattern Generator), causing the locomotion in the animal kingdom. This activity will trigger aseries of stimuli in the injured spinal cord textit in vitro and recreating locomotion previously lost. In the second project, the neural network topology will be determined by the analysis anddecryption of biological signals from groups of neurons grown on electrodes, as well as modeling and simulations performed by our partners. The neural network will be able to repair the injuredneural network. This work show the two different networks design approach and preliminary results obtained in the two projects.Secondly, this work hybridization to extend the interoperability of neuromorphic systems. Through a communication protocol using Ethernet, it is possible to interconnect electronic neuralnetworks, computer and biological. In the near future, it will increase the complexity and size of networks
TAWBI, WASSIM. « La qualite de service dans les systemes de communication multimedia : un cadre d'etude et specification d'un protocole de negociation entre applications ». Paris 6, 1993. http://www.theses.fr/1993PA066477.
Chabrol, Damien. « Etude, conception et mise en oeuvre d'un protocole de communication synchrone tolérant aux fautes et prédictible sur des composants réseaux standards ». Paris 11, 2006. http://www.theses.fr/2006PA112055.
This PhD thesis contributes to the design and realization of safety-critical real-time systems over multiprocessor architectures with distributed memory. They are an essential component of computing systems intended to ensure complex and critical functions. This PhD thesis concerns essentially communications media which conditions strongly the capability of the system to respect the timeliness property and the dependability requirements. Our contribution is distinguished by these following points:-The design of predictable and fault-tolerant synchronous communication protocol;-The study and the definition of the execution model to the efficient and safe communications management;-The proposal of a method to generate automatically the communications scheduling. Our approach is based on communication model which allows the analysis of the feasibility, before execution, of a distributed safety-critical real-time system with timeliness and safety requirements guarantees. This leads to define a execution model based on a time-triggered and parallel communications management. A constraints system is generated automatically to compute network scheduling in checking the network load and the timeliness respect. Then, the proposed communications interface is based on a TDMA protocol, with a advanced version, which allows to use as well as proprietary components (TTP, FlexRay) than standard components. These PhD works have been realized and integrated into an extended development package of the OASIS project from the CEA/Saclay
Conti, Matteo. « Implementazione di sistemi per visible light communication su Raspberry Pi ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.