Tesi sul tema "Computer network protocols – Standards – Research"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-23 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Computer network protocols – Standards – Research".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Dibley, James. "An investigation of the XMOS XSl architecture as a platform for development of audio control standards". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011789.
Testo completoKheirkhah, Sabetghadam Morteza. "MMPTCP : a novel transport protocol for data centre networks". Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/61781/.
Testo completoNaicken, Stephen Murugapa. "Trusted content-based publish/subscribe trees". Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/38598/.
Testo completoKant, Tanya. "Making it personal : web users and algorithmic personalisation". Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/65082/.
Testo completoCheong, Chi Po. "Participant Domain Name Token Profile for security enhancements supporting service oriented architecture". Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/49364/.
Testo completoTsietsi, Mosiuoa Jeremia. "Prototyping a peer-to-peer session initiation protocol user agent". Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1006603.
Testo completoMcLean, Angus L. M. Thom III. "Real-time distributed simulation analysis : an application of temporal database and simulation systems research". Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9124.
Testo completoTsai, Shang-Yuan. "Device profiling analysis in Device-Aware Network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FTsai.pdf.
Testo completoThesis advisor(s): Singh Gurminder, John Gibson. Includes bibliographical references (p. 65-66). Also available online.
Foulkes, Philip James. "An investigation into the control of audio streaming across networks having diverse quality of service mechanisms". Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004865.
Testo completoMascarenhas, da Veiga Alves Manoel Eduardo. "Characterisation of end-to-end performance for web-based file server respositories". Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.
Testo completoKlaška, Patrik. "Návrh autentizace uživatelů ve společnosti". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378339.
Testo completoHsiao, Chih-Wen, David Turner e Keith Ross. "A secure lightweight currency service provider". CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Testo completoKonga, Yannick Lokombo Kala. "Formal specification and verification of peer-to-peer network protocols". 2011. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000638.
Testo completoThis research presented an integrated formal model of the JXTA protocol suite. The integrated model is constructed from the individual models describing the behaviours of protocols entities. Written in the PROMELA specification language, the finite state automata of these models are shown instead. The SPIN-based formal verification revealed that this studys integrated model was too large to perform for the computational resources available. This was in spite of the application of multiple complexity reduction techniques. Subsequently, as final recourse, the research resorted to the formal verification of individual protocols by making further abstraction of the interaction and dependencies between protocols. A number of errors were found including an invalid end state in the routing protocols and multiple non-progress cycles.
Srinivasan, Suman Ramkumar. "Improving Content Delivery and Service Discovery in Networks". Thesis, 2016. https://doi.org/10.7916/D8Z89CCC.
Testo completoChen, Mingye. "Performance evaluation of routing protocols using NS-2 and realistic traces on driving simulator". Thesis, 2014. http://hdl.handle.net/1805/4437.
Testo completoWith the rapid growth in wireless mobile communication technology, Vehicular Ad-hoc Network (VANET) has emerged as a promising method to effectively solve transportation-related issues. So far, most of researches on VANETs have been conducted with simulations as the real-world experiment is expensive. A core problem affecting the fidelity of simulation is the mobility model employed. In this thesis, a sophisticated traffic simulator capable of generating realistic vehicle traces is introduced. Combined with network simulator NS-2, we used this tool to evaluate the general performance of several routing protocols and studied the impact of intersections on simulation results. We show that static nodes near the intersection tend to become more active in packet delivery with higher transferred throughput.
Kabiwa, Tchokonte Maxime Stephane. "Development of an improved link metric for routing protocols in wireless ad-hoc networks". 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001649.
Testo completoDiscusses the interference and bandwidth adjusted ETX routing metric uses a logical interference model that refers to the interference arising from the Carrier Sensing Multiple Access with Collision Avoidance (CSMA-CA) based Medium Access Control. This approach of capturing inter-flow is complex and more restrictive. In this dissertation, a more realistic and less restrictive approach based on the information available at the physical layer (signal strength) is used to capture the interference.In contrast to the logical interference model, this has the excellent advantage of measuring the parameters using online data traffic. The question is whether actual capacity improvements can be achieved by considering the physical interference model.
Mahlaba, Simon Bonginkosi. "A MAC protocol for IP-based CDMA wireless networks". Thesis, 2005. http://hdl.handle.net/10413/2772.
Testo completoThesis (M.Sc.)-University of KwaZulu-Natal, Durban, 2005.
Zare, Afifi Saharnaz. "Securing sensor network". Thesis, 2014. http://hdl.handle.net/1805/6186.
Testo completoA wireless sensor network consists of lightweight nodes with a limited power source. They can be used in a variety of environments, especially in environments for which it is impossible to utilize a wired network. They are easy/fast to deploy. Nodes collect data and send it to a processing center (base station) to be analyzed, in order to detect an event and/or determine information/characteristics of the environment. The challenges for securing a sensor network are numerous. Nodes in this network have a limited amount of power, therefore they could be faulty because of a lack of battery power and broadcast faulty information to the network. Moreover, nodes in this network could be prone to different attacks from an adversary who tries to eavesdrop, modify or repeat the data which is collected by other nodes. Nodes may be mobile. There is no possibility of having a fixed infrastructure. Because of the importance of extracting information from the data collected by the sensors in the network there needs to be some level of security to provide trustworthy information. The goal of this thesis is to organize part of the network in an energy efficient manner in order to produce a suitable amount of integrity/security. By making nodes monitor each other in small organized clusters we increase security with a minimal energy cost. To increase the security of the network we use cryptographic techniques such as: public/ private key, manufacturer signature, cluster signature, etc. In addition, nodes monitor each other's activity in the network, we call it a "neighborhood watch" In this case, if a node does not forward data, or modifies it, and other nodes which are in their transmission range can send a claim against that node.
Pamulapati, Santhan. "Link failure detection in OSPF network using OpenFlow protocol". Thesis, 2014. http://hdl.handle.net/1805/4443.
Testo completoThe study of this thesis is focused on reducing the link failure detection time in OSPF network. When a link failure occurs, OSPF protocol detects it using RouterDeadInterval time. This timer is fired only after a predefined time interval, thus increasing the time of convergence after the link failure. There are previous studies to reduce the RouterDeadInterval time, but they introduce other effects which are discussed later in the thesis. So, a novel approach is proposed in this thesis to reduce the link failure detection time with the help of emerging network architecture Software Defined Networking (SDN) and OpenFlow Protocol.
Pandita, Shreya. "OpenFlow based load balancing and proposed theory for integration in VoIP network". Thesis, 2014. http://hdl.handle.net/1805/4444.
Testo completoIn today's internet world with such a high traffic, it becomes inevitable to have multiple servers representing a single logical server to share enormous load. A very common network configuration consists of multiple servers behind a load balancer. The load balancer determines which server would service a clients request or incoming load from the client. Such a hardware is expensive, runs a fixed policy or algorithm and is a single point of failure. In this paper, we will implement and analyze an alternative load balancing architecture using OpenFlow. This architecture acquires flexibility in policy, costs less and has the potential to be more robust. This paper also discusses potential usage of OpenFlow based load balancing for media gateway selection in SIP-PSTN networks to improve VoIP performance.
Lu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES". 2013. http://hdl.handle.net/1805/3425.
Testo completoThe web applications are now being used in many security oriented areas, including online shopping, e-commerce, which require the users to transmit sensitive information on the Internet. Therefore, to successfully authenticate each party of web applications is very important. A popular deployed technique for web authentication is the Hypertext Transfer Protocol Secure (HTTPS) protocol. However the protocol does not protect the careless users who connect to fraudulent websites from being trapped into tricks. For example, in a phishing attack, a web user who connects to an attacker may provide password to the attacker, who can use it afterwards to log in the target website and get the victim’s credentials. To prevent phishing attacks, the Two-Way Password Protocol (TPP) and Dynamic Two-Way Password Protocol (DTPP) are developed. However there still exist potential security threats in those protocols. For example, an attacker who makes a fake website may obtain the hash of users’ passwords, and use that information to arrange offline password guessing attacks. Based on TPP, we incorporated challenge responses with arbitrary images to prevent the off-line password guessing attacks in our new protocol, TPP with Challenge response using Arbitrary image (TPPCA). Besides TPPCA, we developed another scheme called Rain to solve the same problem by dividing shared secrets into several rounds of negotiations. We discussed various aspects of our protocols, the implementation and experimental results.
Puranik, Darshan Gajanan. "Real-time monitoring of distributed real-time and embedded systems using Web". 2014. http://hdl.handle.net/1805/3801.
Testo completoAsynchronous JavaScript and XML (AJAX) is the primary method for enabling asynchronous communication over the Web. Although AJAX is providing warranted real-time capabilities to the Web, it requires unconventional programming methods at the expense of extensive resource usage. WebSockets, which is an emerging protocol, has the potential to address many challenges with implementing asynchronous communication over the Web. There, however, has been no in-depth study that quantitatively compares AJAX and WebSockets. This thesis therefore provides two contributions to Web development. First, it provides an experience report for adding real-time monitoring support over the Web to the Open-source Architecture of Software Instrumentation of Systems(OASIS), which is open-source real-time instrumentation middleware for distributed real-time and embedded (DRE) systems. Secondly, it quantitatively compares using AJAX and WebSockets to stream collected instrumentation data over the Web in real-time. Results from quantitative comparison between WebSockets and AJAX show that a WebSockets server consumes 50% less network bandwidth than an AJAX server; a WebSockets client consumes memory at constant rate, not at an increasing rate; and WebSockets can send up to 215.44% more data samples when consuming the same amount network bandwidth as AJAX.
Marais, Hester 1961. "Authority control in an academic library consortium using a union catalogue maintained by a central office for authority control". Thesis, 2004. http://hdl.handle.net/10500/2546.
Testo completoInformation Science
D.Litt. et Phil. (Information Science)