Auswahl der wissenschaftlichen Literatur zum Thema „Network devices“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Network devices" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Network devices"

1

Hamza, Muhammad, Syed Mashhad M. Geelani, Qamar Nawaz, Asif Kabir und Isma Hamid. „Clustering of IoT Devices Using Device Profiling and Behavioral Analysis to Build Efficient Network Policies“. April 2021 40, Nr. 2 (01.04.2021): 335–45. http://dx.doi.org/10.22581/muet1982.2102.08.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) has emerged as a new paradigm, and billions of devices are connected with the internet. IoT is being penetrated in major domains of daily life like health care, agriculture, industry, smart homes and monitoring of the environment. The operator of such complex, huge and diverse heterogeneous networks may not even be fully aware of their IoT devices working, activity, behavior and resource utilization etc. The efficient management of IoT devices becomes a challenge for network managers to ensure smooth network operation. Network traffic analysis of IoT devices is a necessary and rudimentary tool to understand the behavior of devices. In this paper firstly, we identify insights of device network traffic, discuss the activity patterns of some IoT devices and present a visual description of the pattern of IoT devices. Secondly, after analyzing the device's behavior, we build and demonstrate a profile of each device based on its activity cycle and traffic patterns information. Thirdly, the K-Means clustering algorithm is used to make clusters of IoT devices using their profile information. The clustering algorithm groups similar devices in a single group. The obtained results clearly describe the patterns of devices which help the network managers to make appropriate network policies for efficient secure network management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ahmad, Hamza Sajjad, Muhammad Junaid Arshad und Muhammad Sohail Akram. „Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes“. International Journal of Embedded and Real-Time Communication Systems 12, Nr. 3 (Juli 2021): 1–13. http://dx.doi.org/10.4018/ijertcs.2021070101.

Der volle Inhalt der Quelle
Annotation:
To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Rodriguez Medel, Abel, und Jose Marcos C. Brito. „Random-Access Accelerator (RAA): A Framework to Speed Up the Random-Access Procedure in 5G New Radio for IoT mMTC by Enabling Device-To-Device Communications“. Sensors 20, Nr. 19 (25.09.2020): 5485. http://dx.doi.org/10.3390/s20195485.

Der volle Inhalt der Quelle
Annotation:
Mobile networks have a great challenge by serving the expected billions of Internet of Things (IoT) devices in the upcoming years. Due to the limited simultaneous access in the mobile networks, the devices should compete between each other for resource allocation during a Random-Access procedure. This contention provokes a non-depreciable delay during the device’s registration because of the great number of collisions experienced. To overcome such a problem, a framework called Random-Access Accelerator (RAA) is proposed in this work, in order to speed up network access in massive Machine Type Communication (mMTC). RAA exploits Device-To-Device (D2D) communications, where devices with already assigned resources act like relays for the rest of devices trying to gain access in the network. The simulation results show an acceleration in the registration procedure of 99%, and a freed space of the allocated spectrum until 74% in comparison with the conventional Random-Access procedure. Besides, it preserves the same device’s energy consumption compared with legacy networks by using a custom version of Bluetooth as a wireless technology for D2D communications. The proposed framework can be taken into account for the standardization of mMTC in Fifth-Generation-New Radio (5G NR).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sun, Wei, Hao Zhang, Li-jun Cai, Ai-min Yu, Jin-qiao Shi und Jian-guo Jiang. „A Novel Device Identification Method Based on Passive Measurement“. Security and Communication Networks 2019 (23.06.2019): 1–11. http://dx.doi.org/10.1155/2019/6045251.

Der volle Inhalt der Quelle
Annotation:
Nowadays, with the continuous integration of production network and business network, more and more Industrial Internet of Things and Internal Office Network have been interconnected and evolved into a large-scale enterprise-level intraindustry network. Terminal devices are the basic units of internal network. Accurate identification of the type of device corresponding to the IP address and detailed description of the communication behavior of the device are of great significance for conducting network security risk assessment, hidden danger investigation, and threat warning. Traditional cyberspace surveying and mapping techniques take the form of active measurement, but they cannot be transplanted to large-scale intranet. Resources or specific targets in internal networks are often protected by firewalls, VPNs, gateways, and other technologies, so they are difficult to analyze and determine by active measurement. In this paper, a passive measurement method is proposed to identify and characterize devices in the network through real traffic data. Firstly, a new graph structure mining method is used to determine the server-like devices and host-like devices; then, the NAT-like devices are determined by quantitative analysis of traffic; finally, by qualitative analysis of the NAT-like device traffic, it is determined whether there are server-like devices behind the NAT-like device. This method will prove to be useful in identifying all kinds of devices in network data traffic, detecting unauthorized NAT-like devices and whether there are server-like devices behind the NAT-like devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hasan Al-Bowarab, Mustafa, Nurul Azma Zakaria, Zaheera Zainal Abidin und Ziadoon Kamil Maseer. „Review on Device-to-Device Communication in Cellular based Network Systems“. International Journal of Engineering & Technology 7, Nr. 3.20 (01.09.2018): 435. http://dx.doi.org/10.14419/ijet.v7i3.20.20587.

Der volle Inhalt der Quelle
Annotation:
In a traditional cellular-network based system, the devices are not allowed to be interconnected directly in the certified mobile bandwidth, and all communications are carried out via the base station (BS). At present, device terminal broadcasting allows devices in the distributed network to act as transmitting relays to each other and reach a massive ad hoc network of networks that is different from the previous cellular architecture that faces technical challenges. Therefore, this article explores the application of a cellular-based two-layer network system that includes a base station (BS) cellular layer, such as cellular-to-device communication and communication between devices. In the proposed two-tier cellular-based network system, user data is transmitted through other users' devices to implement the privacy protection that is lacking in prior communication between devices in cellular systems. To ensure a negligible impact on the performance of current communication between devices, a two-layer network is assimilated to autonomous interference management schemes and associated resource allocation schemes. The findings from this review provide an overview of the major challenges in two-tier networks and propose a two-tier cellular-based system in which user data is routed through other users' devices to implement privacy protection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Yi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen und Kuan-Hung Lai Yu-Liang Tang. „Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks“. 網際網路技術學刊 23, Nr. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.

Der volle Inhalt der Quelle
Annotation:
<p>This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission rate and the channel occupancy rate, the proposed system has &ldquo;knowledge&rdquo; of overall transmission behavior and can regulate transmission resources. An Adaptive Connection Assignment (ACA) mechanism is proposed for end devices; it find out target end devices with poor transmission performance, analyzes their alternative Access Point (AP) availability and causes them to change connections to improve transmission performance. An Adaptive Channel Utilization (ACU) mechanism is designed for APs to identify a target AP that is suffering from interference, to analyze its alternative channel availability and to require it to change its working channel to improve transmission efficiency. Results of simulations of various scenarios indicate that the throughput of end devices is increased by 15 to 24%, the throughput of APs is increased by 6 to 47% and the retransmission rate of APs is reduced by 0.4 to 5.3%.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Rondeau, Christopher M., J. Addison Betances und Michael A. Temple. „Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting“. Security and Communication Networks 2018 (11.07.2018): 1–14. http://dx.doi.org/10.1155/2018/1489347.

Der volle Inhalt der Quelle
Annotation:
This work provides development of Constellation Based DNA (CB-DNA) Fingerprinting for use in systems employing quadrature modulations and includes network protection demonstrations for ZigBee offset quadrature phase shift keying modulation. Results are based on 120 unique networks comprised of seven authorized ZigBee RZSUBSTICK devices, with three additional like-model devices serving as unauthorized rogue devices. Authorized network device fingerprints are used to train a Multiple Discriminant Analysis (MDA) classifier and Rogue Rejection Rate (RRR) estimated for 2520 attacks involving rogue devices presenting themselves as authorized devices. With MDA training thresholds set to achieve a True Verification Rate (TVR) of TVR = 95% for authorized network devices, the collective rogue device detection results for SNR ≥ 12 dB include average burst-by-burst RRR ≈ 94% across all 2520 attack scenarios with individual rogue device attack performance spanning 83.32% < RRR < 99.81%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Laguidi, Ahmed, Tarik Hachad und Lamiae Hachad. „Mobile network connectivity analysis for device to device communication in 5G network“. International Journal of Electrical and Computer Engineering (IJECE) 13, Nr. 1 (01.02.2023): 680. http://dx.doi.org/10.11591/ijece.v13i1.pp680-687.

Der volle Inhalt der Quelle
Annotation:
<p><span>Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or out-band mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.</span></p>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ogogo, Wycliffe Lamech. „Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security“. East African Journal of Information Technology 3, Nr. 1 (04.03.2021): 1–6. http://dx.doi.org/10.37284/eajit.3.1.153.

Der volle Inhalt der Quelle
Annotation:
The business world has been significantly affected by network intrusion leading to infringement of privacy and unprecedented economic losses. Therefore, real-time monitoring of network devices is important due to the enhanced and complex network systems in organizations and associated cyber threats. Real-time monitoring provides adequate alerts and updates regarding specific networks and their performance as soon as they occur. Constant monitoring of devices also makes it possible for organizations to detect any possible challenges that the networks may be encountering. This paper examines the effectiveness of real-time monitoring of network devices in a bid to enhance network security. The study was an empirical review of recently published research papers, journals, internet sites, and books with relevant content. The findings of this study revealed that Real-time device monitoring has many potential advantages to organizations by securing their systems thereby enhancing their overall performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

A., Dr Sathesh. „OPTIMIZED MULTI-OBJECTIVE ROUTING FOR WIRELESS COMMUNICATION WITH LOAD BALANCING“. Journal of Trends in Computer Science and Smart Technology 2019, Nr. 02 (23.12.2019): 106–20. http://dx.doi.org/10.36548/jtcsst.2019.2.004.

Der volle Inhalt der Quelle
Annotation:
The rapid advancements in the wireless communication networks have increased the popularity of portable or mobile devices and the network framed with these mobile devices. These mobile networks framed using the volunteering portable devices are decentralized and have dynamic topologies experiencing sudden changes in the network structure. The main reason causing the topology changes are the limited energy availability of the device and their mobility. Improper trafficking of the tasks and improper selection of the portable devices causes maximum energy consumption resulting in the link failures and changes in the topology of the network. So the paper puts forward the hybridized optimization technique to handle the multi-objective problem faced by these decentralized networks. The proposed method is validated using the network simulator-2 to evince throughput, energy consumption and the network longevity achieved by the proposed method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Network devices"

1

Alexander, David. „A Network Metadata Infrastructure for Locating Network Devices“. Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kühnert, Wolfram. „Dynamic Devices Network Architecture“. [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10952962.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zenteno, Efrain. „Vector Measurements for Wireless Network Devices“. Licentiate thesis, KTH, Signalbehandling, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-111863.

Der volle Inhalt der Quelle
Annotation:
Wireless networks are an iconic technology of today’s modern era, theyare present in our daily activities as can be exemplified by cellular communications,wi-fi, bluetooth, and others. Vector measurements play an importantrole in the design, simulation, and testing of wireless networks and are usedto characterize key devices operating in the radio interface, such as amplifiers,filters, and mixers.Accurate characterization is the key for improving the capacity and efficiencyof wireless networks. As the demand for network capacity continuouslyincreases, the accuracy of vector measurements must also improve. Further,it is anticipated that such trends will continue in the years to come. Consequently,the wireless industry needs to include nonlinear behavior in theircharacterization and analysis, to assess and guaranty the operation of the devices,and to comply to the specifications from governmental regulations. Incontrast to linear behavior, nonlinear behavior presents an additional bandwidthrequirement because the signal bandwidth grows when it passes throughnonlinear devices. In this thesis, vector measurements for devices operatingin wireless networks are studied, emphasizing a synthetic approach for theinstrumentation. This approach enables the use of digital post-processing algorithms,which enhances the measurement accuracy and/or speed and canovercome hardware impairments. This thesis presents the design of a vectorialmeasurement system for wireless devices considering the aforementionedtrends and requirements. It also explores the advantages of the proposedapproach, describes its limitations, and discusses the digital signal processingalgorithms used to reach its final functionality. Finally, measurement resultsof the proposed setup are presented, analyzed and compared to those of modernindustrial instruments.

QC 20130204

APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Duan, Xiao. „DSP-enabled reconfigurable optical network devices and architectures for cloud access networks“. Thesis, Bangor University, 2018. https://research.bangor.ac.uk/portal/en/theses/dspenabled-reconfigurable-optical-network-devices-and-architectures-for-cloud-access-networks(68eaa57e-f0af-4c67-b1cf-c32cfd2ee00f).html.

Der volle Inhalt der Quelle
Annotation:
To meet the ever-increasing bandwidth requirements, the rapid growth in highly dynamic traffic patterns, and the increasing complexity in network operation, whilst providing high power consumption efficiency and cost-effectiveness, the approach of combining traditional optical access networks, metropolitan area networks and 4-th generation (4G)/5-th generation (5G) mobile front-haul/back-haul networks into unified cloud access networks (CANs) is one of the most preferred “future-proof” technical strategies. The aim of this dissertation research is to extensively explore, both numerically and experimentally, the technical feasibility of utilising digital signal processing (DSP) to achieve key fundamental elements of CANs from device level to network architecture level including: i) software reconfigurable optical transceivers, ii) DSP-enabled reconfigurable optical add/drop multiplexers (ROADMs), iii) network operation characteristics-transparent digital filter multiple access (DFMA) techniques, and iv) DFMA-based passive optical network (PON) with DSP-enabled software reconfigurability. As reconfigurable optical transceivers constitute fundamental building blocks of the CAN’s physical layer, digital orthogonal filtering-based novel software reconfigurable transceivers are proposed and experimentally and numerically explored, for the first time. By making use of Hilbert-pair-based 32-tap digital orthogonal filters implemented in field programmable gate arrays (FPGAs), a 2GS/s@8-bit digital-to-analogue converter (DAC)/analogue-to-digital converter (ADC), and an electro-absorption modulated laser (EML) intensity modulator (IM), world-first reconfigurable real-time transceivers are successfully experimentally demonstrated in a 25km IMDD SSMF system. The transceiver dynamically multiplexes two orthogonal frequency division multiplexed (OFDM) channels with a total capacity of 3.44Gb/s. Experimental results also indicate that the transceiver performance is fully transparent to various subcarrier modulation formats of up to 64-QAM, and that the maximum achievable transceiver performance is mainly limited by the cross-talk effect between two spectrally-overlapped orthogonal channels, which can, however, be minimised by adaptive modulation of the OFDM signals. For further transceiver optimisations, the impacts of major transceiver design parameters including digital filter tap number and subcarrier modulation format on the transmission performance are also numerically explored. II Reconfigurable optical add/drop multiplexers (ROADMs) are also vital networking devices for application in CANs as they play a critical role in offering fast and flexible network reconfiguration. A new optical-electrical-optical (O-E-O) conversion-free, software-switched flexible ROADM is extensively explored, which is capable of providing dynamic add/drop operations at wavelength, sub-wavelength and orthogonal sub-band levels in software defined networks incorporating the reconfigurable transceivers. Firstly, the basic add and drop operations of the proposed ROADMs are theoretically explored and the ROADM designs are optimised. To crucially validate the practical feasibility of the ROADMs, ROADMs are experimentally demonstrated, for the first time. Experimental results show that the add and drop operation performances are independent of the sub-band signal spectral location and add/drop power penalties are < 2dB. In addition, the ROADMs are also robust against a differential optical power dynamic range of > 2dB and a drop RF signal power range of 7.1dB. In addition to exploring key optical networking devices for CANs, the first ever DFMA PON experimental demonstrations are also conducted, by using two real-time, reconfigurable, OOFDM-modulated optical network units (ONUs) operating on spectrally overlapped multi-Gb/s orthogonal channels, and an offline optical line terminal (OLT). For multipoint-to-point upstream signal transmission over 26km SSMF in an IMDD DFMA PON, experiments show that each ONU achieves a similar upstream BER performance, excellent robustness to inter-ONU sample timing offset (STO) and a large ONU launch power variation range. Given the importance of IMDD DFMA-PON channel frequency response roll-off, both theoretical and experimental explorations are undertaken to investigate the impact of channel frequency response roll-off on the upstream transmission of the DFMA PON system Such work provides valuable insights into channel roll-off-induced performance dependencies to facilitate cost-effective practical network/transceiver/component designs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cardwell, Gregory S. „Residual network data structures in Android devices“. Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5506.

Der volle Inhalt der Quelle
Annotation:
Approved for public release; distribution is unlimited
The emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, this thesis identifies network metadata stored by the Android operating system that can be readily retrieved from the device's internal non-volatile storage. The identified network metadata can ascertain the identity of prior network access points to which the device associated. An important by-product of this research is a well-labeled Android Smartphone image corpus, allowing the mobile forensic community to perform repeatable, scientific experiments, and to test mobile forensic tools.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Anderson, Pehr C. (Pehr Christian) 1974. „Filaments : lightweight network interfaces for embedded devices“. Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46249.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaf 63).
Filaments are low-cost interfaces for attaching devices to an Ethernet network. While most networking research pushes for faster high-end systems, the filament project targets low-end devices with the goal of making networking easy. Filaments wrap the complexity of the network into a simple and convenient package. The vast majority of device communications require only a tiny thread or filament of connectivity. Before filaments, one could either tie each device to a desktop PC or to deploy a specialized device network. Filaments allow you to leverage the same network used by desktop computers without making devices dependent on them.
by Pehr C. Anderson.
M.Eng.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Tan, SiewYeen Agnes. „A Network Measurement Tool for Handheld Devices“. Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/32982.

Der volle Inhalt der Quelle
Annotation:
This thesis describes a performance measurement tool that allows a user to measure network performance using a handheld device. The measurement tool consists of a client program that runs on a Microsoft Pocket PC device and a server program that runs on a regular Microsoft Windows computer. Both programs are Windows applications implemented in C/C++ using the Microsoft Embedded Visual Tool and Microsoft Visual Studio. The use of a Pocket PC device provides mobility to users, which can save time and energy when performing experiments. The thesis describes the design of the performance measurement application, implementation issues, and tests conducted using the tool.
Master of Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Yusuf, Adewale, Jerry Lartey und Vilhelm Wareus. „Network Admission Control (NAC)Securing end point devices“. Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-5507.

Der volle Inhalt der Quelle
Annotation:

There have been remarkable growths in wireless communication networks in

recent years; this is because of its merits over the wired networks such as

Mobility and convenience. Wireless networks transmit the signal over the

open air via radio waves of different frequencies, this makes it to be

vulnerable to several attacks and anybody on the street can easily intercept the

wireless data or inject new data into the entire network. There has been

existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which

was designed for wireless network security. There were concerns of security

vulnerabilities in WEP; this made it necessary for the implementation of

another solution to overcome the weaknesses of the previous wireless

network security. The IEEE 802.1X (port-based network admission control)

which is defined on Extensible Authentication protocol (EAP) provides

effective and efficient admission control to wireless and other networks

devices [8].

Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security

solution, access different vendor solutions, protocols supported and look into

the inter-operability of these various vendors. In as much as we support the

premise of NAC being an excellent solution, we will also make brilliant

recommendations in this thesis to be considered for future refinements of this

security solution as well as deployment scenarios for the university network.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Spadavecchia, Ljiljana. „A network-based asynchronous architecture for cryptographic devices“. Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/860.

Der volle Inhalt der Quelle
Annotation:
The traditional model of cryptography examines the security of the cipher as a mathematical function. However, ciphers that are secure when specified as mathematical functions are not necessarily secure in real-world implementations. The physical implementations of ciphers can be extremely difficult to control and often leak socalled side-channel information. Side-channel cryptanalysis attacks have shown to be especially effective as a practical means for attacking implementations of cryptographic algorithms on simple hardware platforms, such as smart-cards. Adversaries can obtain sensitive information from side-channels, such as the timing of operations, power consumption and electromagnetic emissions. Some of the attack techniques require surprisingly little side-channel information to break some of the best known ciphers. In constrained devices, such as smart-cards, straightforward implementations of cryptographic algorithms can be broken with minimal work. Preventing these attacks has become an active and a challenging area of research. Power analysis is a successful cryptanalytic technique that extracts secret information from cryptographic devices by analysing the power consumed during their operation. A particularly dangerous class of power analysis, differential power analysis (DPA), relies on the correlation of power consumption measurements. It has been proposed that adding non-determinism to the execution of the cryptographic device would reduce the danger of these attacks. It has also been demonstrated that asynchronous logic has advantages for security-sensitive applications. This thesis investigates the security and performance advantages of using a network-based asynchronous architecture, in which the functional units of the datapath form a network. Non-deterministic execution is achieved by exploiting concurrent execution of instructions both with and without data-dependencies; and by forwarding register values between instructions with data-dependencies using randomised routing over the network. The executions of cryptographic algorithms on different architectural configurations are simulated, and the obtained power traces are subjected to DPA attacks. The results show that the proposed architecture introduces a level of non-determinism in the execution that significantly raises the threshold for DPA attacks to succeed. In addition, the performance analysis shows that the improved security does not degrade performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Krishna, Ashwin. „Composing and connecting devices in animal telemetry network“. Kansas State University, 2016. http://hdl.handle.net/2097/32882.

Der volle Inhalt der Quelle
Annotation:
Master of Science
Department of Computing and Information Sciences
Venkatesh P. Ranganath
As the Internet of Things (IoT) continues to grow, the need for services that span multiple application domains will continue to increase to realise the numerous possibilities enabled by IoT. Today, however, heterogeneity among devices leads to interoperability issues while building a system of systems and often give rise to closed ecosystems. The issues with interoperability are driven by the inability of devices and apps from different vendors to communicate with each other. The interoperability problem forces the users to stick to one particular vendor, leading to vendor lock-in. To achieve interoperability, the users have to do the heavy lifting (at times impossible) of connecting heterogeneous devices. As we slowly move towards system-of-systems and IoT, there is a real need to support heterogeneity and interoperability. A recent effort in Santos Lab developed Medical Device Coordination Framework (MDCF), which was a step to address these issues in the space of human medical systems. Subsequently, we have been wondering if a similar solution can be employed in the area of animal science. In this effort, by borrowing observations from MDCF and knowledge from on-field experience, we have created a demonstration showcasing how a combination of precise component descriptions (via DSL) and communication patterns can be used in software development and deployment to overcome barriers due to heterogeneity, interoperability and to enable an open ecosystem of apps and devices in the space of animal telemetry.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Network devices"

1

Interconnecting Cisco network devices. Indianapolis, IN: Cisco Press, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

M, Thomas Thomas, Hrsg. ICND: Interconnecting Cisco network devices. New York: McGraw-Hill, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Network algorithmics: An interdisciplinary approach to designing fast networked devices. Amsterdam: Elsevier/Morgan Kaufmann, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Varghese, George. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices. Burlington: Elsevier, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Varghese, George. Network algorithmics: An interdisciplinary approach to designing fast networked devices. San Francisco, CA: Morgan Kaufmann, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Rusen, Ciprian Adrian. Network your computers & devices step by step. Sebastopol, CA: O'Reilly Media, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

McQuerry, Steve. Authorized self-study guide: Interconnecting Cisco network devices. 2. Aufl. Indianapolis, Ind: Cisco Press, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

A modular and extensible network storage architecture. Cambrdige: Cambridge University Press, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Adamski, M. Design of Digital Systems and Devices. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Bill, Mann, Hrsg. Wireless devices end to end. New York, NY: Hungry Minds, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Network devices"

1

Chowdhury, Dhiman Deb. „Timing Devices“. In NextGen Network Synchronization, 65–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71179-5_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramamurthy, Byrav. „Optical Network Devices“. In Design of Optical WDM Networks, 9–31. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1675-0_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Vanem, Erik, Dao Tran, Tore E. Jønvik, Pål Løkstad und Do Thanh. „Managing Heterogeneous Services and Devices with the Device Unifying Service“. In Integrated Network Management VIII, 379–92. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_38.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Foley, Gráinne, und Fergus O’Reilly. „Software Distribution for Wireless Devices“. In Integrated Network Management VIII, 469–72. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_46.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Thakur, Kutub, und Al-Sakib Khan Pathan. „Securing Wireless Network Communication“. In Securing Mobile Devices and Technology, 167–90. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003230106-11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Pal, Arpan, Chirabrata Bhaumik, Priyanka Sinha und Avik Ghose. „Intelligent Social Network of Devices“. In Computational Social Networks, 329–48. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4048-1_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Halsey, Mike. „Managing Network Connections and Devices“. In The Windows 10 Productivity Handbook, 79–88. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3294-1_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Nespor, Jan. „Devices and Educational Change“. In Researching Education Through Actor-Network Theory, 1–22. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118275825.ch1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Hutter, Michael, Marcel Medwed, Daniel Hein und Johannes Wolkerstorfer. „Attacking ECDSA-Enabled RFID Devices“. In Applied Cryptography and Network Security, 519–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_32.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Thakur, Kutub, und Al-Sakib Khan Pathan. „Working Principle of Cellular Network“. In Securing Mobile Devices and Technology, 89–104. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003230106-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Network devices"

1

Dudnik, Andriy, Ivan Bakhov, Olha Cholyshkina, Andriy Fesenko, Olexander Grinenko, Volodymyr Brodkevych und Serhii Zybin. „Cognitive Positioning Technologies for IoT Network Devices“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001847.

Der volle Inhalt der Quelle
Annotation:
Nowadays, wireless technologies are increasingly being used for human needs. Increasingly, technologies are emerging that are used by people not only for the need to transfer data. One of these technologies is the Internet of Things, which often uses wireless sensors with ZigBee data transmission technology as end devices.There are areas that require deployment of these networks on the territory, a large number of sensors are required, which must with sufficient accuracy “know” their position on the deployment area. Usually, devices with built-in GPS modules are used for this, but devices containing this module are significantly more expensive than without it. And if in a large distributed network with many segments, more than 1000 such devices are required, then a device with a GPS module can only be at most one for each segment. Therefore, if this is a forest where there are many thousands of trees and it is necessary to monitor fires at the initial stage, which take place in many US states in the summer, then the cognitive task of teaching those devices, that do not contain a GPS module, to determine their position is relevant. This paper proposes a mathematical formulation of the cognitive task of learning to determine the coordinates of devices in wireless sensor networks. The study of the mathematical model has been carried out. The purpose of these studies was to find new alternative teaching methods for determining the distance between objects of IoT sensor networks, using the function of localizing objects where an emergency occurred.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ryan, Les M. „Breaking the Barriers: An Architecture for Multi-Host Access to Field Devices“. In 1996 1st International Pipeline Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/ipc1996-1909.

Der volle Inhalt der Quelle
Annotation:
An overview of some of the many host applications that collect and use data from field devices such as RTUs, PLCs and flow computers is given and the need to provide multi-host access to these field devices is established. The challenges in providing multi-host access to field device networks is discussed as well as some of the current methods used. The concept of using a gateway to interface field device networks to wide area networks (WAN) is introduced with a brief discussion on the advantages of using TCP/IP for host to gateway transport. Several popular field device network protocols are assessed for their multi-host access capabilities with and without a field device network gateway.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Isuyama, Vivian Kimie, und Bruno De Carvalho Albertini. „Comparison of Convolutional Neural Network Models for Mobile Devices“. In Workshop em Desempenho de Sistemas Computacionais e de Comunicação. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wperformance.2021.15724.

Der volle Inhalt der Quelle
Annotation:
In recent years mobile devices have become an important part of our daily lives and Deep Convolutional Neural Networks have been performing well in the task of image classification. Some considerations have to be made when running a Neural Network inside a mobile device such as computational complexity and storage size. In this paper, common architectures for image classification were analyzed to retrieve the values of accuracy rate, model complexity, memory usage, and inference time. Those values were compared and it was possible to show which architecture to choose from considering mobile restrictions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Li, Yao, Xiaohui Chen, Nan Hua und Xiaoping Zheng. „A Novel Virtual Optical Network Embedding Strategy for Optical Network Virtualization“. In Photonic Networks and Devices. Washington, D.C.: OSA, 2014. http://dx.doi.org/10.1364/networks.2014.nt1c.3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Littlewood, Paul. „Filterless Networks: Merely Interesting or Valued Network Technology?“ In Photonic Networks and Devices. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/networks.2016.new3c.2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Chamania, Mohit, und Xiaomin Chen. „Analytics-driven Network Management“. In Photonic Networks and Devices. Washington, D.C.: OSA, 2019. http://dx.doi.org/10.1364/networks.2019.neth1d.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chan, Vincent. „Free Space Optical Network Architecture“. In Photonic Networks and Devices. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/networks.2017.nem4b.2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wosinska, Lena. „Optical Network Architectures for Datacenters“. In Photonic Networks and Devices. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/networks.2017.new2b.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lembo, Leonardo, Salvatore Maresca, Giovanni Serafino, Filippo Scotti, Antonio Malacarne, Paolo Ghelfi und Antonella Bogoni. „Microwave Photonics for a Radar Network“. In Photonic Networks and Devices. Washington, D.C.: OSA, 2019. http://dx.doi.org/10.1364/networks.2019.neth2d.2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Simsarian, Jesse. „Transport Network OS: from Physical to Abstractions“. In Photonic Networks and Devices. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/networks.2017.nem2b.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Network devices"

1

MacFaden, M., D. Partain, J. Saperia und W. Tackabury. Configuring Networks and Devices with Simple Network Management Protocol (SNMP). RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3512.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Bradner, S. Benchmarking Terminology for Network Interconnection Devices. RFC Editor, Juli 1991. http://dx.doi.org/10.17487/rfc1242.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bradner, S., und J. McQuaid. Benchmarking Methodology for Network Interconnect Devices. RFC Editor, Mai 1996. http://dx.doi.org/10.17487/rfc1944.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bradner, S., und J. McQuaid. Benchmarking Methodology for Network Interconnect Devices. RFC Editor, März 1999. http://dx.doi.org/10.17487/rfc2544.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Popoviciu, C., A. Hamza, G. Van de Velde und D. Dugatkin. IPv6 Benchmarking Methodology for Network Interconnect Devices. RFC Editor, Mai 2008. http://dx.doi.org/10.17487/rfc5180.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Levkowetz, H., und S. Vaarala. Mobile IP Traversal of Network Address Translation (NAT) Devices. RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3519.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Watrobski, Paul, Murugiah Souppaya, Joshua Klosterman und William Barker. Methodology for Characterizing Network Behavior of Internet of Things Devices. National Institute of Standards and Technology, Januar 2022. http://dx.doi.org/10.6028/nist.ir.8349-draft.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Colella, Whitney G. Network design optimization of fuel cell systems and distributed energy devices. Office of Scientific and Technical Information (OSTI), Juli 2010. http://dx.doi.org/10.2172/993325.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kumar, Prem, Seng-Tiong Ho und Bruce W. Wessels. Integrated Devices for Terabit per Second 1.3 and 1.5 Micron WDM/TDM Network Applications. Fort Belvoir, VA: Defense Technical Information Center, Juni 1996. http://dx.doi.org/10.21236/ada438395.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zhang, Jing, Lei Yan und Jing Deng. Comparison of 4 tibial fixation devices in anterior cruciate ligament reconstruction: result from a network meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, November 2022. http://dx.doi.org/10.37766/inplasy2022.11.0087.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie