Dissertations / Theses on the topic 'Gestion de Network Slice'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Gestion de Network Slice.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ben, Saad Sabra. "Security architectures for network slice management for 5G and beyond." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS023V2.pdf.
Full textNetwork slicing architecture, enabled by new technologies such as Network Functions Virtualization (NFV) and Software-Defined Networking (SDN), is one of the main pillars of Fifth-generation and Beyond (B5G). In B5G settings, the number of coexisting slices with varying degrees of complexity and very diverse lifespans, resource requirements, and performance targets is expected to explode. This creates significant challenges towards zero-touch slice management and orchestration, including security, fault management, and trust. In addition, network slicing opens the business market to new stakeholders, namely the vertical or tenant, the network slice provider, and the infrastructure provider. In this context, there is a need to ensure not only a secure interaction between these actors, but also that each actor delivers the expected service to meet the network slice requirements. Therefore, new trust architectures should be designed, which are able to identify/detect the new forms of slicing-related attacks in real-time, while securely and automatically managing Service Level Agreements (SLA) among the involved actors. In this thesis, we devise new security architectures tailored to network slicing ready networks (B5G), heavily relying on blockchain and Artificial Intelligence (AI) to enable secure and trust network slicing management
Boutigny, François. "Multidomain virtual network embedding under security-oriented requirements applied to 5G network slices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAS002.
Full text5G brings a new concept called network slicing. This technology makes it possible to generalize the business model of MVNOs to companies in need to operate a network, without it being their core business. Each slice is an end-to-end, dedicated and customized virtual network, over a shared infrastructure; this infrastructure itself is provided by the interconnection of infrastructure providers: we refer to this case as a multi-domain infrastructure.The objective of this thesis is to study the allocation of these slices in such a multi-domain infrastructure. The problem is known as Virtual Network Embedding (VNE). It is an NP-hard problem. Practically, the VNE problem looks for which physical resources to associate a set of virtual elements. Physical resources describe what they can offer. Virtual elements describe what they require. Linking these offers and requests is the key to solve the VNE problem.In this thesis, we focused on modeling and implementing security requirements. Indeed, we expect that the initiators of the slices belong to areas distant from telecommunications. In the same way that they know little about this field, we can expect that their needs, especially in security, are novel in the slice context.This thesis presents an algorithm able to handling various requirements, according to an extensible model based on a Satisfiability Modulo Theories (SMT) solver. Compared to Integer Linear Programming (ILP), more common in the VNE field, this formulation allows to express the satisfaction constraints in a more transparent way, and allows to audit all the constraints.Moreover, being aware that infrastructure providers are reluctant to disclose information about their physical resources, we propose a resolution limiting this disclosure. This system has been successfully implemented and tested during the Ph.D
Purvis, Liston Keith. "Models of Single Neurons and Network Dynamics in the Medullary Transverse Slice." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14125.
Full textBehrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.
Full textThe fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G network operators will be able to provide specific connectivity capabilities in order to support these various use cases. Each network slice can be dedicated to a 3rd party (i.e., any business actor that is not the network operator), and be designed to fit its requirements.However, although network slices can be designed by enabling or disabling certain network functions, the Authentication and Access Control (AAC) mechanisms remain the same for all slices, with tightly coupled network components.This thesis proposes 5G-SSAAC (5G Slice-Specific AAC), as an initial step to introduce a more loosely coupled design into the whole 5G network architecture. 5G-SSAAC enables 5G networks to provide various AAC mechanisms to the 3rd parties according to their security requirements. To assess this innovative mechanism, the thesis analyses the consequences of using the 5G-SSAAC on the security of the whole 5G system. The feasibility of the 5G-SSAAC is also presented with the implementation of a fully virtualized mobile network through an OAI (Open Air Interface) based testbed. This work finally evaluates the impact of 5G-SSAAC mechanism on the network load considering the anticipated number of AAC signalling messages compared to the existing AAC mechanisms in cellular networks
Max, Lindblad. "The impact of parsing methods on recurrent neural networks applied to event-based vehicular signal data." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-223966.
Full textDenna avhandling jämför två olika tillvägagångssätt vad gäller parsningen av händelsebaserad signaldata från fordon för att producera indata till en förutsägelsemodell i form av ett neuronnät, nämligen händelseparsning, där datan förblir ojämnt fördelad över tidsdomänen, och skivparsning, där datan är omgjord till att istället vara jämnt fördelad över tidsdomänen. Det dataset som används för dessa experiment är ett antal signalloggar från fordon som kommer från Scania. Jämförelser mellan parsningsmetoderna gjordes genom att först träna ett lång korttidsminne (LSTM) återkommande neuronnät (RNN) på vardera av de skapade dataseten för att sedan mäta utmatningsfelet och resurskostnader för varje modell efter att de validerats på en delad uppsättning av valideringsdata. Resultaten från dessa tester visar tydligt på att skivparsning står sig väl mot händelseparsning.
Rayrole, Martin. "Gestion automatisée de systèmes complexes." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066722.
Full textTechnological advances in recent decades have led to a considerable increase in performance of computer hardware and data networks. Many industrial sectors have benefited from these advances in using computers and networks to increase productivity and offer value-added services. These changes have led to interconnect a large number of equipments and functions, and thus to build increasingly complex systems. The management of these systems has become, therefore, extremely difficult without the support of computer tools. This paper describes the research that I have done for twenty years on the automated management systems in three industrial sectors: telecommunications, data centers, and avionics. Each of these sectors has specific characteristics that influence the management of the corresponding systems, but there are nevertheless many similarities on the principles of management. The paper presents the results of different studies on system configuration, supervision, security, and safety. A comparative analysis identifies management areas that are the most advanced in each of the industrial sectors. From there, several technology transfers are proposed to help improve the management systems in each sector, taking advantage of advances in other areas
Lecuire, Vincent. "Gestion des systèmes et réseaux industriels." Nancy 1, 1994. http://www.theses.fr/1994NAN10051.
Full textValdemarin, Stefano. "Network development in international organizations : the case of ONLYLYON." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3059.
Full textIn a rapidly changing context, organizations need to develop new strategies to seize global business opportunities. Based on the Uppsala evolution model and the business network view, this doctoral dissertation focuses on the development of networks in international organizations. Following the micro-foundations theory, we consider two levels of analysis to better understand the interplay between the organization and its members in the network evolution process. We developed a single case study conducted at ONLYLYON, an organization aiming to promote the city of Lyon worldwide through a large network of individuals called the “ambassador network”. Using an intervention research approach, we co-constructed with the organization a research project which aims to develop the ambassador network. The empirical study is based on 36 interviews (five exploratory and 31 semi-structured interviews), 103 participant observations performed over a period of 30 months and secondary data. Our findings highlight the role played by individuals in developing networks for organizations. They emphasize the importance of creating a network allowing organizations and individuals to develop opportunities. We propose an evolution path to (1) create the ONLYLYON ambassador network in Italy and (2) develop an international “network of networks”. Both paths include a set of managerial propositions and are based on three steps: (1) establishing, (2) structuring or restructuring, and (3) growing the network. We also elaborate a model to study the interaction between an organization and its members in the process of network development. This intervention research can help ONLYLYON in developing its international networks by implementing strategic actions. It also contributes to the development of the Uppsala evolution model and the debate on the importance of micro-foundations in management research
Hertzog, Patrick. "Gestion des réseaux locaux industriels : application au réseau." Nancy 1, 1994. http://www.theses.fr/1994NAN10047.
Full textShaun, Ferdous Jahan. "Multi-Parameters Miniature Sensor for Water Network Management." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1138/document.
Full textWater is a vital element for every living being on the earth. Like many other dwindling natural resources, clean water faces a strong pressure because of human activity and the rapid growth of global population. The situation is so critical that clean water has been identified as one of the seventeenth sustainable development goals of the United Nations. Under these conditions, a sustainable management of water resources is necessary. For this purpose, a smart solution for water networks monitoring can be very helpful. However, commercially available solutions lack compactness, self-powering capabilities cost competitiveness, necessary to enable the large rollout over water networks. The present thesis takes place in the framework of a European research project, PROTEUS, which addresses these different problems by designing and fabricating a multi-parameter sensor chip (MPSC) for water resources monitoring. The MPSC enables the measurement of 9 physical and chemical parameters, is reconfigurable and self-powered. The present thesis addresses more precisely physical sensors, their design, optimization and co-integration on the MPSC. The developed device exhibits state of the art or larger performances with regard to its redundancy, turn-down ratio and power consumption. The present manuscript is split into two main parts: Part-I and Part-II. Part-I deals with non-thermal aspects of the MPSC, the pressure and conductivity sensor for instance, as well as the fabrication process of the whole device (Chapter 1 and 2). The background of environmental monitoring is presented in Chapter 1 along with the State of Art review. Chapter 2 describes fabrication methods of the MPSC. Preliminary characterization results of non-thermal sensors are also reported in this chapter. Chapter 3 and 4, included in Part-II, deal with thermal sensors (temperature and flow-rate). Chapter 3 describes the many possible uses of electric resistances for sensing applications. Finally, in chapter four, we focus on flowrate sensors before concluding and making a few suggestions for future works
Gonzalez, santamaria Carlos. "Gestion d'une architecture hétérogène distribuée à l'aide du SDN." Thesis, Reims, 2017. http://www.theses.fr/2017REIMS037/document.
Full textRecently, the giants of the Internet are adopting every day more and more the benefits of virtualization within the data center. Each virtualized application and its operating system can run simultaneously from one physical device. This technology reduces significantly power consumption, energy consumption, as well as operational cost. Furthermore, not long ago, this promising solution is studied by the research communities to be extended for network virtualization deployment. In traditional network physical device like routers and/or switches are responsible to transfer the information from one point to another, following the instructions previously programmed by a network administrator. At this time, the physical networking devices can be virtualized, providing an intelligent abstraction via virtual network software that makes easy to deploy and manage network resources. The search giant Google has deployed SDN to experiment with the inter-connection between their data center around the world [1].With the exponential growth of devices connected to the Internet, security network is one of the hardest challenge for network managers. Maintaining and securing such large scale and heterogeneous network is a challenging task. In this context, the new networking paradigm, the Software Defined Networking (SDN), introduces many opportunities and provides the potential to overcome those challenges. In our approach, we first propose a new SDN based architecture for networking with or without infrastructure, that we call an SDN domain. This domain includes wired network, wireless network and Ad-Hoc networks. Next, a second architecture includes sensor networks in an SDN-based network and in a domain. Third, interconnecting multiple domains and we describe how we can enhance the security of each domain and how to distribute the security rules in order not to compromise the security of one domain. Finally, we present a new secure and distributed architecture for ad-hoc networks and IoT (Internet of Things)
Maniu, Silviu. "Gestion des données dans les réseaux sociaux." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0053/document.
Full textWe address in this thesis some of the issues raised by the emergence of social applications on the Web, focusing on two important directions: efficient social search inonline applications and the inference of signed social links from interactions between users in collaborative Web applications. We start by considering social search in tagging (or bookmarking) applications. This problem requires a significant departure from existing, socially agnostic techniques. In a network-aware context, one can (and should) exploit the social links, which can indicate how users relate to the seeker and how much weight their tagging actions should have in the result build-up. We propose an algorithm that has the potential to scale to current applications, and validate it via extensive experiments. As social search applications can be thought of as part of a wider class of context-aware applications, we consider context-aware query optimization based on views, focusing on two important sub-problems. First, handling the possible differences in context between the various views and an input query leads to view results having uncertain scores, i.e., score ranges valid for the new context. As a consequence, current top-k algorithms are no longer directly applicable and need to be adapted to handle such uncertainty in object scores. Second, adapted view selection techniques are needed, which can leverage both the descriptions of queries and statistics over their results. Finally, we present an approach for inferring a signed network (a "web of trust")from user-generated content in Wikipedia. We investigate mechanisms by which relationships between Wikipedia contributors - in the form of signed directed links - can be inferred based their interactions. Our study sheds light into principles underlying a signed network that is captured by social interaction. We investigate whether this network over Wikipedia contributors represents indeed a plausible configuration of link signs, by studying its global and local network properties, and at an application level, by assessing its impact in the classification of Wikipedia articles.javascript:nouvelleZone('abstract');_ajtAbstract('abstract')
Slim, Farah. "Etude et implémentation d'algorithmes de gestion de ressources pour un système d'exploitation de réseau." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0071.
Full textNetwork programmability is a major issue in the evolution of telecommunication systems. However, the emergence of new initiatives in the context of the internet of the future, such as network function virtualization and specialized tools such as Openstack makes it possible to develop new approaches to control and manage the network infrastructure. This new approach on which telecom operators rely to accelerate their digital transformation will impact not only the way networks are defined but also the main role of the operator, who now hasto manage cloud resources in combination with network resources. The main goal of the thesis is to analyze the modifications that will affect the infrastructure of the operator in order to design resource allocation algorithms adapted to the context of the virtualization of network functions
Ben, Hassine Nesrine. "Machine Learning for Network Resource Management." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV061.
Full textAn intelligent exploitation of data carried on telecom networks could lead to a very significant improvement in the quality of experience (QoE) for the users. Machine Learning techniques offer multiple operating, which can help optimize the utilization of network resources.In this thesis, two contexts of application of the learning techniques are studied: Wireless Sensor Networks (WSNs) and Content Delivery Networks (CDNs). In WSNs, the question is how to predict the quality of the wireless links in order to improve the quality of the routes and thus increase the packet delivery rate, which enhances the quality of service offered to the user. In CDNs, it is a matter of predicting the popularity of videos in order to cache the most popular ones as close as possible to the users who request them, thereby reducing latency to fulfill user requests.In this work, we have drawn upon learning techniques from two different domains, namely statistics and Machine Learning. Each learning technique is represented by an expert whose parameters are tuned after an off-line analysis. Each expert is responsible for predicting the next metric value (i.e. popularity for videos in CDNs, quality of the wireless link for WSNs). The accuracy of the prediction is evaluated by a loss function, which must be minimized. Given the variety of experts selected, and since none of them always takes precedence over all the others, a second level of expertise is needed to provide the best prediction (the one that is the closest to the real value and thus minimizes a loss function). This second level is represented by a special expert, called a forecaster. The forecaster provides predictions based on values predicted by a subset of the best experts.Several methods are studied to identify this subset of best experts. They are based on the loss functions used to evaluate the experts' predictions and the value k, representing the k best experts. The learning and prediction tasks are performed on-line on real data sets from a real WSN deployed at Stanford, and from YouTube for the CDN. The methodology adopted in this thesis is applied to predicting the next value in a series of values.More precisely, we show how the quality of the links can be evaluated by the Link Quality Indicator (LQI) in the WSN context and how the Single Exponential Smoothing (SES) and Average Moving Window (AMW) experts can predict the next LQI value. These experts react quickly to changes in LQI values, whether it be a sudden drop in the quality of the link or a sharp increase in quality. We propose two forecasters, Exponential Weighted Average (EWA) and Best Expert (BE), as well as the Expert-Forecaster combination to provide better predictions.In the context of CDNs, we evaluate the popularity of each video by the number of requests for this video per day. We use both statistical experts (ARMA) and experts from the Machine Learning domain (e.g. DES, polynomial regression). These experts are evaluated according to different loss functions. We also introduce forecasters that differ in terms of the observation horizon used for prediction, loss function and number of experts selected for predictions. These predictions help decide which videos will be placed in the caches close to the users. The efficiency of the caching technique based on popularity prediction is evaluated in terms of hit rate and update rate. We highlight the contributions of this caching technique compared to a classical caching algorithm, Least Frequently Used (LFU).This thesis ends with recommendations for the use of online and offline learning techniques for networks (WSN, CDN). As perspectives, we propose different applications where the use of these techniques would improve the quality of experience for mobile users (cellular networks) or users of IoT (Internet of Things) networks, based, for instance, on Time Slotted Channel Hopping (TSCH)
Bouzembrak, Yamine. "Multi-criteria Supply Chain Network Design under uncertainty." Thesis, Artois, 2011. http://www.theses.fr/2011ARTO0211/document.
Full textThis thesis contributes to the debate on how uncertainty and concepts of sustainable development can be put into modern supply chain network and focuses on issues associated with the design of multi-criteria supply chain network under uncertainty. First, we study the literature review , which is a review of the current state of the art of Supply Chain Network Design approaches and resolution methods. Second, we propose a new methodology for multi-criteria Supply Chain Network Design (SCND) as well as its application to real Supply Chain Network (SCN), in order to satisfy the customers demand and respect the environmental, social, legislative, and economical requirements. The methodology consists of two different steps. In the first step, we use Geographic Information System (GIS) and Analytic Hierarchy Process (AHP) to buildthe model. Then, in the second step, we establish the optimal supply chain network using Mixed Integer Linear Programming model (MILP). Third, we extend the MILP to a multi-objective optimization model that captures a compromisebetween the total cost and the environment influence. We use Goal Programming approach seeking to reach the goals placed by Decision Maker. After that, we develop a novel heuristic solution method based on decomposition technique, to solve large scale supply chain network design problems that we failed to solve using exact methods. The heuristic method is tested on real case instances and numerical comparisons show that our heuristic yield high quality solutions in very limited CPU time. Finally, again, we extend the MILP model presented before where we assume that the costumer demands are uncertain. We use two-stage stochastic programming approach to model the supply chain network under demand uncertainty. Then, we address uncertainty in all SC parameters: opening costs, production costs, storage costs and customers demands. We use possibilistic linear programming approach to model the problem and we validate both approaches in a large application case
Naves, Raphaël. "Apport de la gestion des interférences aux réseaux sans-fil multi-sauts. Le cas du Physical-Layer Network Coding." Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23566/1/Naves_Raphael.pdf.
Full textMorell, Jared Anthony. "Adaptive Resizing of Deadline-Driven Requests for Provisioning Traffic in Elastic Optical Networks." Miami University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=miami1375629976.
Full textNouasse, Houda. "Gestion supervisée de systèmes étendus à retards variables : cas des réseaux hydrographiques." Thesis, Toulouse, INPT, 2015. http://www.theses.fr/2015INPT0001/document.
Full textOn either side of the Earth, we observe more and more devastating natural phenomena. Amon these phenomena, floods are one of the most frequent and devastating natural disasters. During these last decades extensive flooding were caused by the flood of rivers. These floods due to excessive rainfall or runoff induce invariably the loss of human lives and material damages. To overcome these problems, water systems are increasingly equipped with means for detecting floods. A key factor in the management of such phenomena is responsiveness. Indeed, managers of river systems, faced to this kind of situation should quickly take important decisions in an uncertain context, as most of these floods are induced by abrupt climate events, whose magnitude is difficult to assess accuracy. We propose in this dissertation, a method of flood management in river systems equipped with flood zones controlled by gravitational gates. At first, we modeled our management method using a static transportation network. In a second step, we enriched it by using transportation networks with delays in order to take into account the travel time of the managed resource. The main difficulty of transportation networks with delays is their oversize. To overcome this problem, we developed an alternative mechanism combining a static reduced transportation network with a temporization matrix. Furthermore, this mechanism allows the consideration of variable time transfer depending on flows, without modification either on the transportation network, or on the structure of the temporization matrix. This mechanism allows simplified management of the transfer times, variable or not. With this mechanism, the evaluation of the minimum cost maximum flow allowed us, according to the management strategies considered, to compute the gate opening for floodplains in order to mitigate the flood but also to restore the water stored at the relevant time. Finally, to evaluate the contributions of this management, the method was applied to a case study based on a section of river equipped with three flood control reservoirs areas modeled using hydraulic simulators combining 1D and 2D models. The simulation results showed that the proposed approach allowed reducing significantly the floods downstream watercourses
Löfgren, Lars. "Managing Mega technological projects : The case of the defence industry and Network Centric Warfare projects." Thesis, Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAX030.
Full textThis thesis project consists of a comparative work on three different military megaprojects regarding Network Centric Warfare, in three different countries: the United States, France and Sweden. The aim of the comparison is to find similarities and differences with respect to why, and if, the projects failed, or are failing, and if they failed - to what extent. The objectives of the military megaprojects were ambitious and a great deal of the involved technology was not yet developed at the time and the technical requirements were incongruous. For the comparative study a narrative case study methodology has been employed, structuring and analysing the different military megaprojects.The result is three different descriptions of the military megaprojects reproducing the internal and external dynamics of two of the three projects. One project, the French one, has been reproduced up to its present stage because it is planned to continue to the 2030s. The result of the comparison between the military megaprojects has shown that such vast projects can be managed like normal vast development projects. On the other hand, these kinds of vast projects are comprehensively complex. Such projects do also involve ideas leading to project developments of already known and unknown obstacles before and during the mega project not possible to manage and results in project and development failure
Cherrared, Sihem. "Gestion des fautes dans les réseaux multi-tenants et programmables." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S016.
Full textNetwork Functions Virtualization (NFV) is one promising attempt at solving some of the 5G challenges. NFV is about running network functions as virtualized workloads on commodity hardware. This may optimize deployment costs and simplify the life cycle management, but it introduces new challenges such as the dynamic network topology and the lack of visibility. In this thesis, we propose a self-modeling algorithm and an active diagnosis process to face these challenges. We define a dependency model learned from faults injection. The self-modeling and the active diagnosis approach was applied to the real-world virtual Ip Multimedia Subsystem (vIMS) use-case
Mokrenko, Olesia. "Gestion de l'énergie dans un réseau de capteurs au niveau application." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30199/document.
Full textEnergy is a key resource in Wireless Sensor Networks (WSNs), especially when sensor nodes are powered by batteries. This thesis is investigates how to save energy of the whole WSN, at the application level, thanks to control strategies, in real time and in a dynamic way. The first energy management strategy investigated is based on Model Predictive Control (MPC). The choice of MPC is motivated by the global objectives that are to reduce the energy consumption of the set of sensor nodes while ensuring a given service, named mission, for the sensor network. Moreover, a set of constraints on the binary control variables and on the sensor modes must be fulfilled. The second energy management strategy at the application level is based on a Hybrid Dynamical System (HDS) approach. This choice is motivated by the hybrid inherent nature of the WSN system when energy management is considered. The hybrid nature basically comes from the combination of continuous physical processes, namely, the charge / discharge of the node batteries; while the discrete part is related to the change in the functioning modes and the Unreachable condition of the nodes. The proposed strategies are evaluated and compared in simulation on a realistic test-case. Lastly, they have been implemented on a real test-bench and the results obtained have been discussed
Azzouni, Abdelhadi. "Smart and secure network softwarization." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS259.
Full textThe recent trend toward Network Softwarization is driving an unprecedented technoeconomic shift in the Telecom and ICT (Information and Communication Technologies) industries. By separating the hardware on which network functions/services run and the software that realizes and controls the network functions/services, Software-Defined Networking (SDN) and Network Function Virtualization (NFV) are creating an open ecosystem that drastically reduces the cost of building networks and changes the way operators operate their networks. SDN and NFV paradigms add more flexibility and enable more control over networks, thus, related technologies are expected to dominate a large part of the networking market in the next few years (estimated at USD 3.68B in 2017 and forecasted by some to reach 54B USD by 2022 at a Compound Annual Growth Rate (CAGR) of 71.4%). However, one of the major operators’ concerns about Network Softwarization is security. In this thesis, we have first designed and implemented a pentesting (penetration testing) framework for SDN controllers. We have proposed a set of algorithms to fingerprint a remote SDN controller without having direct connection to it. Using our framework, network operators can evaluate the security of their SDN deployments (including Opendaylight, Floodlight and Cisco Open SDN Controller) before putting them into production. Second, we have studied the Topology Discovery problem in SDN controllers and discovered major security (as well as performance) issues around the current de-facto OpenFlow Topology Discovery Protocol (OFDP). In order to fix these major issues, we have designed and implemented a new secure and efficient OpenFlow Topology Discovery Protocol (called sOFTDP). sOFTDP requires minimal changes to the OpenFlow switch design and is shown to be more secure than previous workarounds on traditional OFDP. Also, sOFTDP outperforms OFDP by several orders of magnitude which we confirmed by extensive experiments. The second axis of our research in this thesis is smart management in softwarized networks. Inspired by the recent breakthroughs in machine learning techniques, notably, Deep Neural Networks (DNNs), we have built a traffic engineering engine for SDN called NeuRoute, entirely based on DNNs. Current SDN/OpenFlow controllers use a default routing based on Dijkstra’s algorithm for shortest paths, and provide APIs to develop custom routing applications. NeuRoute is a controller-agnostic dynamic routing framework that (i) predicts traffic matrix in real time, (ii) uses a neural network to learn traffic characteristics and (iii) generates forwarding rules accordingly to optimize the network throughput. NeuRoute is composed of two main components: NeuTM and NeuRoute-TRU. NeuTM is a traffic matrix (TM) prediction framework that uses Long Short Term Memory (LSTM) Neural Network architecture to learn long-range traffic dependencies and characteristics then accurately predicts future TMs. NeuRoute-TRU is a path selection engine that computes optimal paths for traffic matrices predicted by NeuTM. NeuRoute-TRU achieves the same results as the most efficient dynamic routing heuristic but in much less execution time
Medina, Ruiz Hamlet. "TCP and network coding : equilibrium and dynamic properties." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112165.
Full textCommunication networks today share the same fundamental principle of operation: information is delivered to their destination by nodes intermediate in a store-and-forward manner.Network coding (NC) is a technique that allows intermediate nodes to send out packets that are linear combinations of previously received information. The main benefits of NC are the potential throughput improvements and a high degree of robustness, which is translated into loss resilience. These benefits have motivated deployment efforts for practical applications of NC, e.g., incorporating NC into congestion control schemes such as TCP-Reno to get a TCP-NC congestion protocol. In TCP-NC, TCP-Reno throughput is improved by sending a fixed amount of redundant packets, which mask part of the losses due, e.g., to channel transmission errors. In this thesis, we first analyze the dynamics of TCP-NC with random early detection (RED) as active queue management (AQM) using tools from convex optimization and feedback control. We study the network equilibrium point and the stability properties of TCP-Reno when NC is incorporated into the TCP/IP protocol stack. The existence and uniqueness of an equilibrium point is proved, and characterized in terms of average throughput, loss rate, and queue length. Our study also shows that TCP-NC/RED becomes unstable when delay or link capacities increases, but also, when the amount of redundant packets added by NC increases. Using a continuous-time model and neglecting feedback delays, we prove that TCP-NC is globally stable. We provide a sufficient condition for local stability when feedback delays are present. The fairness of TCP-NC with respect to TCP-Reno-like protocols is also studied. Second, we propose an algorithm to dynamically adjust the amount of redundant linear combinations of packets transmitted by NC. In TCP-NC with adaptive redundancy (TCP-NCAR), the redundancy is adjusted using a loss differentiation scheme, which estimates the amount of losses due to channel transmission errors and due to congestion. Simulation results show that TCP-NCAR outperforms TCP-NC in terms of throughput. Finally, we analyze the equilibrium and stability properties of TCP-NCAR/RED. The existence and uniqueness of an equilibrium point is characterized experimentally. The TCP-NCAR/RED dynamics are modeled using a continuous-time model. Theoretical and simulation results show that TCP-NCAR tracks the optimal value for the redundancy for small values of the packet loss rate. Moreover, simulations of the linearized model around equilibrium show that TCP-NCAR increases the size of the TCP-Reno stability region. We show that this is due to the compensator effect of the redundancy adaptation dynamics to TCP-Reno. These characteristics of TCP-NCAR allow the congestion window adaptation mechanism of TCP-Reno to react in a smooth way to channel losses, avoiding some unnecessary rate reductions, and increasing the local stability of TCP-Reno
Benkirane, Nada. "La gestion du trafic dans les réseaux orientés contenus." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2014. http://tel.archives-ouvertes.fr/tel-00987630.
Full textHou, Yanting. "Airline network revenue management : integrated optimization of hub location and capacity allocation." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLE030.
Full textAs one of critical problems in aviation industry, airline network revenue management has received significant attention in recent decades. However, many issues still need to be addressed. This thesis investigates four new airline network revenue management problems. Firstly, a network capacity allocation problem with competitive alliances is studied. In this problem, horizontal and vertical competitions and deterministic demand are considered. The aim is to maximize the global alliance revenue by determining the (seat) capacities in flights for each fare class of each airline. The problem is formulated into a mixed integer programming and is solved by a commercial solver CPLEX. Secondly, an integrated p-hub median location and (seat) capacity allocation problem is investigated to maximize the combined average-case and worst-case profits of an airline. For this problem, an uncapacitated hub is considered and uncertain demand is represented by a finite set of scenarios. The studied problem is formulated based on a two-stage stochastic programming framework. Then a Genetic Algorithm (GA) is proposed to solve the problem for each scenario. Computational results show that the proposed method outperforms those in the literature only considering average-case profit. The third studied problem is a generalization of the second one in which the capacity of hub to be located is limited and disruptions which can impact airline hub capacity, such as adverse weather, are considered. Two formulations of the problem are proposed based on : (1) a scenario-based two-stage stochastic programming, and (2) a weight-based hybrid two-stage stochastic programming-robust optimization framework. Then a Sample Average Approximation (SAA) method and a GA are applied to solve them, respectively. Computational results show that the SAA is more effective than the GA. The fourth problem is also an extension of the second one where an airline is subjected to a CO2 emission limit. The problem is modeled into a scenario-based two-stage stochastic programming. And a SAA method is proposed to solve it
Rezaei, Hamidreza. "Designing a supply chain network integrating financial dimensions." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2022. http://www.theses.fr/2022IMTA0302.
Full textThis thesis focuses on the development of a mathematical model and optimization algorithms for the design of a supply chain integrating financial dimensions. We propose a capacitated, multi-period, single-echelon, single-product model. The objective function to be maximized is the firm's value, represented by its Adjusted Present Value (APV). The decision binary variables are related to the location of logistics facilities; the continuous variables concern product flows and debt planning. The mathematical model is first evaluated by solving a set of generated instances using a state-of-the-art solver. We propose a sequential approach, consisting in optimizing the logistic variables first, then the financial variables. Then, we propose an optimization procedure based on the Large Neighborhood Search (LNS) metaheuristic to solve larger instances. Finally, consider the logistic and financial dimensions as two independent objectives. The multi-directional local search (MDLS) is employed to solve the bi-objective model by embedding the LNS into that framework. Extensive numerical experiments assess the relevance of our model and compare the performance of our algorithms to those of the solver
Billet, Benjamin. "Système de gestion de flux pour l'Internet des objets intelligents." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS012V/document.
Full textThe Internet of Things (IoT) is currently characterized by an ever-growing number of networked Things, i.e., devices which have their own identity together with advanced computation and networking capabilities: smartphones, smart watches, smart home appliances, etc. In addition, these Things are being equipped with more and more sensors and actuators that enable them to sense and act on their environment, enabling the physical world to be linked with the virtual world. Specifically, the IoT raises many challenges related to its very large scale and high dynamicity, as well as the great heterogeneity of the data and systems involved (e.g., powerful versus resource-constrained devices, mobile versus fixed devices, continuously-powered versus battery-powered devices, etc.). These challenges require new systems and techniques for developing applications that are able to (i) collect data from the numerous data sources of the IoT and (ii) interact both with the environment using the actuators, and with the users using dedicated GUIs. To this end, we defend the following thesis: given the huge volume of data continuously being produced by sensors (measurements and events), we must consider (i) data streams as the reference data model for the IoT and (ii) continuous processing as the reference computation model for processing these data streams. Moreover, knowing that privacy preservation and energy consumption are increasingly critical concerns, we claim that all the Things should be autonomous and work together in restricted areas as close as possible to the users rather than systematically shifting the computation logic into powerful servers or into the cloud. For this purpose, our main contribution can be summarized as designing and developing a distributed data stream management system for the IoT. In this context, we revisit two fundamental aspects of software engineering and distributed systems: service-oriented architecture and task deployment. We address the problems of (i) accessing data streams through services and (ii) deploying continuous processing tasks automatically, according to the characteristics of both tasks and devices. This research work lead to the development of a middleware layer called Dioptase, designed to run on the Things and abstract them as generic devices that can be dynamically assigned communication, storage and computation tasks according to their available resources. In order to validate the feasability and the relevance of our work, we implemented a prototype of Dioptase and evaluated its performance. In addition, we show that Dioptase is a realistic solution which can work in cooperation with legacy sensor and actuator networks currently deployed in the environment
Barrère, Cambrún Martín. "Vulnerability management for safe configurations in autonomic networks and systems." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0048/document.
Full textOver the last years, the massive deployment of computing devices over disparate interconnected infrastructures has dramatically increased the complexity of network management. Autonomic computing has emerged as a novel paradigm to cope with this challenging reality. By specifying high-level objectives, autonomic computing aims at delegating management activities to the networks themselves. However, when changes are performed by administrators and self-governed entities, vulnerable configurations may be unknowingly introduced. Nowadays, vulnerabilities constitute the main entry point for security attacks. Therefore, vulnerability management mechanisms are vital to ensure safe configurations, and with them, the survivability of any autonomic environment. This thesis targets the design and development of novel autonomous mechanisms for dealing with vulnerabilities, in order to increase the security of autonomic networks and systems. We first present a comprehensive state of the art in autonomic computing and vulnerability management. Afterwards, we present our contributions which include autonomic assessment strategies for device-based vulnerabilities and extensions in several dimensions, namely, distributed vulnerabilities (spatial), past hidden vulnerable states (temporal), and mobile security assessment (technological). In addition, we present vulnerability remediation approaches able to autonomously bring networks and systems into secure states. The scientific approaches presented in this thesis have been largely validated by an extensive set of experiments which are also discussed in this manuscript
Orcesi, André. "Étude de la performance des réseaux d'ouvrages d'art et détermination des stratégies de gestion optimales." Thesis, Paris Est, 2008. http://www.theses.fr/2008PEST0276.
Full textIn a context of scarce capital resources and to tackle the ageing of the bridge stock, stakeholders require and use decision making techniques. These tools prioritize at least maintenance actions and optimize allocation of funds eventually. However, all these bridge management systems have an individual strategy approach. They do not include the performance of the transportation network as a criterion in the decision process. The general principle is to find the most appropriate maintenance strategy for each bridge belonging to a network. This approach is not necessarily the best suited strategy for a transportation network. The aim of this thesis is to propose a methodology that provides optimal maintenance strategies for a network of bridges and not for each bridge taken as individuals. The proposed methodology consists in balancing supply costs provided by the infrastructure network with demand costs of the network users. The supply costs are those of all needed maintenance actions, performed by the bridge owner, to provide an adequate level of service for the bridges. The demand costs are those supported by the network users in case of inadequate level of service. The assessment of the supply costs requires to introduce performance of bridges. To take into account the uncertainties in the ageing process of bridges, the performance is calculated by using two probabilistic approaches : a parametrical one that is based on the reliability theory and that applies a failure mode for each bridge, and a non parametrical one that is based on a condition index that gives an information on the overall condition of the bridge. The methodology is proposed in a first time when both information are known, and in a second time when only the condition index is available. Besides, The demand costs are quantified by determining the traffic assignment if there is a traffic disruption for a combination of bridges, then by calculating the difference of user costs for these events with the reference when all bridges are in good condition and ideal performance. Optimal management strategies are determined by using genetical algorithms. First, optimal maintenance times are found for each bridge. Second, optimal maintenance actions are found. Two approaches are proposed. In a first one, the sum of user costs and maintenance costs is minimized. In a second one both user and maintenance costs are minimized separately and the best compromise is determined. Finally, the proposed methodology allows to determine the optimal maintenance actions planning for a given time period. It helps to answer the two questions : « when » and « how » take decisions in order to have the best network system by optimizing the different costs
Daoudi, Kamal. "Modélisation et gestion de performance de services de la messagerie industrielle MMS (manufacturing message specification)." Nancy 1, 1994. http://www.theses.fr/1994NAN10312.
Full textRusso, Patrice. "Contribution à l'amélioration de la gestion de l'énergie dans les applications audio embarquées." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00918487.
Full textTalut, Guillaume. "La normalisation des formations supérieures de gestion en action : une analyse pragmatique des pratiques rhétoriques de la Commission d’Evaluation des Formations et Diplômes de Gestion (CEFDG)." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020006/document.
Full textThis research looks into the regulation of the French Higher Education in Managementsystem by focusing on a major body: the “Committee for evaluation of managementprograms” known as the “Commission d'Evaluation des Formations et Diplômes deGestion” (CEFDG). The CEFDG advises the Minister for higher education on theawarding of quality recognition to non-public higher education institutions. Drawingupon the Actor-Network Theory, ethnomethodology and Foucaldism, the researchintends to identify the specificities of the CEFDG by comparing it with other significantbodies: the AACSB (U.S.), the QAA (U.K.), the EQUIS system (transnational) and the“Commission des Titres d’Ingénieur” (French regulator in charge of engineers’programmes). Based on in-situ participant observation, archives and statistical data,an analysis of the rhetorical practices within CEFDG was carried out to identify keyfactors enabling conditions of success. Results show that two "normalization regimes"coexist and contribute to a better understanding of the French higher educationregulation and its operating conditions
Faye, Sébastien. "Contrôle et gestion du trafic routier urbain par un réseau de capteurs sans fil." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0061/document.
Full textRoad traffic has a significant effect on metropolitan activities, especially during peak hours when it impacts on areas such as the economy and the environment. Road infrastructure is typically coordinated from a control centre that is responsible for maintaining not only its equipment but also their initial settings and incident management (both material and human). During the past few years, new technologies in the fields of information and communication have led to the introduction of intelligent transportation systems. Using multiple measurement points distributed across a country, an operator can count road users and calculate the network load. However, the centralization of information has a number of drawbacks. The aim of this thesis is to study the use of distributed systems in order to implement intelligent transportation systems via a wireless sensor network. Coupled to a detection unit (e.g., a magnetometer), the interconnected sensors can respond to the passage of a vehicle when deployed, for example, along the road. They can also work together without recourse to a central entity - rendering all or part of an urban area totally independent. Furthermore, these networks can operate autonomously and are less susceptible to breadown, because the overall running of the system is not affected by the failure of individual components. Finally, components are small and cheap, and they operate wirelessly, which means they can be deployed and redeployed both rapidly and densely
Cougoulic, Alain. "Simulation de spécifications d'applications de gestion de réseaux de télécommunications." Phd thesis, Grenoble INPG, 1999. http://tel.archives-ouvertes.fr/tel-00004824.
Full textZouine, Abdesamad. "The Critical Success Factors of ERP system in management control function : toward a new analytical approach based on Structuration & Actor Network Theories." Thesis, Clermont-Ferrand 1, 2015. http://www.theses.fr/2015CLF10485.
Full textThe aim of this thesis is to investigate the phenomenon of the ERP system success within management control context through identifying, analyzing and classifying the main critical success factors
Dong, Alyssia. "Algorithmes asynchrones pour la gestion décentralisée des réseaux électriques soumis aux aléas de communication." Thesis, Rennes, École normale supérieure, 2022. http://www.theses.fr/2022ENSR0035.
Full textSmart grids are based on the interaction of an electrical network and a communication network between distributed, "intelligent" and communicating agents. In the case of a traditional electrical network, unforeseen events (loss of an equipment, line congestion, etc.) are mainly absorbed and compensated by the inertia of the network and its operating reserve. Smart grids aim to reduce this dependency by using intelligent distributed management strategies using information exchange and therefore based on a communication network. The impact of the communication network's reliability is a critical issue that we must address. This project aims at analyzing the impact of communication hazards on the resilience of a smart grid and at developing strategies that take these hazards into account in order to guarantee the operability and efficiency of the smart grid. In particular, we investigate three types of algorithms: a peer-to-peer market algorithm, an Optimal Power Flow algorithm that takes into account the physical constraints of the power grid, and finally an endogenous peer-to-peer market algorithm. We have studied in depth the principles of asynchronous algorithms, which help to minimize the waiting time at each iteration, as well as the effects of communication network hazards on the asynchronous resolution of these algorithms
Hacker, Janine. "Discovering knowledge actor roles in enterprise social network : towards a better understanding of knowledge-in-practice." Thesis, Mulhouse, 2017. http://www.theses.fr/2017MULH9113.
Full textEnterprise Social Networks (ESN) have emerged as an important technology for knowledge management. Prior research suggests different knowledge management-related roles in offline informal organisational networks. On the other hand, the topic of user roles receives a lot of attention in social media research with regards to public online social spaces. As for ESN, it is not clear to what extent platform users engage in different use practices and how combinations of use practices relevant in the context of knowledge work contribute to different user roles, that is, ESN knowledge actor roles. Addressing this gap, this thesis seeks to answer the following research question: Which knowledge actor roles emerge from interactions on ESN platforms and how can these roles be discovered?As a first step, this thesis derives a literature-based ESN knowledge actor role reference model by drawing on knowledge management research, organisation science, and social media research. Next, a unique dataset from a large Australian professional services firm is utilised within an in-depth case study. Contrasting the literature-based reference model and the roles discovered within the case study, an integrated ESN knowledge actor role framework is developed.This thesis contributes to the stream of ESN data analytics by developing a set of metrics to conceptualise user behaviour based on a quantitative approach. Secondly, it adds to the body of literature on social roles in online social spaces by proposing a theory of ESN knowledge actor roles. Concerning implications for practice, a notion of ESN user roles helps companies to recognise the different ways in which users contribute to ESN
Fang, Chao. "Modeling and Analysing Propagation Behavior in Complex Risk Network : A Decision Support System for Project Risk Management." Phd thesis, Ecole Centrale Paris, 2011. http://tel.archives-ouvertes.fr/tel-01018574.
Full textDuri, Christelle. "Etude comparative de gestions à flux tiré." Grenoble INPG, 1997. http://www.theses.fr/1997INPG0006.
Full textBenfattoum, Youghourta. "Network coding for quality of service in wireless multi-hop networks." Thesis, Paris 11, 2012. http://www.theses.fr/2012PA112267/document.
Full textIn this thesis we deal with the application of Network Coding to guarantee the Quality of Service (QoS) for wireless multi-hop networks. Since the medium is shared, wireless networks suffer from the negative interference impact on the bandwidth. It is thus interesting to propose a Network Coding based approach that takes into account this interference during the routing process. In this context, we first propose an algorithm minimizing the interference impact for unicast flows while respecting their required bandwidth. Then, we combine it with Network Coding to increase the number of admitted flows and with Topology Control to still improve the interference management. We show by simulation the benefit of combining the three fields: Network Coding, interference consideration and Topology Control. We also deal with delay management for multicast flows and use the Generation-Based Network Coding (GBNC) that combines the packets per blocks. Most of the works on GBNC consider a fixed generation size. Because of the network state variations, the delay of decoding and recovering a block of packets can vary accordingly degrading the QoS. To solve this problem, we propose a network-and content-aware method that adjusts the generation size dynamically to respect a certain decoding delay. We also enhance it to overcome the issue of acknowledgement loss. We then propose to apply our approach in a Home Area Network for Live TV and video streaming. Our solution provides QoS and Quality of Experience for the end user with no additional equipment. Finally, we focus on a more theoretical work in which we present a new Butterfly-based network for multi-source multi-destination flows. We characterize the source node buffer size using the queuing theory and show that it matches the simulation results
Seddiki, Mohamed Said. "Allocation dynamique des ressources et gestion de la qualité de service dans la virtualisation des réseaux." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0031/document.
Full textInternet has been successful in the recent years. The critical infrastructure of the internet has become stagnant due to the absence of changes in the core networks and stiffness of deployed equipment. It has become difficult and expensive to deploy new network services. Network virtualization is a new paradigm to overcome this problem. In this thesis, we present network virtualization and Software Defined Networking (SDN) as a solution that can be used by service providers. It enables them to provide new services to users through virtual networks (VNs) with better quality of service while optimizing the use of physical network resources. Firstly, we demonstrate the potential of SDN in the QoS management ofa virtualized home network (VN). We propose and implement ''FlowQoS'', a mechanism that can be deployed by an Internet Service Provider in the last-mile hop or in the home gateway. Performance measurements show that this solution can share bandwidth between applications according to user-defined configuration to guarantee QoS for each active traffic. The second contribution is modeling the interaction between service providers and infrastructure providers using game theoretic framework to offer dynamic sharing of physical infrastructure across multiple VN with different QoS requirements. We present a set of non-cooperative games to model the negotiation phase and the dynamic allocation of nodes and physical links for each deployed VN. Finally we focus on a predictive approach that allows an adaptive control of bandwidth allocation in order to reduce the packet delays for a given VN on each physical link. The last two contributions offer dynamic sharing models of physical infrastructure resources while guaranteeing the QoS for each VN
Sarabi, Siyamak. "Contribution of Vehicle-to-Grid (V2G) to the energy management of the Electric Vehicles fleet on the distribution network." Thesis, Paris, ENSAM, 2016. http://www.theses.fr/2016ENAM0050/document.
Full textThe power and energy density increment of the electrical storage system (ESS) of electric vehicles/Plug-in hybrid electric vehicles (EVs/PHEVs), while maintaining reasonable costs for the user, and the development of converters of electrical energy to high power density and more and more powerful, will encourage the mass production of electrified vehicles. Beyond, electric vehicles (EVs/PHEVs) require a connection to the grid for the charging of the batteries. The insertion of these new loads in the grid will then present several issues and significant impacts for electrical networks since they must respond locally to non-negligible power requests. This PhD thesis aims to study and reduce the impacts of the EVs/PHEVs on the distribution grid thanks to the vehicle-to-Grid (V2G) technology. The electric vehicle supplies the grid depending on the needs of the electrical system (bi-directional model) and offers a flexible service. These works of research have aimed to deepen the concepts in which the supply of electric vehicles (EV) and/or hybrids of type PHEV is integrated with the management of the distribution network and the future "energy hubs". The objective of the thesis is at first to examine the possible ancillary services provided by V2G, then to design a system of supervision which will ensure an energy management of these new loads by choosing the adequate mode of charge/discharge and also taking into consideration the request of local consumption and the presence of renewable production of type photovoltaic and wind in the distribution grid. This supervision will be in a first step "offline" and subsequently "online". The methods which are used in this thesis are as follows; artificial intelligence such as machine learning and fuzzy logic, the predictive control as well as the methods of hybrids optimization (stochastic and deterministic)
Cherif, Mohamed Oussama. "Optimization of V2V and V2I communications in an operated vehicular network." Compiègne, 2010. http://www.theses.fr/2010COMP1906.
Full textAs a component of the intelligent transportation system (ITS) and one of the concrete applications of mobile ad hoc networks, vehicular networks are attracting an extensive attention from both academia and industry. The most important feature of these networks is their ability to extend the horizon of drivers and on-board devices and, thus, to make the time spent in vehicle enjoyable to both driver and passengers and improve road traffic safety and efficiency. Nevertheless, it is not usually casy to develop such systems due to the constraints related to the vehicular environment such as the road’s architecture and the high mobility of nodes. These different properties offer two major challenges which are (i) offering sufficient QoS, and (ii) limiting the generated overhead. In this thesis, we focused on both vehicle to vehicle communication and vehicle to infrastructure communication. We tried to propose some optimized solutions that improve the quality of service in vehicular networks while generating a limited overhead and make easier the deployment of new services. First, we focused on the address configuration and mobility management in vehicular networks which are basic issues that act as pedestals to all other items. We proposed a multicast-communication-based solution to minimize the handover delays. Then, we bend over to study three major items in the vehicular network context : (i) data dissemination, where we proposed a local intersection-aware data dissemination protocol called ROD, (ii) data collection, where we proposed CGP protocol. This later is based on both cellular network and V2V communications, and (iii) self organization, where we proposed a self-organizing architecture based on geographic clustering. The performances of the different contributions were evaluated via simulations studies. Some of them were also evaluated analytically or/and via on-road real tests
Coudron, Matthieu. "Nouvelles approches pour les communications multichemins." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066514/document.
Full textThe criticity of the Internet keeps increasing with a very high number of services depending on its infrastructure. The Internet is expected to support services with an increasing tangible impact on the physical world such as the Internet of Things (IoT) or autonomous vehicles. It is thus important to address the current infrastructure shortcomings in terms of scalability, confidentiality and reliability. Multipath communications are one possible solution to address this challenge. The transition towards multipath technologies is not obvious, there are several challenges ahead. Some network devices block unknown protocols, thus preventing the emergence of new technologies, which plays a part in what is often referred to as the ossification of the Internet. Moreover, due to technical reasons, there are cases for which multipath technologies perform worse than their single path counterpart. In this thesis, we are interested in addressing some of these cases and limit their impact, so that multipath communications perform better than single path communications as often as possible. More specifically, we propose enhancements to Multipath TCP (MPTCP). After a detailed survey of multipath communications across all layers, we propose an answer as to the question of how many paths to use and how to ensure proper forwarding. Moreover, motivated by the intuition that packet arrival disorder can be mitigated by the knowledge of one way latencies, we propose a latency estimator with sender-side modifications only. Furthermore, as throughput maximization is in general solved regardless of the interface cost or user preferences, we elaborate a framework capable of presenting more complex strategies if for instance the user wants to enforce throughput even on less efficient paths. Finally, we develop and present a complete simulation model of MPTCP
Gansonre, Yassia. "Contribution à la mise en place d'une chaine qualité pour la conception, la réalisation et la gestion des infrastructures routières au Burkina Faso." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC059.
Full textIn Burkina Faso, landlocked country, agricultural and mining country, mobility is mainly ensured by the road infrastructures which cover nearly 90% of the transport needs. So the policy of the Burkina Faso’s state is relatively to reinforce the existing road network and to disenclose the country, conscious of the strong link between the development of the country and the development of the road network. However, it is possible to note an early degradation of the road network. Which phenomena are recurrent, in particular in the intertropical countries of Africa, and, are sometime related to the environmental factors (traffic, climate and materials) and to the procedures of design, construction and maintenance of roads. The study is consisted in analyzing the complete chain of realization roads since the preliminary draft until maintenance, in order to highlight the dysfunctions and to suggest solutions making it possible to improve them. Thus, the study was based on experimental, analytical and on socio-economic studies which finally made it possible to understand and to implement a QSE chain adapted to the socio-economic context of the country
Peng, Hongxia. "Les enjeux de gestion des espaces numériques interstitiels à thématiques professionnelles : introduction à une approche systémique. Recherche exploratoire menée sur les espaces numériques spécialisés dans la gestion des ressources humaines de la fonction publique territoriale." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020036.
Full textProfessional digital social networks, defined as interstitial professional digital spaces (IPDS) in this research, arouse, because of their emergent and ambivalent characteristics, empirical and academic questions. From an exploratory study conducted with an inductive and qualitative approach about the IPDS specified in the human resources management of the French public territorial sector, this research suggests, firstly, a systemic conceptualization in analysis of the IPDS’s functionaries, and second, an analysis of its management functionalities in the development of new HRM practices in this sector. Based on the autopoietic system theory of Niklas Luhmann (1928-1998), this research proposes a theoretical framework for analysis whereas the IPDS is a system with self-maintenance and a self-renewal process through communications between individuals who are both contributors and consumers, assembled by digital tools in interstitial spaces. The results stemming from the observation data show that, for HR professionals, IPDS are above all complementary professional tool with different features which can be illustrated as a public garden for broadening the mind, a window for observation, a mirror for self-examination, and a transmission belt for articulating HRM and IS. This work ends with reflection on the IPDS’s potentialities in a development of HR practices in the public territorial sector
Mazzilli, Ingrid. "Construire la GRH territoriale : une approche par les dispositifs de gestion et la théorie de l'acteur-réseau." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00910096.
Full textBuire, Jérôme. "Intégration des incertitudes liées aux prévisions de consommation et production à la gestion prévisionnelle d'un réseau de distribution." Thesis, Ecole centrale de Lille, 2018. http://www.theses.fr/2018ECLI0017/document.
Full textThe voltage profiles inside the network and power flows at the transport-distribution interface are modified under the massive insertion of renewable sources in distribution grids. The system’s uncertainties cannot be handled by local controllers which parameters are tuned at the actuator installation stage. A solution, widely accepted in the literature, consists of achieving a centralized optimization of the actuators references (distributed generators reactive powers, reference voltage of the On Load Tap Changer, capacitor banks reactive power). Within this framework, a supervisor computes all references at the same time and delivers the references to each actuators, which requires an efficient and reliable communication system.The main contribution of the thesis is to design an alternative approach which keeps the local control structures which settings will be updated on an hourly basis. The optimization relies on a stochastic representation of the grid that accounts for the On Load Tap Changer uncertainties and day ahead forecasts of the productions and consumptions. It is shown that every variable of the system can be represented by Gaussian or sum of truncated Gaussian variables. A stochastic optimization allows to select the controllers settings that minimize overvoltages and control efforts, without using time-consuming algorithms such as Monte-Carlo methods. This work will demonstrate that an appropriate management of uncertainties spares unnecessary and costly oversizing
Gao, Meihui. "Models and Methods for Network Function Virtualization (NFV) Architectures." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0025/document.
Full textDue to the exponential growth of service demands, telecommunication networks are populated with a large and increasing variety of proprietary hardware appliances, and this leads to an increase in the cost and the complexity of the network management. To overcome this issue, the NFV paradigm is proposed, which allows dynamically allocating the Virtual Network Functions (VNFs) and therefore obtaining flexible network services provision, thus reducing the capital and operating costs. In this thesis, we focus on the VNF Placement and Routing (VNF-PR) problem, which aims to find the location of the VNFs to allocate optimally resources to serve the demands. From an optimization point of view, the problem can be modeled as the combination of a facility location problem (for the VNF location and server dimensioning) and a network design problem (for the demands routing). Both problems are widely studied in the literature, but their combination represents, to the best of our knowledge, a new challenge. We start working on a realistic VNF-PR problem to understand the impact of different policies on the overall network management cost and performance. To this end, we extend the work in [1] by considering more realistic features and constraints of NFV infrastructures and we propose a linear programming model and a math-heuristic to solve it. In order to better understand the problem structure and its properties, in the second part of our work, we focus on the theoretical study of the problem by extracting a simplified, yet significant variant. We provide results on the computational complexity under different graph topology and capacity cases. Then, we propose two mathematical programming formulations and we test them on a common testbed with more than 100 different test instances under different capacity settings. Finally, we address the scalability issue by proposing ILP-based constructive methods and heuristics to efficiently deal with large size instances (with up to 60 nodes and 1800 demands). We show that our proposed heuristics can efficiently solve medium size instances (with up to 30 nodes and 1000 demands) of challenging capacity cases and provide feasible solutions for large size instances of the most difficult capacity cases, for which the models cannot find any solution even with a significant computational time
Gaudier, Fabrice. "Modélisation par réseaux de neurones : application à la gestion du combustible dans un réacteur." Cachan, Ecole normale supérieure, 1999. http://www.theses.fr/1999DENS0009.
Full text