Dissertations / Theses on the topic 'Internet addresses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 41 dissertations / theses for your research on the topic 'Internet addresses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Shue, Craig A. "A better Internet without IP addresses." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3358945.
Full textTitle from PDF t.p. (viewed on Feb. 10, 2010). Source: Dissertation Abstracts International, Volume: 70-05, Section: B, page: 3011. Adviser: Minaxi Gupta.
Phillips, Matthew D. W., and Trevor J. Baumgartner. "Implementation of a network address translation mechanism over IPv6." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.
Full textNetwork Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
Baumgartner, Trevor J. Phillips Matthew D. W. "Implementation of a Network Address Translation Mechanism Over IPv6 /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
Snyder, Mark E. "Critical infrastructure protection and the Domain Name Service (DNS) system." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Snyder_09007dcc805e0f32.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
Dunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.
Full textPh. D.
AbuGhazaleh, Shereen N. A. "The resolution of domain name disputes : a comparison of Jordan, United Kingdom, United States, and ICANN rules." Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=158341.
Full textRattananon, Sanchai Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "RPX ??? a system for extending the IPv4 address range." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/30210.
Full textSamiuddin, Asim. "IPAM : a web-based IP/DNS management system /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.
Full textTang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textAhmed, Ejaz. "Monitoring and analysis of internet traffic targeting unused address spaces." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/34075/1/Ejaz_Ahmed_Thesis.pdf.
Full textWeaver, Rhiannon. "Behavioral Modeling of Botnet Populations Viewed through Internet Protocol Address Space." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/152.
Full textEndo, Patricia Takako. "WBG (Whois Based Geolocation): uma estratégia para localização geográfica de hosts na Internet." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2039.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
Baseado, por exemplo, na localização geográfica de um determinado host na Internet, podese oferecer serviços especializados, como: a) páginas web com preferências regionais (e.g. usuários online podem receber propagandas direcionadas ou ter a linguagem para apresentação de conteúdo selecionada automaticamente); b) controle de disponibilidade de dados, de acordo com a localização do usuário (e.g. pode-se restringir o acesso a determinados dados através de políticas regionais e autorização de transações a partir de localidades pré-estabelecidas), c) estudo e análise de tráfego geolocalizado para entender quem se comunica com quem no nível de usuários, regiões e países e identificação de anomalias de roteamento. Os aspectos comuns destas aplicações são a sua dependência em relação a estratégias, denominadas geolocalização. Contudo, alguns destes mecanismos apresentam uma baixa acurácia ou uma estimativa de localização geográfica não-aceitável para determinadas aplicações. Portanto, torna-se de grande importância estudos que melhorem a precisão, bem como a completude das estratégias utilizadas para inferir a geolocalização de hosts na Internet. Este trabalho tem como principais objetivos o estudo sobre as estratégias de geolocalização existentes; a proposta de uma estratégia que melhore a precisão das inferências de localização geográfica de hosts na Internet e a completude dos resultados; e o estudo de tráfego geolocalizado de uma base de dados da rede acadêmica do Estado de Pernambuco. A estratégia desenvolvida, denominada WBG (Whois Based Geolocation), é baseada em buscas whois online e possui uma heurística baseada na ferramenta traceroute
Klíma, Oldřich. "Aplikace pro geolokační databáze." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400906.
Full textManocha, Jitendra. "Using innovation from block chain technology to address privacy and security problems of Internet of Things." Thesis, KTH, Industriell Marknadsföring och Entreprenörskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209682.
Full textZhuang, Yinfang. "Measuring Effectiveness of Address Schemes for AS-level Graphs." UKnowledge, 2012. http://uknowledge.uky.edu/cs_etds/8.
Full textMesser, Benjamin Lee. "Improving survey response in mail and internet general public surveys using address-based sampling and mail contact procedures." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/B_Messer_040309.pdf.
Full textSignorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109.
Full textThis work illustrates how today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the emerging future Internet proposals, the promising Information-Centric Networking (ICN) research paradigm is presented. ICN aims to redesign Internet's core protocols to promote a shift in focus from hosts to contents. Among the ICN architectures, the Named-Data Networking (NDN) envisions users' named content requests to be forwarded by their names in routers along the path from one consumer to 1-or-many sources. NDN's requests leave trails in traversed routers which are then followed backwards by the requested contents. The Pending Interest Table (PIT) is the NDN's data-plane component which temporarily records forwarded content requests in routers. On one hand, this work explains that the PIT stateful mechanism enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, this work illustrates how the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets can flood the network with a large amount of hard to satisfy requests with the aim to overload both the network infrastructure and the content producers. This work proves that although countermeasures against IFAs have been proposed, a fair understanding of their real efficacy is missing since those have been tested under simplistic assumptions about the evaluation scenarios. Overall, the work presented in this manuscript shapes a better understanding of both the implications of IFAs and the possibilities of improving the state-of-the-art defense mechanisms against these attacks. The main contributions of this work revolves around a security analysis of the NDN's forwarding plane. In particular, this work defines a more robust attacker model for IFAs by identifying flaws in the state-of-the-art IFA countermeasures. This work introduces a new set of IFAs built upon the proposed attacker model. The novel IFAs are used to re-assess the most effective existing IFA countermeasures. Results of this evaluation disproves the universal efficacy of the state-of-the-art IFA defense mechanisms and so, call for different countermeasures to protect the NDN against this threat. To overcome the revealed issue, this work also defines proactive IFA countermeasures, which are novel defense mechanisms against IFAs inspired by the issues with the state-of-the-art ones. This work introduces Charon, a novel proactive IFA countermeasure, and tests it against the novel IFA attacks. This work shows Charon counteracts latest stealthy IFAs better than the state-of-the-art reactive countermeasures. Finally, this work illustrates the NDN.p4 design, that is, the first implementation of an ICN protocol written in the high-level language for packet processors P4. The NDN.p4 work is the first attempt in the related literature to leverage novel programmable-networks technologies to test and evaluate different NDN forwarding plane designs. This last contribution also classifies existing alternative forwarding mechanisms with respect to a set of PIT cardinal properties. The work outlines that it is worth to explore alternative forwarding mechanisms aiming to design an NDN forwarding plane less vulnerable to the IFA threat
Fourcot, Florent. "Address spreading in future Internet supporting both the unlinkability of communication relations and the filtering of non legitimate traffic." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-181117.
Full textKibru, Shomoro Abenezer. "EXAMINING FACTORS INFLUENCING NETWORK EXPERT‟S DECISION WHETHER TO RECOMMEND INTERNET PROTOCOL (IP) MIGRATION (IPV4 to IPV6) OR NOT IN ORGANIZATIONS." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18130.
Full textProgram: Masterutbildning i Informatik
Richter, Wolf R. "'Better' regulation through social entrepreneurship? : innovative and market-based approaches to address the digital challenge to copyright regulation." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:8d609027-8605-4815-a499-3d2981028a24.
Full textCriqui-Barthalais, Géraldine. "La protection des libertés individuelles sur le réseau internet." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020076/document.
Full textThis study considers the internet as a new territory where rights guaranteed to each individual in physical space can be promoted; not only free speech and privacy, but also the Habeas Corpus prerogative writ, which protects against unlawful imprisonment, and the right to freedom of movement. Thus, processing by analogy, the dissertation intends to promote two specific digital rights: the freedom to connect to the internet and the freedom to surf on the web. The freedom to connect should be part of a public service which promotes this access through public policies. Moreover, barring someone from using the internet can only be decided by a judge. The freedom to surf should protect the web users against unreasonable restrictions. Thus, measures blocking illegal websites should not come through self-regulation but through a legal framework which defines how administrative authorities are entitled to decide such restrictions. The protection of these two rights entails further obligations. Individuals must access the internet anonymously and they must be aware of how the government monitors their actions on the web. This study tries to outline the content of measures aiming to frame network addressing mechanisms. Identity checks based on the IP address should be subject to a strict legal regime. The study concludes that individuals have to be protected from surveillance when data reveal their choices among websites while they are connected. Internet access providers, but also search engines and browsers, must delete this data. Only special measures taken by a public entity or someone entitled to control the web users may lead to this kind of data retention
Modrák, Zdeněk. "Webová aplikace zobrazující polohu IP stanic." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220392.
Full textSignorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109/document.
Full textThis work illustrates how today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the emerging future Internet proposals, the promising Information-Centric Networking (ICN) research paradigm is presented. ICN aims to redesign Internet's core protocols to promote a shift in focus from hosts to contents. Among the ICN architectures, the Named-Data Networking (NDN) envisions users' named content requests to be forwarded by their names in routers along the path from one consumer to 1-or-many sources. NDN's requests leave trails in traversed routers which are then followed backwards by the requested contents. The Pending Interest Table (PIT) is the NDN's data-plane component which temporarily records forwarded content requests in routers. On one hand, this work explains that the PIT stateful mechanism enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, this work illustrates how the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets can flood the network with a large amount of hard to satisfy requests with the aim to overload both the network infrastructure and the content producers. This work proves that although countermeasures against IFAs have been proposed, a fair understanding of their real efficacy is missing since those have been tested under simplistic assumptions about the evaluation scenarios. Overall, the work presented in this manuscript shapes a better understanding of both the implications of IFAs and the possibilities of improving the state-of-the-art defense mechanisms against these attacks. The main contributions of this work revolves around a security analysis of the NDN's forwarding plane. In particular, this work defines a more robust attacker model for IFAs by identifying flaws in the state-of-the-art IFA countermeasures. This work introduces a new set of IFAs built upon the proposed attacker model. The novel IFAs are used to re-assess the most effective existing IFA countermeasures. Results of this evaluation disproves the universal efficacy of the state-of-the-art IFA defense mechanisms and so, call for different countermeasures to protect the NDN against this threat. To overcome the revealed issue, this work also defines proactive IFA countermeasures, which are novel defense mechanisms against IFAs inspired by the issues with the state-of-the-art ones. This work introduces Charon, a novel proactive IFA countermeasure, and tests it against the novel IFA attacks. This work shows Charon counteracts latest stealthy IFAs better than the state-of-the-art reactive countermeasures. Finally, this work illustrates the NDN.p4 design, that is, the first implementation of an ICN protocol written in the high-level language for packet processors P4. The NDN.p4 work is the first attempt in the related literature to leverage novel programmable-networks technologies to test and evaluate different NDN forwarding plane designs. This last contribution also classifies existing alternative forwarding mechanisms with respect to a set of PIT cardinal properties. The work outlines that it is worth to explore alternative forwarding mechanisms aiming to design an NDN forwarding plane less vulnerable to the IFA threat
Heim, Aileen F. "Preventing Personal Conflicts of Interest for Contractor Employees Performing Acquisition Functions| What Lessons Can Be Learned From This First Effort to Address Government Contractors Employees' Personal Conflicts of Interest." Thesis, The George Washington University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1537342.
Full textPersonal conflicts of interest among contractor employees are an increasingly visible and controversial area of U.S. Government contracting, given the U.S. Government’s expanded reliance on contractor personnel. On November 2, 2011, the FAR Council issued a final rule on preventing personal conflicts of interest for contractor employees performing acquisition functions and issued a request for information regarding whether other privately contracted services in addition to acquisition support present sufficient risk to the integrity of the U.S. Government procurement process to warrant additional regulation.
This paper will review the defects in the new rule; will evaluate what lessons can be learned from the new rule to enhance future rules governing the personal conflicts of interest of U.S. Government contractors’ employees; and recommend better integration of U.S. Government compliance regulations to include conflicts of interest rules, protection of proprietary information, and the mandatory disclosure rule to reduce contractor compliance cost and promote implementation efficiencies through integration.
Fourcot, Florent [Verfasser], Alexander [Akademischer Betreuer] Schill, Frédéric [Akademischer Betreuer] Cuppens, Jorge [Akademischer Betreuer] Cardoso, and Isabelle [Akademischer Betreuer] Chrisment. "Address spreading in future Internet supporting both the unlinkability of communication relations and the filtering of non legitimate traffic / Florent Fourcot. Betreuer: Alexander Schill ; Frédéric Cuppens. Gutachter: Alexander Schill ; Jorge Cardoso ; Isabelle Chrisment." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://d-nb.info/1083462628/34.
Full textDu, Preez Johannes Lodewicus. "Pension interest at divorce : a guide to the treatment of pension interest at divorce with reference to the history, the changes made to legislation, and the expected future outcome as based upon the current outstanding issues to be addressed by the legislature and the Minister of Finance." Thesis, Stellenbosch : Stellenbosch University, 2010. http://hdl.handle.net/10019.1/19878.
Full textENGLISH ABSTRACT: Due to a number of legislative changes, the tax treatment of pension interest at divorce has become a complicated issue, as it is not only affected by the Income Tax Act, but also by the Pension Funds Act as well as the Divorce Act. Because these changes are still fairly new to the industry, there are still a couple of technical issues on which the industry is not clear. In practice there are many articles and writers trying to give some form of guidance regarding the technical issues of pension interest at divorce. The study will refer to case law that affected the changes made to the Pension Funds Act, which led to the institution of the “clean-break” principle. Some of the technical issues with regard to a payment of an award made to a non-member spouse by a divorce order will be included along with a discussion on difficulties and uncertainties arising from the “clean-break” principle. The focus of the study will then be directed towards changes made to the Income Tax Act. Specific reference will be made to the tax on an award made to a non-member spouse by a divorce order. In some cases the tax on such an award will be recovered from the member spouse. The Income Tax Act does however provide for a right of recovery, which will be discussed. The payment of the tax from the member’s individual reserve however constitutes an additional accrual according to the Income Tax Act, which leads to a tax-on-tax issue. A discussion on GN33 will be included, as GN33 addresses the tax-on-tax issue. A chapter on preservation funds is included, as it is important to understand the working of these funds on when a non-member spouse has the option to transfer his/her pension interest to such a fund. The study will then look at an inequitable position in which the member finds him/herself when party to a divorce order made before 13 September 2007. Due to the changes made to the Income Tax Act, a situation arose where the member spouse looses out on all or part of his/her R300 000 tax free benefit as allowed by the Income Tax Act for withdrawals from his/her retirement funds. The study will include considerations for financial planning. The industry is placing more and more emphasis on sound financial planning, and it is therefore important to understand the key considerations, which an advisor or a party to a divorce should consider. The study will include a discussion on some of the outstanding issues, which the industry expects the legislature to address in the near future. As the changes to the Income Tax Act are ever changing and the discussion on pension interest at divorce is still a new topic under discussion, the industry is keeping an eye on the expected changes from the finance ministry and the legislature.
AFRIKAANSE OPSOMMING: As gevolg van ’n aantal veranderinge in wetgewing, het die belastinghantering van pensioenbelang by egskeiding ’n ingewikkelde kwessie geword, aangesien dit nie net deur die Inkomstebelastingwet beïnvloed word nie, maar ook deur die Pensioenfondswet sowel as die Egskeidingswet. Die studie sal verwys na regspraak wat aanleiding gegee het tot die veranderinge wat in die Pensioenfondswet gemaak is en wat gelei het tot die instelling van die “skoon-breuk”-beginsel. Sommige van die tegniese vrae wat betref die betaling van ’n toekenning aan ’n nie-lid-gade by ’n egskeidingsbevel sal ingesluit word saam met ’n bespreking van probleme en onsekerhede wat uit die “skoon-breuk”-beginsel voortspruit. Die fokus van die studie sal dan gerig word op veranderinge wat in die Inkomstebelastingwet aangebring is. As gevolg van veranderinge in wetgewing op spesifieke datums, word ’n toekenning wat aan ’n nie-lid-gade gemaak is in terme van ’n egskeidingsbevel belas onder drie verskillende belastingregimes, afhangende van die datum van die egskeidingsbevel. Daar sal spesifiek verwys word na die belasting op ’n toekenning aan ’n nie-lid-gade. In sommige gevalle sal die belasting op so ’n toekenning verhaal word van die lid-gade. Die Inkomstebelastingwet maak egter voorsiening vir ’n verhalingsreg wat ook bespreek sal word. Die betaling van die belasting vanuit die lid-gade se minimum individuele reserwe word egter erken as ’n addisionele toevalling in terme van die Inkomstebelastingwet wat lei tot ’n belasting-op-belasting kwessie. GN33 sal bespreek word aangesien hierdie algemene nota die kwessie aanspreek. ’n Hoofstuk oor bewaringsfondse word ingesluit, aangesien dit belangrik is om die werking van hierdie fondse te verstaan wanneer ’n nie-lid-gade die opsie het om sy/haar pensioenbelang na so ’n fonds oor te dra. Die studie sal dan kyk na ’n onbillike posisie waarin die lid hom/haarself bevind as hy/sy party was by ’n egskeiding voor 13 September 2007. As gevolg van die veranderinge wat in die Inkomstebelastingwet aangebring is, het ’n situasie ontstaan waar die lid eggenoot ’n gedeelte van sy/haar R300 000 belastingvrye voordeel vir onttrekkings van sy/haar aftreefonds, verloor. Die studie sal oorwegings vir finansiële beplanning insluit. Die bedryf plaas al meer klem op omvattende finansiële beplanning en dit is dus belangrik om die deurslaggewende oorwegings waarmee ’n adviseur of ’n party by ’n egskeiding moet rekening hou, te verstaan. Ten slotte sal die studie ’n bespreking insluit van sommige uitstaande kwessies wat die industrie verwag die wetgewer in die toekoms moet aanspreek.
Becher, Mike. "Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem." Master's thesis, Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199801481.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textYoo, Kevin. "VoIP & NAT compatibility: test techniques and results." Thesis, 2006. http://hdl.handle.net/1828/2213.
Full textRavinder, Sunil. "Cache architectures to improve IP lookups." Master's thesis, 2009. http://hdl.handle.net/10048/667.
Full textTitle from PDF file main screen (viewed on Mar. 18, 2010). A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Science, Department of Computing Science, University of Alberta. Includes bibliographical references.
Chen, Ting-Hsin, and 陳鼎新. "Strategy Analysis of Internet IPv4 Address Exhaustion." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/66534705597196450261.
Full text淡江大學
資訊管理學系碩士班
97
After the commercial interests in 1991, a large number of Internet service providers started to provide various types of value-added services, and a large number of terminals and 3G, WiMAX communications equipment add to Internet, its geometric growth of the network, IPv4 address space exhaustion issue is more attention. According to IANA''s information, only 12% of the total IPv4 address space remains unallocated in 2009. Geoff Huston observe BGP routing table and the trends of the allocated address over the past 3 years, if current trends continue, projections expect the free pool of unallocated IPv4 address space will run out in the 2 years. For the desired effect, address space exhausted relatively early time. This paper will provide an overview of the current IPv4 allocation of IPv4 address space, the problems of the Internet, tracing the Asia-Pacific Network Information Center with issues of readiness and the impact of IPv4 address space exhaustion. Proposing the strategy of Internet IPv4 address exhaustion and suggesting Taiwan the exhaustion issue. Utilizing the network management, user, continuity, cost, controversy, feasibility, effectiveness of sustainability to assessment of each policy comprehensively. Understanding that the impact of IPv4 address depletion in Taiwan. To ensure that smooth operation and use of the Internet when the depletion of IPv4 resources.
Huang, Kenny, and 黃勝雄. "Research on Internet Resource Identifiers and Address Resolution Technologies." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/83917092057964422200.
Full text國立政治大學
資訊管理研究所
97
Internet is the information space with the collection of resources, network protocols, resource identifiers and addresses. The resources include not only the physical resources but also the virtual resources such as information services. How to build the efficient identifier mapping mechanism and discover these resources is crucial for efficient use of all kinds of resources. The DNS is the most prevalent means of initiating a network transaction. It is the core of Internet and virtually forwards messages to desired destinations. With the growth of Internet, there are more and more applications and services are innovated with new identifier requirements. DNS simply isn’t capable to identify and resolve these resources. This study describes the DNS technology and its disadvantages. Several technical approaches are evaluated. The study proposes a new Partial match mechanism for resource naming and addressing, which improves the DNS service features, supports the demands for advanced resource identification and resolution. The main contributions of this research are: 1. Research on the issues of equal of simple Chinese characters and traditional Chinese characters; propose a solution based on the algorithm of IDN-Admin to implement the equal of simple Chinese characters (SC) and traditional Chinese (TC) characters, and design TC/SC conversion computing algorithm. 2. Evaluate directory service model in the DNS infrastructure 3. Propose internationalized domain name (IDN) administrative guideline for managing locality IDN implementation and operation. 4. Propose Partial Match Mechanism and multifaceted model. Partial Match Mechanism enhances naming service features and backward integrated with the existing DNS infrastructure. 5. Explore business considerations for multilingual name identifiers.
Ho, Fu-Shen, and 何福軒. "On Secure Online Services over the Internet with Network Address Translators." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/77443577856708479489.
Full text國立交通大學
資訊工程系
91
In this dissertation, we discuss the issues and propose solutions when deploying secure online services over the Internet with network address translators (NAT). In general, deployment of a secure online service can consist of following steps: probing of services, registration, authentication, payment, content delivery and settlement. We first discuss the pros and cons of NAT from the network layering perspective. Then, to cope with the issues raised by NAT, we propose a service probing and channel establishment protocol that can be deployed across multiple network address realms. After that, customers and service providers have to authenticate each other for further interactions. As an example of efficient authentication mechanism between two parties, we present an ID-based proxy authentication system that leverages the management strength of Public Key Infrastructure (PKI) while inherits the simplicity of a traditional ID-based protocol. Next, we present our payment and settlement models that enables current payment systems to handle transactions involving multiple participants. As the last step, we present two key distribution schemes for content delivery in the conditional access systems of Video-on-Demand (VoD) networks that improve the efficiency of key updates.
Wang, Hsiang, and 王翔. "Single-Address-Space Extension on 64-bit Linux and Its Support to Highly Available Internet Service." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/05996095348402878183.
Full text國立清華大學
資訊工程學系
93
Internet service has become very important no matter in business or in our leisure time. Popular Internet service always results in great economical lose while service crash. Due to the long execution time and the huge number of clients, Internet services can easily suffer from transient faults or the software aging problem. Service restart can solve these problems but fully restart of an Internet service may take a long period of time. Thus fully restart will cause the Internet service downtime too long. Some researches have been proposed to reduce the service restart time efficiently. Internet services may achieve higher availability in these researches but will suffer from performance degradation because of the framework characteristic in these researches. We proposed a framework which includes a Single-Address-Space extension on 64-bit Linux and supports to help the Internet service achieve higher availability without much performance degradation as previous researches. In the framework, we make good use of the widespread 64-bit address space. The Internet service with the need of higher availability will be modified to run efficiently in the Single-Address-Space extension and the legacy applications can still run in the traditional Multiple-Address-Space environment.
Mtimkulu, Sebabatso. "Towards the functionality South African internet banking websites should provide to address the needs of generation-Y users." Diss., 2014. http://hdl.handle.net/10500/18415.
Full textCollege of Engineering, Science & Technology
M. Tech. (Information Technology)
Fourcot, Florent. "Address spreading in future Internet supporting both the unlinkability of communication relations and the filtering of non legitimate traffic." Doctoral thesis, 2014. https://tud.qucosa.de/id/qucosa%3A28935.
Full textYUEH, DAO-YI, and 樂道頤. "The Judgement Against the Competence of a Plaintiff of the Third Party That Shares the Same Interest with the Addressee of the Administrative Decision." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/73xh8c.
Full text輔仁大學
法律學系
107
Ubi jus, ibi remedium Nowadays, the determine foundation of Taiwan’s main stream theory and practice to whether people have public right or legal interest to file an administrative litigation, in order to fulfilling its procedure conditions, is mostly abided by the context of Interpretation No. 469 of Justices and quoted from the “Theory of Protective Norms” under German Law. However, through academic discussions and mass amount of practices, the Theory of Protective Norms are mostly used in those cases that the third party has opposite interest with the addressee of the administrative decision. E.g., neighbor litigation, competitor litigation or environmental litigation. On the opposite, when the third party shares same interest with the addressee of the administrative decision, the Theory of Protective Norms is barely applicable in such circumstances. At this point, how to seek public right for the third party becomes a question. At this moment, the Joint Conference of Presiding Justices and Justices of Supreme Administrative Court reached a resolution in August 2013 which vetoed the citizens to have the standing of a plaintiff. This resolution was made against the question on whether or not citizens have the standing of a plaintiff in the cases of which the authority rejects the resident certification applied by their foreign spouse. As for this deposition, further discussion is necessary since the question on “whether or not citizens (the third party that share the same interest with the addressee of the administrative decision) have the standing of a plaintiff to initiate administrative litigations for their foreign spouse (the opposite party for administrative decision) against the rejected decision” involves both the Marriage and Family Rights in ICCPR&ICESCR and the Right of Instituting Legal Proceedings (also known as where there is a right, there is a remedy) which is guaranteed by the Constitution.
Olayinka, Vincent Folajimi, and Вінсент Фолажімі Олайіка. "Deploying IPv6 based network for TopCorn Bank (Nigeria)." Master's thesis, 2017. http://elartu.tntu.edu.ua/handle/lib/24135.
Full textΔελέγκου, Βασιλική. "Ανάλυση πρωτοκόλλων σε επίπεδο εφαρμογής σε δίκτυα τηλεϊατρικής." Thesis, 2011. http://hdl.handle.net/10889/4956.
Full textThe existence of the Internet provides the possibility to transfer structured information through many different applications.One of the most used applications is the e-mail, which exists from the very beginning of the Internet. Recently a new important application, the telemedicine, appears which includes operations similar to e-mail.In this diploma thesis the protocols for the format of Internet messages RFC 822, RFC 2822, the RFC 2045 of the category of MIME and also the RFC 2231 are presented. These are some of the most basic e-mail protocols and thus the basis for the development of telemedicine. Simultaneously there is a comprehensive reference to the basic protocols that establish a structure format and are used in Medical Informatics.Specifically, Chapter 1presents the protocol RFC 822, which defines the format and semantics of the contents of the e-mail. Atlhough this protocol is sufficient for ASCII text messages sending, it’s not for non-ASCII text messages.In Chapter 2 there is reference to protocol RFC 2822, which is a more updated version of RFC 822, in order to reflect current practice. It strictly defines the structure of contents of text messages while it makes no provision for the transmission of multimedia messages. In Chapter 3 we present the RFC 2045 of the category MIME which is an independent specification that complements RFC 822.This protocol provides the necessary additional header in the mail in order to sent content of non-ASCII text. By using header fields "MIME- Version","Content-Type"and"Content-Transfer-Encoding ", it’s possible arbitrary data types with compliant mail messages to be included in a standard way. Because of this any restriction imposed by RFC 822, is being violated. In Chapter 4 , we describe the standard RFC 2231 which defines the extensions considering different restrictions that arise from the use of MIME parameters in content type and content-disposition header fields in Internet e-mail.All these extensions are applicable to a model which is completely compatible in syntax level with already existing applications. Finally in Chapter 5 we present the basic protocols that determine structure formats and are used in telemedicine. Also the functional specifications of the WADO are analyzed here.The IHE XDS layout integration is presented that address the problem of interoperability of HER. The HER is a key research field in medical informatics.
Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.
Full textMercantile Law
LL. D.
"Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem." Master's thesis, siehe Literaturverzeichnis, 1998. https://monarch.qucosa.de/id/qucosa%3A17525.
Full text