To see the other types of publications on this topic, follow the link: Internet protocol.

Dissertations / Theses on the topic 'Internet protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ali, Amjad. "Migration from Internet Protocol Version 4 To Internet Protocol Version 6." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-38322.

Full text
Abstract:
IPv4 has played it big role in spreading Internet and Internet based applications for more than 20 years. Now it will hand over the stage to its more powerful successor IPv6. IP is an important component of the TCP/IP protocol suit and the Internet is built on it.          IPv6 is a new generation protocol suite which has been proposed by the Internet Engineering Task Force (IETF) which uses the 128-bit address instead of IPv4 32-bit address. Moving to the next generation of Internet Protocol became an issue to solve many problems in the current generation.          Unfortunately IPv4 and IPv6 are incompatible with each other. It is necessary to create smooth transition mechanisms that a transition mechanism is required during the time of migration from IPv4 to IPv6 networks. This paper aims to supplement this by presenting the design and implementation of IPv4 to IPv6 Transition Scenarios. This paper very clearly illustrates the transition of IPv4-to-IPv6 Transition mechanisms along with how to execute IPv6 commands.
APA, Harvard, Vancouver, ISO, and other styles
2

Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.

Full text
Abstract:
Thesis (M.S. Computer Science) Naval Postgraduate School, September 1999.
"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lund, Anders Smedstuen. "Refining the Internet Voting Protocol." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13177.

Full text
Abstract:
We make two improvements to the Internet voting protocol written by Gjøsteen. The first improvement improves the performance of the protocol, by changing the encryption of the votes. The second improvement improves the security of the protocol, by removing a private key used in the original protocol. The second improvement is done to the protocol after the first improvement has been implemented, so we end up with a protocol where both improvements are implemented.
APA, Harvard, Vancouver, ISO, and other styles
5

Øberg, Marianne Wiik. "Improving the Norwegian Internet Voting Protocol." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13117.

Full text
Abstract:
We have in this thesis looked at possible improvements with respect to security for the Norwegian Internet voting protocol. We have made a new protocol with independent secret keys, where all the encryptions of the votes are done by the voter's computer. We have also made two Special-Honest-Verifier-Zero-Knowledge Arguments of Knowledge for proving permutation and decryption of ElGamal ciphertexts, useful for the decryption service.
APA, Harvard, Vancouver, ISO, and other styles
6

Poutanen, Tomi J. "NetCents protocol for inexpensive Internet payments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ33966.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Savage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elahi, Faizan Ehsan. "CONCURRENT INTERNET OF THINGS PROTOCOL STACKS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397010.

Full text
Abstract:
This work presents the design and implementation of a firmware prototype that allows multiple Internet Of Things (IoT) protocols to coexist such that they share a single radio. 6LoWPAN over Time Slotted Channel Hopping (TSCH) and Bluetooth Low Energy (BLE) are the two network protocols that are explored in this work. 6LoWPAN over TSCH forms a mesh network of low power embedded devices so that they are globally accessible through their IPv6 addresses. BLE is suitable for the direct connectivity between devices in short radio ranges. Sharing a single radio between diverse protocols is challenging since protocols access the radio in different modes and with different time patterns. The proposed architecture uses radio abstraction layer for dynamically sharing the radio based on the priority of the requests. Furthermore, concurrent operation of protocols is achieved with the help of priority based multitasking of Micrium operating system. Finally, the time critical operations of the TSCH and the radio abstraction module are handled with nested interrupts. The implementation of the firmware is evaluated with mainly two types of experiments. Overall, it is observed from the experiments that both protocols can coexist concurrently and can maintain their connections. In one set of experiments, periodic data is sent over both protocols every 5 seconds (with small random jitter). Basically these experiments involve small data traffic on both protocols. It is observed that the protocol with lower radio priority degrades in performance. Approximately 10% of the packets need re-transmissions, and thus have more latency for the protocol with lower radio priority. The second set of experiments involve file transfers over 3 hops using 6LoWPAN, while one of the middle nodes (acting as a router for the file transfer) also carries BLE session comprising of 17 BLE activities. It is observed that the mean file transfer time with BLE session is delayed compared to the no BLE case. The delay is less than the duration of the two active TSCH slots. This architecture is suitable for sharing a single radio where the network traffic is sparse. This architecture allows small embedded devices with a single radio to be accessible across many protocols without any modifications to the protocol standards. Although the performance degrades in the simultaneous operations, the protocols still keep their respective connections and complete their operations.
APA, Harvard, Vancouver, ISO, and other styles
9

Patrick, Pamela H. "Transmission Control Protocol/Internet Protocol for the PC : an Ethernet implementation." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/26817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lella, Tuneesh Kumar. "Privacy of encrypted Voice Over Internet Protocol." Thesis, Texas A&M University, 2008. http://hdl.handle.net/1969.1/86009.

Full text
Abstract:
In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We use the simple Bayesian classifier and the complex HMM (Hidden Markov Models) classier to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be effective in carrying out silence detection based attacks on VOIP systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Dechjaroen, Chaiporn. "Performance evaluation of Voice over Internet Protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FDechjaroen.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Švec, Michal. "Dohledový systém pro Internet Protocol Multimedia Subsystem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220193.

Full text
Abstract:
The master’s thesis describes IMS (IP Multimedia Subsystem) in terms of IMS core ele- ments (functional description, different implementation, signaling etc.) Communication protocols SIP and DIAMETER, together with SNMP protocol, which is used for collecting data are briefly described in this thesis.Thesis is also describing various IMS projects to- gether with Open IMS project, for whom was this surveillance system designed. Next part deals with architecture design of surveillance system along with management options implemented in surveillance system for users and administrators. The main part of master’s thesis deals with the description of the surveillance system for the experimental school Open IMS network and describes the remote configuration of core elements and monitoring of network traffic, together with the monitoring servers performance. The most of the data in the designed surveillance system are processed into graphs, which are regularly updated. The final part of master’s thesis describes the configuration and implementation of monitoring tools MRTG and NfSen that were used in created web based surveillance system.
APA, Harvard, Vancouver, ISO, and other styles
13

Maaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lawson, Shawn, Kelvin Brentzel, Carol Harris, Patrick Coronado, Michael Pasciuto, Paul Greenfield, and Thomas Zajkowski. "RIPCom – A REMOTE INTERNET PROTOCOL COMMUNICATION SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606744.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
NASA Goddard Space Flight Center (GSFC) is developing the Remote Internet Protocol Communication (RIPCom) system, which is a wireless communication system that makes an aircraft look like a network node in the sky. RIPCom provides an Ethernet to Radio Frequency (RF) connection solution for real-time data transmission, and its design allows the end points of the communication system to become nodes on a network with assigned IP addresses. RIPCom’s design is especially suitable for Unmanned Aerial Vehicle (UAV) applications, and its versatility makes it valuable for many systems that require a high speed, digital wireless network.
APA, Harvard, Vancouver, ISO, and other styles
15

Eikenberg, Bruce R. "Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/43854.

Full text
Abstract:
Approved for public release; distribution is unlimited.
The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. This thesis conducts an in depth study of many aspects of the TCP/IP technology. Based upon descriptions provided, flowcharts detailing the series of procedures of numerous functions of both TCP and IP are created. Additionally, inefficient TCP/IP functions are discussed and possible solutions to the inefficiencies are provided.
APA, Harvard, Vancouver, ISO, and other styles
16

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Evloguieva, Evelina. "Light-weight SIP protocol for internet telephony services." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30117.

Full text
Abstract:
The technology that governs the Telecommunications today is based on the Intelligent Networks (IN). But we can see that the Internet Telephony is emerging rapidly and that it has good chances to become the basis for the next generation telecommunication networks. There are two major competing standards for Internet Telephony - H.323 protocol stack and SIP. This thesis focuses on SIP and the Value Added Services in the SIP based Internet Telephony. It describes and analyzes two existing SIP based approaches to the VAS implementation and presents new hybrid SIP-IN approach based on the concept of reusing the existing IN nodes. The major part of the study is devoted to the design of a lightweight protocol, built as SIP extension, providing for VAS in the hybrid SIP-IN environment. To illustrate the hybrid SIP-IN approach to VAS implementation and the SIPext protocol operation the execution of the Freephone and the Call Distribution services is described. Finally the functional modules supporting the SIPext communication in a hybrid SIP-IN architecture are outlined.
APA, Harvard, Vancouver, ISO, and other styles
18

Evloguieva, Evelina. "Light-weight SIP protocol for Internet telephony services." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0020/MQ55052.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kariyawasam, Sharadha. "High frequency internet protocol for wide area networks." Thesis, Lancaster University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577504.

Full text
Abstract:
The future success of high frequency (HF) communication systems rely on its ability to integrate and support IP diversity within a multiple intemet protocol (IP) based networks, such as satellite communication (SATCOM), local area network (LAN), wide area network (WAN) bearers. The introduction of new and proposed standards on HP-IP in recent years has increased the interest in the areas of performance analysis of HP -IP communication systems and networks. A wide range of modem services rely on IP and current HP-IP systems can support 2.4 to 19.2 kbps services such as e-mail and intemet. However, the reliability and the quality of service (QoS) still remains an issue of interest, particularly over longer distance skywave channels. These modem services require a higher data rate, much better bandwidth utilisation and a good QoS for its successful implementation. This work investigated HP-IP systems with the aim of improving the performance of legacy, current and proposed future systems without modifications to existing hardware systems. Initially the research conducted involved practical measurements and analysis on HF-IP systems complying with proposed NATO STANAG 5066 draft/edition 2 standards. Having investigated several NATO HF-IP standards (STANAG 5066 editionl, STANAG 5066 draft/edition 2, STANAG 4539/4285/4529, etc), a novel concept of error control coding (ECC) within the data link (DL) layer for HP-IP systems was proposed. Benefit of this proposed concept is that it does not require hardware modifications in legacy and current system for improving the performance. For application of this concept high performance low density parity check (LDPC) coding was considered. Two classes of short block length quasi-cyclic (QC) LDPC codes with switchable- rate single encoder/decoder structure; based on finite fields were designed and constructed. Several code rates were constructed within a single encoder/decoder structure resulting in reduced implementation complexity. Both classes of codes were simulated using HF channel model (ITU- R F.1487) covering latitudes and conditions for performance analysis. The simulation results show by using switchable-rate QC-LDPC coding scheme that there is coding gain of 2.4 dB compared to the existing STANAG 4539 convolutional coding scheme demonstrating the high performance of the proposed scheme in ITU-R F.l487 HF channel environment. In addition, the use of STANAG 5066 draft/edition 2 operating on a skywave multi-node HF-IP token ring (TR) WAN for a civilian disaster relief scenario was investigated. Here, a novel HF-IP network concept was proposed. The concept incorporates multi-node HF-IP TR WAN as an inner network, supported by an outer network made up of digital radio monodiale (DRM) service operating on a single frequency within the HF band. As STANAG 5066 draft/edition 2 was primarily designed to supporting multi-node HF-IP networks, it was vital to understand the network reliability and number of practical nodes that this network can support in different skywave HF channel conditions. A 3-node network based on skywave propagation covering a large geographical area was investigated. Using this scenario probability of reliability of a skywave multi-node HF-IP was analysed by simulations and practical measurements using STANAG 5066 draft/edition 2 IP protocol and STANAG 4539 modem setups. This analysis showed that the skywave multi-node HF-IP TR network can reliably operate between 3-5 nodes.
APA, Harvard, Vancouver, ISO, and other styles
20

Petrov, Emil Ivov Noël Thomas. "Optimizing real-time communications over the Internet protocol." Strasbourg : Université Louis Pasteur, 2008. http://eprints-scd-ulp.u-strasbg.fr:8080/950/01/PETROV_Emil_Ivov_2008.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yip, Wingkong Oliver. "HTTP-based protocol for Internet calendaring and scheduling." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/41017.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (p. [127]-[128]).
by Wingkong (Oliver) Yip.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
22

Abubakar, Babangida Albaba. "Intelligent routing algorithm for mobile Internet Protocol Television." Thesis, University of Brighton, 2016. https://research.brighton.ac.uk/en/studentTheses/9b6ecad1-5dea-4ee0-bce2-5d32417b1dde.

Full text
Abstract:
Network bandwidth and server capacity are gradually becoming overloaded due to the high demand and rapid evolution of high quality multimedia services over the Internet. Internet Protocol Television (IPTV) is among the multimedia services that demand more of network and server resources, especially with the emergence of Mobile IPTV. It is imperative for the service providers to maintain good quality management services in order to satisfy their clients. To guarantee the required quality of service (QoS) and quality of experience (QoE) in IPTV, the server must have the required capacity and resources to serve all the clients’ requests. The flexibility of IPTV services which provide users with the ability to stream multimedia content at anytime and anywhere they want, makes the demand for video-on-demand (VoD) services higher. However, the server bandwidth capacity is limited, and as such the numerous requests from the clients may exhaust all the available bandwidth depending on the number of requests at a given time, which may lead to the poor QoS and QoE. In this research, a new algorithm called Intelligent Routing Algorithm for Mobile IPTV (IRA-MIPTV) is proposed. The algorithm combined features and advantages of Internet Protocol (IP), Mobile Ad hoc Network (MANET) characteristics and Content Delivery Network (CDN) based network architecture to improve on the QoS and QoE in mobile IPTV. The proposed algorithm is aimed at reducing total dependency on the server by the mobile nodes. The algorithm intelligently learns the best server or client to serve an incoming service request depending on the available server capacity and the number of requests received at a point in time. The routing decision is made by the Designated Server (DS) that selects and reroutes a request to the most appropriate server or client. The novelty of this research work can simply be identified as the designing, developing and evaluating an Intelligent Routing Algorithm for mobile ITPV (IRA-MIPTV) that intelligently learns and select a reflective server or client to serve a particular service request on behalf of the server during high service demand. The selection depends on the server available bandwidth, load and proximity. The proposed algorithm also dynamically adjusts to server failure by assigning the role of designated server to the backup server and re-elect another backup server to guarantee service delivery at all times. To validate the effectiveness of the proposed algorithm, different simulation tests were conducted using OPNET/Riverbed Modeler 18.0. A typical IPTV network, where packets are delivered over IP, and the proposed algorithm were modelled and incorporated into the Modeler. For the study to reflect more on real situations, live video programme was streamed using VLC media player. The packet’s size and packet inter-arrival time data were collected and used in the simulation’s environment. After conducting a series of simulation tests, the results showed that the proposed algorithm outperforms the normal IPTV system in server load reduction, high throughput and low amount of end-to-end delay, as well as adaptability and robustness. The results also showed that the efficiency of the proposed algorithm increases as the number of clients increase. It also confirmed that the algorithm reduces the server overload during high service request periods by using clients to serve some of the incoming service requests on behalf of the server. The algorithm produced low server and network load, low end-to-end delay, high throughput, adaptability and robustness.
APA, Harvard, Vancouver, ISO, and other styles
23

Petrov, Emil Ivov. "Optimizing real-time communications over the Internet protocol." Université Louis Pasteur (Strasbourg) (1971-2008), 2008. https://publication-theses.unistra.fr/public/theses_doctorat/2008/PETROV_Emil_Ivov_2008.pdf.

Full text
Abstract:
Dans cette thèse, nous présenterons d’abord un état de l’art décrivant les mécanismes et procédures existantes permettant le déplacement des appareils mobiles au travers de plusieurs réseaux WiFi de type IPv6. Nous décrirons alors le travail réalisé sur plusieurs optimisations permettant d’améliorer la transparence lors du déplacement entre différents réseaux WiFi et rendant le basculement imperceptible pour l’utilisateur. Le travail que nous avons fait pour optimiser les procédures de mobilité a été fait sur 3 couches différentes, la couche liaison, la couche réseau et la couche application. Dans la deuxième partie de cette thèse nous nous concentrons sur l’optimisation des communications temps réel quelle que soit la configuration réseau ainsi que la facilitation de leur déploiement. Nous nous sommes penchés sur l’adaptation des algorithmes peertopeer et nous décrivons les protocoles XPP et XPPPCAN qui permettent l’utilisation des DHTs en tant que registrar SIP
In this thesis we will first present a state of the art description of existing mechanisms and procedures that allow mobile devices to move through IPv6 WiFi networks. We will then describe work completed on several optimizations that allow us to improve user experience during mobility in WiFi networks and to implement completely seamless handovers. The work that we have completed on optimizing these mobility procedures has been implemented on the connection, network and the application layers of the OSI model. In the second part of this thesis we concentrate on optimizing realtime communication, improving their operation regardless of the network configuration and simplifying their deployment. We therefore focus on the use of peertopeer algorithms. In this part we also describe the XPP and XPPPCAN protocols created during our work on the thesis, which allow the use of the distributed hash tables as a means of replacing centralized SIP registrars
APA, Harvard, Vancouver, ISO, and other styles
24

Jakma, Paul. "A distributed, compact routing protocol for the Internet." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7523/.

Full text
Abstract:
The Internet has grown in size at rapid rates since BGP records began, and continues to do so. This has raised concerns about the scalability of the current BGP routing system, as the routing state at each router in a shortest-path routing protocol will grow at a supra-linearly rate as the network grows. The concerns are that the memory capacity of routers will not be able to keep up with demands, and that the growth of the Internet will become ever more cramped as more and more of the world seeks the benefits of being connected. Compact routing schemes, where the routing state grows only sub-linearly relative to the growth of the network, could solve this problem and ensure that router memory would not be a bottleneck to Internet growth. These schemes trade away shortest-path routing for scalable memory state, by allowing some paths to have a certain amount of bounded “stretch”. The most promising such scheme is Cowen Routing, which can provide scalable, compact routing state for Internet routing, while still providing shortest-path routing to nearly all other nodes, with only slightly stretched paths to a very small subset of the network. Currently, there is no fully distributed form of Cowen Routing that would be practical for the Internet. This dissertation describes a fully distributed and compact protocol for Cowen routing, using the k-core graph decomposition. Previous compact routing work showed the k-core graph decomposition is useful for Cowen Routing on the Internet, but no distributed form existed. This dissertation gives a distributed k-core algorithm optimised to be efficient on dynamic graphs, along with with proofs of its correctness. The performance and efficiency of this distributed k-core algorithm is evaluated on large, Internet AS graphs, with excellent results. This dissertation then goes on to describe a fully distributed and compact Cowen Routing protocol. This protocol being comprised of a landmark selection process for Cowen Routing using the k-core algorithm, with mechanisms to ensure compact state at all times, including at bootstrap; a local cluster routing process, with mechanisms for policy application and control of cluster sizes, ensuring again that state can remain compact at all times; and a landmark routing process is described with a prioritisation mechanism for announcements that ensures compact state at all times.
APA, Harvard, Vancouver, ISO, and other styles
25

Grobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Felczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.

Full text
Abstract:
Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desirable security features and a list of proofs that should be satisfied. We then present the results of the analysis. These results validate that the protocol does contain many security features and properties. They also help understand the security properties and identify areas where the protocol can be further secured. This led us to extend the design of the protocol to enhance its security. This thesis also presents a prototype implementation of SPP. Three software components were implemented. They are the Electronic Wallet component, the merchant software component and the Trusted Third Party component. The architecture and technologies that are required for implementation are discussed. The prototype is then used in performance measurement experiments. Results on system performance as a function of key size are presented. Finally, this thesis presents an extension of SPP to support a two buyer scenario. In this scenario one buyer makes an order while another buyer makes the payment. This scenario enables additional commerce services.
APA, Harvard, Vancouver, ISO, and other styles
28

Workman, Stephen J. H. "AMPM Adaptive multipoint multimedia over wireless internet protocol networks." Thesis, University of Ulster, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Arthur, Colin Michael. "Measuring impact of packet reordering on internet protocol networks." Thesis, University of Strathclyde, 2008. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21987.

Full text
Abstract:
Packet Reordering in IP networks is a phenomenon which is becoming increasingly important in network performance analysis. Reordering is a consequence of network equipment manufacturers increasing switch and link level parallelism within networks, in the quest for performance, reliability and fiscal gains. Wireless technologies are also expected to increase the amount of packet reordering observable in an end-to-end path. This thesis addresses the issue of measuring the impact of packet reordering on Internet traffic, by proposing a number of measurement methodologies and metrics. Previous techniques assume that packet reordering does not often occur, or make assumptions which severely limit the results obtained. This thesis proposes a twopoint passive measurement technique, which improves on previous methods by allowing lightweight measurement of the amount and extent of reordering observed in a TCP flow, and classification of the cause of each reordering-induced packet retransmission. A large testbed measurement study performed using this technique indicated that TCP is tolerant to large percentages of reordered packets, providing that the delay of these packets is maintained below a threshold relative to Round-Trip-Time. This study further indicated that the effects of TCP packet reordering are not always negative. In specific scenarios reverse-path reordering can increase the overall throughput of a flow. This thesis further proposes a mid-point passive Measurement Technique and Visualisation Metric of TCP packet reordering, designed to classify out of sequence packets for many thousands of concurrent TCP flows. This technique is lightweight to implement and does not require symmetric TCP connections to operate. Finally, this thesis argues that future packet reordering metrics must correlate reordering observed at the network layer, with the resulting impacts observed at the application layer. An example of an application-specific metric is developed for MPEG-4 video over UDP traffic, and this metric is used to describe the effects of packet reordering on streamed video traffic.
APA, Harvard, Vancouver, ISO, and other styles
30

Sun, Lingfen. "Speech quality prediction for voice over Internet protocol networks." Thesis, University of Plymouth, 2004. http://hdl.handle.net/10026.1/870.

Full text
Abstract:
IP networks are on a steep slope of innovation that will make them the long-term carrier of all types of traffic, including voice. However, such networks are not designed to support real-time voice communication because their variable characteristics (e.g. due to delay, delay variation and packet loss) lead to a deterioration in voice quality. A major challenge in such networks is how to measure or predict voice quality accurately and efficiently for QoS monitoring and/or control purposes to ensure that technical and commercial requirements are met. Voice quality can be measured using either subjective or objective methods. Subjective measurement (e.g. MOS) is the benchmark for objective methods, but it is slow, time consuming and expensive. Objective measurement can be intrusive or non-intrusive. Intrusive methods (e.g. ITU PESQ) are more accurate, but normally are unsuitable for monitoring live traffic because of the need for a reference data and to utilise the network. This makes non-intrusive methods(e.g. ITU E-model) more attractive for monitoring voice quality from IP network impairments. However, current non-intrusive methods rely on subjective tests to derive model parameters and as a result are limited and do not meet new and emerging applications. The main goal of the project is to develop novel and efficient models for non-intrusive speech quality prediction to overcome the disadvantages of current subjective-based methods and to demonstrate their usefulness in new and emerging VoIP applications. The main contributions of the thesis are fourfold: (1) a detailed understanding of the relationships between voice quality, IP network impairments (e.g. packet loss, jitter and delay) and relevant parameters associated with speech (e.g. codec type, gender and language) is provided. An understanding of the perceptual effects of these key parameters on voice quality is important as it provides a basis for the development of non-intrusive voice quality prediction models. A fundamental investigation of the impact of the parameters on perceived voice quality was carried out using the latest ITU algorithm for perceptual evaluation of speech quality, PESQ, and by exploiting the ITU E-model to obtain an objective measure of voice quality. (2) a new methodology to predict voice quality non-intrusively was developed. The method exploits the intrusive algorithm, PESQ, and a combined PESQ/E-model structure to provide a perceptually accurate prediction of both listening and conversational voice quality non-intrusively. This avoids time-consuming subjective tests and so removes one of the major obstacles in the development of models for voice quality prediction. The method is generic and as such has wide applicability in multimedia applications. Efficient regression-based models and robust artificial neural network-based learning models were developed for predicting voice quality non-intrusively for VoIP applications. (3) three applications of the new models were investigated: voice quality monitoring/prediction for real Internet VoIP traces, perceived quality driven playout buffer optimization and perceived quality driven QoS control. The neural network and regression models were both used to predict voice quality for real Internet VoIP traces based on international links. A new adaptive playout buffer and a perceptual optimization playout buffer algorithms are presented. A QoS control scheme that combines the strengths of rate-adaptive and priority marking control schemes to provide a superior QoS control in terms of measured perceived voice quality is also provided. (4) a new methodology for Internet-based subjective speech quality measurement which allows rapid assessment of voice quality for VoIP applications is proposed and assessed using both objective and traditional MOS test methods.
APA, Harvard, Vancouver, ISO, and other styles
31

Beyh, S. "Computer and communication engineering : internet protocol telephony in construction." Thesis, University of Salford, 2004. http://usir.salford.ac.uk/26582/.

Full text
Abstract:
A construction project traditionally involves intensive communication flows between the site operations (workers, gangers, engineers, foremen, etc.), the site office, the company and the Supply Chain. Typically on the jobsite, a temporary site office is set up in order to conduct the operations of the construction project phases. The site office is equipped with traditional telecommunication means such as phone, fax and Internet connection. The site personnel are provided with a multitude of mobile, satellite and wireless telecommunication devices where appropriate, such as PDA, GSM and satellite phones/fax, and walkie-talkies. Technically, these legacy systems, once put together, could be able to provide adequate communication resources to the construction project teams. But one of the main issues emerging from the use of the abovementioned traditional telecommunication systems is that their cost can be found in some cases to be very high. On the other hand, in the absence of providing the necessary communication means available through the traditional telecommunication systems to the personnel on the move for whatsoever reason could be very harmful and, may negatively affect the execution of the construction works and the project lifecycle as a whole. This situation could be overcome if alternative solutions are put in place to reduce cost and improve communications. Therefore, this study has investigated a new communication paradigm known as IP (Internet Protocol) Telephony, which could possibly provide the site office, as well as the entire project team members with adequate, cheaper and more effective communications means at the jobsite. IP Telephony refers to communication services such as voice, video, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the Public Switch Telephone Network (PSTN). The basic steps involved in originating an IP Telephony call are the conversion of the analogue voice signal into digital format and the compression/translation of the signal into IP packets for transmission over the Internet. This communication paradigm eliminates the need for separate infrastructures for voice and data networks as these services can be implemented over a single data infrastructure. Furthermore, while, from the technical point of view IP Telephony Technology could be ready to satisfy the business case in general, its development within the construction sector has not been observed due to several barriers that have been investigated in this work as being part of the development of an integrated framework that aimed at enabling the use of Internet Protocol Telephony in construction. This research aimed at developing a generic integrated framework for enabling the use of Internet Protocol (IP) Telephony in construction. The process involved in the development of this framework included the conduct of intensive literature around the traditional telecommunication systems used by construction firms in the United Kingdom as well as the investigation of the current situation of IP Telephony technology in terms of availability of commercial services and applications used by the construction industry. The field investigations were obtained through appropriate surveys and interviews conducted with construction firms, telecommunication operators and Internet Protocol (IP) Telephony equipment vendors respectively. The research further looked at the issues related to the transfer of such a technology into the construction industry and investigated the main barriers preventing its implementation in construction sites' environments. These investigations represented an important part in the development of the "Internet Protocol Telephony on Construction Sites (IPTCS) Framework" which represents the focus of this research. The various modes of communications are described under this common framework which is expected to benefit in premier-lieu the construction industry by driving construction firms to look at IP Telephony technology as an adequate and cost effective alternative to their communication means for empowering their mobile personnel on construction sites and in the office alike. It could also motivate telecommunication operators, IP Telephony application developers and equipment vendors to establish specific solutions suitable for construction sites environments according to the industry's needs and requirements.
APA, Harvard, Vancouver, ISO, and other styles
32

Grebe, David L. "PROTOCOL LAYERING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607490.

Full text
Abstract:
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California
The advent of COTS based network-centric data systems brings a whole new vocabulary into the realm of instrumentation. The Communications and computer industries have developed networks to a high level and they continue to evolve. One of the basic techniques that has proven itself useful with this technology is the use of a “layered architecture.” This paper is an attempt to discuss the basic ideas behind this concept and to give some understanding of the vocabulary that has grown up with it.
APA, Harvard, Vancouver, ISO, and other styles
33

Ninet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.

Full text
Abstract:
Dans cette thèse, nous analysons le protocole IKEv2 à l'aide de trois outils de vérification formelle : Spin, ProVerif et Tamarin. Pour effectuer l'analyse avec Spin, nous étendons une méthode existante de modélisation. En particulier, nous proposons un modèle de la signature numérique, du MAC et de l'exponentiation modulaire, nous simplifions le modèle d'adversaire pour le rendre applicable à des protocoles complexes, et nous proposons des modèles de propriétés d'authentification. Nos analyses montrent que l'attaque par réflexion, une attaque trouvée par une précédente analyse, n'existe pas. De plus, nos analyses avec ProVerif et Tamarin produisent de nouvelles preuves concernant les garanties d'accord non injectif et d'accord injectif pour IKEv2 dans le modèle non borné. Nous montrons ensuite que la faille de pénultième authentification, une vulnérabilité considérée comme bénigne par les analyses précédentes, permet en fait d'effectuer un nouveau type d'attaque par déni de service auquel IKEv2 est vulnérable : l'Attaque par Déviation. Cette attaque est plus difficile à détecter que les attaques par déni de service classiques mais est également plus difficile à réaliser. Afin de démontrer concrètement sa faisabilité, nous attaquons avec succès une implémentation open-source populaire de IKEv2. Les contre-mesures classiques aux attaques DoS ne permettent pas d'éviter cette attaque. Nous proposons alors deux modifications simples du protocole, et prouvons formellement que chacune d'entre elles empêche l'Attaque par Déviation
In this thesis, we analyze the IKEv2 protocol specification using three formal verification tools: Spin, ProVerif and Tamarin. To perform the analysis with Spin, we extend and improve an existing modeling method with a simpler adversary model and a model for common cryptographic primitives and Lowe's authentication properties. As a result we show that the reflection attack, an attack found by a previous analysis, is actually not applicable. Moreover, our analysis using ProVerif and Tamarin provides new results regarding non-injective agreement and injective agreement guaranties of IKEv2 in the unbounded model. We then show that the penultimate authentication flaw, a vulnerability that was considered harmless by previous analyses, actually allows for a new type of Denial-of-Service attack, which works against IKEv2: the Deviation Attack. The Deviation Attack is harder to detect than existing DoS attacks, but is also harder to perform. To concretely demonstrate the attack, we successfully implement it against a popular open-source implementation of IKEv2. Finally, we study the use of existing DoS countermeasures and existing configuration options to defeat the attack, but we only find mitigations or incomplete workarounds. We therefore tackle the problem at a higher level: we propose two possible inexpensive modifications of the protocol, and formally prove that they both prevent the attack
APA, Harvard, Vancouver, ISO, and other styles
34

Perkins, Kyle L., and Michael A. Scott. "The Department of Defense's transition of program of record (POR) systems from Internet Protocol Version Four (IPV4) to Internet Protocol Version Six (IPV6)." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10093.

Full text
Abstract:
Joint Applied Project
The objective of this Joint Applied Project was to examine the technical, financial, and implementation aspects for DoD transitioning POR systems to IPv6. The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM). Implementation of transition strategies and mechanisms are identified and courses of action for implementing the mandatory IPv6 requirement are recommended. The principal finding of this research is that DoD Global Information Grid (GIG) assets must function in a dual IPv4/IPv6 capacity when transitioning to IPv6 in order to maintain the relevance of currently fielded programs. Furthermore, legacy GIG assets should be transitioned using Technology Refresh or Software Block upgrade programs while paying careful attention to the effects the transition has on tactical network operations.
APA, Harvard, Vancouver, ISO, and other styles
35

Morris, Jonathan Frank. "Protocol performance evaluation to support IP traffic over ATM." Thesis, Manchester Metropolitan University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.250774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Deng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.

Full text
Abstract:
Voice over IP (VoIP) is gaining more popularity in today‟s communications. The Session Initiation Protocol (SIP) is becoming one of the dominant VoIP signalling protocol[1, 2], however it is vulnerable to many kinds of attacks. Among these attacks, flood-based denial of service attacks have been identified as the major threat to SIP. Even though a great deal of research has been carried out to mitigate denial of service attacks, only a small proportion has been specific to SIP. This project examines the way denial of service attacks affect the performance of a SIP-based system and two evolutionary solutions to this problem that build on each other are proposed with experimental results to demonstrate the effectiveness of each solution. In stage one, this project proposes the Security-Enhanced SIP System (SESS), which contains a security-enhanced firewall, which evolved from the work of stage one and a security-enhanced SIP proxy server. This approach helps to improve the Quality-of-Service (QoS) of legitimate users during the SIP flooding attack, while maintaining a 100 percent success rate in blocking attack traffic. However, this system only mitigates SIP INVITE and REGISTER floods. In stage two, this project further advances SESS, and proposes an Improved Security-Enhanced SIP System (ISESS). ISESS advances the solution by blocking other SIP request floods, for example CANCEL, OK and BYE flood. JAIN Service Logic Execution Environment (JAIN SLEE) is a java-based application server specifically designed for event-driven applications. JAIN SLEE is used to implement enhancements of the SIP proxy server, as it is becoming a popular choice in implementing communication applications. The experimental results show that during a SIP flood, ISESS cannot only drop all attack packets but also the call setup delay of legitimate users can be improved substantially compared to and unsecured VoIP system.
APA, Harvard, Vancouver, ISO, and other styles
37

Hussain, S. A. "An active scheduling paradigm for open adaptive network environment." Thesis, Queen's University Belfast, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.273292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zuniga, Rodriguez Ricardo Francisco. "A comparative analysis of internet protocol telephony in Latin America /." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32819.

Full text
Abstract:
Recent technological advances (such as digitization) and economic shifts (such as privatization and liberalization) have radically changed the telecommunications landscape.
Internet Telephony is one of the most important developments that has resulted from digitization. It raises several legal-regulatory issues at both domestic and international levels.
This thesis analyzes the existing legal-regulatory framework for Internet Telephony in Latin America, and examines its implications and potential developments in the region.
In order to provide a more solid foundation for this analysis, the first chapter provides an overview of the traditional regulatory framework, and describes the technological and economic underpinnings of Internet Telephony.
The second chapter studies the regulatory frameworks for Internet Telephony that have been adopted by Canada, the United States and the European Union. These frameworks could serve as models and provide further guidance to analyze the approaches taken to regulate Internet Telephony in Latin America.
Finally, the third chapter examines the three existing legal-regulatory approaches to Internet Telephony that have been adopted in Latin America and its potential implications.
APA, Harvard, Vancouver, ISO, and other styles
39

Heath, Laura. "Toward an internet protocol (version 6) deployable information-centric framework." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53077.

Full text
Abstract:
This research defines a new information-centric networking (ICN) framework and associated protocol that is implementable in the existing internet with feasible minimal changes to the existing internet infrastructure. We create a protocol that assigns globally unique data item names and embeds these names, plus associated metadata, into an IPv6 header. This technique allows the use of the existing IPsec suite of protocols to mitigate user privacy and security concerns which exist in other existing non-implementable ICN designs. We demonstrate that this technique allows the use of standard routing and switching methods, which ensures network stability and reachability, and it permits self-assembly into internetworks. Next, we analyze the layer four functionality which must be provided by a general-purpose transport protocol, and we give an initial implementation which is used by our prototype. Lastly, using the Mininet network virtualization suite, we show that using RFC-compliant IPv6 datagrams as the named content allows information-centric routing and switching to be done using unmodified hardware and software, and that it also ensures backwards compatibility with unmodified networks.
APA, Harvard, Vancouver, ISO, and other styles
40

Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Full text
Abstract:
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
APA, Harvard, Vancouver, ISO, and other styles
41

Vehkaoja, V. (Ville). "End-to-end encryption protocol for internet of things devices." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201706022469.

Full text
Abstract:
Secure communication is an important requirement for many applications, even if the communicating devices are resource-constrained. The emergence of Internet of Things (IoT) has also raised the demand for low-power devices that can communicate with each other or send data to a central location for processing. Commonly used protocols that provide secure messaging to different applications are reviewed in this document. Some IoT applications are also described to provide more context and different types of attacks against IoT systems are also briefly presented. An encrypted messaging protocol employing the Double Ratchet Algorithm is described and the protocol implementation evaluated and compared to a simple reference protocol implementation. The results show that the protocol has improved backward secrecy and forward secrecy properties compared to commonly used protocols at the cost of slightly decreased performance and a reliability trade-off. Different cryptographic primitives and their suitability for use in the protocol are also evaluated
Turvallinen kommunikointi on tärkeä vaatimus monille sovelluksille vaikka kommunikoivilla laitteilla olisikin vain hyvin rajallinen määrä resursseja käytettävissään. Esineiden internetin syntyminen on myös nostanut kysyntää pienitehoisille laitteille, jotka voivat kommunikoida toistensa kanssa tai lähettää dataa keskeiseen sijaintiin prosessoitavaksi. Tässä dokumentissa arvioidaan yleisesti käytettyjä protokollia, jotka toteuttavat turvallisen kommunikaation erilaisissa sovelluksissa. Myös joitakin esineiden internetin sovelluksia ja erilaisia hyökkäyksiä niitä vastaan esitetään. Dokumentissa myös kuvaillaan viestintäprotokolla, joka käyttää Double Ratchet Algoritmia. Protokollan toteutus arvioidaan ja sitä vertaillaan yksinkertaiseen vertailuprotokollaan. Tulokset näyttävät esitetyn protokollan toteuttavan yleisesti käytettyjä protokollia paremmat backward secrecy- ja forward secrecy -ominaisuudet vähäisellä suorituskyvyn laskun, ja joissakin tapauksissa luotettavuuden, kustannuksella. Myös erilaisia kryptografisia primitiivejä ja niiden soveltuvuutta protokollassa käytettäväksi arvioidaan
APA, Harvard, Vancouver, ISO, and other styles
42

Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.

Full text
Abstract:

SMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.

In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.

APA, Harvard, Vancouver, ISO, and other styles
43

Santos, Ana Patrícia Gonçalves dos. "Street lighting mesh network protocol." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/15970.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações
The digital revolution of the 21st century contributed to stem the Internet of Things (IoT). Trillions of embedded devices using the Internet Protocol (IP), also called smart objects, will be an integral part of the Internet. In order to support such an extremely large address space, a new Internet Protocol, called Internet Protocol Version 6 (IPv6) is being adopted. The IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has accelerated the integration of WSNs into the Internet. At the same time, the Constrained Application Protocol (CoAP) has made it possible to provide resource constrained devices with RESTful Web services functionalities. This work builds upon previous experience in street lighting networks, for which a proprietary protocol, devised by the Lighting Living Lab, was implemented and used for several years. The proprietary protocol runs on a broad range of lighting control boards. In order to support heterogeneous applications with more demanding communication requirements and to improve the application development process, it was decided to port the Contiki OS to the four channel LED driver (4LD) board from Globaltronic. This thesis describes the work done to adapt the Contiki OS to support the Microchip TM PIC24FJ128GA308 microprocessor and presents an IP based solution to integrate sensors and actuators in smart lighting applications. Besides detailing the system’s architecture and implementation, this thesis presents multiple results showing that the performance of CoAP based resource retrievals in constrained nodes is adequate for supporting networking services in street lighting networks.
A revolução digital do século 21 contribuiu para o surgimento da Internet das Coisas (IoT). Em breve triliões de dispositivos embutidos usando o Internet Protocol (IP) serão parte integrante da Internet. De modo a suportar tal gama de endereços, um novo protocolo de Internet, chamado Internet Protocol versão 6 (IPv6) está a ser adoptado. O IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) acelerou a integração das redes sem-fios de sensores na Internet. Ao mesmo tempo, o Constrained Application Protocol (CoAP) tornou possível fornecer funcionalidades de serviços Web RESTful a dispositivos com recursos limitados. Este trabalho baseia-se em experiências anteriores em redes de iluminação pública, para os quais um protocolo proprietário, elaborado pelo Lighting Living Lab, foi implementado e usado durante vários anos. O protocolo proprietário tem sido utilizado numa ampla gama de placas de controlo de iluminação. De modo a suportar aplicações heterogéneas com requisitos de comunicação mais exigentes além de melhorar o processo de desenvolvimento de aplicações, adaptou-se o Contiki OS à placa LED driver de 4 canais (4LD) da Globaltronic. Esta dissertação descreve o trabalho conduzido para adaptar o Contiki OS ao microprocessador Microchip TM PIC24FJ128GA308 e apresenta uma solução baseada em IP para integrar sensores e atuadores em aplicações de iluminação inteligentes. Além da descrição da arquitetura e da implementação do sistema, este trabalho apresenta vários resultados que mostram que o desempenho do protocolo CoAP na placa 4LD é adequado para suportar serviços Web em redes de iluminação pública.
APA, Harvard, Vancouver, ISO, and other styles
44

Cheng, Chih Wei. "Design and implementation of home automation control system based on Zigbee and transmission control protocol/internet protocol." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10001582.

Full text
Abstract:

This project discusses the Home Automation System (HAS), which utilizes the technology of wireless sensor network (WSN). The control mechanism of these systems is based on ZigBee that works in collaboration with mobile and Internet systems. The input of these devices is quite different, which creates challenges for the creators of the system. Certain household devices are very easy to control while others have comparatively complex inputs. The system should be able to control both types of devices through a singular interface. This challenge is overcome by implementation of the wireless sensor nodes in a HAS. A highly important advantage of using ZigBee’s monitoring system is energy conservation, and reduction in power costs. Utilization of HAS leads to a decrease in consumption of water, electricity and other energy inputs, a reduction of the cost of utilities, and the improvement of security features. The paper demonstrates that Home Automation System has numerous applications beyond control of lighting, temperature and security cameras in a household. The technology opens up frontiers for numerous other applications in the area of home assistance and even in home health care.

APA, Harvard, Vancouver, ISO, and other styles
45

Raheem, Ali Hussein. "An integrated security protocol communication scheme for Internet of Things using the Locator/ID Separation Protocol network." Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/22173/.

Full text
Abstract:
Internet of Things communication is mainly based on a machine-to-machine pattern, where devices are globally addressed and identified. However, as the number of connected devices increase, the burdens on the network infrastructure increase as well. The major challenges are the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone. To address these problems, an Internet Engineering Task Force (IETF) working group, along with the research group at Cisco, are still working on the Locator/ID Separation Protocol as a routing architecture that can provide new semantics for the IP addressing, to simplify routing operations and improve scalability in the future of the Internet such as the Internet of Things. Nonetheless, The Locator/ID Separation Protocol is still at an early stage of implementation and the security Protocol e.g. Internet Protocol Security (IPSec), in particular, is still in its infancy. Based on this, three scenarios were considered: Firstly, in the initial stage, each Locator/ID Separation Protocol-capable router needs to register with a Map-Server. This is known as the Registration Stage. Nevertheless, this stage is vulnerable to masquerading and content poisoning attacks. Secondly, the addresses resolving stage, in the Locator/ID Separation Protocol the Map Server (MS) accepts Map-Request from Ingress Tunnel Routers and Egress Tunnel Routers. These routers in trun look up the database and return the requested mapping to the endpoint user. However, this stage lacks data confidentiality and mutual authentication. Furthermore, the Locator/ID Separation Protocol limits the efficiency of the security protocol which works against redirecting the data or acting as fake routers. Thirdly, As a result of the vast increase in the different Internet of Things devices, the interconnected links between these devices increase vastly as well. Thus, the communication between the devices can be easily exposed to disclosures by attackers such as Man in the Middle Attacks (MitM) and Denial of Service Attack (DoS). This research provided a comprehensive study for Communication and Mobility in the Internet of Things as well as the taxonomy of different security protocols. It went on to investigate the security threats and vulnerabilities of Locator/ID Separation Protocol using X.805 framework standard. Then three Security protocols were provided to secure the exchanged transitions of communication in Locator/ID Separation Protocol. The first security protocol had been implemented to secure the Registration stage of Locator/ID separation using ID/Based cryptography method. The second security protocol was implemented to address the Resolving stage in the Locator/ID Separation Protocol between the Ingress Tunnel Router and Egress Tunnel Router using Challenge-Response authentication and Key Agreement technique. Where, the third security protocol had been proposed, analysed and evaluated for the Internet of Things communication devices. This protocol was based on the authentication and the group key agreement via using the El-Gamal concept. The developed protocols set an interface between each level of the phase to achieve security refinement architecture to Internet of Things based on Locator/ID Separation Protocol. These protocols were verified using Automated Validation Internet Security Protocol and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and achieved results demonstrating that they do not have any security flaws. Finally, a performance analysis of security refinement protocol analysis and an evaluation were conducted using Contiki and Cooja simulation tool. The results of the performance analysis showed that the security refinement was highly scalable and the memory was quite efficient as it needed only 72 bytes of memory to store the keys in the Wireless Sensor Network (WSN) device.
APA, Harvard, Vancouver, ISO, and other styles
46

Yu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.

Full text
Abstract:
Anycast in next generation Internet Protocol is a hot topic in the research of computer networks. It has promising potentials and also many challenges, such as architecture, routing, Quality-of-Service, anycast in ad hoc networks, application-layer anycast, etc. In this thesis, we tackle some important topics among them. The thesis at first presents an introduction about anycast, followed by the related work. Then, as our major contributions, a number of challenging issues are addressed in the following chapters. We tackled the anycast routing problem by proposing a requirement based probing algorithm at application layer for anycast routing. Compared with the existing periodical based probing routing algorithm, the proposed routing algorithm improves the performance in terms of delay. We addressed the reliable service problem by the design of a twin server model for the anycast servers, providing a transparent and reliable service for all anycast queries. We addressed the load balance problem of anycast servers by proposing new job deviation strategies, to provide a similar Quality-of-Service to all clients of anycast servers. We applied the mesh routing methodology in the anycast routing in ad hoc networking environment, which provides a reliable routing service and uses much less network resources. We combined the anycast protocol and the multicast protocol to provide a bidirectional service, and applied the service to Web-based database applications, achieving a better query efficiency and data synchronization. Finally, we proposed a new Internet based service, minicast, as the combination of the anycast and multicast protocols. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. We show that the minicast service consumes less network resources while providing the same services. The last chapter of the thesis presents the conclusions and discusses the future work.
APA, Harvard, Vancouver, ISO, and other styles
47

Hahm, Oliver. "Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX090/document.

Full text
Abstract:
L'Internet des Objets a pour but d'intégrer des milliards d'objets connectés dans l'Internet.Du point de vue matériel, ces objets connectés sont de petits ordinateurs très bon marché, basés sur des micro-contrôleurs et des puces radio efficaces en énergie apparus récemment, couplés avec des capteurs et actionneur divers, le tout alimenté par une batterie de très petite taille.Ces objets connectés sont donc typiquement très contraints en ressources telles que CPU, mémoire et énergie.De plus, les liens radio à travers lesquels communiquent les objets connectés ont une capacité très limitée, sont souvent sujet à des taux de perte importants, et peuvent requérir du routage spontané entre objets connectés pour fournir la connectivité nécessaire.Ces caractéristiques posent des défis, d'une part en termes de logiciel embarqué s'exécutant sur les objets connectés, et d'autre part en termes de protocols réseaux utilisés par les objets connectés pour communiquer.En conséquence, de nouvelles méthodes et outils expérimentaux sont nécessaires pour étudier in vivo les réseaux formés d'objets connectés, de nouvelles plateformes logicielles sont nécessaires pour exploiter efficacement les objets connectés, et des protocoles de communication innovants sont nécessaire pour interconnecter ces objets.La présente thèse relève en partie ces défis, en introduisant des nouveaux outils facilitant l'utilisation de grands réseaux test interconnectant de nombreux objets connectés, un nouveau système d'exploitation (RIOT) utilisable sur une très grande variété d'objets connectés, ainsi que plusieurs nouveaux mécanismes utilisant le paradigme des réseaux centrés contenus pour améliorer significativement l'efficacité énergétique des protocoles de communication standards de l'Internet des Objets
The Internet of Things aims to seamlessly integrate billions of so-called Smart Objects into traditional Internet infrastructures.From the hardware perspective, Smart Objects emerged when tiny, cheap computers became available, combining energy efficient micro-controllers, low-power radio transceivers, and sensors as well as actuators interacting with the physical world, often powered by batteries.Typically, Smart Objects are thus heavily constrained in terms of CPU, memory and energy resources.Furthermore, wireless links used for communication among Smart Objects or towards the Internet are often slow, subject to high packet loss, and may require spontaneous store-and-forward among peer Smart Objects to ensure connectivity.Such characteristics pose challenges, on one hand in terms of software running on Smart Objects, and on the other hand in terms of network protocols Smart Objects use to communicate.In consequence, novel evaluation methods and experimental tools are needed to study Smart Object networks in vivo, new software platforms are needed to efficiently operate Smart Objects, and innovative networking paradigms and protocols are required to interconnect Smart Objects.This thesis addresses these challenges by introducing new tools for large scale testbed-driven experimental research, a novel operating system (RIOT) applicable to a wide variety of connected Smart Objects, and several new mechanisms leveraging information-centric networking which significantly improve energy-efficiency compared to state-of-the-art network protocols in the Internet of Things
APA, Harvard, Vancouver, ISO, and other styles
48

Tasyumruk, Lutfullah. "Analysis of voice quality problems of Voice Over Internet Protocol (VoIP)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FTasyumruk.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Thothadri, Radha. "Design and implementation of the mobile internet protocol on the linux kernel to support internet mobility." Ohio University / OhioLINK, 1999. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1175284051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography