Dissertations / Theses on the topic 'Internet protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Internet protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ali, Amjad. "Migration from Internet Protocol Version 4 To Internet Protocol Version 6." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-38322.
Full textBrachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Full text"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.
Full textLund, Anders Smedstuen. "Refining the Internet Voting Protocol." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13177.
Full textØberg, Marianne Wiik. "Improving the Norwegian Internet Voting Protocol." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13117.
Full textPoutanen, Tomi J. "NetCents protocol for inexpensive Internet payments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ33966.pdf.
Full textSavage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Full textElahi, Faizan Ehsan. "CONCURRENT INTERNET OF THINGS PROTOCOL STACKS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397010.
Full textPatrick, Pamela H. "Transmission Control Protocol/Internet Protocol for the PC : an Ethernet implementation." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/26817.
Full textLella, Tuneesh Kumar. "Privacy of encrypted Voice Over Internet Protocol." Thesis, Texas A&M University, 2008. http://hdl.handle.net/1969.1/86009.
Full textDechjaroen, Chaiporn. "Performance evaluation of Voice over Internet Protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FDechjaroen.pdf.
Full textŠvec, Michal. "Dohledový systém pro Internet Protocol Multimedia Subsystem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220193.
Full textMaaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.
Full textLawson, Shawn, Kelvin Brentzel, Carol Harris, Patrick Coronado, Michael Pasciuto, Paul Greenfield, and Thomas Zajkowski. "RIPCom – A REMOTE INTERNET PROTOCOL COMMUNICATION SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606744.
Full textNASA Goddard Space Flight Center (GSFC) is developing the Remote Internet Protocol Communication (RIPCom) system, which is a wireless communication system that makes an aircraft look like a network node in the sky. RIPCom provides an Ethernet to Radio Frequency (RF) connection solution for real-time data transmission, and its design allows the end points of the communication system to become nodes on a network with assigned IP addresses. RIPCom’s design is especially suitable for Unmanned Aerial Vehicle (UAV) applications, and its versatility makes it valuable for many systems that require a high speed, digital wireless network.
Eikenberg, Bruce R. "Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/43854.
Full textThe backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. This thesis conducts an in depth study of many aspects of the TCP/IP technology. Based upon descriptions provided, flowcharts detailing the series of procedures of numerous functions of both TCP and IP are created. Additionally, inefficient TCP/IP functions are discussed and possible solutions to the inefficiencies are provided.
Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.
Full textEvloguieva, Evelina. "Light-weight SIP protocol for internet telephony services." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30117.
Full textEvloguieva, Evelina. "Light-weight SIP protocol for Internet telephony services." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0020/MQ55052.pdf.
Full textKariyawasam, Sharadha. "High frequency internet protocol for wide area networks." Thesis, Lancaster University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577504.
Full textPetrov, Emil Ivov Noël Thomas. "Optimizing real-time communications over the Internet protocol." Strasbourg : Université Louis Pasteur, 2008. http://eprints-scd-ulp.u-strasbg.fr:8080/950/01/PETROV_Emil_Ivov_2008.pdf.
Full textYip, Wingkong Oliver. "HTTP-based protocol for Internet calendaring and scheduling." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/41017.
Full textIncludes bibliographical references (p. [127]-[128]).
by Wingkong (Oliver) Yip.
M.Eng.
Abubakar, Babangida Albaba. "Intelligent routing algorithm for mobile Internet Protocol Television." Thesis, University of Brighton, 2016. https://research.brighton.ac.uk/en/studentTheses/9b6ecad1-5dea-4ee0-bce2-5d32417b1dde.
Full textPetrov, Emil Ivov. "Optimizing real-time communications over the Internet protocol." Université Louis Pasteur (Strasbourg) (1971-2008), 2008. https://publication-theses.unistra.fr/public/theses_doctorat/2008/PETROV_Emil_Ivov_2008.pdf.
Full textIn this thesis we will first present a state of the art description of existing mechanisms and procedures that allow mobile devices to move through IPv6 WiFi networks. We will then describe work completed on several optimizations that allow us to improve user experience during mobility in WiFi networks and to implement completely seamless handovers. The work that we have completed on optimizing these mobility procedures has been implemented on the connection, network and the application layers of the OSI model. In the second part of this thesis we concentrate on optimizing realtime communication, improving their operation regardless of the network configuration and simplifying their deployment. We therefore focus on the use of peertopeer algorithms. In this part we also describe the XPP and XPPPCAN protocols created during our work on the thesis, which allow the use of the distributed hash tables as a means of replacing centralized SIP registrars
Jakma, Paul. "A distributed, compact routing protocol for the Internet." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7523/.
Full textGrobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.
Full textFelczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.
Full textKovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Full textWorkman, Stephen J. H. "AMPM Adaptive multipoint multimedia over wireless internet protocol networks." Thesis, University of Ulster, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529585.
Full textArthur, Colin Michael. "Measuring impact of packet reordering on internet protocol networks." Thesis, University of Strathclyde, 2008. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21987.
Full textSun, Lingfen. "Speech quality prediction for voice over Internet protocol networks." Thesis, University of Plymouth, 2004. http://hdl.handle.net/10026.1/870.
Full textBeyh, S. "Computer and communication engineering : internet protocol telephony in construction." Thesis, University of Salford, 2004. http://usir.salford.ac.uk/26582/.
Full textGrebe, David L. "PROTOCOL LAYERING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607490.
Full textThe advent of COTS based network-centric data systems brings a whole new vocabulary into the realm of instrumentation. The Communications and computer industries have developed networks to a high level and they continue to evolve. One of the basic techniques that has proven itself useful with this technology is the use of a “layered architecture.” This paper is an attempt to discuss the basic ideas behind this concept and to give some understanding of the vocabulary that has grown up with it.
Ninet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Full textIn this thesis, we analyze the IKEv2 protocol specification using three formal verification tools: Spin, ProVerif and Tamarin. To perform the analysis with Spin, we extend and improve an existing modeling method with a simpler adversary model and a model for common cryptographic primitives and Lowe's authentication properties. As a result we show that the reflection attack, an attack found by a previous analysis, is actually not applicable. Moreover, our analysis using ProVerif and Tamarin provides new results regarding non-injective agreement and injective agreement guaranties of IKEv2 in the unbounded model. We then show that the penultimate authentication flaw, a vulnerability that was considered harmless by previous analyses, actually allows for a new type of Denial-of-Service attack, which works against IKEv2: the Deviation Attack. The Deviation Attack is harder to detect than existing DoS attacks, but is also harder to perform. To concretely demonstrate the attack, we successfully implement it against a popular open-source implementation of IKEv2. Finally, we study the use of existing DoS countermeasures and existing configuration options to defeat the attack, but we only find mitigations or incomplete workarounds. We therefore tackle the problem at a higher level: we propose two possible inexpensive modifications of the protocol, and formally prove that they both prevent the attack
Perkins, Kyle L., and Michael A. Scott. "The Department of Defense's transition of program of record (POR) systems from Internet Protocol Version Four (IPV4) to Internet Protocol Version Six (IPV6)." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10093.
Full textThe objective of this Joint Applied Project was to examine the technical, financial, and implementation aspects for DoD transitioning POR systems to IPv6. The research outlines the initial intended useful life and limitations of IPv4 and IPv6. The financial aspects of transitioning to IPv6 are examined from a programs perspective, relative to the Program Objective Memorandum (POM). Implementation of transition strategies and mechanisms are identified and courses of action for implementing the mandatory IPv6 requirement are recommended. The principal finding of this research is that DoD Global Information Grid (GIG) assets must function in a dual IPv4/IPv6 capacity when transitioning to IPv6 in order to maintain the relevance of currently fielded programs. Furthermore, legacy GIG assets should be transitioned using Technology Refresh or Software Block upgrade programs while paying careful attention to the effects the transition has on tactical network operations.
Morris, Jonathan Frank. "Protocol performance evaluation to support IP traffic over ATM." Thesis, Manchester Metropolitan University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.250774.
Full textDeng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.
Full textHussain, S. A. "An active scheduling paradigm for open adaptive network environment." Thesis, Queen's University Belfast, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.273292.
Full textZuniga, Rodriguez Ricardo Francisco. "A comparative analysis of internet protocol telephony in Latin America /." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32819.
Full textInternet Telephony is one of the most important developments that has resulted from digitization. It raises several legal-regulatory issues at both domestic and international levels.
This thesis analyzes the existing legal-regulatory framework for Internet Telephony in Latin America, and examines its implications and potential developments in the region.
In order to provide a more solid foundation for this analysis, the first chapter provides an overview of the traditional regulatory framework, and describes the technological and economic underpinnings of Internet Telephony.
The second chapter studies the regulatory frameworks for Internet Telephony that have been adopted by Canada, the United States and the European Union. These frameworks could serve as models and provide further guidance to analyze the approaches taken to regulate Internet Telephony in Latin America.
Finally, the third chapter examines the three existing legal-regulatory approaches to Internet Telephony that have been adopted in Latin America and its potential implications.
Heath, Laura. "Toward an internet protocol (version 6) deployable information-centric framework." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53077.
Full textAlm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Full textVehkaoja, V. (Ville). "End-to-end encryption protocol for internet of things devices." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201706022469.
Full textTurvallinen kommunikointi on tärkeä vaatimus monille sovelluksille vaikka kommunikoivilla laitteilla olisikin vain hyvin rajallinen määrä resursseja käytettävissään. Esineiden internetin syntyminen on myös nostanut kysyntää pienitehoisille laitteille, jotka voivat kommunikoida toistensa kanssa tai lähettää dataa keskeiseen sijaintiin prosessoitavaksi. Tässä dokumentissa arvioidaan yleisesti käytettyjä protokollia, jotka toteuttavat turvallisen kommunikaation erilaisissa sovelluksissa. Myös joitakin esineiden internetin sovelluksia ja erilaisia hyökkäyksiä niitä vastaan esitetään. Dokumentissa myös kuvaillaan viestintäprotokolla, joka käyttää Double Ratchet Algoritmia. Protokollan toteutus arvioidaan ja sitä vertaillaan yksinkertaiseen vertailuprotokollaan. Tulokset näyttävät esitetyn protokollan toteuttavan yleisesti käytettyjä protokollia paremmat backward secrecy- ja forward secrecy -ominaisuudet vähäisellä suorituskyvyn laskun, ja joissakin tapauksissa luotettavuuden, kustannuksella. Myös erilaisia kryptografisia primitiivejä ja niiden soveltuvuutta protokollassa käytettäväksi arvioidaan
Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.
Full textSMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.
In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.
Santos, Ana Patrícia Gonçalves dos. "Street lighting mesh network protocol." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/15970.
Full textThe digital revolution of the 21st century contributed to stem the Internet of Things (IoT). Trillions of embedded devices using the Internet Protocol (IP), also called smart objects, will be an integral part of the Internet. In order to support such an extremely large address space, a new Internet Protocol, called Internet Protocol Version 6 (IPv6) is being adopted. The IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has accelerated the integration of WSNs into the Internet. At the same time, the Constrained Application Protocol (CoAP) has made it possible to provide resource constrained devices with RESTful Web services functionalities. This work builds upon previous experience in street lighting networks, for which a proprietary protocol, devised by the Lighting Living Lab, was implemented and used for several years. The proprietary protocol runs on a broad range of lighting control boards. In order to support heterogeneous applications with more demanding communication requirements and to improve the application development process, it was decided to port the Contiki OS to the four channel LED driver (4LD) board from Globaltronic. This thesis describes the work done to adapt the Contiki OS to support the Microchip TM PIC24FJ128GA308 microprocessor and presents an IP based solution to integrate sensors and actuators in smart lighting applications. Besides detailing the system’s architecture and implementation, this thesis presents multiple results showing that the performance of CoAP based resource retrievals in constrained nodes is adequate for supporting networking services in street lighting networks.
A revolução digital do século 21 contribuiu para o surgimento da Internet das Coisas (IoT). Em breve triliões de dispositivos embutidos usando o Internet Protocol (IP) serão parte integrante da Internet. De modo a suportar tal gama de endereços, um novo protocolo de Internet, chamado Internet Protocol versão 6 (IPv6) está a ser adoptado. O IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) acelerou a integração das redes sem-fios de sensores na Internet. Ao mesmo tempo, o Constrained Application Protocol (CoAP) tornou possível fornecer funcionalidades de serviços Web RESTful a dispositivos com recursos limitados. Este trabalho baseia-se em experiências anteriores em redes de iluminação pública, para os quais um protocolo proprietário, elaborado pelo Lighting Living Lab, foi implementado e usado durante vários anos. O protocolo proprietário tem sido utilizado numa ampla gama de placas de controlo de iluminação. De modo a suportar aplicações heterogéneas com requisitos de comunicação mais exigentes além de melhorar o processo de desenvolvimento de aplicações, adaptou-se o Contiki OS à placa LED driver de 4 canais (4LD) da Globaltronic. Esta dissertação descreve o trabalho conduzido para adaptar o Contiki OS ao microprocessador Microchip TM PIC24FJ128GA308 e apresenta uma solução baseada em IP para integrar sensores e atuadores em aplicações de iluminação inteligentes. Além da descrição da arquitetura e da implementação do sistema, este trabalho apresenta vários resultados que mostram que o desempenho do protocolo CoAP na placa 4LD é adequado para suportar serviços Web em redes de iluminação pública.
Cheng, Chih Wei. "Design and implementation of home automation control system based on Zigbee and transmission control protocol/internet protocol." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10001582.
Full textThis project discusses the Home Automation System (HAS), which utilizes the technology of wireless sensor network (WSN). The control mechanism of these systems is based on ZigBee that works in collaboration with mobile and Internet systems. The input of these devices is quite different, which creates challenges for the creators of the system. Certain household devices are very easy to control while others have comparatively complex inputs. The system should be able to control both types of devices through a singular interface. This challenge is overcome by implementation of the wireless sensor nodes in a HAS. A highly important advantage of using ZigBee’s monitoring system is energy conservation, and reduction in power costs. Utilization of HAS leads to a decrease in consumption of water, electricity and other energy inputs, a reduction of the cost of utilities, and the improvement of security features. The paper demonstrates that Home Automation System has numerous applications beyond control of lighting, temperature and security cameras in a household. The technology opens up frontiers for numerous other applications in the area of home assistance and even in home health care.
Raheem, Ali Hussein. "An integrated security protocol communication scheme for Internet of Things using the Locator/ID Separation Protocol network." Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/22173/.
Full textYu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.
Full textHahm, Oliver. "Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX090/document.
Full textThe Internet of Things aims to seamlessly integrate billions of so-called Smart Objects into traditional Internet infrastructures.From the hardware perspective, Smart Objects emerged when tiny, cheap computers became available, combining energy efficient micro-controllers, low-power radio transceivers, and sensors as well as actuators interacting with the physical world, often powered by batteries.Typically, Smart Objects are thus heavily constrained in terms of CPU, memory and energy resources.Furthermore, wireless links used for communication among Smart Objects or towards the Internet are often slow, subject to high packet loss, and may require spontaneous store-and-forward among peer Smart Objects to ensure connectivity.Such characteristics pose challenges, on one hand in terms of software running on Smart Objects, and on the other hand in terms of network protocols Smart Objects use to communicate.In consequence, novel evaluation methods and experimental tools are needed to study Smart Object networks in vivo, new software platforms are needed to efficiently operate Smart Objects, and innovative networking paradigms and protocols are required to interconnect Smart Objects.This thesis addresses these challenges by introducing new tools for large scale testbed-driven experimental research, a novel operating system (RIOT) applicable to a wide variety of connected Smart Objects, and several new mechanisms leveraging information-centric networking which significantly improve energy-efficiency compared to state-of-the-art network protocols in the Internet of Things
Tasyumruk, Lutfullah. "Analysis of voice quality problems of Voice Over Internet Protocol (VoIP)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FTasyumruk.pdf.
Full textThothadri, Radha. "Design and implementation of the mobile internet protocol on the linux kernel to support internet mobility." Ohio University / OhioLINK, 1999. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1175284051.
Full textAhmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.
Find full text