Dissertations / Theses on the topic 'ISO (Computer network standard)'

To see the other types of publications on this topic, follow the link: ISO (Computer network standard).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'ISO (Computer network standard).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ngqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.

Full text
Abstract:
Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
APA, Harvard, Vancouver, ISO, and other styles
3

Alila, Patrick. "Complementing network security to the ISO/IEC 27000 standard." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96298.

Full text
Abstract:
I syfte att öppna upp nya affärsmöjligheter för informationssäkerhetsföretaget Secure State AB, har detta arbete bedrivits för att komplettera företagets nuvarande standard för informationssäkerhetsarbete med ytterligare nätverkssäkerhet. Krav på slutresultatet var att dokumentet eller standarden skulle kunna komplettera ISO 27000, samt vara kostnadseffektivt. Efter en undersökning av den nämnda standarden konstaterades att enbart ISO 27000 i sig inte är ett fullgott verktyg för nätverkssäkerhetsarbete, på grund av dess icke-tekniska inriktning och målgrupp. Att komplettera ISO 27000 med av författaren utarbetade krav var inte heller att föredra, då syftet med ett standardiserat arbetssätt därmed försvinner. Det är bättre och attraktivare för kunden att använda sig av specifika tekniska standarder och rekommendationer. Sökandet efter en kompletterande standard påbörjades däför enligt dessa kriterier Kompatibilitet med ISO 27000 Teknisk inriktning Kostnadseffektiv Attraktiv att arbeta efter ISO 18028 uppfyller dessa krav mycket bra på samtliga punkter och är därmed bäst lämpad att arbeta efter av de tre standarder/rekommendationer som undersöktes mot kravlistan. Därför bör också Secure State välja att utföra nätverkssäkerhetsarbetet förankrat i ISO 18028 med följande förväntade resultat. Fig. 10, Förväntat resultat av komplettering till ISO 27000. Högst upp ser vi de allmäna informationssäkerhetspolicies samtliga anställda följer. Som nivå två finns ISO 27000, vilket är ledningens system för hur informationssäkerhetsarbetet övergripande ska hanteras. Längst ned ser vi den tekniska skyddsutrustningen som administreras av tekniker som följer lämpliga dokument. Denna rapport har identifierat ISO 18028 för säkerheten i nätverk, övriga återstår att vid behov identifiera för annan teknisk utrustning.
APA, Harvard, Vancouver, ISO, and other styles
4

Okcan, Alper. "Automatic Acquisition And Use Of Multimodal Medical Device Observations Based On Iso/ieee 11073 And Hl7 Standards." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608462/index.pdf.

Full text
Abstract:
The delivery of quality healthcare to all citizens at reasonable costs is an important challenge. With the increase in the aging population, the costs of managing chronic diseases increase. Today, healthcare services tend to shift from recovery to prevention. Remote healthcare monitoring is crucial for prevention and monitoring of chronic diseases since they require continuous and long-term monitoring. The advances in networking, mobile communications and medical device technologies offer a great potential to realize remote healthcare monitoring. However, seamless integration of multi-modal medical devices to the existing healthcare information systems is necessary for the automated use of medical device observations in related applications. The thesis addresses the automatic acquisition and use of multi-modal medical device observations in healthcare information systems. The interoperability of medical devices with healthcare information systems requires both physical connectivity and application level interoperability. Therefore, the thesis concentrates on both the medical device domain and the interoperability efforts on the existing healthcare information systems. It provides an interoperability solution based on ISO/IEEE 11073 and HL7 standards. This work is also realized the automatic acquisition and use of multi-modal medical device observations in an intelligent healthcare monitoring and decision support system which is developed as a part of the IST-027074 SAPHIRE project funded by the European Commission.
APA, Harvard, Vancouver, ISO, and other styles
5

Nyström, Jan. "A formalisation of the ITU-T Intelligent Network standard." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-226522.

Full text
Abstract:
Telecommunication systems are today among the largest and most heterogeneous computer systems that exist. The functionality offered by them is rapidly increasing, by numerous features: call waiting, credit-card billing and call-forwarding to name a few. The realisation of extra services poses a challenge to implementors, in particular since different services are developed at different times and places, by different people. Not only is the number and complexity of services increasing but some vendors want to enable users to tailor their own services and ultimately design them entirely. This of course calls for rigorous control of the services so that they do not come into conflict with the interest of the vendors, other users or surprise the users with their behaviours. One way of aiding the service designers is to provide a service creation environment containing a set of well defined building blocks that would be uniform for all features, irrespective of vendor or service. Such an environment also needs tool support for writing, checking, validating and analysing for possible conflicts. We have constructed a formalism for compactly specifying the interface behaviour of the switching and service logic system underlying a service creation environment, and for specifying the behaviour of components of an environment for service creation. For this formalism we supply tool support in the form of a simulator. We have further made a formalisation, in our framework, of the ITU-T Intelligent Network model, Capability Set-1. The formalisation concerns both the underlying service architecture, in which service logic is perform by a dedicated Service Control Function, and the component language, in which Service Independent Building Blocks are composed to yield new services.
APA, Harvard, Vancouver, ISO, and other styles
6

Byrne, Bernadette M. "A longitudinal study of the diffusion of the ISO/IEC information resource dictionary system standard (IRDS.)." Thesis, Aston University, 2001. http://publications.aston.ac.uk/10610/.

Full text
Abstract:
The IRDS standard is an international standard produced by the International Organisation for Standardisation (ISO). In this work the process for producing standards in formal standards organisations, for example the ISO, and in more informal bodies, for example the Object Management Group (OMG), is examined. This thesis examines previous models and classifications of standards. The previous models and classifications are then combined to produce a new classification. The IRDS standard is then placed in a class in the new model as a reference anticipatory standard. Anticipatory standards are standards which are developed ahead of the technology in order to attempt to guide the market. The diffusion of the IRDS is traced over a period of eleven years. The economic conditions which affect the diffusion of standards are examined, particularly the economic conditions which prevail in compatibility markets such as the IT and ICT markets. Additionally the consequences of the introduction of gateway or converter devices into a market where a standard has not yet been established is examined. The IRDS standard did not have an installed base and this hindered its diffusion. The thesis concludes that the IRDS standard was overtaken by new developments such as object oriented technologies and middleware. This was partly because of the slow development process of developing standards in traditional organisations which operate on a consensus basis and partly because the IRDS standard did not have an installed base. Also the rise and proliferation of middleware products resulted in exchange mechanisms becoming dominant rather than repository solutions. The research method used in this work is a longitudinal study of the development and diffusion of the ISO/EEC IRDS standard. The research is regarded as a single case study and follows the interpretative epistemological point of view.
APA, Harvard, Vancouver, ISO, and other styles
7

Coetzer, Christo. "An investigation of ISO/IEC 27001 adoption in South Africa." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018669.

Full text
Abstract:
The research objective of this study is to investigate the low adoption of the ISO/IEC 27001 standard in South African organisations. This study does not differentiate between the ISO/IEC 27001:2005 and ISO/IEC 27001:2013 versions, as the focus is on adoption of the ISO/IEC 27001 standard. A survey-based research design was selected as the data collection method. The research instruments used in this study include a web-based questionnaire and in-person interviews with the participants. Based on the findings of this research, the organisations that participated in this study have an understanding of the ISO/IEC 27001 standard; however, fewer than a quarter of these have fully adopted the ISO/IEC 27001 standard. Furthermore, the main business objectives for organisations that have adopted the ISO/IEC 27001 standard were to ensure legal and regulatory compliance, and to fulfil client requirements. An Information Security Management System management guide based on the ISO/IEC 27001 Plan-Do-Check-Act model is developed to help organisations interested in the standard move towards ISO/IEC 27001 compliance.
APA, Harvard, Vancouver, ISO, and other styles
8

Akinwale, Olusegun. "DuoTracker tool support for software defect data collection and analysis /." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1447633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baalaji, Venkateshwaraiyer S. "Collaborative services in an ad hoc wireless network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBaalaji%5FITM.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Alex Bordetsky, Gurminder Singh. Includes bibliographical references (p. 71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Goh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.

Full text
Abstract:
Different computer systems have their own ways of representing, storing and managing files. One approach to facilitate file transfers among systems in a heterogeneous networked environment is for each system to locally map files for transfer onto a virtual filestore (VFS). Conceptually, a virtual filestore provides a universal model for describing files and how they can be manipulated. The ISO File Transfer, Access and Management (FTAM) protocol offers one such virtual filestore model. This thesis reports on the prototype implementation of a useful subset of the ISO FTAM protocol for the UNIX 4.2 BSD¹ file system. We call this implementation ubcFTAM. UNIX files, ordinarily regarded as unstructured, can be endowed with some internal structure thereby allowing the transfer of selective portions of a file. Furthermore, the implementation offers several file attributes not supported by UNIX. ubcFTAM runs on several Sun Workstations² interconnected by a 10 Mbps Ethernet. Some performance data of ubcFTAM are also presented. This thesis also identifies several aspects of the specifications that are ambiguous or that are inadequate, warranting further studies. Resolutions for these issues are discussed. We hope this experience will be useful to others planning to implement FTAM for UNIX systems. ¹UNIX is a registered trademark of American Telephone and Telegraph Bell Laboratories. BSD denotes Berkeley Standard Distribution ²SUN Workstation is a trademark of Sun Microsystems, Inc.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
11

Aristotelous, Andreas. "Single Board Computer for Standardized Onboard Vehicle Network." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188774.

Full text
Abstract:
This master thesis project was carried in collaboration with Keolis AB. One of the company’s goals is to seek for a possible replacement to expensive custom hardware units by cheap single board computers. As a test case, a simple application is proposed, which implements driver identification by scanning the barcode of driving license (personnummer). The main objective of this project is to find a suitable single board computer, to implement the proposed driver identification application, to send the driving license number along with the timestamp in a web page and test the functionality of the single board computer according to procedures specified in ISO and IEC standards for road vehicles. A parser that analyzes the input string of a barcode reader was implemented in C programming language. The barcode reader scans a barcode or a QR code and the parser returns the content of the barcode symbol in ASCII character format. The driver license number as well as the timestamp should be published to a web page. A webpage was created using the Django Web Framework, which is a database-driven website. Each time a driving license barcode is scanned, a POST Http request method is performed and both the driving license and timestamp are stored in a SQLite database. Each time a GET request method is performed the data stored in the SQLite database is retrieved and presented in the website. The communication between the single board computer Raspberry Pi and the Django framework is achieved using cURL, which is an open source command line tool and library for transferring data with URL syntax. The data of the website will be manipulated in the backend. Moreover, heat and humidity environmental testing were performed as described in ISO and IEC standards for road vehicles, to evaluate the functionality of the system under certain environmental conditions. These tests showed the working temperature range and the humidity range that the Raspberry Pi can tolerate. As a conclusion, it can be stated that Raspberry Pi can be used in the passenger compartment with expected temperatures to be below 100 Celsius, but not in the engine compartment where temperatures more than 100 Celsius can occur. In addition, Raspberry Pi can perform in all the levels of humidity that has been tested. If it is necessary to be employed in other bus compartment with increased temperature, a more expensive robust embedded single board Linux computer should be chosen. Future work should include vibrations and immunity testing, in order to fully qualify with the ISO and IEC standards. These types of tests are costly and should therefore be performed by automotive manufacturers or other parties who are expected to bear such a cost.
Detta examensarbete genomfördes i samarbete med Keolis Sverige AB. Ett av företagets mål är att söka efter möjliga system som ersättning till dyra, specialanpassade hårdvaruenheter och istället övergå till billiga enkortsdatorer. Som ett testfall föreslås ett enkelt program, som genomför identifiering av föraren genom att skanna streckkoden på körkortet (personnummer). Huvudsyftet med projektet är att hitta en lämplig enkortsdator, att implementera den föreslagna föraridentifieringsapplikationen, skicka körkortsnumret/personnumret med tidsstämpel till en webbsida och testa funktionaliteten hos enkortsdator enligt testrutiner som beskrivs av ISO- och IEC-standarder för vägfordon. En parser som analyserar indatasträngen av en streckkodsläsare implementerades i programmeringsspråket C. Streckkodsläsaren skannar en streckkod eller en QR-kod och parsern returnerar innehållet i streckkoden på ASCIIteckenformat. Körkortsnumret samt tidsstämpel publiceras på en webbsida. En webbsida har skapats med Django Web Framework, som är en databasdriven webbplats. Varje gång körkortets streckkod skannas, skickas en POST http-begäransmetod som utförs varvid både körkort och tidsstämpel lagras i en SQLite databas. Varje gång en GET-begäran skickas, lagras data i SQLite databasen och presenteras på webbplatsen. Kommunikationen mellan enkortsdatorn Raspberry Pi och ett Django-ramverk uppnås med hjälp av cURL, som är ett kommandoradsverktyg med öppen källkod, och ett bibliotek för att överföra data med URL-syntax. Uppgifterna på webbplatsen manipuleras i backend. Miljötålighetsprovning med avseende på värme- och fuktighet har utförts för att utvärdera systemets funktionalitet under specifika miljöförhållanden. Testerna specificeras i ISO- och IEC-standarder för vägfordon. Dessa tester visade vilka arbetstemperaturer och vilken luftfuktighet som Raspberry Pi klarar. Det kan konstateras att Raspberry Pi kan användas i passagerarutrymmet, där temperaturen förväntas ligga under 100 Celsius, men inte i motorrummet där temperaturer högre än 100 Celsius kan förekomma. Vidare har Raspberry Pi visat sig fungera vid de nivåer av luftfuktighet som har förkommit i testerna. I de fall där systemet skall användas i miljöer med högre temperaturer bör en dyrare och mer robust inbyggd (embedded) Linux-enkortsdator väljas. Det framtida arbetet bör omfatta vibrations- och elstörningstester för att fullt ut säkerställa att systemet klarar gällande ISO- och IEC-standarder. Dessa typer av test är kostsamma och bör därför genomföras av fordonstillverkare eller andra aktörer som förväntas kunna bära en sådan kostnad.
APA, Harvard, Vancouver, ISO, and other styles
12

Wilks, Antony John. "The analysis of a computer music network and the implementation of essential subsystems." Thesis, Rhodes University, 1995. http://hdl.handle.net/10962/d1006682.

Full text
Abstract:
The inability to share resources in commercial and institutional computer music studios results in non-optimal resource utilisation. The use of computers to process, store and communicate data can be extended within these studios, to provide the capability of sharing resources amongst their users. This thesis describes a computer music network which was designed for this purpose. Certain devices had to be custom built for the implementation of the network. The thesis discusses the design and construction of these devices.
APA, Harvard, Vancouver, ISO, and other styles
13

Eriksson, Carl-Henrik. "Standardiserad informationssäkerhet inom systemutveckling : En pragmatisk metod för uppehållande av en hög standard med ramverket ISO 27000." Thesis, Linköpings universitet, Informationskodning, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127525.

Full text
Abstract:
In today’s online world it is important to protect your organization’s valuable information and assets. Information can be stolen or destroyed in many different ways, and it needs to be dealt with not only on a technical level, but also on a management level. However, the current methods are not very intuitive and require a lot of familiarity with information security management. This report explores how planning of information security within an organization can instead be accomplished in a simple and pragmatic manner, without discouraging the user with too much information and making it too complicated. This is done by examining the requirements and controls from the ISO 27000 framework, and with those in regard creating a method that’s more useful, intuitive, and easy to follow.
APA, Harvard, Vancouver, ISO, and other styles
14

Ekström, Dan. "Securing a wireless local area network : using standard security techniques." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5662.

Full text
Abstract:
Wireless equipment offers several possibilities which make it more attractive than the wired alternative. Meetings or temporary office spaces could be assigned with less consideration of the presence of permanent networking facilities. It also makes it possible for users to create ad-hoc networks simply by being within a certain range of each other, which facilitates information sharing. Since information is broadcasted in the air, it also requires stringent security measures. Vendors of wireless equipment have their non-standard security solutions which lock-in the acquirer. For this purpose I study standard security schemes which could be applied independent of the wireless device manufacturer. The techniques that I have chosen are IPSec, Kerberos and MS Passport. The study describes each technique from the perspectives of manageability, security, performance, compatibility, cost and ease of implementation. The result is a comparison of the studied techniques. I conclude with a recommendation to use a combination of IPSec and Kerberos to enhance the security of a wireless local area network and a reservation towards MS Passport.
APA, Harvard, Vancouver, ISO, and other styles
15

Krehling, Daniel E. "Implementing remote image capture/control in a wireless Sensor network utilizing the IEEE 802.15.4 standard." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKrehling.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Gibson, John ; Singh, Gurminder. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: IEEE 802.15.4, wireless sensor network, remote imaging, wireless. Includes bibliographical references (p. 79-81). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
16

Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Khera, Rajesh. "The design of C++ class hierarchy to model ASN. 1 data types /." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020045/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

de, Oliveira Jaudelice C. "New techniques for end-to-end quality of service provisioning in DiffServ/MPLS networks." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/14790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Papageorgiou, Nikolaos A. "Development of RF front end prototype compliant with the 802.11a standard for wireless applications." Diss., Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04072004-180131/unrestricted/papageorgiou%5Fnikolaos%5Fa%5F200312%5Fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Almantheri, Hamed. "Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FAlmantheri.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Julie, Ferdie Gavin. "Development of an IEC 61850 standard-based automation system for a distribution power network." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1183.

Full text
Abstract:
Thesis submitted in fulfillment of the requirements for the degree Master of Technology: Electrical Engineering in the Faculty of Engineering at the Cape Peninsula University of Technology
The electric power distribution network, an essential section of the electric power system, supplies electrical power to the customer. Automating the distribution network allows for better efficiency, reliability, and level of work through the installation of distribution control systems. Presently, research and development efforts are focused in the area of communication technologies and application of the IEC 61850 protocol to make distribution automation more comprehensive, efficient and affordable. The aim of the thesis is to evaluate the relevance of the IEC61850 standard-based technology in the development and investigation of the distribution automation for a typical underground distribution network through the development of a distribution automation algorithm for fault detection, location, isolation and service restoration and the building of a lab scale test bench Distribution Automation (DA) has been around for many decades and each utility applies its developments for different reasons. Nowadays, due to the advancement in the communication technology, authentic and automatic reconfigurable power system that replies swiftly to instantaneous events is possible. Distribution automation functions do not only supersede legacy devices, but it allows the distribution network to function on another lever. The primary function of a DA system is to enable the devices on the distribution network to be operated and controlled remotely to automatically locate, isolate and reconnect supply during fault conditions. Utilities have become increasingly interested in DA due to the numerous benefits it offers. Operations, maintenance and efficiencies within substations and out on the feeders can be improved by the development of new additional capabilities of DA. Furthermore, the new standard-based technology has advanced further than a traditional Distribution Supervisory and Control Data Acquisition (DSCADA) system. These days the most important components of a DA system include Intelligent Electronic Devices (IEDs). IEDs have evolved through the years and execute various protection related actions, monitoring and control functions and are very promising for improving the operation of the DA systems. The thesis has developed an algorithm for automatic fault detection, location, isolation and system supply restoration using the functions of the IEC61850 standard-based technology. A lab scale system that would meet existing and future requirements for the control and automation of a typical underground distribution system is designed and constructed. The requirement for the lab scale distribution system is to have the ability to clear faults through reliable and fast protection operation, isolate faulted section/s, on the network and restore power to the unaffected parts of the network through automation control operation functions of the IEC61850 standard. Various tests and simulations have been done on the lab scale test bench to prove that the objective of the thesis is achieved. Keywords: IEC61850 Standard, Distribution automation, Distribution automation system, IEDs, Lab scale test bench, Protection, Algorithm for automatic control
APA, Harvard, Vancouver, ISO, and other styles
23

Kerdsri, Jiradett. "SNMP over Wi-Fi wireless networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FKerdsri.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Ted Lewis, Geoffrey Xie, Gurminder Singh. Includes bibliographical references (p. 89). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
24

Johnsson, Andreas. "Modeling, Implementation and Evaluation of IP Network Bandwidth Measurement Methods." Doctoral thesis, Västerås : Department of Computer Science and Electronics, Mälardalen University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Anjali, Tricha. "DiffServ/MPLS Network Design and Management." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5191.

Full text
Abstract:
The MultiProtocol Label Switching (MPLS) framework is used in many networks to provide efficient load balancing which distributes the traffic for efficient Quality of Service (QoS) provisioning in the network. If the MPLS framework is combined with Differentiated Services (DiffServ) architecture, together they can provide aggregate-based service differentiation and QoS. The combined use of DiffServ and MPLS in a network is called DiffServ-aware Traffic Engineering (DS-TE). Such DiffServ-based MPLS networks demand development of efficient methods for QoS provisioning. In this thesis, an automated manager for management of these DiffServ-based MPLS networks is proposed. This manager, called Traffic Engineering Automated Manager (TEAM), is a centralized authority for adaptively managing a DiffServ/MPLS domain and it is responsible for dynamic bandwidth and route management. TEAM is designed to provide a novel and unique architecture capable of managing large scale MPLS/DiffServ domains without any human interference. TEAM constantly monitors the network state and reconfigures the network for efficient handling of network events. Under the umbrella of TEAM, new schemes for Label Switched Path (LSP) setup/teardown, traffic routing, and network measurement are proposed and evaluated through simulations. Also, extensions to include Generalized MPLS (GMPLS) networks and inter-domain management are proposed.
APA, Harvard, Vancouver, ISO, and other styles
26

Okai-Tettey, Harold A. "High speed end-to-end connection management in a bridged IEEE 1394 network of professional audio devices." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006638.

Full text
Abstract:
A number of companies have developed a variety of network approaches to the transfer of audio and MIDI data. By doing this, they have addressed the configuration complications that were present when using direct patching for analogue audio, digital audio, word clock, and control connections. Along with their approaches, controlling software, usually running on a PC, is used to set up and manage audio routings from the outputs to the inputs of devices. However one of the advantages of direct patching is the conceptual simplicity it provides for a user in connecting plugs of devices, the ability to connect from the host plug of one device to the host plug of another. The connection management or routing applications of the current audio networks do not allow for such a capability, and instead employ what is referred to as a two-step approach to connection management. This two-step approach requires that devices be first configured at the transport layer of the network for input and output routings, after which the transmit and receive plugs of devices are manually configured to transmit or receive data. From a user’s point of view, it is desirable for the connection management or audio routing applications of the current audio networks to be able to establish routings directly between the host plugs of devices, and not the audio channels exposed by a network’s transport, as is currently the case. The main goal of this work has been to retain the conceptual simplicity of point-to-point connection management within digital audio networks, while gaining all the benefits that digital audio networking can offer.
APA, Harvard, Vancouver, ISO, and other styles
27

Vassiliou, Vasos. "An integration framework and a signaling protocol for MPLS/DiffServ/HMIP radio access networks." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/13732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wahabi, Abdoul Rassaki. "Resource management in IP networks." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52436.

Full text
Abstract:
Thesis (MSc)--University of Stellenbosch, 2001.
ENGLISH ABSTRACT: lP networks offer scalability and flexibility for rapid deployment of value added lP services. However, with the increased demand and explosive growth of the Internet, carriers require a network infrastructure that is dependable, predictable, and offers consistent network performance. This thesis examines the functionality, performance and implementation aspects of the MPLS mechanisms to minimize the expected packet delay in MPLS networks. Optimal path selection and the assignment of bandwidth to those paths for minimizing the average packet delay are investigated. We present an efficient flow deviation algorithm (EFDA) which assigns a small amount of flow from a set of routes connecting each OD pair to the shortest path connecting the OD pair in the network. The flow is assigned in such a way that the network average packet delay is minimized. Bellman's algorithm is used to find the shortest routes between all OD pairs. The thesis studies the problem of determining the routes between an OD pair and assigning capacities to those routes. The EFDA algorithm iteratively determines the global minimum of the objective function. We also use the optimal flows to compute the optimal link capacities in both single and multirate networks. The algorithm has been applied to several examples and to different models of networks. The results are used to evaluate the performance of the EFDA algorithm and compare the optimal solutions obtained with different starting topologies and different techniques. They all fall within a close cost-performance range. They are all within the same range from the optimal solution as well.
AFRIKAANSE OPSOMMING: lP-netwerke voorsien die skaleerbaarheid en buigsaamheid vir die vinnige ontplooing van toegevoegde-waarde lP-dienste. Die vergrote aanvraag en eksplosiewe uitbreiding van die Internet benodig betroubare, voorspelbare en bestendige netwerkprestasie. Hierdie tesis ondersoek die funksionaliteit, prestasie en implementering van die MPLS(multiprotokoletiketskakel)- meganismes om die verwagte pakketvertraging te minimeer. Ons bespreek 'n doeltreffende algoritme vir vloei-afwyking (EFDA) wat 'n klein hoeveelheid vloei toewys uit die versameling van roetes wat elke OT(oorsprong-teiken)- paar verbind aan die kortste pad wat die OT-paar koppel. Die vloei word toegewys sodanig dat die netwerk se gemiddelde pakketvertraging geminimeer word. Bellman se algoritme word gebruik om die kortste roetes tussen alle OT-pare te bepaal. Die tesis bespreek die probleem van die bepaling van roetes tussen 'n OT-paar en die toewysing van kapasiteite aan sulke roetes. Die EFDA-algoritme bepaal die globale minimum iteratief. Ons gebruik ook optimale vloeie vir die berekening van die optimale skakelkapasiteite in beide enkel- en multikoers netwerke. Die algoritme is toegepas op verskeie voorbeelde en op verskillende netwerkmodelle. Die skakelkapasiteite word aangewend om die prestasie van die EFDAalgoritme te evalueer en dit te vergelyk met die optimale oplossings verkry met verskillende aanvangstopologieë en tegnieke. Die resultate val binne klein koste-prestasie perke wat ook na aan die optimale oplossing lê.
APA, Harvard, Vancouver, ISO, and other styles
29

Frost, Per. "Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011." Thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138576.

Full text
Abstract:
This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks. The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models. Furthermore these values are based on several different sources on how to measure usability. The complete contents of the framework and the underlying ideas, upon which the framework is based, are presented in this report. The framework in this study was designed in order to enable it to be used universally with any modelling language in conjunction with a modelling tool. Its design is also not limited to the field of computer security and computer networks, although that is the intended context of CySeMoL as well as the context described in this report. However, utilization outside the intended area of usage will most likely require some modifications, in order to work in a fully satisfying. Several flaws where uncovered regarding the usability of CySeMoL and EAAT, but this is also accompanied by several recommendations on how to improve both CySeMoL and EAAT. Because of the outline of the framework, the most severe flaws have been identified and recommendations on how to rectify these shortcomings have been suggested.
APA, Harvard, Vancouver, ISO, and other styles
30

Kuncoro, Andreas. "Employing Quality Management Principles to Improve the Performance of Educational Systems: An Empirical Study of the Effect of ISO 9001 Standard on Teachers and Administrators Performance in the Indonesian Vocational Education System." Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5966.

Full text
Abstract:
ISO 9001 has been world widely implemented in both manufacturing and service organizations. A lot of studies have been conducted to investigate the effects of ISO 9001 implementation on the performance of these organizations. Most of these studies show that ISO 9001 implementation realized positive operational improvements and financial success. Building on the merits of successful implementation of ISO 9001 quality management system in manufacturing and service, educational institutions have been attempted to adopt it in their operations. Even though there are studies relating ISO implementation to education, no research has been done to investigate the effects of ISO 9001 at the individual level. The objective of this research is to investigate the effects of ISO 9001 quality management implementation on the performance of administrators and teachers. The Indonesian vocational education system is selected as a case example as there is a significant number of such institutions in Indonesia that attempt to achieve ISO certification and there is a national need to improve the performance of vocational education. It is a challenge to assess objectively the degree of ISO 9001 implementation in this specific educational context because of the size and diversity. This study relies on survey that measures the respondents' perception. Hence, this study applies a self-reported survey based performance measurement. The questionnaires are developed based on extensive literature review. Partial Least Squares Structural Equation Modeling (PLSSEM) has been used to examine the relationships between the different elements of quality management systems, quality culture; administrator and teacher performances. The study is able to examine multiple interrelated dependence and subsequent relationships simultaneously among examined factors such as teacher and administrator performance, existing quality culture and ISO principles; and to incorporate variables that cannot be directly measured, such as leadership, for example. The findings of this study show that ISO 9001 implementation has positive significant effect on the performance of the vocational school administrator and teacher. The study also identifies key influencing elements of the ISO quality management system and examines their direct and indirect relationships with teacher and administrator performances. This study is expected to improve the current practices in implementing ISO and quality culture in any educational settings, specifically in the case of vocational educational system.
Ph.D.
Doctorate
Industrial Engineering and Management Systems
Engineering and Computer Science
Industrial Engineering
APA, Harvard, Vancouver, ISO, and other styles
31

Mazandu, Gaston Kuzamunu. "Traffic Engineering using Multipath Routing Approaches." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pereira, Robson Rogério Dutra. "Protocolo ISO 11783: procedimentos para comunicação serial de dados do controlador de tarefa." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/18/18145/tde-29042010-092136/.

Full text
Abstract:
O recente crescimento da utilização de tecnologias de automação e eletrônica embarcada em máquinas e implementos agrícolas tem estabelecido uma nova prática na área agrícola. Estas novas práticas relacionadas com a agricultura de precisão (AP) têm demandado a utilização de sensores e redes de comunicação embarcadas para aquisição de dados e controle dos dispositivos em campo. A incompatibilidade entre equipamentos e formatos de dados tornou-se um grande obstáculo. A tendência global é de uso de sistemas padronizados de acordo com a norma ISO 11783 (também conhecida como ISOBUS) nos dispositivos, ou Electronic Control Unit (ECU), utilizados na produção agrícola. No Brasil, essas ferramentas ainda não são largamente aplicadas. O objetivo deste trabalho é sistematizar as informações necessárias dos procedimentos para comunicação de uma ECU do implemento com a ECU de trator de gerenciamento. Focou-se no desenvolvimento dos arquivos padrões necessários e no programa da ECU do implemento, e testes de validação da comunicação dos dispositivos via rede ISO 11873. Estabeleceu-se a relação entre as informações sistematizadas e os dispositivos embarcados em máquinas agrícolas. Os dispositivos embarcados consistem em cinco ECUs interconectadas pela rede ISO 11783. Quatro ECUS estão localizados no tractor: ECU do GPS, Controlador de Tarefas (TC), Terminal Virtual (VT) e ECU do Trator (TECU). A ECU do GPS é responsável pela recepção do sinal do Differencial Global Position System (DGPS) e disponibilização na rede ISO 11783. O TC é responsável pelo gerenciamento da aplicação do mapa de prescrição e pelo controle do implemento. O VT é responsável por monitorar e disponibilizar uma interface gráfica com o operador da máquina. O TECU disponibiliza a velocidade do trator obtida por um sensor de radar. A quinta ECU está localizado no implemento, definido como Working Set Master (WSM), que é responsável por interpretar os comandos das ECUs do trator e integrar o dispositivo mecânico-hidráulico para realização de uma aplicação agrícola. Este trabalho mostrou os requisitos necessários para o desenvolvimento dos arquivos necessários (TaskData.XML e o Device Description Object Pool), as capacidades necessárias para o programa da ECU do Implemento, a validação da comunicação da ECU do Implemento com o TC (ECU do trator de gerenciamento) e comprovou que as informações sistematizadas facilitaram e proporcionaram a implementação de um sistema ISO 11783. Espera-se, que este trabalho possa abrir oportunidades para que a norma ISO 11783 possa ser melhor entendida e ampliar a possibilidade de disponibilizar um número maior de aplicações que envolvem o conceito de AP no Brasil.
The recent growth of automation technology and embedded electronic in agricultural machinery has established a new practice in agriculture. These new practices related to precision agriculture (PA) have demanded the use of sensors and communications embedded networks for data acquisition and control devices in the farm field. The incompatibility between hardware, software and data formats has become a major obstacle. The global trend is to use standardized systems in accordance with ISO 11783 (also known as ISOBUS) in the devices, or Electronic Control Units (ECU), used in agricultural production. In Brazil, these tools are not yet implemented. The purpose of this work is to systemize the information necessary of the procedures for communication among the implement ECU with management tractor ECU. This work focuses standardized files format, the program of the implement ECU and the validation tests of the devices communication via ISO 11873 network. It was established the relation among the systematized information and embedded devices on agricultural machinery. The embedded devices consist in five ECUs connected in the ISO 11783 network. Four ECUs are located in the tractor: GPS ECU, Task Controller (TC), Virtual Terminal (VT) and Tractor ECU (TECU). The GPS ECU is responsible to the Differential Global Positioning System (DGPS) positioning. The TC is responsible to manage the prescription map and to control the implement. The VT is responsible monitor the application. The TECU disposes tractor velocity of a radar sensor. The fifth device located in the implement is Working Set Master (WSM), which is responsible to interpret the commands from the tractors ECUs and integrate the mechanical-hidraulical device instruction for agricultural operation. It was presented how to develop the needed standardized files (TaskData.XML and Device Description Object Pool), the capabilities needed of the implement ECU program, the validation of communication between the implement ECU with the TC (management tractor ECU) and was prove that the information systematized has facilitated and provided the communication. It is expect that this work may open opportunities for the ISO 11783 standard can be better understood and enlarge the possibility of providing a great number of applications involving the concept of AP in Brazil.
APA, Harvard, Vancouver, ISO, and other styles
33

Melby, Nathaniel J. "Design and Development of a Framework for Traffic Management in a Global Manufacturing Enterprise: The American Standard Case Study." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/27.

Full text
Abstract:
Managed Bandwidth Services (MBSs) use Quality of Service (QoS) guarantees to effectively control traffic flows and reduce network delay. In the past, the provision of MBS in a global manufacturing enterprise was a difficult task for network administrators. However, advances in recently emerging technologies, such as Multiprotocol Label Switching (MPLS), Generalized Multiprotocol Label Switching (GMPLS), Integrated Services (IntServ), Differentiated Services (DiffServ), and Constraint-based Routing (CBR), hold promise to make MBS implementation more manageable. QoS technologies, such as DiffServ and IntServ, offer the benefits of better application performance and delivery of reliable network service. As a consequence of network traffic loads, packet congestion and latency increases still exist and must be addressed by enterprises that intend to support an MBS solution. In this investigation, the author addressed an issue that is faced by many large manufacturing enterprises, i.e., the addition of latency and congestion sensitive traffic such as Voice-over-Internet Protocol (VoIP) to networks with limited bandwidth. The goal of this research was to provide global manufacturing enterprises with a model for bandwidth management in their offices and plants. This model was based on findings from a case study of traffic management at American Standard Companies.
APA, Harvard, Vancouver, ISO, and other styles
34

Karapetsas, Konstantinos. "Building a simulation toolkit for wireless mesh clusters and evaluating the suitability of different families of ad hoc protocols for the Tactical Network Topology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://handle.dtic.mil/100.2/ADA432399.

Full text
Abstract:
Thesis (M.S. in Information Technology Management and M.S. in Computer Science)--Naval Postgraduate School, March 2005.
Thesis Advisor(s): Alexander Bordetsky, Gilbert M. Lundy. Includes bibliographical references (p. 69-75). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
35

Alkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.

Full text
Abstract:
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing techniques, namely Bayesian blocks and Knuth’s algorithms, over time-tagged events and compares them in the context of rate-based anomaly detection. This was accomplished using data from experimental RFID readings and comparing (1) the event counts versus time if using the smoothed curves versus empirical histograms of the raw data and (2) the threshold-dependent alert-rates based on inter-arrival times obtained if using the smoothed curves versus that of the raw data itself. Results indicate that both algorithms adequately model RFID traffic in which inter-event time statistics are stationary but that Bayesian blocks become superior for traffic in which such statistics experience abrupt changes.
APA, Harvard, Vancouver, ISO, and other styles
36

Šoustar, Jiří. "Modul rozhraní Ethernet pro platformu FITkit." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235428.

Full text
Abstract:
This graduation thesis is aimed at design and implementation of embedded systems, network communication and support of the network communication for embedded systems. Furthermore it introduces school platform FITkit and offers a conceptional extension of the network interface for this platform based on Ethernet network standard. Based on that conception I'm trying to find and describe suitable solution for FITkit platform which realizes a network interface as a form of extension module capable of development supporting.
APA, Harvard, Vancouver, ISO, and other styles
37

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:

In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.

However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security

within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.

By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.

An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.

APA, Harvard, Vancouver, ISO, and other styles
38

Nezafati, Maysam. "Biomaterial Testing Methodology for Long-Term in vivo Applications: Silicon Carbide Corrosion Resistance, Biocompatibility and Hemocompatibility." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5283.

Full text
Abstract:
Biomedical devices that function in-vivo offer a tremendous promise to improve the quality of life for many who suffer from disease and trauma. The most important consideration for these devices is that they interact with the physiological environment as designed without initiating a deleterious inflammatory response. ISO 10993 outlines the current international guideline for investigating the biocompatibility of such devices. Numerous groups report the use of ISO 10993 as the basis for their experimental evaluation of candidate materials for neuroprosthetics, as well as other biomedical devices, however most of these reports fail to completely comply with the standard. This leads to a lack of consistent results between R&D groups, which hinders progress in the implantable biomedical device field. For the first time, and to the best of our knowledge, we present a methodology that is in strict adherence to the methodologies presented in ISO 10993, namely direct contact and extract testing. In addition we show that the MTT assay, which has been used in multiple reports, suffers from a major flaw that can create false results especially for conductive materials. We also report on our application of ISO 10993-12 with respect to control materials and preparation methods. These materials are gold and polyethylene as negative reaction controls, and copper and polyvinyl chloride organotin (PVC-org. Sn) as positive reaction controls. The results of our tests are consistent to what has been previously reported, albeit in separate reports. We used silicon carbide, which is a very promising candidate material for neuroprosthetics, as our test materials. Not only have we confirmed the outstanding in-vitro response of 3C-SiC and amorphous SiC, we do this in strict compliance to ISO 10993 thus showing that it is indeed possible to quantitatively assess the performed of materials in a statistically significant and highly repeatable fashion.
APA, Harvard, Vancouver, ISO, and other styles
39

Bagula, Bigomokero Antoine. "Traffic engineering label switched paths." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/53196.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: The Internet is evolving into a commercial platform requiring enhanced protocols and an expanded physical infrastructure allowing a better delivery from IP. Multi-protocol Label Switching (MPLS) is a technology enabling traffic engineering and virtual private network (VPN) provisioning. MPLS achieves traffic engineering by carrying the traffic over virtual connections called Label Switched Paths (LSPs) which are engineered based on QoS requirements such as delay, jitter and packet loss minimization or throughput maximization. This thesis proposes path finding and traffic distribution methods to be deployed in MPLS networks for traffic engineering LSPs. A flow optimization model based on a pre-planned routing approach separating path finding and traffic distribution is presented. This model is augmented by a threshold routing approach which routes the traffic based on thresholds expressing the maximum load level reached by network links. This routing approach moves the traffic away from thresholdmarked links to achieve low-utilized links/paths. The performance and routing capabilities of these methods are evaluated through designed software. A routing architecture implementing a two-layer signalling model for MPLS network is proposed and evaluated through simulation. v
AFRIKAANSE OPSOMMING:Die verandering van die Internet in 'n kommersiele platform met verbeterde protokolle en 'n uitgebreide fisieke infrastruktuur stel die internetprotokol (IP) in staat tot beter lewering. Multiprotokol- etiketskakeling (MPLS), is 'n tegnologie vir die voorsiening van televerkeerbeheer en virtuele privaatnetwerke (VPN). MPLS verskaf televerkeerbeheer deur die verkeer te dra oar virtuele konneksies, wat bekend staan as etiketgeskakelde paaie, waarvan die ontwerp gebaseer is op vereistes vir diensgehalte soos vertraging, ritteling en die minimering van pakketverlies of maksimering van deurvoer. Hierdie tesis stel nuwe padvind- en verkeerdistribusiemetodes voor wat aangewend word in MPLSnetwerke om etiketgeskakelde paaie te beheer. 'n Model vir vloei-optimering-gebaseer op voorafbeplande roetering wat padvinding en verkeerdistribusie skei-word aangebied. Hierdie model word uitgebrei deur 'n benadering van drempelroetering wat die verkeer roeteer en gebaseer is op drempels wat die maksimum ladingsvlak voorstel wat bereik kan word deur netwerkskakels. Hierdie roeteringsbenadering skuif die verkeer weg van drempelgemerkte skakels en bereik daardeur laaggebruikte skakelsjpaaie. Die prestasie en roeteringsvaardigheid van hierdie metodes word gevalueer deur selfontwikkelde programmatuur. 'n Argitektuur vir roetering wat 'n dubbellaagseinmodel implementeer vir 'n MPLS-netwerk, word aangebied en gevalueer met simulasie.
APA, Harvard, Vancouver, ISO, and other styles
40

Heidari, Fariba. "Quality of service routing using decentralized learning." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=115672.

Full text
Abstract:
This thesis presents several decentralized, learning-based algorithms for on-line routing of bandwidth guaranteed paths. The presented routing algorithms do not need any a-priori knowledge of traffic demand; they use only their locally observed events and update their routing policy using learning schemes. The employed learning algorithms are either learning automata or the multi-armed bandit algorithms. We investigate the asymptotic behavior of the proposed routing algorithms and prove the convergence of one of them to the user equilibrium. Discrete event simulation results show the merit of these algorithms in terms of improving the resource utilization and increasing the network admissibility compared with shortest path routing.
We investigate the performance degradation due to decentralized routing as opposed to centralized optimal routing policies in practical scenarios. The system optimal and the Nash bargaining solutions are two centralized benchmarks used in this study. We provide nonlinear programming formulations of these problems along with a distributed recursive approach to compute the solutions. An on-line partially-decentralized control architecture is also proposed to achieve the system optimal and the Nash bargaining solution performances. Numerical results in some practical scenarios with well engineered networks, where the network resources and traffic demand are well matched, indicate that decentralized learning techniques provide efficient, stable and scalable approaches for routing the bandwidth guaranteed paths.
In the context of on-line learning, we propose a new algorithm to track the best action-selection policy when it abruptly changes over time. The proposed algorithm employs change detection mechanisms to detect the sudden changes and restarts the learning process on the detection of an abrupt change. The performance analysis of this study reveals that when all the changes are detectable by the change detection mechanism, the proposed tracking the best action-selection policy algorithm is rate optimal. On-line routing of bandwidth guaranteed paths with the potential occurrence of network shocks such as significant changes in the traffic demand is one of the applications of the devised algorithm. Simulation results show the merit of the proposed algorithm in tracking the optimal routing policy when it abruptly changes.
APA, Harvard, Vancouver, ISO, and other styles
41

Chigwamba, Nyasha. "An investigation into the hardware abstraction layer of the plural node architecture for IEEE 1394 audio devices." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004841.

Full text
Abstract:
Digital audio network technologies are becoming more prevalent in audio related environments. Yamaha Corporation has created a digital audio network solution, named mLAN (music Local Area Network), that uses IEEE 1394 as its underlying network technology. IEEE 1394 is a digital network technology that is specifically designed for real-time multimedia data transmission. The second generation of mLAN is based on the Plural Node Architecture, where the control of audio and MIDI routings between IEEE 1394 devices is split between two node types, namely an Enabler and a Transporter. The Transporter typically resides in an IEEE 1394 device and is solely responsible for transmission and reception of audio or MIDI data. The Enabler typically resides in a workstation and exposes an abstract representation of audio or MIDI plugs on each Transporter to routing control applications. The Enabler is responsible for configuring audio and MIDI routings between plugs on different Transporters. A Hardware Abstraction Layer (HAL) within the Enabler allows it to uniformly communicate with Transporters that are created by various vendors. A plug-in mechanism is used to provide this capability. When vendors create Transporters, they also create device-specific plug-ins for the Enabler. These plug-ins are created against a Transporter HAL Application Programming Interface (API) that defines methods to access the capabilities of Transporters. An Open Generic Transporter (OGT) guideline document which models all the capabilities of Transporters has been produced. These guidelines make it possible for manufacturers to create Transporters that make use of a common plug-in, although based on different hardware architectures. The introduction of the OGT concept has revealed additional Transporter capabilities that are not incorporated in the existing Transporter HAL API. This has led to the underutilisation of OGT capabilities. The main goals of this investigation have been to improve the Enabler’s plug-in mechanism, and to incorporate the additional capabilities that have been revealed by the OGT into the Transporter HAL API. We propose a new plug-in mechanism, and a new Transporter HAL API that fully utilises both the additional capabilities revealed by the OGT and the capabilities of existing Transporters.
APA, Harvard, Vancouver, ISO, and other styles
42

Nordström, Roger. "Framtagning av en informationssäkerhetspolicy." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-521.

Full text
Abstract:

This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.

The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.

Another question was to investigate the information sources at the company and which threats there are against it.

The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called “Infosäkpulsen”. After the analysis was made of the survey, two reports were present with action plan for better information security for the company. The most important measures were of administrative kind and consist of a risk analysis of information resources and to make an information security policy with instructions for the users.

The risk analysis was made with the tool BITS from Krisberedskapsmyndigheten and the consequence was that base level for IT-security was enough for the company.

To fulfil the demand from the analyses so was an information security policy made and after that so create we information security instructions for the different kind of user group. One instruction was for ordinary users and the other was for management users.

Besides the part with policy and instructions so recommend the company to initiate incident management and register all kind of changes in their IT-system.

For further research it suggests to investigate how different standards can integrate to be only one standard that fulfils the goals in quality, environment and security standard


Rapporten var gjord som examensarbete på HordaGruppen AB och ingår i Breddmagisterprogrammet i Internetteknik på Ingenjörshögskolan i Jönköping.

Problemställningen som rapporten handlar om är hur man skyddar företagets information mot olika sorters hot. Frågeställningen var dels hur man tar fram en informationssäkerhetspolicy och vilka riktlinjer det finns i svensk standard för informationssäkerhet. Frågeställningen skulle också ta reda på företagets informationstillgångar och vilka hot det fanns mot dessa.

Arbetets inleds med en presentation på företaget om informationssäkerhet för Kvalitetschefen och IT-ansvarig. Därefter görs en nulägesanalys över informationssäkerheten med hjälp av verktyget Infosäkpulsen, en enkätundersökning från Länsteknikcentrum i Jönköping AB. Efter att svaren samlats in så sammanställdes en åtgärdsrapport och presenterades för företaget. De åtgärder som ansågs mest aktuella var av det administrativa slaget och bestod i att riskanalysera informationstillgångarna och att ta fram en informationssäkerhetspolicy med anvisningar för användarna.

Riskanalysen gjordes med verktyget BITS från Krisberedskapsmyndigheten och resulterade i att basnivå för it säkerhet räckte överlag för företaget.

För att uppfylla kraven från analyserna så togs en informationssäkerhetspolicy fram och därefter skapades informationssäkerhetsanvisningar till användare och till drift och förvaltning för att kunna uppfölja policyn.

Förutom att följa policyn och anvisningarna så rekommenderas företaget att införa incidenthantering och öka spårbarheten genom att dokumentera vilka ändringar som görs i IT-systemen. Ett uppslag för fortsatt arbete skulle kunna vara att integrera de olika standarderna till en anvisning som uppfyller målen för både kvalitet, miljön och säkerheten.

APA, Harvard, Vancouver, ISO, and other styles
43

Bert, Denis. "Systemes d'annuaire osi : specifications de mise en oeuvre pour la messagerie et l'administration de reseau." Paris 6, 1988. http://www.theses.fr/1988PA066075.

Full text
Abstract:
Etude et specification de l'utilisation des systemes d'annuaire pour l'adressage des systemes osi, l'administration de reseau et la messagerie electronique. Les modeles, services et protocoles des systemes d'annuaire osi definis par la nouvelle serie de recommandations ccitt x500 sont exposes. Sont ensuite decrits les mecanismes de consultation annuaire permettant, a partir d'un nom d'application ou d'une adresse reseau, de determiner les elements d'adressage application ou les informations de routage reseau
APA, Harvard, Vancouver, ISO, and other styles
44

Nsoh, Stephen Atambire. "Resource allocation in WiMAX mesh networks." Thesis, Lethbridge, Alta. : University of Lethbridge, Dept. of Mathematics and Computer Science, c2012, 2012. http://hdl.handle.net/10133/3371.

Full text
Abstract:
The IEEE 802.16 standard popularly known as WiMAX is at the forefront of the technological drive. Achieving high system throughput in these networks is challenging due to interference which limits concurrent transmissions. In this thesis, we study routing and link scheduling inWiMAX mesh networks. We present simple joint routing and link scheduling algorithms that have outperformed most of the existing proposals in our experiments. Our session based routing and links scheduling produced results approximately 90% of a trivial lower bound. We also study the problem of quality of service (QoS) provisioning in WiMAX mesh networks. QoS has become an attractive area of study driven by the increasing demand for multimedia content delivered wirelessly. To accommodate the different applications, the IEEE 802.16 standard defines four classes of service. In this dissertation, we propose a comprehensive scheme consisting of routing, link scheduling, call admission control (CAC) and channel assignment that considers all classes of service. Much of the work in the literature considers each of these problems in isolation. Our routing schemes use a metric that combines interference and traffic load to compute routes for requests while our link scheduling ensures that the QoS requirements of admitted requests are strictly met. Results from our simulation indicate that our routing and link scheduling schemes significantly improve network performance when the network is congested.
ix, 77 leaves : ill. ; 29 cm
APA, Harvard, Vancouver, ISO, and other styles
45

Zhou, Dong. "Clock synchronization and dominating set construction in ad hoc wireless networks." Columbus, Ohio : Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1131725177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wiman, Jonathan, and Jonathan Lundström. "Riktlinjers roll i IT-forensiska utredningar." Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37486.

Full text
Abstract:
A wide range of professions is enjoying the privilege of standardized work, where a document states what operations are the best way to go about any given task. In the work of a digital forensic examiner, standards and guidelines are harder to define given the full range of tasks and continuously developing digital aspect. This study has the goal of mapping out existing digital forensic standards and examining whether or not any digital standards and guidelines are being used in the field of law enforcement. This study is also setting out to explain why, or why not these standards and guidelines are being used. This task is being performed using a literary study, using existing digital forensic standards, and also a set of interviews targeting digital forensics working in law enforcement. The study shows how digital forensic standards are not actively being used, and when guidelines are being used, they are used somewhat vaguely and not firmly enforced. The work of a digital forensic proves to use a more “best practice” approach where experience and competence are key. Standards and guidelines are being used so rarely because, with the extremely different cases, the constant development of technology, and the use of “unrestrained evaluation of evidence”; it simply cannot exist without limiting the digital forensic process.
APA, Harvard, Vancouver, ISO, and other styles
47

Garige, Naga Siddhardha. "A Distributed Routing Algorithm for ER-LSP Setup in MLPS Networks." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Orozco, Barbosa Luis. "Developpement et evaluation de performances du protocole de transport de l'iso pour reseaux locaux." Paris 6, 1987. http://www.theses.fr/1987PA066562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Rojanarowan, Jerapong. "MPLS-Based Best-Effort Traffic Engineering." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7496.

Full text
Abstract:
MPLS-Based Best-Effort Traffic Engineering Jerapong Rojanarowan 120 Pages Directed by Dr. Henry L. Owen The objective of this research is to develop a multipath traffic engineering framework for best-effort traffic in Multiprotocol Label Switching (MPLS) networks so as to deliver more equal shares of bandwidth to best-effort users as compared to the traditional shortest-path algorithm. The proposed framework is static and the input to the traffic engineering algorithm is restricted to network topology. Performance evaluation of this framework is conducted by simulation using ns-2 network simulator. In a multi-service capable network, some portion of the bandwidth is reserved for guaranteed services and the leftover portion is dedicated to best-effort service. This research examines the problem of traffic engineering for the remaining network bandwidth that is utilized by best-effort traffic where demands are not known a priori. This framework will result in making the limited available best-effort traffic bandwidth more equitably shared by the best-effort flows over a wide range of demands. Traditional traffic engineering research has not examined best-effort traffic.
APA, Harvard, Vancouver, ISO, and other styles
50

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography