Academic literature on the topic 'Network devices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network devices"

1

Hamza, Muhammad, Syed Mashhad M. Geelani, Qamar Nawaz, Asif Kabir, and Isma Hamid. "Clustering of IoT Devices Using Device Profiling and Behavioral Analysis to Build Efficient Network Policies." April 2021 40, no. 2 (April 1, 2021): 335–45. http://dx.doi.org/10.22581/muet1982.2102.08.

Full text
Abstract:
The Internet of Things (IoT) has emerged as a new paradigm, and billions of devices are connected with the internet. IoT is being penetrated in major domains of daily life like health care, agriculture, industry, smart homes and monitoring of the environment. The operator of such complex, huge and diverse heterogeneous networks may not even be fully aware of their IoT devices working, activity, behavior and resource utilization etc. The efficient management of IoT devices becomes a challenge for network managers to ensure smooth network operation. Network traffic analysis of IoT devices is a necessary and rudimentary tool to understand the behavior of devices. In this paper firstly, we identify insights of device network traffic, discuss the activity patterns of some IoT devices and present a visual description of the pattern of IoT devices. Secondly, after analyzing the device's behavior, we build and demonstrate a profile of each device based on its activity cycle and traffic patterns information. Thirdly, the K-Means clustering algorithm is used to make clusters of IoT devices using their profile information. The clustering algorithm groups similar devices in a single group. The obtained results clearly describe the patterns of devices which help the network managers to make appropriate network policies for efficient secure network management.
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Hamza Sajjad, Muhammad Junaid Arshad, and Muhammad Sohail Akram. "Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes." International Journal of Embedded and Real-Time Communication Systems 12, no. 3 (July 2021): 1–13. http://dx.doi.org/10.4018/ijertcs.2021070101.

Full text
Abstract:
To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).
APA, Harvard, Vancouver, ISO, and other styles
3

Rodriguez Medel, Abel, and Jose Marcos C. Brito. "Random-Access Accelerator (RAA): A Framework to Speed Up the Random-Access Procedure in 5G New Radio for IoT mMTC by Enabling Device-To-Device Communications." Sensors 20, no. 19 (September 25, 2020): 5485. http://dx.doi.org/10.3390/s20195485.

Full text
Abstract:
Mobile networks have a great challenge by serving the expected billions of Internet of Things (IoT) devices in the upcoming years. Due to the limited simultaneous access in the mobile networks, the devices should compete between each other for resource allocation during a Random-Access procedure. This contention provokes a non-depreciable delay during the device’s registration because of the great number of collisions experienced. To overcome such a problem, a framework called Random-Access Accelerator (RAA) is proposed in this work, in order to speed up network access in massive Machine Type Communication (mMTC). RAA exploits Device-To-Device (D2D) communications, where devices with already assigned resources act like relays for the rest of devices trying to gain access in the network. The simulation results show an acceleration in the registration procedure of 99%, and a freed space of the allocated spectrum until 74% in comparison with the conventional Random-Access procedure. Besides, it preserves the same device’s energy consumption compared with legacy networks by using a custom version of Bluetooth as a wireless technology for D2D communications. The proposed framework can be taken into account for the standardization of mMTC in Fifth-Generation-New Radio (5G NR).
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Wei, Hao Zhang, Li-jun Cai, Ai-min Yu, Jin-qiao Shi, and Jian-guo Jiang. "A Novel Device Identification Method Based on Passive Measurement." Security and Communication Networks 2019 (June 23, 2019): 1–11. http://dx.doi.org/10.1155/2019/6045251.

Full text
Abstract:
Nowadays, with the continuous integration of production network and business network, more and more Industrial Internet of Things and Internal Office Network have been interconnected and evolved into a large-scale enterprise-level intraindustry network. Terminal devices are the basic units of internal network. Accurate identification of the type of device corresponding to the IP address and detailed description of the communication behavior of the device are of great significance for conducting network security risk assessment, hidden danger investigation, and threat warning. Traditional cyberspace surveying and mapping techniques take the form of active measurement, but they cannot be transplanted to large-scale intranet. Resources or specific targets in internal networks are often protected by firewalls, VPNs, gateways, and other technologies, so they are difficult to analyze and determine by active measurement. In this paper, a passive measurement method is proposed to identify and characterize devices in the network through real traffic data. Firstly, a new graph structure mining method is used to determine the server-like devices and host-like devices; then, the NAT-like devices are determined by quantitative analysis of traffic; finally, by qualitative analysis of the NAT-like device traffic, it is determined whether there are server-like devices behind the NAT-like device. This method will prove to be useful in identifying all kinds of devices in network data traffic, detecting unauthorized NAT-like devices and whether there are server-like devices behind the NAT-like devices.
APA, Harvard, Vancouver, ISO, and other styles
5

Hasan Al-Bowarab, Mustafa, Nurul Azma Zakaria, Zaheera Zainal Abidin, and Ziadoon Kamil Maseer. "Review on Device-to-Device Communication in Cellular based Network Systems." International Journal of Engineering & Technology 7, no. 3.20 (September 1, 2018): 435. http://dx.doi.org/10.14419/ijet.v7i3.20.20587.

Full text
Abstract:
In a traditional cellular-network based system, the devices are not allowed to be interconnected directly in the certified mobile bandwidth, and all communications are carried out via the base station (BS). At present, device terminal broadcasting allows devices in the distributed network to act as transmitting relays to each other and reach a massive ad hoc network of networks that is different from the previous cellular architecture that faces technical challenges. Therefore, this article explores the application of a cellular-based two-layer network system that includes a base station (BS) cellular layer, such as cellular-to-device communication and communication between devices. In the proposed two-tier cellular-based network system, user data is transmitted through other users' devices to implement the privacy protection that is lacking in prior communication between devices in cellular systems. To ensure a negligible impact on the performance of current communication between devices, a two-layer network is assimilated to autonomous interference management schemes and associated resource allocation schemes. The findings from this review provide an overview of the major challenges in two-tier networks and propose a two-tier cellular-based system in which user data is routed through other users' devices to implement privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
6

Yi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, and Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks." 網際網路技術學刊 23, no. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.

Full text
Abstract:
<p>This work proposes an adaptive resource orchestration system for a Wireless Local Area Network (WLAN) that is based on the operating principle of Cognitive Radio (CR) technology. By collecting environmental parameters, including the retransmission rate and the channel occupancy rate, the proposed system has &ldquo;knowledge&rdquo; of overall transmission behavior and can regulate transmission resources. An Adaptive Connection Assignment (ACA) mechanism is proposed for end devices; it find out target end devices with poor transmission performance, analyzes their alternative Access Point (AP) availability and causes them to change connections to improve transmission performance. An Adaptive Channel Utilization (ACU) mechanism is designed for APs to identify a target AP that is suffering from interference, to analyze its alternative channel availability and to require it to change its working channel to improve transmission efficiency. Results of simulations of various scenarios indicate that the throughput of end devices is increased by 15 to 24%, the throughput of APs is increased by 6 to 47% and the retransmission rate of APs is reduced by 0.4 to 5.3%.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Rondeau, Christopher M., J. Addison Betances, and Michael A. Temple. "Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting." Security and Communication Networks 2018 (July 11, 2018): 1–14. http://dx.doi.org/10.1155/2018/1489347.

Full text
Abstract:
This work provides development of Constellation Based DNA (CB-DNA) Fingerprinting for use in systems employing quadrature modulations and includes network protection demonstrations for ZigBee offset quadrature phase shift keying modulation. Results are based on 120 unique networks comprised of seven authorized ZigBee RZSUBSTICK devices, with three additional like-model devices serving as unauthorized rogue devices. Authorized network device fingerprints are used to train a Multiple Discriminant Analysis (MDA) classifier and Rogue Rejection Rate (RRR) estimated for 2520 attacks involving rogue devices presenting themselves as authorized devices. With MDA training thresholds set to achieve a True Verification Rate (TVR) of TVR = 95% for authorized network devices, the collective rogue device detection results for SNR ≥ 12 dB include average burst-by-burst RRR ≈ 94% across all 2520 attack scenarios with individual rogue device attack performance spanning 83.32% < RRR < 99.81%.
APA, Harvard, Vancouver, ISO, and other styles
8

Laguidi, Ahmed, Tarik Hachad, and Lamiae Hachad. "Mobile network connectivity analysis for device to device communication in 5G network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (February 1, 2023): 680. http://dx.doi.org/10.11591/ijece.v13i1.pp680-687.

Full text
Abstract:
<p><span>Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or out-band mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
9

Ogogo, Wycliffe Lamech. "Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security." East African Journal of Information Technology 3, no. 1 (March 4, 2021): 1–6. http://dx.doi.org/10.37284/eajit.3.1.153.

Full text
Abstract:
The business world has been significantly affected by network intrusion leading to infringement of privacy and unprecedented economic losses. Therefore, real-time monitoring of network devices is important due to the enhanced and complex network systems in organizations and associated cyber threats. Real-time monitoring provides adequate alerts and updates regarding specific networks and their performance as soon as they occur. Constant monitoring of devices also makes it possible for organizations to detect any possible challenges that the networks may be encountering. This paper examines the effectiveness of real-time monitoring of network devices in a bid to enhance network security. The study was an empirical review of recently published research papers, journals, internet sites, and books with relevant content. The findings of this study revealed that Real-time device monitoring has many potential advantages to organizations by securing their systems thereby enhancing their overall performance.
APA, Harvard, Vancouver, ISO, and other styles
10

A., Dr Sathesh. "OPTIMIZED MULTI-OBJECTIVE ROUTING FOR WIRELESS COMMUNICATION WITH LOAD BALANCING." Journal of Trends in Computer Science and Smart Technology 2019, no. 02 (December 23, 2019): 106–20. http://dx.doi.org/10.36548/jtcsst.2019.2.004.

Full text
Abstract:
The rapid advancements in the wireless communication networks have increased the popularity of portable or mobile devices and the network framed with these mobile devices. These mobile networks framed using the volunteering portable devices are decentralized and have dynamic topologies experiencing sudden changes in the network structure. The main reason causing the topology changes are the limited energy availability of the device and their mobility. Improper trafficking of the tasks and improper selection of the portable devices causes maximum energy consumption resulting in the link failures and changes in the topology of the network. So the paper puts forward the hybridized optimization technique to handle the multi-objective problem faced by these decentralized networks. The proposed method is validated using the network simulator-2 to evince throughput, energy consumption and the network longevity achieved by the proposed method.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Network devices"

1

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kühnert, Wolfram. "Dynamic Devices Network Architecture." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10952962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zenteno, Efrain. "Vector Measurements for Wireless Network Devices." Licentiate thesis, KTH, Signalbehandling, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-111863.

Full text
Abstract:
Wireless networks are an iconic technology of today’s modern era, theyare present in our daily activities as can be exemplified by cellular communications,wi-fi, bluetooth, and others. Vector measurements play an importantrole in the design, simulation, and testing of wireless networks and are usedto characterize key devices operating in the radio interface, such as amplifiers,filters, and mixers.Accurate characterization is the key for improving the capacity and efficiencyof wireless networks. As the demand for network capacity continuouslyincreases, the accuracy of vector measurements must also improve. Further,it is anticipated that such trends will continue in the years to come. Consequently,the wireless industry needs to include nonlinear behavior in theircharacterization and analysis, to assess and guaranty the operation of the devices,and to comply to the specifications from governmental regulations. Incontrast to linear behavior, nonlinear behavior presents an additional bandwidthrequirement because the signal bandwidth grows when it passes throughnonlinear devices. In this thesis, vector measurements for devices operatingin wireless networks are studied, emphasizing a synthetic approach for theinstrumentation. This approach enables the use of digital post-processing algorithms,which enhances the measurement accuracy and/or speed and canovercome hardware impairments. This thesis presents the design of a vectorialmeasurement system for wireless devices considering the aforementionedtrends and requirements. It also explores the advantages of the proposedapproach, describes its limitations, and discusses the digital signal processingalgorithms used to reach its final functionality. Finally, measurement resultsof the proposed setup are presented, analyzed and compared to those of modernindustrial instruments.

QC 20130204

APA, Harvard, Vancouver, ISO, and other styles
4

Duan, Xiao. "DSP-enabled reconfigurable optical network devices and architectures for cloud access networks." Thesis, Bangor University, 2018. https://research.bangor.ac.uk/portal/en/theses/dspenabled-reconfigurable-optical-network-devices-and-architectures-for-cloud-access-networks(68eaa57e-f0af-4c67-b1cf-c32cfd2ee00f).html.

Full text
Abstract:
To meet the ever-increasing bandwidth requirements, the rapid growth in highly dynamic traffic patterns, and the increasing complexity in network operation, whilst providing high power consumption efficiency and cost-effectiveness, the approach of combining traditional optical access networks, metropolitan area networks and 4-th generation (4G)/5-th generation (5G) mobile front-haul/back-haul networks into unified cloud access networks (CANs) is one of the most preferred “future-proof” technical strategies. The aim of this dissertation research is to extensively explore, both numerically and experimentally, the technical feasibility of utilising digital signal processing (DSP) to achieve key fundamental elements of CANs from device level to network architecture level including: i) software reconfigurable optical transceivers, ii) DSP-enabled reconfigurable optical add/drop multiplexers (ROADMs), iii) network operation characteristics-transparent digital filter multiple access (DFMA) techniques, and iv) DFMA-based passive optical network (PON) with DSP-enabled software reconfigurability. As reconfigurable optical transceivers constitute fundamental building blocks of the CAN’s physical layer, digital orthogonal filtering-based novel software reconfigurable transceivers are proposed and experimentally and numerically explored, for the first time. By making use of Hilbert-pair-based 32-tap digital orthogonal filters implemented in field programmable gate arrays (FPGAs), a 2GS/s@8-bit digital-to-analogue converter (DAC)/analogue-to-digital converter (ADC), and an electro-absorption modulated laser (EML) intensity modulator (IM), world-first reconfigurable real-time transceivers are successfully experimentally demonstrated in a 25km IMDD SSMF system. The transceiver dynamically multiplexes two orthogonal frequency division multiplexed (OFDM) channels with a total capacity of 3.44Gb/s. Experimental results also indicate that the transceiver performance is fully transparent to various subcarrier modulation formats of up to 64-QAM, and that the maximum achievable transceiver performance is mainly limited by the cross-talk effect between two spectrally-overlapped orthogonal channels, which can, however, be minimised by adaptive modulation of the OFDM signals. For further transceiver optimisations, the impacts of major transceiver design parameters including digital filter tap number and subcarrier modulation format on the transmission performance are also numerically explored. II Reconfigurable optical add/drop multiplexers (ROADMs) are also vital networking devices for application in CANs as they play a critical role in offering fast and flexible network reconfiguration. A new optical-electrical-optical (O-E-O) conversion-free, software-switched flexible ROADM is extensively explored, which is capable of providing dynamic add/drop operations at wavelength, sub-wavelength and orthogonal sub-band levels in software defined networks incorporating the reconfigurable transceivers. Firstly, the basic add and drop operations of the proposed ROADMs are theoretically explored and the ROADM designs are optimised. To crucially validate the practical feasibility of the ROADMs, ROADMs are experimentally demonstrated, for the first time. Experimental results show that the add and drop operation performances are independent of the sub-band signal spectral location and add/drop power penalties are < 2dB. In addition, the ROADMs are also robust against a differential optical power dynamic range of > 2dB and a drop RF signal power range of 7.1dB. In addition to exploring key optical networking devices for CANs, the first ever DFMA PON experimental demonstrations are also conducted, by using two real-time, reconfigurable, OOFDM-modulated optical network units (ONUs) operating on spectrally overlapped multi-Gb/s orthogonal channels, and an offline optical line terminal (OLT). For multipoint-to-point upstream signal transmission over 26km SSMF in an IMDD DFMA PON, experiments show that each ONU achieves a similar upstream BER performance, excellent robustness to inter-ONU sample timing offset (STO) and a large ONU launch power variation range. Given the importance of IMDD DFMA-PON channel frequency response roll-off, both theoretical and experimental explorations are undertaken to investigate the impact of channel frequency response roll-off on the upstream transmission of the DFMA PON system Such work provides valuable insights into channel roll-off-induced performance dependencies to facilitate cost-effective practical network/transceiver/component designs.
APA, Harvard, Vancouver, ISO, and other styles
5

Cardwell, Gregory S. "Residual network data structures in Android devices." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5506.

Full text
Abstract:
Approved for public release; distribution is unlimited
The emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, this thesis identifies network metadata stored by the Android operating system that can be readily retrieved from the device's internal non-volatile storage. The identified network metadata can ascertain the identity of prior network access points to which the device associated. An important by-product of this research is a well-labeled Android Smartphone image corpus, allowing the mobile forensic community to perform repeatable, scientific experiments, and to test mobile forensic tools.
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, Pehr C. (Pehr Christian) 1974. "Filaments : lightweight network interfaces for embedded devices." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46249.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaf 63).
Filaments are low-cost interfaces for attaching devices to an Ethernet network. While most networking research pushes for faster high-end systems, the filament project targets low-end devices with the goal of making networking easy. Filaments wrap the complexity of the network into a simple and convenient package. The vast majority of device communications require only a tiny thread or filament of connectivity. Before filaments, one could either tie each device to a desktop PC or to deploy a specialized device network. Filaments allow you to leverage the same network used by desktop computers without making devices dependent on them.
by Pehr C. Anderson.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Tan, SiewYeen Agnes. "A Network Measurement Tool for Handheld Devices." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/32982.

Full text
Abstract:
This thesis describes a performance measurement tool that allows a user to measure network performance using a handheld device. The measurement tool consists of a client program that runs on a Microsoft Pocket PC device and a server program that runs on a regular Microsoft Windows computer. Both programs are Windows applications implemented in C/C++ using the Microsoft Embedded Visual Tool and Microsoft Visual Studio. The use of a Pocket PC device provides mobility to users, which can save time and energy when performing experiments. The thesis describes the design of the performance measurement application, implementation issues, and tests conducted using the tool.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
8

Yusuf, Adewale, Jerry Lartey, and Vilhelm Wareus. "Network Admission Control (NAC)Securing end point devices." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-5507.

Full text
Abstract:

There have been remarkable growths in wireless communication networks in

recent years; this is because of its merits over the wired networks such as

Mobility and convenience. Wireless networks transmit the signal over the

open air via radio waves of different frequencies, this makes it to be

vulnerable to several attacks and anybody on the street can easily intercept the

wireless data or inject new data into the entire network. There has been

existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which

was designed for wireless network security. There were concerns of security

vulnerabilities in WEP; this made it necessary for the implementation of

another solution to overcome the weaknesses of the previous wireless

network security. The IEEE 802.1X (port-based network admission control)

which is defined on Extensible Authentication protocol (EAP) provides

effective and efficient admission control to wireless and other networks

devices [8].

Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security

solution, access different vendor solutions, protocols supported and look into

the inter-operability of these various vendors. In as much as we support the

premise of NAC being an excellent solution, we will also make brilliant

recommendations in this thesis to be considered for future refinements of this

security solution as well as deployment scenarios for the university network.

APA, Harvard, Vancouver, ISO, and other styles
9

Spadavecchia, Ljiljana. "A network-based asynchronous architecture for cryptographic devices." Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/860.

Full text
Abstract:
The traditional model of cryptography examines the security of the cipher as a mathematical function. However, ciphers that are secure when specified as mathematical functions are not necessarily secure in real-world implementations. The physical implementations of ciphers can be extremely difficult to control and often leak socalled side-channel information. Side-channel cryptanalysis attacks have shown to be especially effective as a practical means for attacking implementations of cryptographic algorithms on simple hardware platforms, such as smart-cards. Adversaries can obtain sensitive information from side-channels, such as the timing of operations, power consumption and electromagnetic emissions. Some of the attack techniques require surprisingly little side-channel information to break some of the best known ciphers. In constrained devices, such as smart-cards, straightforward implementations of cryptographic algorithms can be broken with minimal work. Preventing these attacks has become an active and a challenging area of research. Power analysis is a successful cryptanalytic technique that extracts secret information from cryptographic devices by analysing the power consumed during their operation. A particularly dangerous class of power analysis, differential power analysis (DPA), relies on the correlation of power consumption measurements. It has been proposed that adding non-determinism to the execution of the cryptographic device would reduce the danger of these attacks. It has also been demonstrated that asynchronous logic has advantages for security-sensitive applications. This thesis investigates the security and performance advantages of using a network-based asynchronous architecture, in which the functional units of the datapath form a network. Non-deterministic execution is achieved by exploiting concurrent execution of instructions both with and without data-dependencies; and by forwarding register values between instructions with data-dependencies using randomised routing over the network. The executions of cryptographic algorithms on different architectural configurations are simulated, and the obtained power traces are subjected to DPA attacks. The results show that the proposed architecture introduces a level of non-determinism in the execution that significantly raises the threshold for DPA attacks to succeed. In addition, the performance analysis shows that the improved security does not degrade performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Krishna, Ashwin. "Composing and connecting devices in animal telemetry network." Kansas State University, 2016. http://hdl.handle.net/2097/32882.

Full text
Abstract:
Master of Science
Department of Computing and Information Sciences
Venkatesh P. Ranganath
As the Internet of Things (IoT) continues to grow, the need for services that span multiple application domains will continue to increase to realise the numerous possibilities enabled by IoT. Today, however, heterogeneity among devices leads to interoperability issues while building a system of systems and often give rise to closed ecosystems. The issues with interoperability are driven by the inability of devices and apps from different vendors to communicate with each other. The interoperability problem forces the users to stick to one particular vendor, leading to vendor lock-in. To achieve interoperability, the users have to do the heavy lifting (at times impossible) of connecting heterogeneous devices. As we slowly move towards system-of-systems and IoT, there is a real need to support heterogeneity and interoperability. A recent effort in Santos Lab developed Medical Device Coordination Framework (MDCF), which was a step to address these issues in the space of human medical systems. Subsequently, we have been wondering if a similar solution can be employed in the area of animal science. In this effort, by borrowing observations from MDCF and knowledge from on-field experience, we have created a demonstration showcasing how a combination of precise component descriptions (via DSL) and communication patterns can be used in software development and deployment to overcome barriers due to heterogeneity, interoperability and to enable an open ecosystem of apps and devices in the space of animal telemetry.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Network devices"

1

Interconnecting Cisco network devices. Indianapolis, IN: Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

M, Thomas Thomas, ed. ICND: Interconnecting Cisco network devices. New York: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Network algorithmics: An interdisciplinary approach to designing fast networked devices. Amsterdam: Elsevier/Morgan Kaufmann, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Varghese, George. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices. Burlington: Elsevier, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Varghese, George. Network algorithmics: An interdisciplinary approach to designing fast networked devices. San Francisco, CA: Morgan Kaufmann, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rusen, Ciprian Adrian. Network your computers & devices step by step. Sebastopol, CA: O'Reilly Media, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

McQuerry, Steve. Authorized self-study guide: Interconnecting Cisco network devices. 2nd ed. Indianapolis, Ind: Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

A modular and extensible network storage architecture. Cambrdige: Cambridge University Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adamski, M. Design of Digital Systems and Devices. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bill, Mann, ed. Wireless devices end to end. New York, NY: Hungry Minds, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Network devices"

1

Chowdhury, Dhiman Deb. "Timing Devices." In NextGen Network Synchronization, 65–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71179-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramamurthy, Byrav. "Optical Network Devices." In Design of Optical WDM Networks, 9–31. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1675-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vanem, Erik, Dao Tran, Tore E. Jønvik, Pål Løkstad, and Do Thanh. "Managing Heterogeneous Services and Devices with the Device Unifying Service." In Integrated Network Management VIII, 379–92. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Foley, Gráinne, and Fergus O’Reilly. "Software Distribution for Wireless Devices." In Integrated Network Management VIII, 469–72. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thakur, Kutub, and Al-Sakib Khan Pathan. "Securing Wireless Network Communication." In Securing Mobile Devices and Technology, 167–90. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003230106-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pal, Arpan, Chirabrata Bhaumik, Priyanka Sinha, and Avik Ghose. "Intelligent Social Network of Devices." In Computational Social Networks, 329–48. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4048-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Halsey, Mike. "Managing Network Connections and Devices." In The Windows 10 Productivity Handbook, 79–88. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3294-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nespor, Jan. "Devices and Educational Change." In Researching Education Through Actor-Network Theory, 1–22. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118275825.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hutter, Michael, Marcel Medwed, Daniel Hein, and Johannes Wolkerstorfer. "Attacking ECDSA-Enabled RFID Devices." In Applied Cryptography and Network Security, 519–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thakur, Kutub, and Al-Sakib Khan Pathan. "Working Principle of Cellular Network." In Securing Mobile Devices and Technology, 89–104. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003230106-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network devices"

1

Dudnik, Andriy, Ivan Bakhov, Olha Cholyshkina, Andriy Fesenko, Olexander Grinenko, Volodymyr Brodkevych, and Serhii Zybin. "Cognitive Positioning Technologies for IoT Network Devices." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001847.

Full text
Abstract:
Nowadays, wireless technologies are increasingly being used for human needs. Increasingly, technologies are emerging that are used by people not only for the need to transfer data. One of these technologies is the Internet of Things, which often uses wireless sensors with ZigBee data transmission technology as end devices.There are areas that require deployment of these networks on the territory, a large number of sensors are required, which must with sufficient accuracy “know” their position on the deployment area. Usually, devices with built-in GPS modules are used for this, but devices containing this module are significantly more expensive than without it. And if in a large distributed network with many segments, more than 1000 such devices are required, then a device with a GPS module can only be at most one for each segment. Therefore, if this is a forest where there are many thousands of trees and it is necessary to monitor fires at the initial stage, which take place in many US states in the summer, then the cognitive task of teaching those devices, that do not contain a GPS module, to determine their position is relevant. This paper proposes a mathematical formulation of the cognitive task of learning to determine the coordinates of devices in wireless sensor networks. The study of the mathematical model has been carried out. The purpose of these studies was to find new alternative teaching methods for determining the distance between objects of IoT sensor networks, using the function of localizing objects where an emergency occurred.
APA, Harvard, Vancouver, ISO, and other styles
2

Ryan, Les M. "Breaking the Barriers: An Architecture for Multi-Host Access to Field Devices." In 1996 1st International Pipeline Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/ipc1996-1909.

Full text
Abstract:
An overview of some of the many host applications that collect and use data from field devices such as RTUs, PLCs and flow computers is given and the need to provide multi-host access to these field devices is established. The challenges in providing multi-host access to field device networks is discussed as well as some of the current methods used. The concept of using a gateway to interface field device networks to wide area networks (WAN) is introduced with a brief discussion on the advantages of using TCP/IP for host to gateway transport. Several popular field device network protocols are assessed for their multi-host access capabilities with and without a field device network gateway.
APA, Harvard, Vancouver, ISO, and other styles
3

Isuyama, Vivian Kimie, and Bruno De Carvalho Albertini. "Comparison of Convolutional Neural Network Models for Mobile Devices." In Workshop em Desempenho de Sistemas Computacionais e de Comunicação. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/wperformance.2021.15724.

Full text
Abstract:
In recent years mobile devices have become an important part of our daily lives and Deep Convolutional Neural Networks have been performing well in the task of image classification. Some considerations have to be made when running a Neural Network inside a mobile device such as computational complexity and storage size. In this paper, common architectures for image classification were analyzed to retrieve the values of accuracy rate, model complexity, memory usage, and inference time. Those values were compared and it was possible to show which architecture to choose from considering mobile restrictions.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Yao, Xiaohui Chen, Nan Hua, and Xiaoping Zheng. "A Novel Virtual Optical Network Embedding Strategy for Optical Network Virtualization." In Photonic Networks and Devices. Washington, D.C.: OSA, 2014. http://dx.doi.org/10.1364/networks.2014.nt1c.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Littlewood, Paul. "Filterless Networks: Merely Interesting or Valued Network Technology?" In Photonic Networks and Devices. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/networks.2016.new3c.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chamania, Mohit, and Xiaomin Chen. "Analytics-driven Network Management." In Photonic Networks and Devices. Washington, D.C.: OSA, 2019. http://dx.doi.org/10.1364/networks.2019.neth1d.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chan, Vincent. "Free Space Optical Network Architecture." In Photonic Networks and Devices. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/networks.2017.nem4b.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wosinska, Lena. "Optical Network Architectures for Datacenters." In Photonic Networks and Devices. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/networks.2017.new2b.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lembo, Leonardo, Salvatore Maresca, Giovanni Serafino, Filippo Scotti, Antonio Malacarne, Paolo Ghelfi, and Antonella Bogoni. "Microwave Photonics for a Radar Network." In Photonic Networks and Devices. Washington, D.C.: OSA, 2019. http://dx.doi.org/10.1364/networks.2019.neth2d.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Simsarian, Jesse. "Transport Network OS: from Physical to Abstractions." In Photonic Networks and Devices. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/networks.2017.nem2b.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Network devices"

1

MacFaden, M., D. Partain, J. Saperia, and W. Tackabury. Configuring Networks and Devices with Simple Network Management Protocol (SNMP). RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bradner, S. Benchmarking Terminology for Network Interconnection Devices. RFC Editor, July 1991. http://dx.doi.org/10.17487/rfc1242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bradner, S., and J. McQuaid. Benchmarking Methodology for Network Interconnect Devices. RFC Editor, May 1996. http://dx.doi.org/10.17487/rfc1944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bradner, S., and J. McQuaid. Benchmarking Methodology for Network Interconnect Devices. RFC Editor, March 1999. http://dx.doi.org/10.17487/rfc2544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popoviciu, C., A. Hamza, G. Van de Velde, and D. Dugatkin. IPv6 Benchmarking Methodology for Network Interconnect Devices. RFC Editor, May 2008. http://dx.doi.org/10.17487/rfc5180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Levkowetz, H., and S. Vaarala. Mobile IP Traversal of Network Address Translation (NAT) Devices. RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Watrobski, Paul, Murugiah Souppaya, Joshua Klosterman, and William Barker. Methodology for Characterizing Network Behavior of Internet of Things Devices. National Institute of Standards and Technology, January 2022. http://dx.doi.org/10.6028/nist.ir.8349-draft.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Colella, Whitney G. Network design optimization of fuel cell systems and distributed energy devices. Office of Scientific and Technical Information (OSTI), July 2010. http://dx.doi.org/10.2172/993325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Prem, Seng-Tiong Ho, and Bruce W. Wessels. Integrated Devices for Terabit per Second 1.3 and 1.5 Micron WDM/TDM Network Applications. Fort Belvoir, VA: Defense Technical Information Center, June 1996. http://dx.doi.org/10.21236/ada438395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Jing, Lei Yan, and Jing Deng. Comparison of 4 tibial fixation devices in anterior cruciate ligament reconstruction: result from a network meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, November 2022. http://dx.doi.org/10.37766/inplasy2022.11.0087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography