Dissertations / Theses on the topic 'Networked home'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Networked home.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Siebörger, David Robert. "Multiprotocol control of networked home entertainment devices." Thesis, Rhodes University, 2004. http://eprints.ru.ac.za/47/1/thesis.pdf.
Full textTajika, Yosuke. "Studies on distributed and cooperative computing architecture for networked home appliances." 京都大学 (Kyoto University), 2005. http://hdl.handle.net/2433/144496.
Full textLi, Zhijun. "Design and implementation SIP and Agent-based home Networked Appliances system." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26696.
Full textLundeland, Jonas, and Øystein Waage. "Developing a Web Application for Smart Home Technology." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18543.
Full textLind, Leili. "Towards Effortless Use of Information Technology in Home Healthcare with a Networked Digital Pen." Doctoral thesis, Linköping : Linköpings universitet, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7840.
Full textSmith, Megan Leigh. "Claiming the portable home/ creative acts of identity placemaking within the networked digital domain." Thesis, Leeds Beckett University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.538324.
Full textKlimasmith, Elizabeth. "At home in the city : networked space and urban domesticity in American literature, 1850-1920 /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/9372.
Full textHiltermann, Jaqueline Elizabeth. "Make yourself at home: networked domestic space, place and narrative in middle class South African everyday life." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29445.
Full textLeifeld, Philip [Verfasser]. "Policy Debates as Dynamic Networks : German Pension Politics and Privatization Discourse / Philip Leifeld." Frankfurt am Main : Campus Verlag, 2016. http://www.campus.de/home/.
Full textBrown, Anthony. "Domesticating home networks." Thesis, University of Nottingham, 2016. http://eprints.nottingham.ac.uk/34145/.
Full textDi, Cioccio Lucas. "Home Network Monitoring." Paris 6, 2013. http://www.theses.fr/2013PA066067.
Full textBroadband Internet access is now widespread and many users connect to theInternet from home. Often, Internet users at home are not computer. When aperformance problem occurs, users have no simple means to diagnose the problemand may call their Internet service provider to fix the problem, even if theproblem comes from the user network. This situation frustrates Internet usersand incurs a large cost on the Internet service providers which must provisioncall centers. In this thesis, we consider techniques for end-hosts to pinpoint whetherperformance problems occur in the home network or not. We show that some homenetwork configurations affect the end-to-end performance and that existingtechniques cannot always pinpoint whether the home network is the performancebottleneck. To get a better understanding of existing home networks at large,we design HomeNet Profiler, a software measurement tool to measure the list ofdevices active in the home network, the implementation of UPnP in residentialhome gateways, and the WiFi environment inside home networks. With our datasetconsisting of nearly 3000 homes, we show that home networks are often small butcan have up to 20 devices. We demonstrate that UPnP queries, can pinpointcross-traffic from the home network and differentiate local from wide-arealosses. We also show that the home WiFi environment is generally dense and hasan inherent risk for interference. To leverage and take advantage of this highWiFi density, we design neighbor-assisted diagnosis techniques. Thesetechniques are able to efficiently detect and distinguish uplink and downlinkdelays and loss rates with small error
Picthall, Keith Robert. "Network home office." Thesis, This resource online, 1995. http://scholar.lib.vt.edu/theses/available/etd-12052009-020359/.
Full textSundaresan, Srikanth. "Characterizing and improving last mile performance using home networking infrastructure." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52280.
Full textWong, Chi-Fai. "CACAO : client-assisted channel assignment optimization for uncoordinated home WLANs /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20WONG.
Full textTariq, Javid, and Sohail Sajid. "Robust Home Care Access Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2616.
Full textCritical networks e.g. telecare services, telemonitoring, are implemented to provide the information security and reliability that the end user desires, especially during an emergency. Unlike business carrier systems that are planned for the general public’s use, critical communication systems are designed particularly for public protection and other serious communication situations. Availability and reliability of such networks is highly desirable. The following thesis works to compare and analyze a variety of communication access technologies to find out the best primary means of data transportation for health critical services and model reliable communication link by using redundancy. This study also provides an efficient failover mechanism to implement redundant links. This strategy is intended to provide the reliable communication and to protect the established communication link.
Long, Weili. "On the topology design of hose-model VPN networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.
Full textFolke, Fredrik. "Security for home, small & medium sized enterprises IPv6 networks : Security using simple network equipment." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98295.
Full textDetta projekt kommer att undersöka och presentera olika hot som ett IPv6 nätverk kan utsättas för samt de vanligaste skydds mekanismer som används idag, med fokus på nätverkets skallskydd mellan det interna lokala nätet och det yttre publika Internet. I stort sätt all Internet ansluten utrustning och nätverk är exponerad och påverkad i någon grad av säkerhets brister, säkerhet är en viktig del i stort sätt alla nätverk oavsett syfte eller verksamhet. Genom ett ständigt växande Internet börjar de 32-bitar adresser tillhörande IPv4 nätet ta slut, vilket gör behovet av att immigrera till 128-bitar adresser på IPv6 nätet allt mer kritiskt. Med IPv6 kommer nya säkerhetshot, samt att även vissa äldre hot kvarstår, som kräver en förståelse av perimeter skydd. I denna rapport säkrar vi en hemma router och beskriver för varje steg tillvägagångssättet för att hem och små företagare ska få möjlighet att skydda sina IPv6 nätverk till en relativt låg kostnad.
Ritacco, Alan W. "How's My Network - Incentives and Impediments of Home Network Measurements." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/564.
Full textDembovsky, Colin. "The remote configuration of devices within home entertainment networks." Thesis, Rhodes University, 2002. http://hdl.handle.net/10962/d1007795.
Full textKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textGummalla, Ajay Chandra V. "Wireless home networks : architecture and access protocols." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/15004.
Full textAl-Mejibli, Intisar. "Enhancing service discovery performance over home networks." Thesis, University of Essex, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.572894.
Full textLoving, James Howard. "Enabling malware remediation in expanding home networks." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/108839.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-91).
As the Internet of Things (IoT) grows, malware will increasingly threaten Internet security and stability. Many actors, from individuals installing antivirus on their personal computers to law enforcement conducting botnet takedowns, have some capability to prevent or remediate malware, but these strategies face technical and economic challenges. These challenges worsen as the IoT expands, due to the high number of IoT devices and other characteristics of the IoT. Fortunately, Internet Service Providers (ISPs) are positioned to effectively contribute to malware remediation efforts, through the detection and notification of compromise. However, Network Address Translation (NAT) and IPv6 Privacy Extensions prevent ISPs from identifying the specific compromised device. We refer to this lastmile extension of the IP traceback problem as the residential source identification problem. As the IoT grows, the problem worsens: IoT devices are less capable of self-remediation and expected to soon outnumber traditional devices, thus imposing a significant cost on customers to triangulate and remediate an infection. To address the residential source identification problem, I propose EDICT, an open-source software package for home routers that will enable consumers to identify a specific device, given retrospective notification of the malicious behavior, without compromising the consumer's privacy. EDICT does this by maintaining a mapping of IP flows to devices through a series of scalable Bloom filters, allowing EDICT to operate under the significant memory constraints of home routers. When a customer is informed of compromise, EDICT will query this connection log using a fuzzy check of the timestamp and source port, both provided by the ISP, iterated across a log of identified devices. EDICT will then provide the customer with user-friendly information on the infection's source, enabling remediation.As the Internet of Things (IoT) grows, malware will increasingly threaten Internet security and stability. Many actors, from individuals installing antivirus on their personal computers to law enforcement conducting botnet takedowns, have some capability to prevent or remediate malware, but these strategies face technical and economic challenges. These challenges worsen as the IoT expands, due to the high number of IoT devices and other characteristics of the IoT. Fortunately, Internet Service Providers (ISPs) are positioned to effectively contribute to malware remediation efforts, through the detection and notification of compromise. However, Network Address Translation (NAT) and IPv6 Privacy Extensions prevent ISPs from identifying the specific compromised device. We refer to this lastmile extension of the IP traceback problem as the residential source identification problem. As the IoT grows, the problem worsens: IoT devices are less capable of self-remediation and expected to soon outnumber traditional devices, thus imposing a significant cost on customers to triangulate and remediate an infection. To address the residential source identification problem, I propose EDICT, an open-source software package for home routers that will enable consumers to identify a specific device, given retrospective notification of the malicious behavior, without compromising the consumer's privacy. EDICT does this by maintaining a mapping of IP flows to devices through a series of scalable Bloom filters, allowing EDICT to operate under the significant memory constraints of home routers. When a customer is informed of compromise, EDICT will query this connection log using a fuzzy check of the timestamp and source port, both provided by the ISP, iterated across a log of identified devices. EDICT will then provide the customer with user-friendly information on the infection's source, enabling remediation.
by James Howard Loving.
S.M. in Technology and Policy
S.M.
Gutiérrez, David. "Next-generation fiber-to-the-home networks /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textYang, Jeonghwa. "Eden an interactive home network management system /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31755.
Full textCommittee Chair: W. Keith Edwards; Committee Member: Blair MacIntyre; Committee Member: David McDonald; Committee Member: Ellen Yi-Luen Do; Committee Member: John Stasko. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Jonsson, Tobias, and Gabriel Acquaye. "Application of IEEE 802.15.4 for home network." Thesis, Jönköping University, Jönköping University, JTH, Computer and Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-6545.
Full text
To implement a utility wireless sensor network, investigation of different wireless protocols has been performed. The protocols are Bluetooth, Wi-Fi, IEEE 802.15.4 and Zigbee. Consecutively literature studies have made it comprehensible to understand the function of the protocols that are suitable for development of wireless sensor networks. The importance of low cost, low power, reliable and high-quality properties for long distances are significant. IEEE 802.15.4 and Zigbee protocol are proper to implement as a wireless sensor network.
To reduce the human efforts in the configuration of the system, a comfortable method is implemented to facilitate the procedure. The applied method is based on an automatic configuration of the system. The configuration and the decision taking are implemented in the software. The system is designed to avoid interference to other wireless networks with the possibilities of reconfiguration.
A uniform hardware and software design with separate functions of the system decided by a subsequent command for configuration is preferable. This imposes an advantage that increases the flexible potential of the system when a uniform solution is implemented.
To support the basic communication principles and control of the system, a buffer implementation has been introduced. The functionality of decision taking is distributed, configured by system commands from the host system. Detecting of system commands requires a properly operating buffer management. In consideration to the power consumption in reference to battery utilizations, the settings of RF-module and microcontroller have a powerful impact to reduce the power consumption. All possibilities of hibernates and avoidance of unnecessarily transmitting, should be deactivated to minimize the power consumption.
Backer, Knut Magnus. "Technology Requirements and Business Opportunities for Home Networks." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8767.
Full textBroadband connectivity has increased significantly the last years. More and more households choose to subscribe to services from various broadband companies. This has led to a range of new services. Some of these have high demands to both bandwidth and quality of service. Network operators have until recently neglected the challenges of providing network coverage within customer homes. Wireless solutions have been widely used, but new and demanding services like HDTV will either need a wired network or a significantly improved wireless standard. The complexity of in-home connectivity has increased dramatically because of a constant increasing number of devices and severe technical requirements. Convergence of earlier separated services is one of the main reasons for these new technical challenges. Different services with various demands are delivered over the same physical pipeline. The convergence of television, Internet and voice services, known as triple play, is delivered by both cable and fibre network operators today. Telecom operators are looking for ways to deliver triple play to compete in this new market. In addition to technical challenges, high costs and uncertain revenues slow down the development. In this thesis, we look at general technical requirements as well as business aspects regarding the development of a home network solution. Various technical solutions for in-home wiring are discussed. Because of high costs attended with installation of new wires in people's homes, usage of existing wiring is recommended. Power line technology (HomePlug) as well as data over coax and copper (HomePNA) are presented as actual solutions. Wireless LAN standards are mentioned and the new 802.11n standard is recommended as the next WLAN solution to be embedded in the future home network. The support of Ethernet is also recommended beacause it is well proven and delivers high bandwidth as well as low latency and jitter. The support for these various interfaces should be embedded in the Residential Gateway (RG) which is delivered by the network operator and resides in the transition between the access network and the home network. The RG is "the brain" in the home network and controls all services. One of the main tasks for the RG, is to deliver the appropriate Quality of Service (QoS) for the different services. This is done through a remote management system that ensures end-to-end QoS. The establishment of triple play leads to changes in existing business models. Telephone companies, broadcasters and cable network operators are among the involved actors. How to increase customers' value and how to ensure return on investment are central questions regarding the development of a triple play business model. Revenues must be ensured to get acceptance among stakeholders. A general business model for a network operator launching triple play is presented in the thesis. The model is based on a pre-defined business model ontology and uses elements from the involved actors' existing models. The establishment of the "connected home" which emphasize ease of use and personalization is central in the proposed value proposition. A home network user interface accessible from the various in-home devices is recommended to ensure customer control and user friendliness. Services like video on demand, personal video recording, interactive television and Internet should be accessible through the user interface. The network operator should differentiate from competitors by offering their customers a complete home network solution where ease of use, performance and personalization are emphasized. Partnerships with actors in the content and advertising industry as well as equipment manufacturers are discussed. To ensure low cost and high quality equipment as residential gateways and set top boxes, good partnerships with equipment manufacturers are essential. TV channels and independent content must be retrieved through partnerships with the copyright holders of the content. By making content available independent of TV-channels, network operators can take over parts of the television business which is operated by broadcasters and television programmers today. VoD and pay-per-view services will probably gradually take over for existing television services. Network operators have a golden opportunity to take over great shares of this business. Advertising can generate important revenues for network operators. The ability to personalize advertisements and offer shopping directly from the TV-set increases the value of advertising. Commercials can be displayed in the home network user interface and in connection with services as video on demand. Content with commercials attached can be offered at reduced price or for free, hence intercepting the customers with low willingness to pay. The financial aspects regarding home network solutions are discussed generally and with a low detailing level in this thesis. Huge costs are connected with the development of triple play and home network solutions, but there is also a high potential for revenue generating services and income from advertising and shopping. But, to generate any revenues, the network operator is dependent on customers. Hence, acquiring and retaining customers by delivering highly valued services and good customer support is the key to success.
Tamvada, Jagannatha Haritash. "Techno Economic Analysis of Interconnected Digital Home Networks." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9778.
Full textA home network is a popular method of allowing computers to communicate with each other within a given residential area or a local area network. Homes are the new frontiers of technology in the current global scenario, a digital interconnected home network is a reality and an efficient means to exchange information seamlessly across different homes and across different geographies is the need of the hour. The interconnection of different homes is possible with the existing ADSL subscriptions but would need changes in the existing gateway structures, which could be challenging for the less techno-savvy. In an effort to make life easier for the end user and help making the interconnection between various home networks seamless, a small device called I-Box is introduced through this project, which is essentially a small UPnP device with rich features and functionalities. This thesis gives an overview of the I-Box technology and with the help of various popular theoretical frameworks and concepts, investigates available Marketing channels and suggests a suitable deployment strategy for the I-Box by making a comparative study of the various possible scenarios and thereby identifying the most suitable model for its deployment.
Bradbury, Richard James. "Architectures for the control of home area networks." Thesis, University of Cambridge, 1998. https://www.repository.cam.ac.uk/handle/1810/273071.
Full textRylander, Lina, and Hilda Sandberg. "Customer Driven Improvements of Home Network and Router." Thesis, KTH, Maskinkonstruktion (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182745.
Full textDetta examensarbete är ett tjänstedesignprojekt som har utförts i samarbete med telekombolaget Telia Sverige (tillhörande TeliaSonera AB). Syftet med rapporten har varit att undersöka Telias fasta bredbandstjänst för privatpersoner ur ett kundperspektiv. Tidigare har tjänsten främst utvecklats utifrån ett teknikdrivet perspektiv. Under tiden som bredbandskund hos Telia får kunden låna en router men Telia har märkt att en del kunder väljer bort routern. Målet för arbetet har varit att leverera användbara kundinsikter och koncept på förbättringsförslag till Telia inom ramen för bredbandstjänsten. I projektet har en tjänstedesignmetodik använts där fokus har legat på interaktioner med kunderna. Interaktionerna har bestått av djupgående kvalitativa intervjuer. Projektet har bestått av fem faser. En inledande förberedande fas med förstudie om bland annat tjänstedesignmetoder, internet och bredbandstekniken, samt tid för att lära känna och förstå företaget. Under den förberedande fasen samlades även interna hypoteser om tjänstens problemområden in. Den inledande fasen följdes av tre iterativa loopar med kundinteraktioner, insiktsanalys, idégenerering och konceptualisering. Kundinsikter och koncept har testats, utvärderats och fördjupats under projektets gång. I den sista fasen bearbetades och rangordnades resultatet för att insikterna lättare ska kunna implementeras på företaget. Ett stort problemområde för många kunder var Wi-Fi och Wi-Fi-täckningen, då tekniken upplevs som svår och abstrakt. Slutsatsen är att Telia borde hjälpa sina kunder att själva förbättra Wi-Fikvalitén och arbetet ledde fram till tre slutgiltiga koncept som testades på kunder och utvärderades. Även sex rekommendationer till Telia levererades.
Carrera, Marianna. "Shape the wireless traffic in the home network." Paris 6, 2011. http://www.theses.fr/2011PA066248.
Full textVilla, Bjørn J. "Enhancing Quality Aspects of Adaptive Video Streamingin Home Networks." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-24724.
Full textAchaichia, Pierre. "Contributions to the Improvement of Multiuser PLC Home Networks." Phd thesis, Supélec, 2012. http://tel.archives-ouvertes.fr/tel-00770932.
Full textZhou, Xuzi. "Understanding Home Networks with Lightweight Privacy-Preserving Passive Measurement." UKnowledge, 2016. http://uknowledge.uky.edu/cs_etds/50.
Full textBeremark, Mikael, and John Fryland. "A Comparison of Intrusion Detection Systems in Home Networks." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37709.
Full textNationell ämneskategori - osäker på om det är rätt
Fensham-Smith, Amber J. "New technologies, knowledge, networks and communities in home-education." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/101035/.
Full textYan, Han. "Smart devices collaboration for energy saving in home networks." Thesis, Rennes 1, 2014. http://www.theses.fr/2014REN1S122/document.
Full textIn recent years, Information and Communications Technology (ICT) has totally changed the people daily life in the Digital Home. Meanwhile, not only the amount of CO2 emission of ICT, so called ''footprint'', is increasing without cease, but also the price of electricity is constantly rising. Thus, it is quite important to reduce energy consumption in the home network and home devices for the environmental and economic reasons. In order to cope with this context, the thesis concerns the design, the evaluation, and the implementation of a novel set of mechanisms with the purpose of responding to home network energy consumption problems. We proposed firstly an Overlay Energy Control Network which is formed by the overlay energy control nodes. Each node is connected to one device which forms an overlay control network to coordinate the power states of the device. Then, a testbed for HOme Power Efficiency system (HOPE) is implemented to demonstrate the technical solution for energy control in a real home network environment with several frequently used scenarios. After analyzing user's way of use of their home network equipment, we propose a power management which controls the devices based on the analysis of the collaborative services. These frequently used collaborative services require different functional blocks in different devices. This model provides the possibility to turn on the right requested functional blocks in the right device at the right moment. Finally, based on the former contribution, the collaborative overlay power management offers several possible tradeoffs between the power consumption and the waiting delay in the home network
Elshakankiry, Osama. "Securing home and correspondent registrations in mobile IPv6 networks." Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/securing-home-and-correspondent-registrations-in-mobile-ipv6-networks(8cd1f092-9229-421d-8315-9220bb8f19f4).html.
Full textAouini, Zied. "Traffic monitoring in home networks : from theory to practice." Thesis, La Rochelle, 2017. http://www.theses.fr/2017LAROS035/document.
Full textHome networks are facing a continuous evolution and are becoming more and more complex. Their complexity has evolved according to two interrelated dimensions. On the one hand, the home network topology (devices and connectivity technologies) tends to produce more complex configurations. On the other hand, the set of services accessed through the home network is growing in a tremendous fashion. Such context has made the home network management more challenging for both Internet Service Provider (ISP) and end-users. In this dissertation, we focus on the traffic dimension of the above described complexity. Our first contribution consists on proposing an architecture for traffic monitoring in home networks. We provide a comparative study of some existing open source tools. Then, we perform a testbed evaluation of the main software components implied in our architecture. Based on the experiments results, we discuss several deployment limits and possibilities. In our second contribution, we conduct a residential traffic and usages analysis based on real trace involving more than 34 000 customers. First, we present our data collection and processing methodology. Second, we present our findings with respect to the different layers of the TCP/IP protocol stack characteristics. Then, we perform a subjective analysis across 645 of residential customers. The results of both evaluations provide a complete synthesis of residential usage patterns and applications characteristics. In our third contribution, we propose a novel scheme for real-time residential traffic classification. Our scheme, which is based on a machine learning approach called C5.0, aims to fulfil the lacks identified in the literature. At this aim, our algorithm is evaluated using several traffic inputs. Then, we detail how we implemented a lightweight probe able to capture, track and identify finely applications running in the home network. This implementation allowed us to validate our designing principles upon realistic test conditions. The obtained results show clearly the efficiency and feasibility of our solution
Chu, Guang Yong. "Photonic devices for next generation fiber-to-the-home access network." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/386564.
Full textPor sus altos requerimientos técnicos, sería inasumible aplicar las tecnologías WDM-PON directamente para el despliegue masivo de Fiber-to-the-Home de nueva generación. Por lo tanto, el potencial se WDM-PON se debe integrar y mejorar con el fin de adaptarlo para NGPON y el futuro 5G. Hoy dia, operadores, usuarios y científicos, ven crucial augmentar la velocitat de funcionament y el alcance de las redes de acceso PON, si bien no tiene sentido conseguirlo con un coste inasequible. El UDWDM-PON puede considerarse como una solución definitiva para la red de acceso de próxima generación, capaz de proporcionar ancho de banda ilimitado para cada usuario, gracias a la detección coherente, por lo que en esta tesis se aborda su realización con un coste e integración prácticos. Con el fin de aplicarlos de manera rentable, el sistema debería exigir a las ONU que sean idénticas, si láseres preseleccionados o incoloros, y ser bidireccionales. Se desea que el conjunto de moduladores del sistema tengan en un bajo consumo, e incluso limitar el número de amplificadores. Sin embargo, para la transmisión bidireccional los efectos de retrodispersión limitarían el rendimiento si queremos volver a utilizar la portadora generada en la OLT. Por lo tanto, debemos diseñar un método para separar la longitud de onda en las transmisiones de bajada y de retorno del usuario a la central. El tradicional UDWDM-PON utiliza 2 láseres en la ONU; en esta tesis, las ONUs usan dispositivos integrados basados en un sólo DFB. ¿Cuál es la configuración más plausible? Los dispositivos fotónicos como RSOA, DEML, FML con configuraciones avanzadas se presentan en esta tesis con diferentes aplicaciones, que resuelven distintos problemas técnicos. La tesis incluye las siguientes partes: análisis y medida de dispositivos fotónicos clave para WDM-PON con modulación de fase, la independencia a la polarización de RSOA con diferentes aplicaciones, demostración de DEML con doble salida para transmisión bidireccional coherente UDWDM-PON, mitigación de AM residual de DEML para la modulación de fase, y la sintonía rápida de canal de UDWDM a través de FML.
Chetty, Marshini. "Making infrastructure visible: a case study of home networking." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41152.
Full textHamadi, Ashraf. "Investigating vulnerabilities in a home network with Kali Linux." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612.
Full textSiebörger, David Robert. "Multiprotocol control of networked home entertainment devices /." 2004. http://eprints.ru.ac.za/47/.
Full textMondal, Arpita. "Simple and secured access to networked home appliances via internet using SSL, BioHashing and single Authentication Server." Thesis, 2009. http://spectrum.library.concordia.ca/976646/1/MR63049.pdf.
Full textMARCELLUS, Kristina. "THE LONG HISTORY OF THE NETWORKED HOME: Convergences of technology, space and sociality in the domestic environment." Thesis, 2011. http://hdl.handle.net/1974/6640.
Full textThesis (Ph.D, Sociology) -- Queen's University, 2011-08-10 18:06:17.221
BRUNI, IRENE. "Design e tecnologie digitali, la connettività come risorsa per il progetto." Doctoral thesis, 2016. http://hdl.handle.net/2158/1036830.
Full textSilva, Wilson Vieira da. "Gestão de Home Networks." Master's thesis, 2009. http://hdl.handle.net/10348/319.
Full textA evolução da banda larga e a introdução de novos equipamentos especializados em determinado tipo de serviço exigem a adopção de soluções inovadoras que permitam uma gestão e configuração rápida e flexível de acordo com as necessidades específicas de cada equipamento e cliente. A recente convergência de diversos serviços (voz, dados, wireless e televisão) num mesmo canal de acesso (Triple Play e Quadruple Play) e a profusão de aplicações têm dificultado a gestão, segurança e garantia do QoS (Quality of Service) nas redes, provocando assim a procura de novas soluções. Garantir a configuração, integridade e despiste de casos de avaria, são nesta altura grandes desafios para os sistemas de suporte à operação dos operadores. A PT Inovação dispõe de um sistema, o Network Activator, que é responsável pela mediação entre os sistemas de suporte à operação e os equipamentos da rede. Este trabalho apresenta um módulo de gestão de equipamentos baseado no recente protocolo de gestão remoto CWMP (CPE WAN Management Protocol), com o objectivo de um dia vir a ser integrado à plataforma da PT Inovação.
The broadband evolution and the new specialized equipment introduction at specific type of service require innovative solutions that enable management and fast and flexible configuration, according to the specific needs of each client and equipment. The recent convergence of various services (voice, data, wireless and television) in the same channel access (Triple Play and Quadruple Play), and the increase of the number of applications has hindered the management, security and QoS (Quality of Service) in data networks, thus causing a demand for new solutions. Ensure the configuration, integrity, and screening of cases of failure, are, at this time great challenges in the operation support systems of the operators. PT Inovação has a system, Network Activator, which is responsible for mediating between operation support systems and network equipment. This work presents a module equipment management based on recent remote management protocol CWMP (CPE WAN Management Protocol), with the aim of being able to be integrated into the platform of PT Inovação.
Shao, Yufen. "Home therapist network modeling." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-12-4500.
Full texttext
Monteiro, João Pedro Sousa. "I2C Network for Home Automation." Master's thesis, 2017. https://repositorio-aberto.up.pt/handle/10216/106655.
Full textMonteiro, João Pedro Sousa. "I2C Network for Home Automation." Dissertação, 2017. https://repositorio-aberto.up.pt/handle/10216/106655.
Full text