Dissertations / Theses on the topic 'Networking'

To see the other types of publications on this topic, follow the link: Networking.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Networking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Scheyhing, Thorsten. "Networking eine Analyse von Networking-Verhalten ; Entwicklung eines Interviews zur Erfassung von Networking-Verhalten." Saarbrücken VDM Verlag Dr. Müller, 2008. http://d-nb.info/98839684X/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wright, Chantal E. (Chantal Elise). "Information networking networking for distributed semicondutor techology development." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/40205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (p. 57-58).
by Chantal E. Wright.
M.Eng.
3

Bakina, Oleksandra. "Social networking." Thesis, Молодь у глобалізованому світі: академічні аспекти англомовних фахових досліджень (англ. мовою) / Укл., ред. А.І.Раду: збірник мат. конф. - Львів: ПП "Марусич", 2011. - 147 с, 2011. http://er.nau.edu.ua/handle/NAU/20769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Velayos, Muñoz Héctor Luis. "Autonomic wireless networking." Doctoral thesis, KTH, School of Electrical Engineering (EES), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

Large-scale deployment of IEEE 802.11 wireless LANs (WLANs) remains a significant challenge. Many access points (APs) must be deployed and interconnected without a-priori knowledge of the demand. We consider that the deployment should be iterative, as follows. At first, access points are deployed to achieve partial coverage. Then, usage statistics are collected while the network operates. Overloaded and under-utilized APs would be identified, giving the opportunity to relocate, add or remove APs. In this thesis, we propose extensions to the WLAN architecture that would make our vision of iterative deployment feasible.

One line of work focuses on self-configuration, which deals with building a WLAN from APs deployed without planning, and coping with mismatches between offered load and available capacity. Self-configuration is considered at three levels. At the network level, we propose a new distribution system that forms a WLAN from a set of APs connected to different IP networks and supports AP auto-configuration, link-layer mobility, and sharing infrastructure between operators. At the inter-cell level, we design a load-balancing scheme for overlapping APs that increases the network throughput and reduces the cell delay by evenly distributing the load. We also suggest how to reduce the handoff time by early detection and fast active scanning. At the intra-cell level, we present a distributed admission control that protects cells against congestion by blocking stations whose MAC service time would be above a set threshold.

Another line of work deals with self-deployment and investigates how the network can assist in improving its continuous deployment by identifying the reasons for low cell throughput. One reason may be poor radio conditions. A new performance figure, the Multi-Rate Performance Index, is introduced to measure the efficiency of radio channel usage. Our measurements show that it identifies cells affected by bad radio conditions. An additional reason may be limited performance of some AP models. We present a method to measure the upper bound of an AP’s throughput and its dependence on offered load and orientation. Another reason for low throughput may be excessive distance between users and APs. Accurate positioning of users in a WLAN would permit optimizing the location and number of APs. We analyze the limitations of the two most popular range estimation techniques when used in WLANs: received signal strength and time of arrival. We find that the latter could perform better but the technique is not feasible due to the low resolution of the frame timestamps in the WLAN cards.

The combination of self-configuration and self-deployment enables the autonomic operation of WLANs.

5

Paradis, Thomas. "Software-Defined Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Software Defined Networks (SDN) is a paradigm in which routing decisions are taken by a control layer. In contrast to conventional network structures, the control plane and forwarding plane are separated and communicate through standard protocols like OpenFlow. Historically, network management was based on a layered approach, each one isolated from the others. SDN proposes a radically different approach by bringing together the management of all these layers into a single controller. It is therefore easy to get a unified management policy despite the complexity of current networks requirements while ensuring performance through the use of dedicated devices for the forwarding plane. Such an upheaval can meet the current challenges of managing an increasingly dynamic network imposed by the development of cloud computing or the increased mobility of everyday devices. Many solutions have emerged, but all do not satisfy the same issues and are not necessarily usable in a real environment. The purpose of this thesis is to study and report on existing solutions and technologies as well as conceive a demonstration prototype to present the benefits of this approach. This project also focuses on an analysis of risks posed by these technologies and the possible solutions.
6

Velayos, Mu~noz Héctor Luis. "Autonomic wireless networking /." Stockholm : Laboratory for Communication Networks, Department of Signals, Sensors and Systems, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Reiners, Felix. "Networking in Organisationen /." Mering, Schwab : Hampp, R, 2008. http://deposit.d-nb.de/cgi-bin/dokserv?id=3125253&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Eugene King. "ECCM networking research." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/30805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Spread -spectrum modulation techniques, which are traditionally applied to military systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are beginning to appear in the commercial secular. Specifically, spread-spectrum technology is being employed in digital cellular radio systems. These systems are identical to the military systems except that they employ much simpler spreading code design and have less security incorporated. However, due to the economies of scale, they can be produced at a much lower cost than their military counterparts. The jamming vulnerability of such commercial products in tactical situations is analyzed in this thesis. The mobile cellular network developed by Qualcomm Inc. is used to illustrate the methodology in analyzing the effects of jamming on the mobile cellular network. With a single mobile station and jammer, the probability of jamming and the optimal jammer trajectory are derived. Next, the effective probabilities of detection and false alarm under the jamming conditions are derived and the mean acquisition times are compared to that without jamming. Our results show that intelligence jamming can cause devastating effects even with very small power. Commercial products are therefore much more vulnerable due to the simplicity in design.
9

Ni, Song. "Intelligent wireless networking." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cherriman, Peter John. "Mobile video networking." Thesis, University of Southampton, 1998. https://eprints.soton.ac.uk/251962/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yang, Teng. "Connected Car Networking." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1544728665967784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Belinová, Gabriela. "Networking neziskových organizací." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-200159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This work deals with networking activities and communication of non-profit organizations and their representatives with external subjects. Networking is a strategic tool, which NGOs can use to make contacts and get new opportunities. As well as in the private sector non-profit organizations must deal with many obstacles. Most often it is a lack of resources. Due to lack of funds non-profit organizations cannot afford to employ experts. Therefore we can see that non-profit organizations struggle with a certain amount of unprofessionalism. They lack the strategy and they do not have set organizational processes. Communication with external subjects or networking activities are not an exception. This has been fully compensated with their energy and enthusiasm. Employees of non-profit organizations are not motivated financially but by doing a good thing. The study shows that employees of non-profit organizations are interested in new trends, what networking undoubtedly is.
13

Reiners, Felix. "Networking in Organisationen." München Mering Hampp, 2007. http://d-nb.info/989185532/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gui, Bo. "Cooperative OFDM networking." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 156 p, 2009. http://proquest.umi.com/pqdweb?did=1654493791&sid=1&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Disque, J. Graham. "Counselor Educator Networking." Digital Commons @ East Tennessee State University, 1997. https://dc.etsu.edu/etsu-works/2823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Moore, Mary. "Digital networking, using new communication technologies to facilitate networking among NGOs." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0005/MQ42085.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mahmoud, Maha Ali. "Value at Networking Event : Developing the individual experience at networking event." Thesis, Mälardalens högskola, Innovation och produktrealisering, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-33543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ziani-Franclet, Zoé. "Networking behaviors under the microscope : examining networking actions from different perspectives." Thesis, Cergy-Pontoise, Ecole supérieure des sciences économiques et commerciales, 2020. http://www.theses.fr/2020ESEC0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Dans cette thèse, j’examine les comportements de réseautage, aussi appelé « networking behaviors », et plus précisément les variations individuelles en matière d’engagement dans ces comportements. En particulier, j’étudie les émotions, processus cognitifs, motivations et propriétés du réseau associé à ces comportements de réseautage. Dans le chapitre 1, j’examine l’inconfort que les individus peuvent ressentir quand ils réseautent, les raisons de cet inconfort ainsi que la nature exacte de cet inconfort. Dans le chapitre 2, j’examine la raison pour laquelle les femmes semblent moins bénéficier de leurs activités de réseautage que les hommes. En me basant sur la littérature documentant les stéréotypes de genre, j’explique comment certaines stratégies de réseautage comportent un risque pour l’image des femmes. En particulier, l’existence d’un stéréotype de genre peignant les femmes comme capables et prêtes à utiliser leur pouvoir de séduction et d’attraction pour manipuler les hommes pourrait présenter un risque réputationnel pour les femmes. En raison de ce stéréotype, les femmes pourraient donc être moins à même de s’engager dans des actions de réseautage visant à renforcer et approfondir leurs relations avec des supérieurs masculins, par crainte que ces actions ne se reflètent négativement sur leur image. Dans le chapitre 3, je tente d’expliquer les variations observées en termes d’engagement dans les comportements de réseautage en examinant les antécédents motivationnels et les conséquences structurelles de ces variations. Plus précisément, je propose un modèle théorique dans lequel différents types de motivations ou besoins (besoin de pouvoir, d’affiliation, et de réalisation) pourraient être associés à différents comportements de réseautage (activité de recherche, de maintien, et d’exploitation des liens), qui pourraient en retour être associés à différentes propriétés du réseau (taille, diversité, et densité du réseau). A partir de données collectées sur une promotion d’étudiants en programme EMBA, je montre dans un premier temps que le besoin de pouvoir est positivement associé à la recherche de nouvelles relations, que le besoin d’affiliation est positivement associé à la recherche et au maintien de relations, mais que le besoin de réalisation n’est associé à aucun comportement de réseautage. Par ailleurs, je montre dans un second temps que la recherche et le maintien de relations sont positivement associés à la taille du réseau, que le maintien de relations est négativement associé à la densité du réseau, mais qu’aucun comportement de réseautage ne semble être associé à la diversité du réseau
In this dissertation, I examine between-people variations in their engagement in networking behaviors. In particular, I investigate the emotions, cognition, motivations and network properties associated with those networking behaviors. In chapter one, I examine whether people experience discomfort when networking, why they do so as well as the nature of this discomfort. Based on the literature on moral emotions, I argue and show that people experience guilt when networking partly because they construe networking as the objectification of others. I also investigate prosocial motives as a potential moderator of the effect, but do not find supporting evidence for this effect. In chapter two, I examine why women seem to benefit less than men from their networking activities. Based on the literature on gender stereotypes, I argue that certain networking strategies carry a risk to women’s image, because of a stereotype painting them as able and willing to use their power of attraction to manipulate men. As such, women could be less likely to engage in actions aimed at deepening and strengthening relationships with their male supervisors for fear that it will reflect negatively on their image. I find that while women do associate more image risk with network-deepening actions when the target is a supervisor of the opposite (rather than same) gender, they are not less likely than men to engage in those actions. I also find that men are less likely than women to engage in network-deepening actions with a colleague of the opposite (rather than same) gender because of the image risk they associate with those actions. Finally, I find women’s concerns for their image to be unwarranted: Third parties do not judge women more harshly than men when engaged in networking-deepening actions with supervisors of the opposite gender. In chapter three, I propose that different motivations (i.e., for power, affiliation, and achievement) could be associated with different networking behaviors (i.e., search, maintenance, and leverage). In turn, I explore how each of those networking behaviors relate to different network properties (i.e., size, diversity, and density). Using data collected from a cohort of EMBA students, I show that motivation for power is positively related to search, and motivation for affiliation is positively related to both search and maintenance, but do not find significant association between motivation for achievement and networking behaviors. In turn, I find that greater engagement in both search and maintenance is associated with larger networks, and greater engagement in maintenance is associated with sparser networks, but do not find significant associations between any type of networking behaviors and network diversity
19

Pitzus, Antonio. "SDN : Software Defined Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14006/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In un periodo in cui tutto si evolve rapidamente, il settore delle telecomunicazioni sta assistendo alla crescita esponenziale del numero di dispositivi mobili costantemente connessi alla rete; ciò richiede la necessità di un nuovo modo di gestire le reti. La nuova visione che sta maturando in questi ultimi tempi è quella di adottare un modello di rete dinamico, flessibile e soprattutto affidabile e che non richieda grossi sforzi di manutenzione o l’installazione di ulteriori hardware da parte degli operatori. Una rete con queste caratteristiche può essere sviluppata grazie ad un modello architetturale innovativo come il Software Defined Networking (SDN) e ad un nuovo modo di sfruttare le funzionalità degli apparati di rete come la Network Function Virtualization (NFV), la quale è a sua volta un processo di virtualizzazione delle funzionalità di rete svolte da apparati di telecomunicazione fisici. Questi due concetti sono strettamente legati tra loro e possono comportare particolari vantaggi se applicati contemporaneamente, ma sono di per sè indipendenti. Software Defined Networking (SDN) è un’ architettura utilizzata per la realizzazione di reti di telecomunicazione nelle quali il piano di controllo della rete e quello del trasporto dei dati sono separati logicamente. La Network Function Virtualization (NFV) è il processo di virtualizzazione delle funzionalità di rete svolte da apparati di telecomunicazione fisici. Un ultimo aspetto da trattare riguarda la comunicazione del controller SDN di alto e basso livello. La comunicazione di alto livello, ovvero quella con i software applicativi è consentita grazie alle NBI (North-Bound Interfaces), mentre quella di basso livello, ovvero con i dispositivi hardware è consentita grazie alle SBI (South-Bound Interfaces). Queste due interfacce riescono a soddisfare le richieste del controller SDN grazie all' applicazione del paradigma Intent NBI, di tipo dichiarativo, non prescrittivo e indipendente dal fornitore.
20

Lönn, Johan, and Jonas Olsson. "ZigBee for wireless networking." Thesis, Linköping University, Department of Science and Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. However, there are many wireless monitoring and control applications for industrial and home environments which require longer battery life, lower data rates and less complexity than those from existing standards. What the market need is a globally defined standard that meets the requirement for reliability, security, low power and low cost. For such wireless applications a new standard called ZigBee has been developed by the ZigBee Alliance based upon the IEEE 802.15.4 standard.

The aim of this diploma work is to design fully functional ZigBee and IEEE 802.15.4 modules, and to evaluate an application in a sensor network.

This diploma work has resulted in two fully functional ZigBee and IEEE 802.15.4 modules, respectively. It is also shown that ZigBee sensors can be networked wirelessly. Eventually it is the authors hope that the modules will be used within ITN, and also be developed further for new applications.

21

Haga, Trond. "Orchestration of networking processes." Doctoral thesis, Norwegian University of Science and Technology, Department of Industrial Economics and Technology Management, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-2095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

Network collaboration between industrial enterprises is the main topic in this dissertation. My aim has been to explore if it is possible to construct a network between industrial enterprises, which for the participating enterprises represents a valuable asset in order to become more innovative, increasing their competitive power. The dissertation contains an overarching umbrella paper and six ordinary papers.

The construction of a network consisting of a set of enterprises, calls for contributions in the field from outsiders, such as researchers. Thus, in my study I have used an action research approach, interpreted as the researcher operating as a ‘friendly outsider’ in the network. To be able to enter into problem solving together with local practitioners calls for a longitudinal approach, meaning that the researcher collaborates closely with the network and the enterprises for a long period of time.

The research process that I have made use of in my study is divided into two closely linked parts. Firstly, I have been part of a network construction and maintenance process for more than four years, establishing sustainable networking processes. The experiences coming from these processes represent my empirical data. Secondly, I have reflected individually, and participated in joint reflection with actors in the research field over experiences and the results of the actions taken in the network. These reflections have resulted in the writing of six papers that are part of this dissertation. In these papers, I have discussed what I regard as the most important elements to arrange for network collaboration and networking processes.

My ambition with the umbrella paper is to pull the different elements discussed in the different papers together in order to present a dynamic networking model. Thus, the model developed is a result of my research on several networks of industrial enterprises. However, the model is not meant to be a definite recipe for constructing additional networks. I regard networks as socially constructed, and as such, they are the result of processes that involve human participation. The personnel involved have their own mental models that will heavily influence the construction and operation of a network. Thus, the model can be used to merely interpret the importance of the existence of a set of enablers while constructing or operating network processes.

The model consists of a set of enablers identified through the research process in this study, and they are thoroughly discussed in the different papers as well as in the umbrella. These enablers are:

• Training. This is an important enabler that may increase knowledge about development work and processes, and the diffusion of such knowledge.

• Network management. Taking care of the daily operation, and closely linked to the enterprises, network management is important in initiating and supporting networking processes.

• Processing roles. Personnel able to hold such roles are important for initiating and accomplishing networking processes, as well as for the supply of external knowledge, funding, and general support.Introducing this as an enabler implies, most likely, making it easier for external resources to assist in operating the networking processes.

• Network infrastructure. The existence of a network structure that makes it possible for the enterprises to discuss experiences and ideas and to develop knowledge is vital. In Paper V, which is a comparison of networks in Sweden and Norway, the management of the network has been analysed and the most striking discovery is the solid structures that are constructed.

• Leadership. The management and unions in the participating enterprises need to take leadership to allow for networking processes to occur. The role of unions in legitimating wide employee involvement seems to be especially important.

As I have indicated, the above enablers or instruments, acting differently, are needed to construct sustainable networking processes. Such processes may bring about important innovations or developments for individuals or groups of enterprises, as shown in several of my papers. Individually, the instruments may be good and important, but they may become even better when combined with other instruments. My study indicates that the support given to network processes by combining instruments may increase what the individual instrument can offer. Thus, orchestration of instruments appears as an important and valuable coordination of contributions given to such processes. Thus, I have revealed that the presence of a number of enablers is necessary to establish sustainable networking processes, but these enablers are not sufficient to get these processes going. As I have shown, orchestration is also needed to initiate and continue such processes, and it calls for action researchers who possess skills and knowledge that enable them to serve as orchestrators.

22

Dandugula, Chaitanya. "Networking for Smart Meters." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
"Smart grid" generally refers to a class of technology bringing electricity delivery systems into the 21st century, using computer-based remote control and automation. With the growing energy demand, efficient usage of the available energy resources is increasingly becoming a major issue around the world. Smart grid is a step in that direction. Research in the European Union and the United States are currently underway to modernize the existing and aging transmission grid and to streamline the usage of electricity. A typical electricity grid consists of two major entities - the utility company and the distribution control system (DCS). Electricity is generated at the utility company and the DCS is responsible for the distribution of electricity to individual homes/consumers. A smart meter (SM) is an electronic device that measures the electricity consumed at the consumer's premises and provides added information to the utility company. The data concentration unit (DCU) is a device acting as a communication hub collecting and encoding data from multiple smart meters in a neighborhood and forwarding the data to the utility company. The aim of this project is to design a network for securing the communication between the SM and the DCU in a smart metering network environment. The meter data communicated from the SM to the DCU is very sensitive and in the hands of an attacker, can reveal significant personal information about an individual. Hence it is of at most importance to protect the meter data transmitted from the SM. On the other hand the control signals transmitted from the DCU to the SM, need protection in order to thwart off unauthorized signals (i.e., an intruder can impersonate the DC and send out control signals to the SMs). Hence the SM and the DCU should be authenticated by each other and authorized and the data and/or control signals exchanged between them should be encrypted.
"Smart grid" avser i allmänhet en klass av teknik föra system elleverans till 21: a århundradet, med hjälp av datorbaserade fjärrkontroll och automation. Med den ökande efterfrågan på energi, är effektiv användning av de tillgängliga energiresurser blir alltmer en viktig fråga över hela världen. Smart grid är ett steg i den riktningen. Forskning i Europeiska unionen och USA för närvarande pågår för att modernisera befintliga och åldrande transmissionsnätet och effektivisera användningen av el. En typisk elnätet består av två större enheter - de allmännyttiga företaget och \distribution control system"(DCS). El genereras vid verktyget företaget och DCS ansvarar för distributionen av el till enskilda hem / konsumenter. En smart meter (SM) är en elektronisk apparat som mäter elförbrukning på konsumentens lokaler och ger ökad information till elbolaget. \Data concentration unit"(DCU) är en enhet fungerar som ett kommunikationsnav insamling och kodning av data från flera smarta mätare i ett område och vidarebefordra data till elbolaget. Syftet med detta projekt är att utforma ett nätverk för att säkra kommunikationen mellan SM och DCU i ett smart mätning nätverksmiljö. Mätaren uppgifter som lämnas från SM till DCU är mycket känslig och i händerna på en angripare, kan avslöja viktig personlig information om en individ. Följaktligen är det av som mest betydelse för att skydda de mätdata som sänds från SM: en. å andra sidan styrsignaler överförs från DCU till SM och behöver skydd för att hindra av obehöriga signaler (dvs en inkräktare kan personifiera DC och skicka ut styrsignaler till SM). Därför SM och DCU ska bestyrkas av varandra och godkänts och data och / eller styrsignaler utväxlas mellan dem ska vara krypterad.
23

Leask, David Matthew. "Low power radio networking." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

O'Hara, Patricia A. "Local area networking handbook." Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/37530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Approved for public release; distribution is unlimited.
This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. A method for conducting a LAN requirements assessment is discussed, followed by a strategy for selecting a local area network.
25

Chen, Xin. "Energy efficient wired networking." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/7966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This research proposes a new dynamic energy management framework for a backbone Internet Protocol over Dense Wavelength Division Multiplexing (IP over DWDM) network. Maintaining the logical IP-layer topology is a key constraint of our architecture whilst saving energy by infrastructure sleeping and virtual router migration. The traffic demand in a Tier 2/3 network typically has a regular diurnal pattern based on people‟s activities, which is high in working hours and much lighter during hours associated with sleep. When the traffic demand is light, virtual router instances can be consolidated to a smaller set of physical platforms and the unneeded physical platforms can be put to sleep to save energy. As the traffic demand increases the sleeping physical platforms can be re-awoken in order to host virtual router instances and so maintain quality of service. Since the IP-layer topology remains unchanged throughout virtual router migration in our framework, there is no network disruption or discontinuities when the physical platforms enter or leave hibernation. However, this migration places extra demands on the optical layer as additional connections are needed to preserve the logical IP-layer topology whilst forwarding traffic to the new virtual router location. Consequently, dynamic optical connection management is needed for the new framework. Two important issues are considered in the framework, i.e. when to trigger the virtual router migration and where to move virtual router instances to? For the first issue, a reactive mechanism is used to trigger the virtual router migration by monitoring the network state. Then, a new evolutionary-based algorithm called VRM_MOEA is proposed for solving the destination physical platform selection problem, which chooses the appropriate location of virtual router instances as traffic demand varies. A novel hybrid simulation platform is developed to measure the performance of new framework, which is able to capture the functionality of the optical layer, the IP layer data-path and the IP/optical control plane. Simulation results show that the performance of network energy saving depends on many factors, such as network topology, quiet and busy thresholds, and traffic load; however, savings of around 30% are possible with typical medium-sized network topologies.
26

Kalanithi, Jeevan James. "Connectibles : tangible social networking." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2007.
Includes bibliographical references (p. 127-132).
This thesis presents "Connectibles," an instantiation of a tangible social network, a new type of social network application rooted in physical objects and real world social behavior. This research is inspired by social signaling and object theory, which together suggest that gifts act as physical symbols and constructors of social relationships. The Connectibles system leverages these gift-giving practices, presenting users with customizable gift objects ("connectibles") that they exchange with one another. These objects form always-on communication channels between givers and receivers. As a user collects more and more of these objects, she begins to acquire a dynamic, physical representation of and interface to her social network. The community of users' interactions implicitly represent the structure of the social network; these data can be accessed with a GUI application, allowing users to explore and interact with their social network. The overarching goal is to examine how a set of devices might naturally and harmoniously interface the physical, virtual and social worlds.
by Jeevan James Kalanithi.
S.M.
27

Liang, Philip Angus. "Social networking in vehicles." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/36151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2006.
Includes bibliographical references (leaves 62-64).
In-vehicle, location-aware, socially aware telematic systems, known as Flossers, stand to revolutionize vehicles, and how their drivers interact with their physical and social worlds. With Flossers, users can broadcast and share information, communicate with one another, and experience a more information-rich environment. Instead of seeing only a physical reality, a user will see a context-enriched reality, with "tags" provided by their social network, and presented to them by the Flosser. The Flosser turns a moving vehicle into a social networking hub, linking social information with the user's vehicle, allowing the user to learn more about their surroundings from social fabric inputs. It will also allow the user to ascertain the location and contactability of other members of their social network.
by Philip Angus Liang.
S.M.
28

Holman, Jason (Jason William) 1974. "Optical networking equipment manufacturing." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/44603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2001.
Includes bibliographical references (leaf 70).
Celestica, a global contract manufacturer specializing in printed circuit board assembly and computer assembly, has recently begun manufacturing equipment for the optical networking equipment (ONE) industry. The expansion to include ONE manufacturing requires the development of new skills in handling optical fiber and components, a new supply chain strategy, and a new approach to manufacturing systems control. Celestica is developing a set of standards for ONE manufacturing that will support the rapid development of the new skills required for this industry. This work outlines the standards and explores the specific issues related to manufacturing with optical fiber, including the mechanical reliability and optical performance of various types of optical fibers. An overview of the telecommunications industry is provided, including an analysis of its supply chain structure. Observations are made on trends in the industry and the ways that these trends have affected Celestica in the past, and could impact Celestica in the future. Finally, Celestica's current approach to manufacturing systems control is evaluated, and suggestions are made for improving systems control and project management when manufacturing for such a rapidly evolving industry.
by Jason Holman.
S.M.
M.B.A.
29

Cardinal, Robert. "TELEMETRY ENTERPRISE SWITCHED NETWORKING." International Foundation for Telemetering, 1994. http://hdl.handle.net/10150/608568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
International Telemetering Conference Proceedings / October 17-20, 1994 / Town & Country Hotel and Conference Center, San Diego, California
The success of the client/server paradigm for modern networked telemetry systems continues to stress the LAN that carries data generated from the acquisition front ends to the display workstations and the file servers on the LAN. As the number of LAN-attached devices such as Loral's System 500 Model 550 (Loral 550) telemetry front end, workstations, and file servers grows beyond two, the Ethernet LAN collision rates increase and the throughput slows down. At what point the network performance declines is a function of the specific application bandwidth demands required. This paper describes a new method for boosting LAN performance by providing Ethernet switching and protocol filtering. The performance of the LAN is critical to the performance of the complete telemetry enterprise architecture.
30

Lichtner, Ondrej. "Networking Subsystem Configuration Interface." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cílem diplomové práce je návrh síťové konfigurační knihovny s důrazem kladeným na přenositelnost mezi operačními systémy na bázi Linuxu a BSD a rozšiřitelnosti podpory knihovny. V druhé kapitole práce zkoumá dostupné konfigurační rozhraní obou operačních systémů. Detailně pak rozebírá vlastnosti rozhraní Netlink socketů, které je primárním konfiguračním rozhraním pro síťové prvky na Linuxu, a systémové volání ioctl, které má na Linuxu menší schopnosti, ale zato je primárně používané na BSD a jiných UNIX systémech. Jsou též zkoumané rozhraní pro konfiguraci rozdílných firewallů. V třetí kapitole je práce zameřená na konkrétní typy síťových zařízení, specifika jejich konfigurace a jejich návaznost na rozhraní jádra popsané v druhé kapitole. V čtvrté kapitole jsou formulovány požadavky na konfigurační knihovnu: jednoduchá rozšiřitelnost, přenositelnost na různé operační systémy, podpora sledování změn a událostí a rozšiřitelnost o různé typy uživatelských rozhraní. Na základě výzkumu z předcházejících dvou kapitol je přednesen návrh knihovny. Návrh definuje konfigurační rozhraní jako hierarchii abstraktních tříd, oddělených od implementace. To umožnuje mít současně několik implementací stejného konfiguračního rozhraní i v rámci jednoho operačního systému. Jako vstupní rozhraní knihovny je definovaná třída LibNCFG, která má na starosti tyto konfigurační objekty vytvořit namísto uživatele. Tímto je dosažená jednoduchá rozšiřitelnost knihovny o nové rozhraní operačních systémů i o podporu konfigurace nových síťových prvků. Podpora pro nové uživatelské rozhraní se dá implementovat jako nová služba, která zabaluje rozhraní knihovny a poskytuje jiná rozhraní. Pro podporu sledování změn poskytuje třída LibNCFG metody pro registraci zpětných volání pro definované události. Ve čtvrté kapitole práce detailně popisuje rozhraní třídy LibNCFG, modulu Common a tříd NetDevice, EthDevice a BondDevice, které definují konfigurační rozhraní příslušných typů síťových zařízení. Pro tyto třídy jsou implementované konkrétní třídy NetlinkNetDevice, NetlinkEthDevice a sysfsBondDevice a popsané jejich implementační detaily. V páté kapitole je popsaná ukázková aplikace, která byla implementovaná pro účely předvedení jednoduchosti použití konfigurační knihovny. Nakonec jsou v závěru shrnuté výsledky práce a je vedena diskuze o možných vylepšeních a o pokračování projektu.
31

Raghavan, Barath. "Toward cheat-proof networking." Diss., [La Jolla] : University of California, San Diego, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p3359355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2009.
Title from first page of PDF file (viewed July 14, 2009). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 113-124).
32

Tate, William R. "Full-duplex underwater networking." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FTate.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Khan, Muhammad Hassan Raza. "Securing Information Centric Networking." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3424568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years, the usage model of the current Internet has experienced an unexpected paradigm shift due to overwhelming requirements in distributed content distribution, device mobility, network scalability, information retrieval, network-based services to name a few. To address these pressing requirements, along with inherent security (which was completely ignored by the early adopters of the Internet), researchers have proposed the Information Centric Networking (ICN) paradigm as a possible replacement of the current host-centric communication model. In ICN, named content turns out to be a ``first-class entity", thus focusing on efficient content distribution, which is debatably not well served by the current Internet. Several projects have embraced the ICN philosophy and aim at proposing a viable future Internet architecture. However, to successfully accomplish the objective, ICN and its implementing projects should include a leading obligation in their design, i.e., support security from the outset. To evade the prolonged and endured past of incremental security-patching and retrofitting that characterizes the current Internet architecture. This dissertation goes into such direction and focuses on securing ICN paradigm and its implementing architectures. In particular, this dissertation contributes by: (i) addressing vulnerabilities in the interaction of ICN's implicit features and widely used existing technology, such as multimedia streaming; (ii) exploiting ICN intrinsic mobility support to provide security services to the upper layer, such as authentication; (iii) securing the ICN mobility features; (iv) addressing the architectural security issues that are intrinsic to the ICN design; and (v) addressing the feasibility and effectiveness of ICN with respect to real-world deployment configurations.
34

Muñoz, Soto Jonathan Mauricio. "Km-scale Industrial Networking." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'Internet des objets (IoT) a pour objectif de fournir une connectivité à des millions d'appareils utilisés au quotidien. Pour la majorité des applications, les connexions filaires sont peu pratiques et trop coûteuses. Par conséquent, les connexions sans fil sont le seul moyen réalisable de fournir une connectivité aux dispositifs. Une des nombreuses solutions sans fil est la norme IEEE802.15.4, conçue pour les réseaux maillés de faible consommation. Cette norme est largement utilisée pour les bâtiments intelligents, la domotique et les applications industrielles. Un amendement ultérieur, IEEE802.15.4g, définit 3 PHY (FSK, OFDM et O-QPSK). Cela cible les applications SUN (Smart Utility Networks), c’est-à-dire le comptage intelligent, tout en offrant une couverture étendue. Dans cette thèse, nous analysons l'utilisation de cette norme en dehors de l'environnement SUN et sur des applications industrielles. Premièrement, nous menons une série d’expériences avec IEEE802.15.4g-dispositifs afin de mesurer la portée des liens dans des scénarios extérieurs réels. Les résultats montrent que des communications très fiables avec des débits jusqu'à 800 kbps (avec OFDM) peuvent être atteintes en milieu urbain à 540 m entre les nœuds, et que la liaison radio la plus longue utile est obtenue à 779 m (FSK). Deuxièmement, nous comparons les performances de la norme IEEE802.15.4 à celle de la norme IEEE802.15.4g OFDM dans les bâtiments intelligents. A partir d'expériences, nous avons déterminé que l'OFDM IEEE802.15.4g surpasse l'IEEE802.15.4 et doit être considéré comme une solution pour les déploiements ultérieurs. Enfin, nous introduisons le concept du réseau agile: des nœuds pouvant modifier dynamiquement leur PHY en fonction de leurs besoins et de leur situation
The Internet of Things (IoT) aims to provide connectivity to millions of devices used in our day-to-day life. For the vast majority of applications, wired connections are unpractical and too expensive, therefore wireless connections is the only feasible way to provide connectivity to the devices. One of many wireless solutions is the standard IEEE802.15.4, specially designed for low power mesh networks. This standard is widely used for Smart Building, Home Automation and Industrial Applications.A subsequent amendment, the IEEE802.15.4g, defines 3 PHYs (FSK, OFDM and O-QPSK). This targets Smart Utility Networks(SUN) applications, i.e., Smart Metering, while providing extended coverage. In this thesis, we analyse the use of this standard outside the SUN environment and onto Industrial Networking applications.First, we conduct a series of experiments using IEEE802.15.4g compliant devices in order to measure the range coverage on radio links in real use case outdoor scenarios. Results show that highly reliable communications with data rates up to 800 kbps (with OFDM) can be achieved in urban environments at 540 m between nodes, and the longest useful radio link is obtained at 779 m (FSK). Sencond, regarding the robustness and high data rate of OFDM, we compare the performance of the IEEE802.15.4 with the IEEE802.15.4g OFDM in Smart Building scenarios. From experiments, we determine that IEEE802.15.4g OFDM outperforms IEEE802.15.4 and should be considered as a solution for further deployments in combination with a TSCH MAC approach. Finally, we introduce the concept of Network Agility: nodes that can dynamically change their PHY according to their needs and circumstances
35

Nguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'architecture de l'Internet a été conçue pour connecter des hôtes distants. Mais l'évolution de son usage, qui s'apparente à celui d'une plate-forme mondiale pour la distribution de contenu met à mal son modèle de communication originale. Afin de mettre en cohérence l'architecture de l'Internet et son usage, de nouvelles architectures réseaux orientées contenu ont été proposées et celles-ci sont prêtes à être mises en oeuvre. Les questions de leur gestion, déploiement et sécurité se posent alors comme des verrous indispensables à lever pour les opérateurs de l'Internet. Dans cette thèse, nous proposons un plan de surveillance de la sécurité pour Named Data Networking (NDN), l'architecture la plus aboutie et bénéficiant d'une implémentation fonctionnelle. Dans le déploiement réel, nous avons caractérisé les attaques NDN les plus importantes - Interest Flooding Attack (IFA) et Content Poisoning Attack (CPA). Ces résultats ont permis de concevoir des micro-détecteurs qui reposent sur la théorie des tests d'hypothèses. L'approche permet de concevoir un test optimal (AUMP) capable d'assurer une probabilité de fausses alarmes (PFA) désirée en maximisant la puissance de détection. Nous avons intégré ces micro-détecteurs dans un plan de surveillance de la sécurité permettant de détecter des changements anormaux et les corréler par le réseau Bayésien, qui permet d'identifier les événements de sécurité dans un noeud NDN. Cette solution a été validée par simulation et expérimentation sur les attaques IFA et CPA
The current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
36

Baumann, Lea [Verfasser], and Sonja [Akademischer Betreuer] Utz. "Professional online networking : investigating the technological and the human side of networking with professional social networking sites / Lea Baumann ; Betreuer: Sonja Utz." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2021. http://d-nb.info/1234059258/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Broad, Roy M. "Networking performance : a study of the benefits of business networking in the West Midlands." Thesis, University of Wolverhampton, 2012. http://hdl.handle.net/2436/297584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Research on business networks has traditionally focussed on understanding the nature of relationships in networks but seldom the outcomes from business networking activities. This thesis examines the benefits from business networking from the perspective of firms in the West Midlands and explains the factors which improve networking performance. Networking is hailed by academics and marketing practitioners as a way to improve business performance. Firms are encouraged to invest resources in networking activities, without necessarily being able to measure the result. Researchers following in the ‘markets as networks’ tradition have identified understanding the benefits from business networking activities as a subject for further investigation. Using survey data from 298 firms in the West Midlands, the findings show that strength of relationship, planned networking behaviour and networking intensity to be significant indicators of networking performance. Analysis also shows degree of embeddedness to have a mediating effect on networking performance. This study provides empirical support for the idea that firms which adopt a systematic approach to business networking achieve better outcomes in terms of networking performance when measured as a percentage of sales turnover, compared to firms adopting an ad-hoc approach to networking. This study contributes to the marketing and markets as networks literature as well as advancing the conceptualisation of networking performance measured in terms of sales turnover. The thesis offers insights from the focal firm’s perspective as to why business networking is important and identifies factors which contribute to positive networking outcomes and a measure of networking performance
38

Khan, Rafiullah. "Energy-aware home area networking." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/285658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A study by Lawrence Berkeley National Laboratory (LBNL) revealed that about 60% of the office PCs are left powered-up 24/7 only to maintain the network connectivity for remote access, Voice-over-IP (VOIP) clients, Instant Messaging (IM) and other administrative management reasons. The Advanced Configuration and Power Interface (ACPI) proposed several low power states for PCs as effective mechanism to reduce energy waste, but unfortunately they are seldomly used due to their incapability to maintain network presence. Thus, Billions of dollars of electricity is wasted every year to keep idle or unused network devices fully powered-up only to maintain the network connectivity.This dissertation addresses the Network Connectivity Proxy (NCP), a concept recently been proposed as an optimal strategy to reduce energy waste due to idle network devices. The NCP is a software entity running on a low power network device (such as home gateway, switch or router) and impersonates presence for high power devices (such as PCs) during their sleeping periods. It wakes-up a sleeping device only when its resources are required. In short, the NCP impersonates link layer, network layer, transport layer and application layer presence on behalf of sleeping devices. In this dissertation, we presented the design and implementation of our NCP prototype. The NCP concept faces several issues and challenges that we tried to address in the most effective way in our implementations. Knowing when to start or stop proxying presence on behalf of sleeping devices is critically important for the NCP operations. To achieve this objective in a seamless way without requiring any user intervention, we developed a kernel module that monitors the power state transitions of the device and immediately informs the NCP over a suitable communication protocol in case of any update. An important challenge for the NCP is its ability to proxy a huge and ever increasing number of applications and networking protocols on behalf of sleeping devices. To tackle with this challenge in an efficient way, we implemented a quite generalized set of behavioral rules in our NCP framework that can be suitable for any protocol or application. We also incorporated deployment flexibility in our NCP software that enables us to operate it on on-board NIC, switch/router or on a standalone PC. On-board NIC and switch/router are the optimal locations for the NCP software in home/small office environment (very limited number of devices) or a standalone PC with enough resources is a good choice if high scalability is desirable e.g., medium or large size organizations. A communication protocol is required for information exchange between the NCP and client devices e.g., for power state notifications, registration/de-registration of client devices/behavioral rules etc. To avoid any configuration issues, we developed a flexible and reliable communication framework based on the Universal Plug & Play (UPnP) architecture that provides interesting features such as auto-discovery, zero-configuration and seamless communication between the NCP and client devices. We expanded the NCP coverage beyond LAN boundaries in order to exploit its full potential in terms of energy savings by covering for thousands of client devices. A single global powerful NCP instance located anywhere in the Internet can make easier the implementation of complex tasks and boosts up the energy savings by also shutting down the unused access links and the packets forwarding equipments whenever possible. Further, we also extended the NCP concept for mobile devices to help in improving the battery life. Another important contribution of this dissertation includes the extensive evaluation of the NCP performance on different low power hardwares. We performed large number of experiments and evaluated the effectiveness of NCP prototype in different
39

Martínez-Vidal, Rubén. "Architectures for aeronautical opportunistic networking." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/319697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
En els últims anys, el camp de les comunicacions aeronàutiques ha experimentat un increment en la demanda d'intercanvis de dades entre plataformes terrestres, aèries i satelitals. Els mètodes de comunicació aeronàutics convencionals han demostrat no ser suficients per manejar aquesta demanda creixent. Com a resultat, els sistemes aeronàutics han tendit cap a l'ús de comunicacions via satèl·lit, que encara que efectives, suposen un repte econòmic tant en la seva instal·lació com en el seu ús. En resposta a aquest problema, el treball acadèmic en aquesta àrea ha proposat l'ús d'alternatives basades en xarxes de comunicació en la forma de xarxes aeronàutiques ad-hoc. Aquestes xarxes usen abastos de comunicació immensos i treballen sota la premissa de les Xarxes Ad-Hoc Mòbils (MANETs) requerint l'existència de connectivitat extrem a extrem per al seu correcte funcionament. Les xarxes aeronàutiques tenen una topologia extremadament variable juntament amb enllaços de comunicació poc fiables. Amb aquestes propietats en ment, creiem que assumir connectivitat de xarxa és una elecció desafortunada. Per tant, en aquesta tesi intentem solucionar aquests reptes utilitzant un enfocament diferent. Específicament, intentarem establir una xarxa d'avions sense assumir garanties de connectivitat, enllaços de radi curts i utilitzant tan sol les trobades esporàdiques entre nodes per realitzar intercanvi de dades. Aquest enfocament oportunista ofereix una alternativa més barata que aquelles basades en enllaços de radi de llarg abast o en comunicacions via satèl·lit. Els fonaments d'aquesta proposta es basen a les xarxes oportunistes, i eventualment s'uneixen amb la tendència actual d'utilitzar enllaços via satèl·lit, per oferir una nova arquitectura de xarxa que redueix àmpliament els costos de comunicació i equipament. Les principals contribucions d'aquesta tesi són les següents. D'una banda, l'ús d'un model de mobilitat precís descrivint patrons aeronàutics basats en informació i horaris de vol reals. A més, aquest treball utilitza un model minuciós per descriure les capacitats de xarxa dels nodes incloent la representació completa de totes les capes de xarxa. Aquestes característiques realistes són molt importants per assegurar el correcte desplegament en xarxes reals. D'altra banda, aquesta tesi ofereix una sèrie de garanties en la qualitat de servei que són difícils d'obtenir en xarxes oportunistes. Fins a on sabem aquesta tesi representa el primer estudi detallat d'una xarxa aeronàutica a gran escala utilitzant comunicacions oportunistes.
En los últimos años, el campo de las comunicaciones aeronáuticas ha experimentado un incremento masivo de los intercambios de datos entre plataformas terrestres, aéreas y satelitales. Los métodos de comunicación aeronáuticos convencionales han demostrado no ser suficientes para manejar esta demanda creciente. Como resultado, los sistemas aeronáuticos han tendido hacia el uso de comunicaciones vía satélite, que aunque efectivas, suponen un reto económico tanto en su instalación como en su uso. En respuesta a este problema, el trabajo académico en esta área ha propuesto el uso de alternativas basadas en redes de comunicación en la forma de redes aeronáuticas ad-hoc. Estas redes usan alcances de comunicación inmensos y trabajan bajo la premisa de las Redes Ad-Hoc Móviles (MANETs) requiriendo la existencia de conectividad extremo a extremo para su correcto funcionamiento. Las redes aeronáuticas tienen una topología extremadamente variable juntamente con enlaces de comunicación poco fiables. Con estas propiedades en mente, creemos que asumir conectividad de red es una elección desafortunada. Por tanto, en esta tesis intentamos solucionar estos retos utilizando un enfoque diferente. Específicamente, intentaremos establecer una red de aviones sin asumir garantías de conectividad, enlaces de radio cortos y utilizando tan solo los encuentros esporádicos entre nodos para realizar intercambio de datos. Este enfoque oportunista ofrece una alternativa más barata que aquellas basadas en enlaces de radio de largo alcance o en comunicaciones vía satélite. Los fundamentos de esta propuesta se basan en las redes oportunistas, y eventualmente se unen con la tendencia actual de utilizar enlaces vía satélite, para ofrecer una nueva arquitectura de red que reduce ampliamente los costes de comunicación y equipamiento. Las principales contribuciones de esta tesis son las siguientes. Por un lado, el uso de un modelo de movilidad preciso describiendo patrones aeronáuticos basados en información y horarios de vuelo reales. Además, este trabajo utiliza un modelo minucioso para describir las capacidades de red de los nodos incluyendo la representación completa de todas las capas de red. Estas características realistas son muy importantes para asegurar el correcto despliegue en redes reales. Por otro lado, esta tesis ofrece una serie de garantías en la calidad de servicio que son difíciles de obtener en redes oportunistas. Hasta donde sabemos esta tesis representa el primer estudio detallado de una red aeronáutica a gran escala utilizando comunicaciones oportunistas.
In recent years, the aeronautical communications field has experienced increased demand for data exchanges between terrestrial, aerial and satellite platforms. Conventional aeronautical communications have proven to fall short on handling this growing demand. As a result, aeronautical systems have moved towards the use of satellite-based communications, and while effective, their deployment and later use poses an economical challenge. To deal with this problem, academic work on the topic has proposed the use of networking alternatives in the form of Aeronautical Ad-hoc Networks. These networks use large radio communication ranges and work on the premises of Mobile Ad-Hoc Networks (MANET), requiring end-to-end connectivity to function properly. Aeronautical networks have an extremely varying topology coupled with a frequently unreliable communication channel. With this in mind, we think that assuming full network connectivity is a problematic choice. Therefore, in this thesis we will approach those problems using a different method. Specifically, we will strive to establish a network of aircraft assuming no guarantees for connectivity, limited radio ranges, and relying solely on the sporadic encounters between nodes to perform data exchanges. This opportunistic approach offers a cheaper solution than those based on long-range radio links or satellite communications. The foundation of this proposal lies in opportunistic networks, and eventually merges with the current communication trend based on satellite links, to provide a new network infrastructure that greatly minimizes communication costs and equipment expenditure. The main contributions of this thesis are as follows. On one hand, the use of an accurate mobility model describing aeronautical patterns by considering on flight route and scheduling information of real flights. Additionally, this work provided accurate modeling of the network capabilities of each node including the complete representation of all layers of the network stack. These realistic features are of severe importance to ensure successful deployment in real networks. On the other hand, this thesis provides Quality of Service assurances that are hard to achieve in opportunistic networking. To the best of our knowledge, this thesis represents the first in-depth analysis of a realistic large-scale aeronautical opportunistic network.
40

Matsukevich, Dzmitry. "Quantum networking with atomic ensembles." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07072006-173336/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.)--Physics, Georgia Institute of Technology, 2007.
Kennedy, Brian, Committee Member ; Chapman, Michael, Committee Member ; Kuzmich, Alex, Committee Chair ; Raman, Chandra, Committee Member ; Voss, Paul, Committee Member.
41

Tembine, Hamidou. "Population games with networking applications." Phd thesis, Université d'Avignon, 2009. http://tel.archives-ouvertes.fr/tel-00451970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Ce manuscrit présente les fondements dynamiques des jeux de population avec un nombre variable de joueurs ainsi que leurs concepts de solutions et de stabilités. Nous introduisons d'abord les dynamiques de jeux avec retard et étudions leurs stabilités. Nous les appliquons aux réseaux filaires et aux réseaux sans fils. Ensuite nous nous intéressons aux aspects de mobilité et aux distributions spatiales des joueurs sur le réseau. Cela nous conduit à une nouvelle classe de dynamique de jeux à stratégies vectorielles avec des contraintes de migrations, appelée dynamique de jeux d'évolution avec migration. Nous dérivons de telles dynamiques pour les réseaux hybrides et appliquons aux problèmes de contrôle de puissance dans les réseaux hétérogènes, choix entre plusieurs technologies et migration entre plusieurs classes d'utilisateurs. Ensuite nous nous focalisons aux jeux stochastiques de population avec plusieurs classes de joueurs dans lesquels chaque joueur possède son propre état et fait face un vecteur qui évolue dans le temps. Des applications à la gestion d'énergie dans les réseaux sont présentées. Finalement, nous étudions une classe de jeux à champ moyen. Lorsque la taille de la population devient très grande, les asymptotiques du système conduisent à des dynamiques appelées dynamiques de jeux à champ moyen. Cette classe de dynamiques contient les dynamiques standard basées sur des révisions de stratégies. Nous utilisons ce modèle pour analyser les problèmes accès aléatoires à des ressources dans un environnement où les utilisateurs et les ressources sont spatialement distribuées. Nous établissons un lien entre les jeux à champ moyen et les jeux différentiels de population dans lesquels chaque joueur a son état individuel et optimise son paiement à long terme pendant son temps de séjour dans le système sous contraintes que le profil de population évolue selon une dynamique de jeux à champ moyen
42

Kim, Jonghoek. "Simultaneous cooperative exploration and networking." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis provides strategies for multiple vehicles to explore unknown environments in a cooperative and systematic manner. These strategies are called Simultaneous Cooperative Exploration and Networking (SCENT) strategies. As the basis for development of SCENT strategies, we first tackle the motion control and planning for one vehicle with range sensors. In particular, we develop the curve-tracking controllers for autonomous vehicles with rigidly mounted range sensors, and a provably complete exploration strategy is proposed so that one vehicle with range sensors builds a topological map of an environment. The SCENT algorithms introduced in this thesis extend the exploration strategy for one vehicle to multiple vehicles. The enabling idea of the SCENT algorithms is to construct a topological map of the environment, which is considered completely explored if the map corresponds to a complete Voronoi diagram of the environment. To achieve this, each vehicle explores its local area by incrementally expanding the already visited areas of the environment. At the same time, every vehicle deploys communication devices at selected locations and, as a result, a communication network is created concurrently with a topological map. This additional network allows the vehicles to share information in a distributed manner resulting in an efficient exploration of the workspace. The efficiency of the proposed SCENT algorithms is verified through theoretical investigations as well as experiments using mobile robots. Moreover, the resulting networks and the topological maps are used to solve coordinated multi-robot tasks, such as capturing intruders.
43

Marin, Nogueras Gerard. "Federation of Community Networking Testbeds." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sapountzis, Ioannis. "Traffic Monitoring for Green Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The notion of the networked society is more than ever true nowadays. The Internet has a big impact on our daily lives. Network operators provide the underlying infrastructure and continuously deploy services in order to meet customer demands. The amount of data transported through operator networks is also increasing with the introduction of new high band width services and over the network content. That being said, operators, most often deploy or operate networks to meet these demands without any regard to energy-efficiency. As the price of electricity continues to grow,  tends to become a problem with serious implications. To solve this problem a trend towards more energy efficient networks has emerged. In this thesis, we investigate a way to facilitate the introduction of new energy efficiency paradigms for fixed networks. Towards this end, we investigate the energy efficiency schemes proposed up to now and select one that we believe is more realistic to deploy. Furthermore, we specify the inputs required for the selected “green” routing approach. Moreover, we study existing and new protocols that can provide basic network monitoring functionality that enables the acquirement of these inputs. In the end, a Software Defined Networking (SDN) approach is proposed to facilitate the development of energy-efficient aware networks. The details of a basic SDN monitoring application are presented from an abstract architectural point of view and three designs stemming from this basic architecture are discussed. The three designs are namely All_Flow, First_Switch and Port_FlowRemoved. The first two were implemented as steps towards understanding the full capabilities of performing monitoring in SDN enabled networks and provided useful input towards realizing the third one as a proof of concept. Their usage and faults are discussed as they can provide useful insight for possible future implementations. The Port_FlowRemoved is the design and implementation that is suggested as providing the most fitting results for the monitoring purpose at hand. This purpose is to retrieve the identified inputs for the selected “green” networking approach. The differentiation factor among the three designs is how they collect the required inputs from the network. A fast-prototype is created as a proof of concept in order to validate the proposed architecture and thus empower the validity of the idea.
45

Berndtsson, Andreas. "VPN Mesh in Industrial Networking." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis report describes the process and present the results gained while evaluating available VPN mesh solutions and equipment for integration into Industrial systems. The task was divided into several sub steps; summarize the previous work done in the VPN mesh area, evaluate the available VPN mesh solutions, verify that the interesting equipment comply with the criteria set by ABB and lastly verify that the equipment can be integrated transparently into already running systems. The result shows that there is equipment that complies with the criteria, which can also be integrated transparently into running systems. The result also shows that IPSec should be used as the VPN protocol since IPSec can make use of the crypto hardware whereas TLS based VPNs currently cannot. Even though the implementation of secure gateways would provide authentication and authorization to the network, the cost of implementing these gateways would be great. The best solution would be to present the evaluated equipment as an optional feature instead of making it standard equipment in each system.
Denna examensarbetesrapport beskriver den process, samt presenterar de resultat som har insamlats, när tillgängliga VPN-mesh-lösningar- och utrustning har utvärderats för integrering i Industriella system. Uppgiften var uppdelad i ett flertal delmoment, varvid det första bestod i att summera tidigare utfört arbete inom VPN-mesh-området. De efterföljande delmomenten bestod i att utvärdera tillgängliga VPN-mesh-lösningar, verifiera att den utvärderade utrustningen uppfyller de krav som fastställts av ABB samt verifiera att utrustningen har stöd för transparent integrering i system under drift. Resultatet visar att det finns utrustning som uppfyller ABB’s krav, vilken även kan bli transparent integrerade i system under drift. Resultatet visar även att IPSec bör användas som VPN-protokoll eftersom IPSec kan nyttja krypto-hårdvara medan TLS-baserade VPN-lösningar för tillfället saknar denna funktionalitet. Implementeringen av säkra gateways medför autentisering och auktorisering till nätverket, dock är kostnaden att implementera dessa hög. Den bästa lösningen vore att erbjuda de utvärderade produkterna som möjliga tillägg, istället för att göra dem till standardutrustning vid köp av ett industriellt system.
46

McGibney, Grant. "Wireless networking with simple terminals." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq64897.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Bin. "Algorithm design in optical networking." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39329161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Xie, Linlin. "An Architecture for Networking Resilience." Thesis, Lancaster University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sturgeon, Thomas. "Exploratory learning for wireless networking." Thesis, University of St Andrews, 2010. http://hdl.handle.net/10023/1702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This dissertation highlights the importance of computer networking education and the challenges in engaging and educating students. An exploratory learning approach is discussed with reference to other learning models and taxonomies. It is felt that an exploratory learning approach to wireless networks improves student engagement and perceived educational value. In order to support exploratory learning and improve the effectiveness of computer networking education the WiFi Virtual Laboratory (WiFiVL) has been developed. This framework enables students to access a powerful network simulator without the barrier of learning a specialised systems programming language. The WiFiVL has been designed to provide “anytime anywhere” access to a self-paced or guided exploratory learning environment. The initial framework was designed to enable users to access a network simulator using an HTML form embedded in a web page. Users could construct a scenario wherein multiple wireless nodes were situated. Traffic links between the nodes were also specified using the form interface. The scenario is then translated into a portable format, a URL, and simulated using the WiFiVL framework detailed in this dissertation. The resulting simulation is played back to the user on a web page, via a Flash animation. This initial approach was extended to exploit the greater potential for interaction afforded by a Rich Internet Application (RIA), referred to as WiFiVL II. The dissertation also details the expansion of WiFiVL into the realm of 3-dimensional, immersive, virtual worlds. It is shown how these virtual worlds can be exploited to create an engaging and educational virtual laboratory for wireless networks. Throughout each development the supporting framework has been re-used and has proved capable of supporting multiple interfaces and views. Each of the implementations described in this dissertation has been evaluated with learners in undergraduate and postgraduate degrees at the University of St Andrews. The results validate the efficacy of a virtual laboratory approach for supporting exploratory learning for wireless networks.
50

Wu, Bin, and 吳斌. "Algorithm design in optical networking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39329161.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography