Dissertations / Theses on the topic 'Networking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Networking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Scheyhing, Thorsten. "Networking eine Analyse von Networking-Verhalten ; Entwicklung eines Interviews zur Erfassung von Networking-Verhalten." Saarbrücken VDM Verlag Dr. Müller, 2008. http://d-nb.info/98839684X/04.
Full textWright, Chantal E. (Chantal Elise). "Information networking networking for distributed semicondutor techology development." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/40205.
Full textIncludes bibliographical references (p. 57-58).
by Chantal E. Wright.
M.Eng.
Bakina, Oleksandra. "Social networking." Thesis, Молодь у глобалізованому світі: академічні аспекти англомовних фахових досліджень (англ. мовою) / Укл., ред. А.І.Раду: збірник мат. конф. - Львів: ПП "Марусич", 2011. - 147 с, 2011. http://er.nau.edu.ua/handle/NAU/20769.
Full textVelayos, Muñoz Héctor Luis. "Autonomic wireless networking." Doctoral thesis, KTH, School of Electrical Engineering (EES), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254.
Full textLarge-scale deployment of IEEE 802.11 wireless LANs (WLANs) remains a significant challenge. Many access points (APs) must be deployed and interconnected without a-priori knowledge of the demand. We consider that the deployment should be iterative, as follows. At first, access points are deployed to achieve partial coverage. Then, usage statistics are collected while the network operates. Overloaded and under-utilized APs would be identified, giving the opportunity to relocate, add or remove APs. In this thesis, we propose extensions to the WLAN architecture that would make our vision of iterative deployment feasible.
One line of work focuses on self-configuration, which deals with building a WLAN from APs deployed without planning, and coping with mismatches between offered load and available capacity. Self-configuration is considered at three levels. At the network level, we propose a new distribution system that forms a WLAN from a set of APs connected to different IP networks and supports AP auto-configuration, link-layer mobility, and sharing infrastructure between operators. At the inter-cell level, we design a load-balancing scheme for overlapping APs that increases the network throughput and reduces the cell delay by evenly distributing the load. We also suggest how to reduce the handoff time by early detection and fast active scanning. At the intra-cell level, we present a distributed admission control that protects cells against congestion by blocking stations whose MAC service time would be above a set threshold.
Another line of work deals with self-deployment and investigates how the network can assist in improving its continuous deployment by identifying the reasons for low cell throughput. One reason may be poor radio conditions. A new performance figure, the Multi-Rate Performance Index, is introduced to measure the efficiency of radio channel usage. Our measurements show that it identifies cells affected by bad radio conditions. An additional reason may be limited performance of some AP models. We present a method to measure the upper bound of an AP’s throughput and its dependence on offered load and orientation. Another reason for low throughput may be excessive distance between users and APs. Accurate positioning of users in a WLAN would permit optimizing the location and number of APs. We analyze the limitations of the two most popular range estimation techniques when used in WLANs: received signal strength and time of arrival. We find that the latter could perform better but the technique is not feasible due to the low resolution of the frame timestamps in the WLAN cards.
The combination of self-configuration and self-deployment enables the autonomic operation of WLANs.
Paradis, Thomas. "Software-Defined Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143882.
Full textVelayos, Mu~noz Héctor Luis. "Autonomic wireless networking /." Stockholm : Laboratory for Communication Networks, Department of Signals, Sensors and Systems, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254.
Full textReiners, Felix. "Networking in Organisationen /." Mering, Schwab : Hampp, R, 2008. http://deposit.d-nb.de/cgi-bin/dokserv?id=3125253&prov=M&dok_var=1&dok_ext=htm.
Full textChang, Eugene King. "ECCM networking research." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/30805.
Full textNi, Song. "Intelligent wireless networking." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420233.
Full textCherriman, Peter John. "Mobile video networking." Thesis, University of Southampton, 1998. https://eprints.soton.ac.uk/251962/.
Full textYang, Teng. "Connected Car Networking." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1544728665967784.
Full textBelinová, Gabriela. "Networking neziskových organizací." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-200159.
Full textReiners, Felix. "Networking in Organisationen." München Mering Hampp, 2007. http://d-nb.info/989185532/04.
Full textGui, Bo. "Cooperative OFDM networking." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 156 p, 2009. http://proquest.umi.com/pqdweb?did=1654493791&sid=1&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textDisque, J. Graham. "Counselor Educator Networking." Digital Commons @ East Tennessee State University, 1997. https://dc.etsu.edu/etsu-works/2823.
Full textMoore, Mary. "Digital networking, using new communication technologies to facilitate networking among NGOs." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0005/MQ42085.pdf.
Full textMahmoud, Maha Ali. "Value at Networking Event : Developing the individual experience at networking event." Thesis, Mälardalens högskola, Innovation och produktrealisering, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-33543.
Full textZiani-Franclet, Zoé. "Networking behaviors under the microscope : examining networking actions from different perspectives." Thesis, Cergy-Pontoise, Ecole supérieure des sciences économiques et commerciales, 2020. http://www.theses.fr/2020ESEC0006.
Full textIn this dissertation, I examine between-people variations in their engagement in networking behaviors. In particular, I investigate the emotions, cognition, motivations and network properties associated with those networking behaviors. In chapter one, I examine whether people experience discomfort when networking, why they do so as well as the nature of this discomfort. Based on the literature on moral emotions, I argue and show that people experience guilt when networking partly because they construe networking as the objectification of others. I also investigate prosocial motives as a potential moderator of the effect, but do not find supporting evidence for this effect. In chapter two, I examine why women seem to benefit less than men from their networking activities. Based on the literature on gender stereotypes, I argue that certain networking strategies carry a risk to women’s image, because of a stereotype painting them as able and willing to use their power of attraction to manipulate men. As such, women could be less likely to engage in actions aimed at deepening and strengthening relationships with their male supervisors for fear that it will reflect negatively on their image. I find that while women do associate more image risk with network-deepening actions when the target is a supervisor of the opposite (rather than same) gender, they are not less likely than men to engage in those actions. I also find that men are less likely than women to engage in network-deepening actions with a colleague of the opposite (rather than same) gender because of the image risk they associate with those actions. Finally, I find women’s concerns for their image to be unwarranted: Third parties do not judge women more harshly than men when engaged in networking-deepening actions with supervisors of the opposite gender. In chapter three, I propose that different motivations (i.e., for power, affiliation, and achievement) could be associated with different networking behaviors (i.e., search, maintenance, and leverage). In turn, I explore how each of those networking behaviors relate to different network properties (i.e., size, diversity, and density). Using data collected from a cohort of EMBA students, I show that motivation for power is positively related to search, and motivation for affiliation is positively related to both search and maintenance, but do not find significant association between motivation for achievement and networking behaviors. In turn, I find that greater engagement in both search and maintenance is associated with larger networks, and greater engagement in maintenance is associated with sparser networks, but do not find significant associations between any type of networking behaviors and network diversity
Pitzus, Antonio. "SDN : Software Defined Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14006/.
Full textLönn, Johan, and Jonas Olsson. "ZigBee for wireless networking." Thesis, Linköping University, Department of Science and Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2885.
Full textThe past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. However, there are many wireless monitoring and control applications for industrial and home environments which require longer battery life, lower data rates and less complexity than those from existing standards. What the market need is a globally defined standard that meets the requirement for reliability, security, low power and low cost. For such wireless applications a new standard called ZigBee has been developed by the ZigBee Alliance based upon the IEEE 802.15.4 standard.
The aim of this diploma work is to design fully functional ZigBee and IEEE 802.15.4 modules, and to evaluate an application in a sensor network.
This diploma work has resulted in two fully functional ZigBee and IEEE 802.15.4 modules, respectively. It is also shown that ZigBee sensors can be networked wirelessly. Eventually it is the authors hope that the modules will be used within ITN, and also be developed further for new applications.
Haga, Trond. "Orchestration of networking processes." Doctoral thesis, Norwegian University of Science and Technology, Department of Industrial Economics and Technology Management, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-2095.
Full textNetwork collaboration between industrial enterprises is the main topic in this dissertation. My aim has been to explore if it is possible to construct a network between industrial enterprises, which for the participating enterprises represents a valuable asset in order to become more innovative, increasing their competitive power. The dissertation contains an overarching umbrella paper and six ordinary papers.
The construction of a network consisting of a set of enterprises, calls for contributions in the field from outsiders, such as researchers. Thus, in my study I have used an action research approach, interpreted as the researcher operating as a ‘friendly outsider’ in the network. To be able to enter into problem solving together with local practitioners calls for a longitudinal approach, meaning that the researcher collaborates closely with the network and the enterprises for a long period of time.
The research process that I have made use of in my study is divided into two closely linked parts. Firstly, I have been part of a network construction and maintenance process for more than four years, establishing sustainable networking processes. The experiences coming from these processes represent my empirical data. Secondly, I have reflected individually, and participated in joint reflection with actors in the research field over experiences and the results of the actions taken in the network. These reflections have resulted in the writing of six papers that are part of this dissertation. In these papers, I have discussed what I regard as the most important elements to arrange for network collaboration and networking processes.
My ambition with the umbrella paper is to pull the different elements discussed in the different papers together in order to present a dynamic networking model. Thus, the model developed is a result of my research on several networks of industrial enterprises. However, the model is not meant to be a definite recipe for constructing additional networks. I regard networks as socially constructed, and as such, they are the result of processes that involve human participation. The personnel involved have their own mental models that will heavily influence the construction and operation of a network. Thus, the model can be used to merely interpret the importance of the existence of a set of enablers while constructing or operating network processes.
The model consists of a set of enablers identified through the research process in this study, and they are thoroughly discussed in the different papers as well as in the umbrella. These enablers are:
• Training. This is an important enabler that may increase knowledge about development work and processes, and the diffusion of such knowledge.
• Network management. Taking care of the daily operation, and closely linked to the enterprises, network management is important in initiating and supporting networking processes.
• Processing roles. Personnel able to hold such roles are important for initiating and accomplishing networking processes, as well as for the supply of external knowledge, funding, and general support.Introducing this as an enabler implies, most likely, making it easier for external resources to assist in operating the networking processes.
• Network infrastructure. The existence of a network structure that makes it possible for the enterprises to discuss experiences and ideas and to develop knowledge is vital. In Paper V, which is a comparison of networks in Sweden and Norway, the management of the network has been analysed and the most striking discovery is the solid structures that are constructed.
• Leadership. The management and unions in the participating enterprises need to take leadership to allow for networking processes to occur. The role of unions in legitimating wide employee involvement seems to be especially important.
As I have indicated, the above enablers or instruments, acting differently, are needed to construct sustainable networking processes. Such processes may bring about important innovations or developments for individuals or groups of enterprises, as shown in several of my papers. Individually, the instruments may be good and important, but they may become even better when combined with other instruments. My study indicates that the support given to network processes by combining instruments may increase what the individual instrument can offer. Thus, orchestration of instruments appears as an important and valuable coordination of contributions given to such processes. Thus, I have revealed that the presence of a number of enablers is necessary to establish sustainable networking processes, but these enablers are not sufficient to get these processes going. As I have shown, orchestration is also needed to initiate and continue such processes, and it calls for action researchers who possess skills and knowledge that enable them to serve as orchestrators.
Dandugula, Chaitanya. "Networking for Smart Meters." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98210.
Full text"Smart grid" avser i allmänhet en klass av teknik föra system elleverans till 21: a århundradet, med hjälp av datorbaserade fjärrkontroll och automation. Med den ökande efterfrågan på energi, är effektiv användning av de tillgängliga energiresurser blir alltmer en viktig fråga över hela världen. Smart grid är ett steg i den riktningen. Forskning i Europeiska unionen och USA för närvarande pågår för att modernisera befintliga och åldrande transmissionsnätet och effektivisera användningen av el. En typisk elnätet består av två större enheter - de allmännyttiga företaget och \distribution control system"(DCS). El genereras vid verktyget företaget och DCS ansvarar för distributionen av el till enskilda hem / konsumenter. En smart meter (SM) är en elektronisk apparat som mäter elförbrukning på konsumentens lokaler och ger ökad information till elbolaget. \Data concentration unit"(DCU) är en enhet fungerar som ett kommunikationsnav insamling och kodning av data från flera smarta mätare i ett område och vidarebefordra data till elbolaget. Syftet med detta projekt är att utforma ett nätverk för att säkra kommunikationen mellan SM och DCU i ett smart mätning nätverksmiljö. Mätaren uppgifter som lämnas från SM till DCU är mycket känslig och i händerna på en angripare, kan avslöja viktig personlig information om en individ. Följaktligen är det av som mest betydelse för att skydda de mätdata som sänds från SM: en. å andra sidan styrsignaler överförs från DCU till SM och behöver skydd för att hindra av obehöriga signaler (dvs en inkräktare kan personifiera DC och skicka ut styrsignaler till SM). Därför SM och DCU ska bestyrkas av varandra och godkänts och data och / eller styrsignaler utväxlas mellan dem ska vara krypterad.
Leask, David Matthew. "Low power radio networking." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621892.
Full textO'Hara, Patricia A. "Local area networking handbook." Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/37530.
Full textThis thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. A method for conducting a LAN requirements assessment is discussed, followed by a strategy for selecting a local area network.
Chen, Xin. "Energy efficient wired networking." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/7966.
Full textKalanithi, Jeevan James. "Connectibles : tangible social networking." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41739.
Full textIncludes bibliographical references (p. 127-132).
This thesis presents "Connectibles," an instantiation of a tangible social network, a new type of social network application rooted in physical objects and real world social behavior. This research is inspired by social signaling and object theory, which together suggest that gifts act as physical symbols and constructors of social relationships. The Connectibles system leverages these gift-giving practices, presenting users with customizable gift objects ("connectibles") that they exchange with one another. These objects form always-on communication channels between givers and receivers. As a user collects more and more of these objects, she begins to acquire a dynamic, physical representation of and interface to her social network. The community of users' interactions implicitly represent the structure of the social network; these data can be accessed with a GUI application, allowing users to explore and interact with their social network. The overarching goal is to examine how a set of devices might naturally and harmoniously interface the physical, virtual and social worlds.
by Jeevan James Kalanithi.
S.M.
Liang, Philip Angus. "Social networking in vehicles." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/36151.
Full textIncludes bibliographical references (leaves 62-64).
In-vehicle, location-aware, socially aware telematic systems, known as Flossers, stand to revolutionize vehicles, and how their drivers interact with their physical and social worlds. With Flossers, users can broadcast and share information, communicate with one another, and experience a more information-rich environment. Instead of seeing only a physical reality, a user will see a context-enriched reality, with "tags" provided by their social network, and presented to them by the Flosser. The Flosser turns a moving vehicle into a social networking hub, linking social information with the user's vehicle, allowing the user to learn more about their surroundings from social fabric inputs. It will also allow the user to ascertain the location and contactability of other members of their social network.
by Philip Angus Liang.
S.M.
Holman, Jason (Jason William) 1974. "Optical networking equipment manufacturing." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/44603.
Full textIncludes bibliographical references (leaf 70).
Celestica, a global contract manufacturer specializing in printed circuit board assembly and computer assembly, has recently begun manufacturing equipment for the optical networking equipment (ONE) industry. The expansion to include ONE manufacturing requires the development of new skills in handling optical fiber and components, a new supply chain strategy, and a new approach to manufacturing systems control. Celestica is developing a set of standards for ONE manufacturing that will support the rapid development of the new skills required for this industry. This work outlines the standards and explores the specific issues related to manufacturing with optical fiber, including the mechanical reliability and optical performance of various types of optical fibers. An overview of the telecommunications industry is provided, including an analysis of its supply chain structure. Observations are made on trends in the industry and the ways that these trends have affected Celestica in the past, and could impact Celestica in the future. Finally, Celestica's current approach to manufacturing systems control is evaluated, and suggestions are made for improving systems control and project management when manufacturing for such a rapidly evolving industry.
by Jason Holman.
S.M.
M.B.A.
Cardinal, Robert. "TELEMETRY ENTERPRISE SWITCHED NETWORKING." International Foundation for Telemetering, 1994. http://hdl.handle.net/10150/608568.
Full textThe success of the client/server paradigm for modern networked telemetry systems continues to stress the LAN that carries data generated from the acquisition front ends to the display workstations and the file servers on the LAN. As the number of LAN-attached devices such as Loral's System 500 Model 550 (Loral 550) telemetry front end, workstations, and file servers grows beyond two, the Ethernet LAN collision rates increase and the throughput slows down. At what point the network performance declines is a function of the specific application bandwidth demands required. This paper describes a new method for boosting LAN performance by providing Ethernet switching and protocol filtering. The performance of the LAN is critical to the performance of the complete telemetry enterprise architecture.
Lichtner, Ondrej. "Networking Subsystem Configuration Interface." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235421.
Full textRaghavan, Barath. "Toward cheat-proof networking." Diss., [La Jolla] : University of California, San Diego, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p3359355.
Full textTitle from first page of PDF file (viewed July 14, 2009). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 113-124).
Tate, William R. "Full-duplex underwater networking." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FTate.pdf.
Full textKhan, Muhammad Hassan Raza. "Securing Information Centric Networking." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3424568.
Full textMuñoz, Soto Jonathan Mauricio. "Km-scale Industrial Networking." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS252.
Full textThe Internet of Things (IoT) aims to provide connectivity to millions of devices used in our day-to-day life. For the vast majority of applications, wired connections are unpractical and too expensive, therefore wireless connections is the only feasible way to provide connectivity to the devices. One of many wireless solutions is the standard IEEE802.15.4, specially designed for low power mesh networks. This standard is widely used for Smart Building, Home Automation and Industrial Applications.A subsequent amendment, the IEEE802.15.4g, defines 3 PHYs (FSK, OFDM and O-QPSK). This targets Smart Utility Networks(SUN) applications, i.e., Smart Metering, while providing extended coverage. In this thesis, we analyse the use of this standard outside the SUN environment and onto Industrial Networking applications.First, we conduct a series of experiments using IEEE802.15.4g compliant devices in order to measure the range coverage on radio links in real use case outdoor scenarios. Results show that highly reliable communications with data rates up to 800 kbps (with OFDM) can be achieved in urban environments at 540 m between nodes, and the longest useful radio link is obtained at 779 m (FSK). Sencond, regarding the robustness and high data rate of OFDM, we compare the performance of the IEEE802.15.4 with the IEEE802.15.4g OFDM in Smart Building scenarios. From experiments, we determine that IEEE802.15.4g OFDM outperforms IEEE802.15.4 and should be considered as a solution for further deployments in combination with a TSCH MAC approach. Finally, we introduce the concept of Network Agility: nodes that can dynamically change their PHY according to their needs and circumstances
Nguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Full textThe current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
Baumann, Lea [Verfasser], and Sonja [Akademischer Betreuer] Utz. "Professional online networking : investigating the technological and the human side of networking with professional social networking sites / Lea Baumann ; Betreuer: Sonja Utz." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2021. http://d-nb.info/1234059258/34.
Full textBroad, Roy M. "Networking performance : a study of the benefits of business networking in the West Midlands." Thesis, University of Wolverhampton, 2012. http://hdl.handle.net/2436/297584.
Full textKhan, Rafiullah. "Energy-aware home area networking." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/285658.
Full textMartínez-Vidal, Rubén. "Architectures for aeronautical opportunistic networking." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/319697.
Full textEn los últimos años, el campo de las comunicaciones aeronáuticas ha experimentado un incremento masivo de los intercambios de datos entre plataformas terrestres, aéreas y satelitales. Los métodos de comunicación aeronáuticos convencionales han demostrado no ser suficientes para manejar esta demanda creciente. Como resultado, los sistemas aeronáuticos han tendido hacia el uso de comunicaciones vía satélite, que aunque efectivas, suponen un reto económico tanto en su instalación como en su uso. En respuesta a este problema, el trabajo académico en esta área ha propuesto el uso de alternativas basadas en redes de comunicación en la forma de redes aeronáuticas ad-hoc. Estas redes usan alcances de comunicación inmensos y trabajan bajo la premisa de las Redes Ad-Hoc Móviles (MANETs) requiriendo la existencia de conectividad extremo a extremo para su correcto funcionamiento. Las redes aeronáuticas tienen una topología extremadamente variable juntamente con enlaces de comunicación poco fiables. Con estas propiedades en mente, creemos que asumir conectividad de red es una elección desafortunada. Por tanto, en esta tesis intentamos solucionar estos retos utilizando un enfoque diferente. Específicamente, intentaremos establecer una red de aviones sin asumir garantías de conectividad, enlaces de radio cortos y utilizando tan solo los encuentros esporádicos entre nodos para realizar intercambio de datos. Este enfoque oportunista ofrece una alternativa más barata que aquellas basadas en enlaces de radio de largo alcance o en comunicaciones vía satélite. Los fundamentos de esta propuesta se basan en las redes oportunistas, y eventualmente se unen con la tendencia actual de utilizar enlaces vía satélite, para ofrecer una nueva arquitectura de red que reduce ampliamente los costes de comunicación y equipamiento. Las principales contribuciones de esta tesis son las siguientes. Por un lado, el uso de un modelo de movilidad preciso describiendo patrones aeronáuticos basados en información y horarios de vuelo reales. Además, este trabajo utiliza un modelo minucioso para describir las capacidades de red de los nodos incluyendo la representación completa de todas las capas de red. Estas características realistas son muy importantes para asegurar el correcto despliegue en redes reales. Por otro lado, esta tesis ofrece una serie de garantías en la calidad de servicio que son difíciles de obtener en redes oportunistas. Hasta donde sabemos esta tesis representa el primer estudio detallado de una red aeronáutica a gran escala utilizando comunicaciones oportunistas.
In recent years, the aeronautical communications field has experienced increased demand for data exchanges between terrestrial, aerial and satellite platforms. Conventional aeronautical communications have proven to fall short on handling this growing demand. As a result, aeronautical systems have moved towards the use of satellite-based communications, and while effective, their deployment and later use poses an economical challenge. To deal with this problem, academic work on the topic has proposed the use of networking alternatives in the form of Aeronautical Ad-hoc Networks. These networks use large radio communication ranges and work on the premises of Mobile Ad-Hoc Networks (MANET), requiring end-to-end connectivity to function properly. Aeronautical networks have an extremely varying topology coupled with a frequently unreliable communication channel. With this in mind, we think that assuming full network connectivity is a problematic choice. Therefore, in this thesis we will approach those problems using a different method. Specifically, we will strive to establish a network of aircraft assuming no guarantees for connectivity, limited radio ranges, and relying solely on the sporadic encounters between nodes to perform data exchanges. This opportunistic approach offers a cheaper solution than those based on long-range radio links or satellite communications. The foundation of this proposal lies in opportunistic networks, and eventually merges with the current communication trend based on satellite links, to provide a new network infrastructure that greatly minimizes communication costs and equipment expenditure. The main contributions of this thesis are as follows. On one hand, the use of an accurate mobility model describing aeronautical patterns by considering on flight route and scheduling information of real flights. Additionally, this work provided accurate modeling of the network capabilities of each node including the complete representation of all layers of the network stack. These realistic features are of severe importance to ensure successful deployment in real networks. On the other hand, this thesis provides Quality of Service assurances that are hard to achieve in opportunistic networking. To the best of our knowledge, this thesis represents the first in-depth analysis of a realistic large-scale aeronautical opportunistic network.
Matsukevich, Dzmitry. "Quantum networking with atomic ensembles." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07072006-173336/.
Full textKennedy, Brian, Committee Member ; Chapman, Michael, Committee Member ; Kuzmich, Alex, Committee Chair ; Raman, Chandra, Committee Member ; Voss, Paul, Committee Member.
Tembine, Hamidou. "Population games with networking applications." Phd thesis, Université d'Avignon, 2009. http://tel.archives-ouvertes.fr/tel-00451970.
Full textKim, Jonghoek. "Simultaneous cooperative exploration and networking." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39536.
Full textMarin, Nogueras Gerard. "Federation of Community Networking Testbeds." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177198.
Full textSapountzis, Ioannis. "Traffic Monitoring for Green Networking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147981.
Full textBerndtsson, Andreas. "VPN Mesh in Industrial Networking." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18160.
Full textDenna examensarbetesrapport beskriver den process, samt presenterar de resultat som har insamlats, när tillgängliga VPN-mesh-lösningar- och utrustning har utvärderats för integrering i Industriella system. Uppgiften var uppdelad i ett flertal delmoment, varvid det första bestod i att summera tidigare utfört arbete inom VPN-mesh-området. De efterföljande delmomenten bestod i att utvärdera tillgängliga VPN-mesh-lösningar, verifiera att den utvärderade utrustningen uppfyller de krav som fastställts av ABB samt verifiera att utrustningen har stöd för transparent integrering i system under drift. Resultatet visar att det finns utrustning som uppfyller ABB’s krav, vilken även kan bli transparent integrerade i system under drift. Resultatet visar även att IPSec bör användas som VPN-protokoll eftersom IPSec kan nyttja krypto-hårdvara medan TLS-baserade VPN-lösningar för tillfället saknar denna funktionalitet. Implementeringen av säkra gateways medför autentisering och auktorisering till nätverket, dock är kostnaden att implementera dessa hög. Den bästa lösningen vore att erbjuda de utvärderade produkterna som möjliga tillägg, istället för att göra dem till standardutrustning vid köp av ett industriellt system.
McGibney, Grant. "Wireless networking with simple terminals." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq64897.pdf.
Full textWu, Bin. "Algorithm design in optical networking." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39329161.
Full textXie, Linlin. "An Architecture for Networking Resilience." Thesis, Lancaster University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504209.
Full textSturgeon, Thomas. "Exploratory learning for wireless networking." Thesis, University of St Andrews, 2010. http://hdl.handle.net/10023/1702.
Full textWu, Bin, and 吳斌. "Algorithm design in optical networking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39329161.
Full text