Tesi sul tema "Internet (computer network)"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Internet (computer network)".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Testo completoWells, Daniel David. "Network management for community networks". Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.
Testo completoPezaros, D. "Network traffic measurement for the next generation Internet". Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.
Testo completoYang, Yang. "Network congestion control". Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.
Testo completoRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator". Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Testo completoSpring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Testo completoZhang, Zaichen, e 張在琛. "Network-supported internet multicast congestion and error control". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.
Testo completoSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity". Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Testo completoXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET". Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.
Testo completoGummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Testo completoBenson, Karyn. "Leveraging Internet Background Radiation for Opportunistic Network Analysis". Thesis, University of California, San Diego, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10161733.
Testo completoIn this dissertation, we evaluate the potential of unsolicited Internet traffic, called Internet Background Radiation (IBR), to provide insights into address space usage and network conditions. IBR is primarily collected through darknets, which are blocks of IP addresses dedicated to collecting unsolicited traffic resulting from scans, backscatter, misconfigurations, and bugs. We expect these pervasively sourced components to yield visibility into networks that are hard to measure (e.g., hosts behind firewalls or not appearing in logs) with traditional active and passive techniques. Using the largest collections of IBR available to academic researchers, we test this hypothesis by: (1) identifying the phenomena that induce many hosts to send IBR, (2) characterizing the factors that influence our visibility, including aspects of the traffic itself and measurement infrastructure, and (3) extracting insights from 11 diverse case studies, after excluding obvious cases of sender inauthenticity.
Through IBR, we observe traffic from nearly every country, most ASes with routable prefixes, and millions of /24 blocks. Misconfigurations and bugs, often involving P2P networks, result in the widest coverage in terms of visible networks, though scanning traffic is applicable for in-depth and repeated analysis due to its large volume. We find, notwithstanding the extraordinary popularity of some IP addresses, similar observations using IBR collected in different darknets, and a predictable degradation using smaller darknets. Although the mix of IBR components evolves, our observations are consistent over time.
Our case studies highlight the versatility of IBR and help establish guidelines for when researchers should consider using unsolicited traffic for opportunistic network analysis. Based on our experience, IBR may assist in: corroborating inferences made through other datasets (e.g., DHCP lease durations) supplementing current state-of-the art techniques (e.g., IPv4 address space utilization), exposing weaknesses in other datasets (e.g., missing router interfaces), identifying abused resources (e.g., open resolvers), testing Internet tools by acting as a diverse traffic sample (e.g., uptime heuristics), and reducing the number of required active probes (e.g., path change inferences). In nearly every case study, IBR improves our analysis of an Internet-wide behavior. We expect future studies to reap similar benefits by including IBR.
Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.
Testo completoFelczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /". Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.
Testo completoSargent, Matthew. "On Understanding the Internet Via Edge Measurement". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1432290894.
Testo completoSavage, Stefan R. "Protocol design in an uncooperative Internet /". Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Testo completoSookavatana, Pipat Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Service Trading Marketplace Network (STAMP-Net): service discovery and composition for customizable adaptive network". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2003. http://handle.unsw.edu.au/1959.4/20439.
Testo completoTian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.
Testo completoGold, Richard. "An Indirection Architecture for the Internet". Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-6199.
Testo completoKay, James T. "Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FKay.pdf.
Testo completoThesis Advisor(s): Geoffrey Xie, John Gibson. "June 2006." Includes bibliographical references (p. 47-48). Also available in print.
Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /". Online version of thesis, 2010. http://hdl.handle.net/1850/12263.
Testo completoElysee, Pierre Arthur 1967. "Usage profiles : allocation of network capacity to Internet users". Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86607.
Testo completoDunmore, Martin. "QoS provisioning in the next generation Internet : the role of the network edge". Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11949/.
Testo completoCao, Zhiruo. "Network support for adaptive applications". Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/8146.
Testo completoAlim, M. Abdul. "On the interaction of internet routing protocols". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609846.
Testo completoRakotoarivelo, Thierry Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Distributed discovery and management of alternate internet paths with enhanced quality of service". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/27316.
Testo completoIrwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network". Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Testo completoLu, Zhenxin, e 蘆振鑫. "Location-aware routing with reduced location maintenance routing for Ad hoc networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29737308.
Testo completoShen, Wen-Chuan. "Implementing a global anti-dos service based on random overlay network". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0007880.
Testo completoGomes, Rafael Lopes 1987. "Uma arquitetura para negociação de redes virtualizadas na internet do futuro baseada em classes de QoS". [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275671.
Testo completoDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-21T07:23:57Z (GMT). No. of bitstreams: 1 Gomes_RafaelLopes_M.pdf: 1407268 bytes, checksum: c68d2355ef384cdcbcdb0658ddb32852 (MD5) Previous issue date: 2012
Resumo: Ao longo dos anos a Internet vem se tornando o principal meio de comunicação, onde muitas empresas e organizações a usam como base para os seus serviços, sendo que na maioria dos casos, estas empresas têm vários provedores de Internet (Modelo Multi- Provedor). Entretanto, a Internet atual não provê garantias de Qualidade de Serviço (Quality of Service - QoS). Para contornar esse problema, as empresas realizam um Acordo de Nível de Serviços (Service Level Agreement - SLA). Dentro desse contexto, esta dissertação de mestrado tem por objetivo desenvolver uma arquitetura para negociação de redes virtualizadas na Internet do Futuro utilizando técnicas de classificação de tráfegos para decidir, a partir dos dados coletados e das políticas de SLA, por qual ISP (Internet Service Provider) enviar os dados de acordo com a classe que os dados se enquadram. Espera-se assim atender aos requisitos de QoS de cada classe de tráfego, e diminuir os custos da empresa. Para realizar a validação da arquitetura proposta, foram efetuados experimentos baseados no protocolo OpenFlow e no emulador Mininet. Os resultados mostraram a eficiência do modelo desenvolvido, bem como a capacidade do mesmo de cumprir os objetivos definidos
Abstract: Over the years the Internet has become the primary means of communication, where many companies and organizations use it as basis for their services, and in most cases, these companies have multiple Internet service providers (Multi-Provider Model). However, the current Internet does not guarantee Quality of Service (QoS), to circumvent this problem; the companies apply a Service Level Agreements (SLA). Within this context, this dissertation aims to develop architecture for traffic engineering based on traffic classification to decide, from the data collected and SLA policies, for which ISPs to send the data, according to the data class. It is expected to ensure QoS requirements of each traffic class, and reduce the costs of the company. To validate the proposed framework, experiments based on the OpenFlow protocol and on the Mininet emulator were performed. The results showed the efficiency of the framework, as well as its capacity to fulfill the desired requirements
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Samiuddin, Asim. "IPAM : a web-based IP/DNS management system /". free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.
Testo completoMahajan, Ratul. "Practical and efficient internet routing with competing interests /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6960.
Testo completoBarwinski, Mark Andrei. "Taxonomy of spyware and empirical study of network drive-by-downloads". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBarwinski.pdf.
Testo completoThesis Advisor(s): Cynthia E. Irvine, Tim E. Levin. Includes bibliographical references (p. 115-120). Also available online.
Shuster, Marc S. (Mark Saul) 1975. "Diffusion of network innovation : implications for adoption of internet services". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46196.
Testo completoIncludes bibliographical references (p. 51-53).
by Mark S. Shuster.
B.S.
M.Eng.
Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks". Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.
Testo completoVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
Mahajan, Harshad S. "Filtering engine model for VIMNet". Toledo, Ohio : University of Toledo, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1271388865.
Testo completoTypescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Title from title page of PDF document. Bibliography: p. 77-78.
Lim, Jaeyong. "Fast and scalable Internet service scheme for static and dynamic web data contents". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000736.
Testo completoPhillips, Matthew D. W., e Trevor J. Baumgartner. "Implementation of a network address translation mechanism over IPv6". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.
Testo completoNetwork Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
Baumgartner, Trevor J. Phillips Matthew D. W. "Implementation of a Network Address Translation Mechanism Over IPv6 /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.
Testo completoThesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
Zhang, Junjie. "Effective and scalable botnet detection in network traffic". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.
Testo completoKaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications". PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.
Testo completoBanerjee, Anirban. "Measuring and modeling applications for content distribution in the Internet". Diss., [Riverside, Calif.] : University of California, Riverside, 2008. http://proquest.umi.com/pqdweb?index=0&did=1663077961&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1265225554&clientId=48051.
Testo completoIncludes abstract. Title from first page of PDF file (viewed February 3, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references. Also issued in print.
Bremner, Duncan James. "25 years of network access technologies : from voice to internet : the changing face of telecommunications". Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6670/.
Testo completoBui, Vinh Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "A framework for improving internet end-to-end performance and availability using multi-path overlay networks". Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/39735.
Testo completoKaynar, Kerem. "Developing A Zigbee Wireless Network And Controlling It Through The Internet". Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610583/index.pdf.
Testo completoStone, Zachary. "Face Identification in the Internet Era". Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10397.
Testo completoEngineering and Applied Sciences
Kwok, Ki-wa Joyce. "Hong Kong international telecommunications : strategic issues /". Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1883727X.
Testo completoAllen, Patricia Dougherty. "WebQuest investigation to acquire internet usage skills". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2077.
Testo completoZhuang, Shixin. "Stochastic modeling and performance analysis of differentiated service architecture in the Internet /". View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202002%20ZHUANG.
Testo completoIncludes bibliographical references (leaves 67-69). Also available in electronic version. Access restricted to campus users.
Munitzk, Michaela. "Facebook : A Comparative Study of its Usage on Smartphone vs. Computer". Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-5955.
Testo completoMaida, Elisabeth M. (Elisabeth Marigo). "The regulation of internet interconnection : assessing network market power". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79345.
Testo completoCataloged from PDF version of thesis.
Includes bibliographical references (p. 59-64).
Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, network neutrality, Internet peering, and last mile competition have generated much discussion about whether Internet interconnection regulation is warranted. In order to determine whether such regulation is necessary, policymakers need appropriate metrics to help gauge a network provider's market power. Since Internet interconnection agreements are typically not published publicly, policymakers must instead rely on proxy metrics and inferred interconnection relationships. Alessio D'Ignazio and Emanuele Giovannetti have attempted to address this challenge by proposing a standard set of metrics that are based on and assessed using network topology data. They suggest two metrics, referred to as customer cone and betweenness, as proxies for market size and market power. This thesis focuses on the efficacy of the proposed customer cone and betweenness metrics as proxies for network market size and market power.
by Elisabeth M. Maida.
S.M.
S.M.in Technology and Policy