Rozprawy doktorskie na temat „Internet (computer network)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Internet (computer network)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Pełny tekst źródłaWells, Daniel David. "Network management for community networks". Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.
Pełny tekst źródłaPezaros, D. "Network traffic measurement for the next generation Internet". Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.
Pełny tekst źródłaYang, Yang. "Network congestion control". Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.
Pełny tekst źródłaRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator". Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Pełny tekst źródłaSpring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Pełny tekst źródłaZhang, Zaichen, i 張在琛. "Network-supported internet multicast congestion and error control". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.
Pełny tekst źródłaSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity". Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Pełny tekst źródłaXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET". Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.
Pełny tekst źródłaGummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Pełny tekst źródłaBenson, Karyn. "Leveraging Internet Background Radiation for Opportunistic Network Analysis". Thesis, University of California, San Diego, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10161733.
Pełny tekst źródłaIn this dissertation, we evaluate the potential of unsolicited Internet traffic, called Internet Background Radiation (IBR), to provide insights into address space usage and network conditions. IBR is primarily collected through darknets, which are blocks of IP addresses dedicated to collecting unsolicited traffic resulting from scans, backscatter, misconfigurations, and bugs. We expect these pervasively sourced components to yield visibility into networks that are hard to measure (e.g., hosts behind firewalls or not appearing in logs) with traditional active and passive techniques. Using the largest collections of IBR available to academic researchers, we test this hypothesis by: (1) identifying the phenomena that induce many hosts to send IBR, (2) characterizing the factors that influence our visibility, including aspects of the traffic itself and measurement infrastructure, and (3) extracting insights from 11 diverse case studies, after excluding obvious cases of sender inauthenticity.
Through IBR, we observe traffic from nearly every country, most ASes with routable prefixes, and millions of /24 blocks. Misconfigurations and bugs, often involving P2P networks, result in the widest coverage in terms of visible networks, though scanning traffic is applicable for in-depth and repeated analysis due to its large volume. We find, notwithstanding the extraordinary popularity of some IP addresses, similar observations using IBR collected in different darknets, and a predictable degradation using smaller darknets. Although the mix of IBR components evolves, our observations are consistent over time.
Our case studies highlight the versatility of IBR and help establish guidelines for when researchers should consider using unsolicited traffic for opportunistic network analysis. Based on our experience, IBR may assist in: corroborating inferences made through other datasets (e.g., DHCP lease durations) supplementing current state-of-the art techniques (e.g., IPv4 address space utilization), exposing weaknesses in other datasets (e.g., missing router interfaces), identifying abused resources (e.g., open resolvers), testing Internet tools by acting as a diverse traffic sample (e.g., uptime heuristics), and reducing the number of required active probes (e.g., path change inferences). In nearly every case study, IBR improves our analysis of an Internet-wide behavior. We expect future studies to reap similar benefits by including IBR.
Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.
Pełny tekst źródłaFelczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /". Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.
Pełny tekst źródłaSargent, Matthew. "On Understanding the Internet Via Edge Measurement". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1432290894.
Pełny tekst źródłaSavage, Stefan R. "Protocol design in an uncooperative Internet /". Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Pełny tekst źródłaSookavatana, Pipat Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Service Trading Marketplace Network (STAMP-Net): service discovery and composition for customizable adaptive network". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2003. http://handle.unsw.edu.au/1959.4/20439.
Pełny tekst źródłaTian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.
Pełny tekst źródłaGold, Richard. "An Indirection Architecture for the Internet". Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-6199.
Pełny tekst źródłaKay, James T. "Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FKay.pdf.
Pełny tekst źródłaThesis Advisor(s): Geoffrey Xie, John Gibson. "June 2006." Includes bibliographical references (p. 47-48). Also available in print.
Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /". Online version of thesis, 2010. http://hdl.handle.net/1850/12263.
Pełny tekst źródłaElysee, Pierre Arthur 1967. "Usage profiles : allocation of network capacity to Internet users". Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86607.
Pełny tekst źródłaDunmore, Martin. "QoS provisioning in the next generation Internet : the role of the network edge". Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11949/.
Pełny tekst źródłaCao, Zhiruo. "Network support for adaptive applications". Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/8146.
Pełny tekst źródłaAlim, M. Abdul. "On the interaction of internet routing protocols". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609846.
Pełny tekst źródłaRakotoarivelo, Thierry Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Distributed discovery and management of alternate internet paths with enhanced quality of service". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/27316.
Pełny tekst źródłaIrwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network". Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Pełny tekst źródłaLu, Zhenxin, i 蘆振鑫. "Location-aware routing with reduced location maintenance routing for Ad hoc networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29737308.
Pełny tekst źródłaShen, Wen-Chuan. "Implementing a global anti-dos service based on random overlay network". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0007880.
Pełny tekst źródłaGomes, Rafael Lopes 1987. "Uma arquitetura para negociação de redes virtualizadas na internet do futuro baseada em classes de QoS". [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275671.
Pełny tekst źródłaDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-21T07:23:57Z (GMT). No. of bitstreams: 1 Gomes_RafaelLopes_M.pdf: 1407268 bytes, checksum: c68d2355ef384cdcbcdb0658ddb32852 (MD5) Previous issue date: 2012
Resumo: Ao longo dos anos a Internet vem se tornando o principal meio de comunicação, onde muitas empresas e organizações a usam como base para os seus serviços, sendo que na maioria dos casos, estas empresas têm vários provedores de Internet (Modelo Multi- Provedor). Entretanto, a Internet atual não provê garantias de Qualidade de Serviço (Quality of Service - QoS). Para contornar esse problema, as empresas realizam um Acordo de Nível de Serviços (Service Level Agreement - SLA). Dentro desse contexto, esta dissertação de mestrado tem por objetivo desenvolver uma arquitetura para negociação de redes virtualizadas na Internet do Futuro utilizando técnicas de classificação de tráfegos para decidir, a partir dos dados coletados e das políticas de SLA, por qual ISP (Internet Service Provider) enviar os dados de acordo com a classe que os dados se enquadram. Espera-se assim atender aos requisitos de QoS de cada classe de tráfego, e diminuir os custos da empresa. Para realizar a validação da arquitetura proposta, foram efetuados experimentos baseados no protocolo OpenFlow e no emulador Mininet. Os resultados mostraram a eficiência do modelo desenvolvido, bem como a capacidade do mesmo de cumprir os objetivos definidos
Abstract: Over the years the Internet has become the primary means of communication, where many companies and organizations use it as basis for their services, and in most cases, these companies have multiple Internet service providers (Multi-Provider Model). However, the current Internet does not guarantee Quality of Service (QoS), to circumvent this problem; the companies apply a Service Level Agreements (SLA). Within this context, this dissertation aims to develop architecture for traffic engineering based on traffic classification to decide, from the data collected and SLA policies, for which ISPs to send the data, according to the data class. It is expected to ensure QoS requirements of each traffic class, and reduce the costs of the company. To validate the proposed framework, experiments based on the OpenFlow protocol and on the Mininet emulator were performed. The results showed the efficiency of the framework, as well as its capacity to fulfill the desired requirements
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Samiuddin, Asim. "IPAM : a web-based IP/DNS management system /". free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.
Pełny tekst źródłaMahajan, Ratul. "Practical and efficient internet routing with competing interests /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6960.
Pełny tekst źródłaBarwinski, Mark Andrei. "Taxonomy of spyware and empirical study of network drive-by-downloads". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBarwinski.pdf.
Pełny tekst źródłaThesis Advisor(s): Cynthia E. Irvine, Tim E. Levin. Includes bibliographical references (p. 115-120). Also available online.
Shuster, Marc S. (Mark Saul) 1975. "Diffusion of network innovation : implications for adoption of internet services". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46196.
Pełny tekst źródłaIncludes bibliographical references (p. 51-53).
by Mark S. Shuster.
B.S.
M.Eng.
Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks". Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.
Pełny tekst źródłaVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
Mahajan, Harshad S. "Filtering engine model for VIMNet". Toledo, Ohio : University of Toledo, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1271388865.
Pełny tekst źródłaTypescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Title from title page of PDF document. Bibliography: p. 77-78.
Lim, Jaeyong. "Fast and scalable Internet service scheme for static and dynamic web data contents". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000736.
Pełny tekst źródłaPhillips, Matthew D. W., i Trevor J. Baumgartner. "Implementation of a network address translation mechanism over IPv6". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.
Pełny tekst źródłaNetwork Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
Baumgartner, Trevor J. Phillips Matthew D. W. "Implementation of a Network Address Translation Mechanism Over IPv6 /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.
Pełny tekst źródłaThesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
Zhang, Junjie. "Effective and scalable botnet detection in network traffic". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.
Pełny tekst źródłaKaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications". PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.
Pełny tekst źródłaBanerjee, Anirban. "Measuring and modeling applications for content distribution in the Internet". Diss., [Riverside, Calif.] : University of California, Riverside, 2008. http://proquest.umi.com/pqdweb?index=0&did=1663077961&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1265225554&clientId=48051.
Pełny tekst źródłaIncludes abstract. Title from first page of PDF file (viewed February 3, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references. Also issued in print.
Bremner, Duncan James. "25 years of network access technologies : from voice to internet : the changing face of telecommunications". Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6670/.
Pełny tekst źródłaBui, Vinh Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "A framework for improving internet end-to-end performance and availability using multi-path overlay networks". Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/39735.
Pełny tekst źródłaKaynar, Kerem. "Developing A Zigbee Wireless Network And Controlling It Through The Internet". Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610583/index.pdf.
Pełny tekst źródłaStone, Zachary. "Face Identification in the Internet Era". Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10397.
Pełny tekst źródłaEngineering and Applied Sciences
Kwok, Ki-wa Joyce. "Hong Kong international telecommunications : strategic issues /". Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1883727X.
Pełny tekst źródłaAllen, Patricia Dougherty. "WebQuest investigation to acquire internet usage skills". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2077.
Pełny tekst źródłaZhuang, Shixin. "Stochastic modeling and performance analysis of differentiated service architecture in the Internet /". View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202002%20ZHUANG.
Pełny tekst źródłaIncludes bibliographical references (leaves 67-69). Also available in electronic version. Access restricted to campus users.
Munitzk, Michaela. "Facebook : A Comparative Study of its Usage on Smartphone vs. Computer". Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-5955.
Pełny tekst źródłaMaida, Elisabeth M. (Elisabeth Marigo). "The regulation of internet interconnection : assessing network market power". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79345.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 59-64).
Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, network neutrality, Internet peering, and last mile competition have generated much discussion about whether Internet interconnection regulation is warranted. In order to determine whether such regulation is necessary, policymakers need appropriate metrics to help gauge a network provider's market power. Since Internet interconnection agreements are typically not published publicly, policymakers must instead rely on proxy metrics and inferred interconnection relationships. Alessio D'Ignazio and Emanuele Giovannetti have attempted to address this challenge by proposing a standard set of metrics that are based on and assessed using network topology data. They suggest two metrics, referred to as customer cone and betweenness, as proxies for market size and market power. This thesis focuses on the efficacy of the proposed customer cone and betweenness metrics as proxies for network market size and market power.
by Elisabeth M. Maida.
S.M.
S.M.in Technology and Policy