Rozprawy doktorskie na temat „Internet (computer network)”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Internet (computer network).

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Internet (computer network)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wells, Daniel David. "Network management for community networks". Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Pełny tekst źródła
Streszczenie:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access Point (CAP) is located at each site within the community network. This provides the hosts and servers at that site with access to services on the community network and the Internet, it is the site's router. The CAP provides a web based interface (CAPgui) which allows configuration of the device and viewing of simple monitoring statistics. The Access Concentrator (AC) is the default router for the CAPs and the gateway to the Internet. It provides authenticated and encrypted communication between the network sites. The AC performs several monitoring functions, both for the individual sites and for the upstream Internet connection. The AC provides a means for centrally managing and effectively allocating Internet bandwidth by using the web based interface (ACgui). Bandwidth use can be allocated per user, per host and per site. The system is maintainable, extendable and customisable for different network architectures. The system was deployed successfully to two community networks. The Centre of Excellence (CoE) testbed network is a peri-urban network deployment whereas the Siyakhula Living Lab (SLL) network is a rural deployment. The results gathered conclude that the project was successful as the deployed system is more robust and more manageable than the previous systems.
Style APA, Harvard, Vancouver, ISO itp.
3

Pezaros, D. "Network traffic measurement for the next generation Internet". Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.

Pełny tekst źródła
Streszczenie:
Measurement-based performance evaluation of network traffic is a fundamental prerequisite for the provisioning of managed and controlled services in short timescales, as well as for enabling the accountability of network resources. The steady introduction and deployment of the Internet Protocol Next Generation (IPNG-IPv6) promises a network address space that can accommodate any device capable of generating a digital heart-beat. Under such a ubiquitous communication environment, Internet traffic measurement becomes of particular importance, especially for the assured provisioning of differentiated levels of service quality to the different application flows. The non-identical response of flows to the different types of network-imposed performance degradation and the foreseeable expansion of networked devices raise the need for ubiquitous measurement mechanisms that can be equally applicable to different applications and transports. This thesis introduces a new measurement technique that exploits native features of IPv6 to become an integral part of the Internet's operation, and to provide intrinsic support for performance measurements at the universally-present network layer. IPv6 Extension Headers have been used to carry both the triggers that invoke the measurement activity and the instantaneous measurement indicators in-line with the payload data itself, providing a high level of confidence that the behaviour of the real user traffic flows is observed. The in-line measurements mechanism has been critically compared and contrasted to existing measurement techniques, and its design and a software-based prototype implementation have been documented. The developed system has been used to provisionally evaluate numerous performance properties of a diverse set of application flows, over different-capacity IPv6 experimental configurations. Through experimentation and theoretical argumentation, it has been shown that IPv6-based, in-line measurements can form the basis for accurate and low-overhead performance assessment of network traffic flows in short time-scales, by being dynamically deployed where and when required in a multi-service Internet environment.
Style APA, Harvard, Vancouver, ISO itp.
4

Yang, Yang. "Network congestion control". Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator". Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Pełny tekst źródła
Streszczenie:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater for the majority of their simulation's requirements. In this work, a system is proposed for the creation of a scalable, dynamic-resolution network simulation framework that provides scalable scope for researchers, using modern technologies and languages. This framework should allow researchers to rapidly develop a broad range of semantically-rich simulations, without the necessity of superor grid-computers or clusters. Design and implementation are discussed and alternative network simulations are compared to the proposed framework. A series of simulations, focusing on malware, is run on an implementation of this framework, and the results are compared to expectations for the outcomes of those simulations. In conclusion, a critical review of the simulator is made, considering any extensions or shortcomings that need to be addressed.
Style APA, Harvard, Vancouver, ISO itp.
6

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhang, Zaichen, i 張在琛. "Network-supported internet multicast congestion and error control". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity". Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.
Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Style APA, Harvard, Vancouver, ISO itp.
9

Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET". Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Benson, Karyn. "Leveraging Internet Background Radiation for Opportunistic Network Analysis". Thesis, University of California, San Diego, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10161733.

Pełny tekst źródła
Streszczenie:

In this dissertation, we evaluate the potential of unsolicited Internet traffic, called Internet Background Radiation (IBR), to provide insights into address space usage and network conditions. IBR is primarily collected through darknets, which are blocks of IP addresses dedicated to collecting unsolicited traffic resulting from scans, backscatter, misconfigurations, and bugs. We expect these pervasively sourced components to yield visibility into networks that are hard to measure (e.g., hosts behind firewalls or not appearing in logs) with traditional active and passive techniques. Using the largest collections of IBR available to academic researchers, we test this hypothesis by: (1) identifying the phenomena that induce many hosts to send IBR, (2) characterizing the factors that influence our visibility, including aspects of the traffic itself and measurement infrastructure, and (3) extracting insights from 11 diverse case studies, after excluding obvious cases of sender inauthenticity.

Through IBR, we observe traffic from nearly every country, most ASes with routable prefixes, and millions of /24 blocks. Misconfigurations and bugs, often involving P2P networks, result in the widest coverage in terms of visible networks, though scanning traffic is applicable for in-depth and repeated analysis due to its large volume. We find, notwithstanding the extraordinary popularity of some IP addresses, similar observations using IBR collected in different darknets, and a predictable degradation using smaller darknets. Although the mix of IBR components evolves, our observations are consistent over time.

Our case studies highlight the versatility of IBR and help establish guidelines for when researchers should consider using unsolicited traffic for opportunistic network analysis. Based on our experience, IBR may assist in: corroborating inferences made through other datasets (e.g., DHCP lease durations) supplementing current state-of-the art techniques (e.g., IPv4 address space utilization), exposing weaknesses in other datasets (e.g., missing router interfaces), identifying abused resources (e.g., open resolvers), testing Internet tools by acting as a diverse traffic sample (e.g., uptime heuristics), and reducing the number of required active probes (e.g., path change inferences). In nearly every case study, IBR improves our analysis of an Internet-wide behavior. We expect future studies to reap similar benefits by including IBR.

Style APA, Harvard, Vancouver, ISO itp.
12

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Felczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /". Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Sargent, Matthew. "On Understanding the Internet Via Edge Measurement". Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1432290894.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Savage, Stefan R. "Protocol design in an uncooperative Internet /". Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Sookavatana, Pipat Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Service Trading Marketplace Network (STAMP-Net): service discovery and composition for customizable adaptive network". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2003. http://handle.unsw.edu.au/1959.4/20439.

Pełny tekst źródła
Streszczenie:
This thesis presents a complete alternative service composition model named Service Trading Marketplace Network (STAMP-Net). The primary concept is to improve overall system scalability and introduce a fair business scheme for customers and providers. STAPM-Net focuses on designing an architecture based on both technical and business aspect. In STAMP-NET, users remain the ability to choose their preference service providers from potential-provider lists, and service providers are able to compete for the requested services that they can handle. For these purposes, STAMP-Net introduce a concept of 'Service Trading Marketplace Mechanism' which facilitates a problem of 'conflict of interest'; 'Indirect Service Discovery' which allows service providers to the learn existing of services being offered by other service providers; and 'Service Subcontract System' which allows service providers to subcontract any missing service to other potential service providers. In addition, this thesis also present monitor techniques, which are used to ensure the quality of services.
Style APA, Harvard, Vancouver, ISO itp.
17

Tian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Gold, Richard. "An Indirection Architecture for the Internet". Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-6199.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Kay, James T. "Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FKay.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2006.
Thesis Advisor(s): Geoffrey Xie, John Gibson. "June 2006." Includes bibliographical references (p. 47-48). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
20

Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /". Online version of thesis, 2010. http://hdl.handle.net/1850/12263.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Elysee, Pierre Arthur 1967. "Usage profiles : allocation of network capacity to Internet users". Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86607.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Dunmore, Martin. "QoS provisioning in the next generation Internet : the role of the network edge". Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11949/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Cao, Zhiruo. "Network support for adaptive applications". Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/8146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Alim, M. Abdul. "On the interaction of internet routing protocols". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609846.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Rakotoarivelo, Thierry Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Distributed discovery and management of alternate internet paths with enhanced quality of service". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/27316.

Pełny tekst źródła
Streszczenie:
The convergence of recent technology advances opens the way to new ubiquitous environments, where network-enabled devices collectively form invisible pervasive computing and networking environments around the users. These users increasingly require extensive applications and capabilities from these devices. Recent approaches propose that cooperating service providers, at the edge of the network, offer these required capabilities (i.e services), instead of having them directly provided by the devices. Thus, the network evolves from a plain communication medium into an endless source of services. Such a service, namely an overlay application, is composed of multiple distributed application elements, which cooperate via a dynamic communication mesh, namely an overlay association. The Quality of Service (QoS) perceived by the users of an overlay application greatly depends on the QoS on the communication paths of the corresponding overlay association. This thesis asserts and shows that it is possible to provide QoS to an overlay application by using alternate Internet paths resulting from the compositions of independent consecutive paths. Moreover, this thesis also demonstrates that it is possible to discover, select and compose these independent paths in a distributed manner within an community comprising a limited large number of autonomous cooperating peers, such as the fore-mentioned service providers. Thus, the main contributions of this thesis are i) a comprehensive description and QoS characteristic analysis of these composite alternate paths, and ii) an original architecture, termed SPAD (Super-Peer based Alternate path Discovery), which allows the discovery and selection of these alternate paths in a distributed manner. SPAD is a fully distributed system with no single point of failure, which can be easily and incrementally deployed on the current Internet. It empowers the end-users at the edge of the network, allowing them to directly discover and utilize alternate paths.
Style APA, Harvard, Vancouver, ISO itp.
26

Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network". Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.

Pełny tekst źródła
Streszczenie:
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
Style APA, Harvard, Vancouver, ISO itp.
27

Lu, Zhenxin, i 蘆振鑫. "Location-aware routing with reduced location maintenance routing for Ad hoc networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29737308.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Shen, Wen-Chuan. "Implementing a global anti-dos service based on random overlay network". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0007880.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Gomes, Rafael Lopes 1987. "Uma arquitetura para negociação de redes virtualizadas na internet do futuro baseada em classes de QoS". [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275671.

Pełny tekst źródła
Streszczenie:
Orientador: Edmundo Roberto Mauro Madeira
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-21T07:23:57Z (GMT). No. of bitstreams: 1 Gomes_RafaelLopes_M.pdf: 1407268 bytes, checksum: c68d2355ef384cdcbcdb0658ddb32852 (MD5) Previous issue date: 2012
Resumo: Ao longo dos anos a Internet vem se tornando o principal meio de comunicação, onde muitas empresas e organizações a usam como base para os seus serviços, sendo que na maioria dos casos, estas empresas têm vários provedores de Internet (Modelo Multi- Provedor). Entretanto, a Internet atual não provê garantias de Qualidade de Serviço (Quality of Service - QoS). Para contornar esse problema, as empresas realizam um Acordo de Nível de Serviços (Service Level Agreement - SLA). Dentro desse contexto, esta dissertação de mestrado tem por objetivo desenvolver uma arquitetura para negociação de redes virtualizadas na Internet do Futuro utilizando técnicas de classificação de tráfegos para decidir, a partir dos dados coletados e das políticas de SLA, por qual ISP (Internet Service Provider) enviar os dados de acordo com a classe que os dados se enquadram. Espera-se assim atender aos requisitos de QoS de cada classe de tráfego, e diminuir os custos da empresa. Para realizar a validação da arquitetura proposta, foram efetuados experimentos baseados no protocolo OpenFlow e no emulador Mininet. Os resultados mostraram a eficiência do modelo desenvolvido, bem como a capacidade do mesmo de cumprir os objetivos definidos
Abstract: Over the years the Internet has become the primary means of communication, where many companies and organizations use it as basis for their services, and in most cases, these companies have multiple Internet service providers (Multi-Provider Model). However, the current Internet does not guarantee Quality of Service (QoS), to circumvent this problem; the companies apply a Service Level Agreements (SLA). Within this context, this dissertation aims to develop architecture for traffic engineering based on traffic classification to decide, from the data collected and SLA policies, for which ISPs to send the data, according to the data class. It is expected to ensure QoS requirements of each traffic class, and reduce the costs of the company. To validate the proposed framework, experiments based on the OpenFlow protocol and on the Mininet emulator were performed. The results showed the efficiency of the framework, as well as its capacity to fulfill the desired requirements
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Style APA, Harvard, Vancouver, ISO itp.
30

Samiuddin, Asim. "IPAM : a web-based IP/DNS management system /". free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Mahajan, Ratul. "Practical and efficient internet routing with competing interests /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6960.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Barwinski, Mark Andrei. "Taxonomy of spyware and empirical study of network drive-by-downloads". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBarwinski.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Cynthia E. Irvine, Tim E. Levin. Includes bibliographical references (p. 115-120). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
33

Shuster, Marc S. (Mark Saul) 1975. "Diffusion of network innovation : implications for adoption of internet services". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46196.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (p. 51-53).
by Mark S. Shuster.
B.S.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
34

Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks". Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
Style APA, Harvard, Vancouver, ISO itp.
35

Mahajan, Harshad S. "Filtering engine model for VIMNet". Toledo, Ohio : University of Toledo, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1271388865.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Toledo, 2010.
Typescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Title from title page of PDF document. Bibliography: p. 77-78.
Style APA, Harvard, Vancouver, ISO itp.
36

Lim, Jaeyong. "Fast and scalable Internet service scheme for static and dynamic web data contents". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000736.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Phillips, Matthew D. W., i Trevor J. Baumgartner. "Implementation of a network address translation mechanism over IPv6". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited
Network Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
Style APA, Harvard, Vancouver, ISO itp.
38

Baumgartner, Trevor J. Phillips Matthew D. W. "Implementation of a Network Address Translation Mechanism Over IPv6 /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004.
Thesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
39

Zhang, Junjie. "Effective and scalable botnet detection in network traffic". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.

Pełny tekst źródła
Streszczenie:
Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale and coordinated cyber attacks, such as distributed denial of service, spamming, and information stolen. Detecting botnets is therefore of great importance and a number of network-based botnet detection systems have been proposed. However, as botnets perform attacks in an increasingly stealthy way and the volume of network traffic is rapidly growing, existing botnet detection systems are faced with significant challenges in terms of effectiveness and scalability. The objective of this dissertation is to build novel network-based solutions that can boost both the effectiveness of existing botnet detection systems by detecting botnets whose attacks are very hard to be observed in network traffic, and their scalability by adaptively sampling network packets that are likely to be generated by botnets. To be specific, this dissertation describes three unique contributions. First, we built a new system to detect drive-by download attacks, which represent one of the most significant and popular methods for botnet infection. The goal of our system is to boost the effectiveness of existing drive-by download detection systems by detecting a large number of drive-by download attacks that are missed by these existing detection efforts. Second, we built a new system to detect botnets with peer-to-peer (P2P) command&control (C&C) structures (i.e., P2P botnets), where P2P C&Cs represent currently the most robust C&C structures against disruption efforts. Our system aims to boost the effectiveness of existing P2P botnet detection by detecting P2P botnets in two challenging scenarios: i) botnets perform stealthy attacks that are extremely hard to be observed in the network traffic; ii) bot-infected hosts are also running legitimate P2P applications (e.g., Bittorrent and Skype). Finally, we built a novel traffic analysis framework to boost the scalability of existing botnet detection systems. Our framework can effectively and efficiently identify a small percentage of hosts that are likely to be bots, and then forward network traffic associated with these hosts to existing detection systems for fine-grained analysis, thereby boosting the scalability of existing detection systems. Our traffic analysis framework includes a novel botnet-aware and adaptive packet sampling algorithm, and a scalable flow-correlation technique.
Style APA, Harvard, Vancouver, ISO itp.
40

Kaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications". PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.

Pełny tekst źródła
Streszczenie:
The Internet supports a perpetually evolving patchwork of network services and applications. Popular applications include the World Wide Web, online commerce, online banking, email, instant messaging, multimedia streaming, and online video games. Practically all networked applications have a common objective: to directly or indirectly process requests generated by humans. Some users employ automation to establish an unfair advantage over non-automated users. The perceived and substantive damages that automated, adversarial users inflict on an application degrade its enjoyment and usability by legitimate users, and result in reputation and revenue loss for the application's service provider. This dissertation examines three challenges critical to addressing the undesirable automation of networked applications. The first challenge explores individual methods that detect various automated behaviors. Detection methods range from observing unusual network-level request traffic to sensing anomalous client operation at the application-level. Since many detection methods are not individually conclusive, the second challenge investigates how to combine detection methods to accurately identify automated adversaries. The third challenge considers how to leverage the available knowledge to disincentivize adversary automation by nullifying their advantage over legitimate users. The thesis of this dissertation is that: there exist methods to detect automated behaviors with which an application's service provider can identify and then systematically disincentivize automated adversaries. This dissertation evaluates this thesis using research performed on two network applications that have different access to the client software: Web-based services and multiplayer online games.
Style APA, Harvard, Vancouver, ISO itp.
41

Banerjee, Anirban. "Measuring and modeling applications for content distribution in the Internet". Diss., [Riverside, Calif.] : University of California, Riverside, 2008. http://proquest.umi.com/pqdweb?index=0&did=1663077961&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1265225554&clientId=48051.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--University of California, Riverside, 2008.
Includes abstract. Title from first page of PDF file (viewed February 3, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references. Also issued in print.
Style APA, Harvard, Vancouver, ISO itp.
42

Bremner, Duncan James. "25 years of network access technologies : from voice to internet : the changing face of telecommunications". Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6670/.

Pełny tekst źródła
Streszczenie:
This work contributes to knowledge in the field of semiconductor system architectures, circuit design and implementation, and communications protocols. The work starts by describing the challenges of interfacing legacy analogue subscriber loops to an electronic circuit contained within the Central Office (Telephone Exchange) building. It then moves on to describe the globalisation of the telecom network, the demand for software programmable devices to enable system customisation cost effectively, and the creation of circuit and system blocks to realise this. The work culminates in the application challenges of developing a wireless RF front end, including antenna, for an Ultra Wideband communications systems applications. This thesis illustrates how higher levels of integration over the period of 1981 to 2010 have influenced the realisation of complex system level products, particularly analogue signal processing capabilities for communications applications. There have been many publications illustrating the impact of technology advancement from an economic or technology perspective. The thesis shows how technology advancement has impacted the physical realisation of semiconductor products over the period, at system, circuit, and physical implementation levels.
Style APA, Harvard, Vancouver, ISO itp.
43

Bui, Vinh Information Technology &amp Electrical Engineering Australian Defence Force Academy UNSW. "A framework for improving internet end-to-end performance and availability using multi-path overlay networks". Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/39735.

Pełny tekst źródła
Streszczenie:
Application-layer overlay networks have recently emerged as a promising platform to deploy additional services over the Internet. A virtual network of overlay nodes can be used to regulate traffic flows of an underlay network, without modifying the underlay network infrastructure. As a result, an opportunity to redeem the inefficiency of IP routing and to improve end-to-end performance of the Internet has arisen, by routing traffic over multiple overlay paths. However, to achieve high end-to-end performance over the Internet by means of overlay networks, a number of challenging issues, including limited knowledge of the underlay network characteristics, fluctuations of overlay path performance, and interactions between overlay and the underlay traffic must be addressed. This thesis provides solutions to some of these issues, by proposing a framework to construct a multi-path overlay architecture for improving Internet end-to-end performance and availability. The framework is formed by posing a series of questions, including i) how to model and forecast overlay path performance characteristics; ii) how to route traffic optimally over multiple overlay paths; and iii) how to place overlay nodes to maximally leverage the Internet resource redundancy, while minimizing the deployment cost. To answer those research questions, analytical and experimental studies have been conducted. As a result, i) a loss model and a hybrid forecasting technique are proposed to capture, and subsequently predict end-to-end loss/delay behaviors; with this predictive capability, overlay agents can, for example, select overlay paths that potentially offer good performance and reliability; ii) to take full advantage of the predictive capability and the availability of multiple paths, a Markov Decision Process based multi-path traffic controller is developed, which can route traffic simultaneously over multiple overlay paths to optimize some performance measures, e.g. average loss rate and latency. As there can be multiple overlay controllers, competing for common resources by making selfish decisions, which could jeopardize performance of the networks, game theory is applied here to turn the competition into cooperation; as a consequence, the network performance is improved; iii) furthermore, to facilitate the deployment of the multi-path overlay architecture, a multi-objective genetic-based algorithm is introduced to place overlay nodes to attain a high level of overlay path diversity, while minimizing the number of overlay nodes to be deployed, and thus reducing the deployment cost. The findings of this thesis indicate that the use of multiple overlay paths can substantially improve end-to-end performance. They uncover the potential of multi-path application-layer overlay networks as an architecture for achieving high end-to-end performance and availability over the Internet.
Style APA, Harvard, Vancouver, ISO itp.
44

Kaynar, Kerem. "Developing A Zigbee Wireless Network And Controlling It Through The Internet". Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610583/index.pdf.

Pełny tekst źródła
Streszczenie:
The aim of this thesis is to develop a network, whose nodes communicate with the ZigBee wireless network protocol, and control this network with a PC through the Internet. One of the nodes of this network is designed to be master node. The other nodes are slave nodes. The master node can be connected to an Ethernet connected to the Internet. A PC can communicate with the master node via a specific web application over the Internet. The communication between a web server, in which the specific web application is loaded, and the master node is performed using a specific application protocol working over TCP/IP and defined in this thesis. The master node controls the slave nodes of the wireless network formed according to the commands given by the user of a PC over the Internet. The master node contains an implementation of the ZigBee stack along with a suitable application software to communicate with the slave nodes. The master node also contains an implementation of the TCP/IP stack along with a suitable application software to communicate with a web server in which the specific web application is loaded. The slave nodes contain an implementation of the ZigBee stack along with a suitable application software to communicate with the master node. For each type of node, appropriate hardware which is compliant with the software contained by that type of node is used. Each type of node uses microcontroller-based hardware.
Style APA, Harvard, Vancouver, ISO itp.
45

Stone, Zachary. "Face Identification in the Internet Era". Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10397.

Pełny tekst źródła
Streszczenie:
Despite decades of effort in academia and industry, it is not yet possible to build machines that can replicate many seemingly-basic human perceptual abilities. This work focuses on the problem of face identification that most of us effortlessly solve daily. Substantial progress has been made towards the goal of automatically identifying faces under tightly controlled conditions; however, in the domain of unconstrained face images, many challenges remain. We observe that the recent combination of widespread digital photography, inexpensive digital storage and bandwidth, and online social networks has led to the sudden creation of repositories of billions of shared photographs and opened up an important new domain for unconstrained face identification research. Drawing upon the newly-popular phenomenon of “tagging,” we construct some of the first face identification datasets that are intended to model the digital social spheres of online social network members, and we examine various qualitative and quantitative properties of these image sets. The identification datasets we present here include up to 100 individuals, making them comparable to the average size of members’ networks of “friends” on a popular online social network, and each individual is represented by up to 100 face samples that feature significant real-world variation in appearance, expression, and pose. We demonstrate that biologically-inspired visual representations can achieve state-of-the-art face identification performance on our novel frontal and multi-pose face datasets. We also show that the addition of a tree-structured classifier and training set augmentation can enhance accuracy in the multi-pose setting. Finally, we illustrate that the machine-readable “social context” in which shared photos are often embedded can be applied to further boost face identification accuracy. Taken together, our results suggest that accurate automated face identification in vast online shared photo collections is now feasible.
Engineering and Applied Sciences
Style APA, Harvard, Vancouver, ISO itp.
46

Kwok, Ki-wa Joyce. "Hong Kong international telecommunications : strategic issues /". Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1883727X.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Allen, Patricia Dougherty. "WebQuest investigation to acquire internet usage skills". CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2077.

Pełny tekst źródła
Streszczenie:
The purpose of this project was to develop a WebQuesst investigation that would facilitate student Internet usage. A WebQuest investigation is an inquiry-oriented activity in which most or all of the information that learners interact with comes from resources on the Internet.
Style APA, Harvard, Vancouver, ISO itp.
48

Zhuang, Shixin. "Stochastic modeling and performance analysis of differentiated service architecture in the Internet /". View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202002%20ZHUANG.

Pełny tekst źródła
Streszczenie:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002.
Includes bibliographical references (leaves 67-69). Also available in electronic version. Access restricted to campus users.
Style APA, Harvard, Vancouver, ISO itp.
49

Munitzk, Michaela. "Facebook : A Comparative Study of its Usage on Smartphone vs. Computer". Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-5955.

Pełny tekst źródła
Streszczenie:
This research aims at analysing how the usage of Facebook differs on mobile phones and computers from the view of an end user. 10 people were consulted in semistructured interviews about their individual usage. Topics of the interviews included the amount of time they spend on Facebook on their mobile phones and how often, why they are using it on this device and when they rather use a computer. The results of the interviews indicate that people mostly use their mobile phone on their every-day journeys, esp. while they use public transport and they are bored waiting for or beeing on the means of transport. Often they just check the Newsfeed to see what their friends are doing. They mainly want to be informed about the activities of their friends, therefore, produce less content themselves on Facebook Mobile rather than on their computer. The questioned users do not have the feeling they need to log in on Facebook, instead they do it subconsciously all the time. The small screen and keypad on the mobile phone are still the main reasons why the usage of Facebook on the computer is more convenient. Nevertheless, because Facebook on the mobile phone is limited in its features it also offers a good overview. The non-available features on mobile devices are simply not missed and for this reason not even used on the Facebook computer version. However, if a function should be executed, which does not exist on the mobile phone the users are waiting until they can access a computer but possibly they forget about it by then and the importance of the accomplishment disappears.
Style APA, Harvard, Vancouver, ISO itp.
50

Maida, Elisabeth M. (Elisabeth Marigo). "The regulation of internet interconnection : assessing network market power". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79345.

Pełny tekst źródła
Streszczenie:
Thesis (S.M. in Technology and Policy)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 59-64).
Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, network neutrality, Internet peering, and last mile competition have generated much discussion about whether Internet interconnection regulation is warranted. In order to determine whether such regulation is necessary, policymakers need appropriate metrics to help gauge a network provider's market power. Since Internet interconnection agreements are typically not published publicly, policymakers must instead rely on proxy metrics and inferred interconnection relationships. Alessio D'Ignazio and Emanuele Giovannetti have attempted to address this challenge by proposing a standard set of metrics that are based on and assessed using network topology data. They suggest two metrics, referred to as customer cone and betweenness, as proxies for market size and market power. This thesis focuses on the efficacy of the proposed customer cone and betweenness metrics as proxies for network market size and market power.
by Elisabeth M. Maida.
S.M.
S.M.in Technology and Policy
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii