Rozprawy doktorskie na temat „Wide Local Area Network”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Wide Local Area Network.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Wide Local Area Network”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Robeson, Bridget M. "A local area network & wide area network design". Master's thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-12232009-020117/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Voelker, Geoffrey Michael. "Cooperative caching in local-area and wide-area networks /". Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/7010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hill, Kevin Carlos. "Design of a local area network and a wide area network to connect the US Navy's training organization". Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020032/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Yang, Yue Carleton University Dissertation Engineering Electrical. "Performance evaluation of an integrated FDDI-ATM-FDDI network". Ottawa, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Laird, Daniel, i Kip Temple. "INSTRUMENTING AN AIRBORNE NETWORK TELEMETRY LINK". International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604244.

Pełny tekst źródła
Streszczenie:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California
The Central Test and Evaluation Investment Program (CTEIP) Integrated Network Enhanced Telemetry (iNET) program is currently testing a wireless local area networking (WLAN) in an L-band telemetry (TM) channel to evaluate the feasibility and capabilities of enhancing traditional TM methods in a seamless wide area network (WAN). Several advantages of networking are real-time command and control of instrumentation formats, quick-look acquisition, data retransmission and recovery (gapless TM) and test point real-time verification. These networking functions, and all others, need to be tested and evaluated. The iNET team is developing a WLAN based on 802.x technologies to test the feasibility of the enhanced telemetry implementation for flight testing.
Style APA, Harvard, Vancouver, ISO itp.
6

Lungaro, Pietro. "Self-organization, cooperation and control distribution in wide and local area networks". Licentiate thesis, KTH, Communication Systems, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4533.

Pełny tekst źródła
Streszczenie:

To support the future requirements on wireless systems in an affordable manner it is commonly believed that multiple radio access technologies have to be combined. These technologies can be deployed by a single operator or, even, be managed by different competing operators. In order to cope with the increased complexity of such a multifaced wireless environment it has been argued that a transfer of Radio Resource Management (RRM) functionalities towards the network edges (access ports and, ultimately, user terminals) may be beneficial. In addition to detecting varying system conditions in a faster manner this would also allow a more responsive service adaptation. In this thesis we evaluate a set of self-organizing regimes, all with the purpose of supporting the distribution of control at the edge node.

Particular emphasis is put on the design of a mechanism for dynamically establishing cooperation between different network entities whether these are access ports or user terminals.

Terminal cooperation by means of multihopping is considered in the context of service provision in cellular access systems. Previously the opportunity cost associated with sharing own bandwidth, and energy loss have been seen as a major obstacle for relaying other users’ traffic. To mitigate the effects of this selfish behavior the concept of resource delegation is introduced and evaluated in combination with a rewarding scheme designed for compensating the energy losses induced by forwarding. The results show that our proposed schemes not only are capable of fostering significant cooperation among users, but also to create a simultaneous improvement in user utility, data rates as well as in operator revenues.

Opening up networks of user-deployed Access Points (APs) for service provision is considered a means to radically lower the cost of future wireless services. However, since these networks are deployed in an uncoordinated manner, only discontinuous coverage will be provided. The question of how dense these networks need to be, to deliver acceptable user perception, is investigated in this thesis for a set of archetypical services. The results show that already at moderate AP densities the investigated services can be provided with sufficient quality. Epidemic exchange of popular content and inter-AP cooperation are also shown to further decrease the required infrastructure density and improve the APs’ utilization respectively.

As last contribution, “Word-of-Mouth”, a distributed reputation-based scheme, is investigated in the context of access selection in multi-operator environments. By exchanging information concerning the Quality of Service (QoS) associated with the different networks, terminal agents can collectively reveal the capabilities of individual networks. For a vertical handover scenario we show that our proposed scheme can reward access providers capable of ensuring some degrees of QoS. By introducing a model for collusion, between low performing APs and terminal agents, we show that our proposed scheme is also robust to the dissemination of false information.

Style APA, Harvard, Vancouver, ISO itp.
7

Topol, Brad Byer. "A framework for the development of wide area distributed applications". Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8300.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Chew, Zhen Bob. "Modelling message-oriented-middleware brokers using autoregressive models for bottleneck prediction". Thesis, Queen Mary, University of London, 2013. http://qmro.qmul.ac.uk/xmlui/handle/123456789/8832.

Pełny tekst źródła
Streszczenie:
Message brokers are the backbone of modern publish subscribe messaging systems. These brokers can degrade or fail for a variety of reasons. This research specifically looks at the detection, prediction and mitigation of bottlenecks in brokers. The message-oriented-middleware framework here uses either a cluster of brokers on a Local Area Network (LAN) or a federation of brokers on a Wide Area Network (WAN) to route messages, facilitate multicasting and ameliorate demand surges and geographically related faults. Sensors have been constructed to monitor brokers and controllers to run the bottleneck detection algorithms. An overlay manager controls broker and topic pairing. Each topic is assigned a primary and secondary broker. When a failure is predicted, the overlay manager routes messages from the failing broker by switching topics to its secondary broker(s). The application for bottleneck forecasting is to allow us to pre-empt a broker failure and hence reroute messages to other brokers to increase resilience and reliability. The key contributions of this research are an abstract model of message-oriented-middleware broker based on the Apache Qpid message broker coupled with the use of analytical autoregressive exogenous (ARX) models that describes the broker behaviour during bottleneck conditions. The Apache Qpid message broker is a message broker that implements the Advanced Message Queuing Protocol (AMQP) for publish-subscribe messaging. ARX models are autoregressive models where the output depends on the previous output as well as external stimuli. These components are integrated to produce a generalised technique for calibrating broker performance and detection of bottlenecks in the broker. This research show how models were initially constructed using a complete range of input data. As bottlenecks occur only when the broker is heavily loaded, input data during idle periods can cause corruption to the model fit. Models were constructed with segmented input data, with each segment covering the range of one peak period. The segmented input allows the modelling of the broker behaviour only when it is experiencing a bottleneck. The result of this is a much-improved fit of the predictive models. The work here is compared against previous work using Markov-chains for creating predictive models. The results of both approaches are compared and reported.
Style APA, Harvard, Vancouver, ISO itp.
9

Sun, Zhaohui, i n/a. "Improving Security in WLAN With the Use of Smart Antennas". Griffith University. School of Engineering, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070115.143811.

Pełny tekst źródła
Streszczenie:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused by the omni-directional antenna it usually uses. In recent years, few studies have been undertaken which examine the use of the smart directional antenna to mitigate the security risks in mobile wireless computing networks. One of the major reasons is the antenna size, as portability is a key requirement. Due to the dielectric-material embedding and FDTD optimal design technology, a smart antenna with controllable directionality can now achieve an overall volume reduction of 80%. This has promise for application in the wireless security realm. This thesis provides a conventional background in wireless computing networks and security theory. In addition, security level definition, program in Matlab™ and corresponding experimental results are provided. To show the effectiveness of improving security in WLAN with the use of a smart directional antenna, this thesis proposes a model for predicting electromagnetic environments using a directional transmission antenna based on the Finite Element method. To validate the numerical results, a new experimental method (using Network Stumbler software) to measure the signal strength in different locations is introduced. Results from experiments using the two methods are consistent. The latter method gives the users the possibility of using a laptop (with an appropriate wireless card, software and roguing around) to detect the real-time signal strength in different locations instead of using expensive measure apparatus. Such an advantage can be valuable for the efficient implementation of indoor wireless networks for security purposes. Finally, it contributes a security solution using DE-ESMB and DE-ESPAR smart antennas in WLAN. Through these simulated and experimental results, one can conclude that the security performance in WLAN can be greatly improved by using smart directional antenna. There are five chapters in this thesis: Chapter 1 introduces the wireless communication network. Information about architecture, topology and popular wireless standards is presented in this chapter. Chapter 2 investigates the security problem in IEEE 802.11 Standards. Recent improvements in security, and their limitations, are also included. This problem is investigated by performing laboratory experiments, including a real attack on 802.11 Standards and packet capture experiments using AiroPeek NX software. Chapter 3 describes the useful parameters of smart directional antennas, and then presents the security level definition in WLAN. Simple software in Matlab™ to determine the security level according to the beamwidth of the adopted antenna is also introduced. Chapter 4 is the important part of this thesis. Simulation results of signal strength in different locations using FEMLAB™ are presented, which are consistent with the follow-up experimental results carried out in a typical office area. This chapter also describes the final security solution using the newly-designed DE-ESMB and DE-ESPAR directional antennas. Chapter 5 is a summary of the thesis. It presents the conclusions and suggests area of future research for improving the security level using smart antennas in WLAN.
Style APA, Harvard, Vancouver, ISO itp.
10

Sun, Zhaohui. "Improving Security in WLAN With the Use of Smart Antennas". Thesis, Griffith University, 2006. http://hdl.handle.net/10072/366543.

Pełny tekst źródła
Streszczenie:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused by the omni-directional antenna it usually uses. In recent years, few studies have been undertaken which examine the use of the smart directional antenna to mitigate the security risks in mobile wireless computing networks. One of the major reasons is the antenna size, as portability is a key requirement. Due to the dielectric-material embedding and FDTD optimal design technology, a smart antenna with controllable directionality can now achieve an overall volume reduction of 80%. This has promise for application in the wireless security realm. This thesis provides a conventional background in wireless computing networks and security theory. In addition, security level definition, program in Matlab™ and corresponding experimental results are provided. To show the effectiveness of improving security in WLAN with the use of a smart directional antenna, this thesis proposes a model for predicting electromagnetic environments using a directional transmission antenna based on the Finite Element method. To validate the numerical results, a new experimental method (using Network Stumbler software) to measure the signal strength in different locations is introduced. Results from experiments using the two methods are consistent. The latter method gives the users the possibility of using a laptop (with an appropriate wireless card, software and roguing around) to detect the real-time signal strength in different locations instead of using expensive measure apparatus. Such an advantage can be valuable for the efficient implementation of indoor wireless networks for security purposes. Finally, it contributes a security solution using DE-ESMB and DE-ESPAR smart antennas in WLAN. Through these simulated and experimental results, one can conclude that the security performance in WLAN can be greatly improved by using smart directional antenna. There are five chapters in this thesis: Chapter 1 introduces the wireless communication network. Information about architecture, topology and popular wireless standards is presented in this chapter. Chapter 2 investigates the security problem in IEEE 802.11 Standards. Recent improvements in security, and their limitations, are also included. This problem is investigated by performing laboratory experiments, including a real attack on 802.11 Standards and packet capture experiments using AiroPeek NX software. Chapter 3 describes the useful parameters of smart directional antennas, and then presents the security level definition in WLAN. Simple software in Matlab™ to determine the security level according to the beamwidth of the adopted antenna is also introduced. Chapter 4 is the important part of this thesis. Simulation results of signal strength in different locations using FEMLAB™ are presented, which are consistent with the follow-up experimental results carried out in a typical office area. This chapter also describes the final security solution using the newly-designed DE-ESMB and DE-ESPAR directional antennas. Chapter 5 is a summary of the thesis. It presents the conclusions and suggests area of future research for improving the security level using smart antennas in WLAN.
Thesis (Masters)
Master of Philosophy (MPhil)
School of Engineering
Full Text
Style APA, Harvard, Vancouver, ISO itp.
11

Lungaro, Pietro. "Context-based Resource Management and Architectures for Future Wide and Local Area Wireless Networks". Doctoral thesis, KTH, Kommunikationssystem, CoS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12216.

Pełny tekst źródła
Streszczenie:
In the last few years we have been witnessing the beginning of a revolution in the world of wireless communication. The recent launch of advanced smartphones in the mobile market has been welcomed by mobile operators as an opportunity to finally fulfill the promises of 3G and increase the uptake of mobile services. Driven by unprecedented user experience and flat rate pricing, the success of novel mobile platforms for accessing multimedia content and applications has gone far beyond the most optimistic of expectations. Data-hungry services are currently creating significant capacity limitations in many networks, and projections on future content consumption anticipate that with the next generation of mobile devices the stress on cellular infrastructures will increase. Rolling-out additional capacity is not the most profitable of solutions given the current cost structure of mobile infrastructures. Instead, a significant cost reduction can be achieved by revolutionizing the current content provision paradigm. Accordingly, this thesis proposes solutions for making future services and infrastructures more affordable. From an operator perspective, terminal-to-terminal information forwarding has the potential to increase both coverage and capacity, however it introduces opportunity costs and energy losses at the user side. Resource delegation, together with an energy reimbursement scheme, is presented in this thesis to induce user cooperation. The results show that this approach is successful in fostering significant cooperation among users and can create a simultaneous improvement in user utility, data rates and operator revenues. Opening up for public access privately deployed WLANs might radically lower the cost of wireless services. However, since these networks are deployed in an uncoordinated manner, only discontinuous coverage can be provided. To hide the sparsity of the infrastructure to the end-user perception we propose the adoption of opportunistic schemes for content pre-fetching. Results show that already with moderate AP densities a set of archetypical services, including web-browsing, can be provided with sufficient user perceived quality. Epidemic exchange of popular content, and inter-AP cooperation are also shown to further decrease the required AP density. Moreover, to support informed access selection decisions when performing vertical handovers to WLANs, we propose “Word-of-Mouth”, a reputation-based scheme for revealing the QoS of different networks. By epidemically exchanging grades on their experienced service quality, we show that terminal agents can collectively improve their decision making, avoiding selecting networks not meeting the required QoS. Context-based content delivery is presented in this thesis as means to improve the utilization of wireless resources in cellular systems. Since networks are typically dimensioned for peak hour traffic, the BSs are underutilized for significant portions of the day. By adopting context-based architectures, capable of opportunistically utilizing the instantaneous excess of resources for content pre-fetching, we show that a significant amount of additional traffic can be served in already existing networks. The gains introduced by this content provision paradigm over the current “on-demand” solutions are further expressed in terms of lower requirements on BS density, more users in the system and larger files served while reaching the same level of user experience.
QC20100716
Style APA, Harvard, Vancouver, ISO itp.
12

Montehermoso, Ronald Centeno. "Microsoft Windows Server 2003 : security enhancements and new features /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FMontehermoso.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis Advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 111-118). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
13

Wexler, Marty. "THE FUTURE OF DATA ACQUISITION". International Foundation for Telemetering, 1998. http://hdl.handle.net/10150/609217.

Pełny tekst źródła
Streszczenie:
International Telemetering Conference Proceedings / October 26-29, 1998 / Town & Country Resort Hotel and Convention Center, San Diego, California
The necessity to acquire and analyze data dates back to the beginning of science itself. Long ago, a scientist may have run experiments and noted the results on a piece of paper. These notes became the data. The method was crude, but effective. As experiments got more complex, the need for better methodologies arose. Scientists began using computers to gather, analyze, and store the data. This method worked well for most types of data acquisition. As the amount of data being collected increased, larger computers, faster processors, and faster storage devices were used in order to keep up with the demand. This method was more refined, but still did not meet the needs of the scientific community. Requirements began to change in the data acquisition arena. More people wanted access to the data in real time. Companies producing large data acquisition systems began to move toward a network-based solution. This architecture featured a specialized computer called the server, which contained all of the data acquisition hardware. The server handled requests from multiple clients and handled the data flow to the network, data displays, and the archive medium. While this solution worked well to satisfy most requirements, it fell short in meeting others. The ability to have multiple computers working together across a local or wide area network (LAN or WAN) was not addressed. In addition, this architecture inherently had a single point of failure. If the server machine went down, all data from all sources was lost. Today, we see that the requirements for data acquisition systems include features only dreamed of five years ago. These new systems are linked around the world by wide area networks. They may include code to command satellites or handle 250 Mbps download rates. They must produce data for dozens of users at once, be customizable by the end user, and they must run on personal computers (PCs)! Systems like these cannot work using the traditional client/server model of the past. The data acquisition industry demands systems with far more features than were traditionally available. These systems must provide more reliability and interoperability, and be available at a fraction of the cost. To this end, we must use commercial-off-the-shelf (COTS) computers that operate faster than the mainframe computers of only a decade ago. These computers must run software that is smart, reliable, scalable, and easy to use. All of these requirements can be met by a network of PCs running the Windows NT operating system.
Style APA, Harvard, Vancouver, ISO itp.
14

Chan, Edward. "Supporting heterogeneous traffic in LANs and WANs : issues and techniques". Thesis, University of Sunderland, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390607.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Smith, Quentin D. "AN EVOLUTIONARY APPROACHTO A COMMUNICATIONS INFRASTRUCTURE FOR INTEGRATED VOICE, VIDEO AND HIGH SPEED DATA FROM RANGETO DESKTOP USING ATM". International Foundation for Telemetering, 1993. http://hdl.handle.net/10150/608864.

Pełny tekst źródła
Streszczenie:
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada
As technology progresses we are faced with ever increasing volumes and rates of raw and processed telemetry data along with digitized high resolution video and the less demanding areas of video conferencing, voice communications and general LAN-based data communications. The distribution of all this data has traditionally been accomplished by solutions designed to each particular data type. With the advent of Asynchronous Transfer Modes or ATM, a single technology now exists for providing an integrated solution to distributing these diverse data types. This allows an integrated set of switches, transmission equipment and fiber optics to provide multi-session connection speeds of 622 Megabits per second. ATM allows for the integration of many of the most widely used and emerging low, medium and high speed communications standards. These include SONET, FDDI, Broadband ISDN, Cell Relay, DS-3, Token Ring and Ethernet LANs. However, ATM is also very well suited to handle unique data formats and speeds, as is often the case with telemetry data. Additionally, ATM is the only data communications technology in recent times to be embraced by both the computer and telecommunications industries. Thus, ATM is a single solution for connectivity within a test center, across a test range, or between ranges. ATM can be implemented in an evolutionary manner as the needs develop. This means the rate of capital investment can be gradual and older technologies can be replaced slowly as they become the communications bottlenecks. However, success of this evolution requires some planning now. This paper provides an overview of ATM, its application to test ranges and telemetry distribution. A road map is laid out which can guide the evolutionary changeover from today's technologies to a full ATM communications infrastructure. Special applications such as the support of high performance multimedia workstations are presented.
Style APA, Harvard, Vancouver, ISO itp.
16

Stone, Larry W. "Local area network analysis". Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/27120.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited
This thesis focuses on the performance of the Ethernet local area network in Ingersoll Hall, Room 250, Naval Postgraduate School, Monterey, California. The primary research is in performing a cost benefit analysis, using the economic value imputed to a reduction in average response time as the return on investment. The major objective is to find the best configuration for the network, based on integrating user-computer response time guidelines and the cost benefit analysis to indicate what might be economically acceptable response times for processing initial simultaneous requests for software installed on network servers. Word Perfect 5.0 software was chosen because it is typical of the software that is used in the lab under conditions of simultaneous access. Additionally, some of the effects of response time on human performance will be researched and noted in the conclusions along with the results of the feasibility test of user-computer interfaces and related cost benefit values.
Style APA, Harvard, Vancouver, ISO itp.
17

Ochieng, Washington Yotto. "Wide area DGPS and fiducial network design". Thesis, University of Nottingham, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335810.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Robledo, Amoza Franco. "GRASP heuristics for Wide Area Network design". Rennes 1, 2005. http://www.theses.fr/2005REN1S122.

Pełny tekst źródła
Streszczenie:
Un réseau de large étendue (WAN, Wide Area Network) peut être considéré comme un ensemble de sites et un ensemble de lignes de communication qui connectent ces sites. Du point de vue topologique, un réseau WAN est organisé en deux niveaux : le noyau et le réseau d'accès. Dans cette thèse, nous traitons le problème de la conception d'un réseau de large étendue en le décomposant en deux problèmes liées étroitement : le problème de la conception du réseau d'accès (Access Network Design Problem - ANDP) et le problème de la conception du noyau (Backbone Network Design Problem - BNDP). Les problèmes ANDP et BNDP appartiennent à la classe des problèmes NP-difficiles. Nous avons développé des algorithmes GRASP pour ces problèmes, concevant différents algorithmes alternatifs pour les phases de construction et de recherche locale. Les résultats sont bons, achevant soit l'optimalité, dans une partie importante des cas, soit des solutions localement optimales de bonne qualité.
Style APA, Harvard, Vancouver, ISO itp.
19

Robledo, Amoza Franco Rubino Gerardo Cancela Héctor. "GRASP heuristics for Wide Area Network design". [S.l.] : [s.n.], 2005. ftp://ftp.irisa.fr/techreports/theses/2005/robledo.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Staples, John. "Local area network development standards". Master's thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03302010-020011/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Andersland, David L. "3Com Etherseries Local Area Network". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26840.

Pełny tekst źródła
Streszczenie:
The Naval Postgraduate School has implemented a 3Com Etherseries baseband Ethernet Local Area Network (LAN). The purpose of this thesis is to explore the requirements and protocols required in the implementation of an Ethernet LAN, discuss the demands of 3Com's Etherseries network as regards hardware and software, and development a comprehensive student's user manual. The purpose of a LAN has evolved from just sharing expensive computer peripherals laser printers, hard disks, and software to reduce costs. Robert Metcalfe, a co-inventor of Ethernet, subscribes to the new view that the purpose of LAN's is to share information creating work group information system Reprints. (jes)
Style APA, Harvard, Vancouver, ISO itp.
22

Putienko, O. M., i A. V. Bulashenko. "Virtual local area network in a residential area". Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/66965.

Pełny tekst źródła
Streszczenie:
Consider a simple example of how within a single local area network deployed in a residential area can operate multiple virtual networks. The use of VLANs significantly increases the manageability of your home network.
Style APA, Harvard, Vancouver, ISO itp.
23

Hiran, Rahul Gokulchand. "Collaborative Network Security: Targeting Wide-area Routing and Edge-network Attacks". Doctoral thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131959.

Pełny tekst źródła
Streszczenie:
To ensure that services can be delivered reliably and continuously over theInternet, it is important that both Internet routes and edge networks aresecured. However, the sophistication and distributed nature of many at-tacks that target wide-area routing and edge networks make it difficult foran individual network, user, or router to detect these attacks. Thereforecollaboration is important. Although the benefits of collaboration betweendifferent network entities have been demonstrated, many open questionsstill remain, including how to best design distributed scalable mechanismsto mitigate attacks on the network infrastructure. This thesis makes severalcontributions that aim to secure the network infrastructure against attackstargeting wide-area routing and edge networks. First, we present a characterization of a controversial large-scale routinganomaly, in which a large Telecom operator hijacked a very large numberof Internet routes belonging to other networks. We use publicly availabledata from the time of the incident to understand what can be learned aboutlarge-scale routing anomalies and what type of data should be collected inthe future to diagnose and detect such anomalies. Second, we present multiple distributed mechanisms that enable col-laboration and information sharing between different network entities thatare affected by such attacks. The proposed mechanisms are applied in thecontexts of collaborating Autonomous Systems (ASes), users, and servers,and are shown to help raise alerts for various attacks. Using a combina-tion of data-driven analysis and simulations, based on publicly availablereal network data (including traceroutes, BGP announcements, and net-work relationship data), we show that our solutions are scalable, incur lowcommunication and processing overhead, and provide attractive tradeoffsbetween attack detection and false alert rates. Finally, for a set of previously proposed routing security mechanisms,we consider the impact of regional deployment restrictions, the scale of thecollaboration, and the size of the participants deploying the solutions. Al-though regional deployment can be seen as a restriction and the participationof large networks is often desirable, we find interesting cases where regionaldeployment can yield better results compared to random global deployment,and where smaller networks can play an important role in achieving bettersecurity gains. This study offers new insights towards incremental deploy-ment of different classes of routing security mechanisms.
Style APA, Harvard, Vancouver, ISO itp.
24

Yasmin, R. (Rumana). "Integration of LoRa Wide Area Network with the 5G Test Network". Master's thesis, University of Oulu, 2017. http://jultika.oulu.fi/Record/nbnfioulu-201706082650.

Pełny tekst źródła
Streszczenie:
Abstract. The global communication network is going through major transformation from conventional to more versatile and diversified network approaches. With the advent of virtualization and cloud technology, information technology (IT) is merging with telecommunications to alter the conventional approaches of traditional proprietary networking techniques. From radio to network and applications, the existing infrastructure lacks several features that we wished to be part of 5th Generation Mobile Networks (5G). Having a support for large number of applications, Internet of Things (IoT) will bring a major evolution by creating a comfortable, flexible and an automated environment for end users. A network having the capability to support radio protocols on top of basic networking protocols, when blended with a platform which can generate IoT use cases, can make the expectations of 5G a reality. Low Power Wide Area Network (LPWAN) technologies can be utilized with other emerging and suitable technologies for IoT applications. To implement a network where all the technologies can be deployed virtually to serve their applications within a single cloud, Network Functions Virtualization (NFV) and Software Defined Network (SDN) is introduced to implement such a networking possibility for upcoming technologies. The 5G Test Network (5GTN), a testbed for implementing and testing 5G features in real time, is deployed in virtual platform which allows to add other technologies for IoT applications. To implement a network with an IoT enabler technology, LoRa Wide Area Network (LoRaWAN) technology can be integrated to test the feasibility and capability of IoT implications. LoRaWAN being an IoT enabler technology is chosen out of several possibilities to be integrated with the 5GTN. Using MultiConnect Conduit as a gateway, the integration is realized by establishing point to point protocol (PPP) connection with eNodeB. Once the connection is established, LoRa packets are forwarded to the ThingWorx IoT cloud and responses can be received by the end-devices from that IoT cloud by using Message Queuing Telemetry Transport (MQTT) protocol. Wireshark, an open source packet analyser, is then used to ensure successful transmission of packets to the ThingWorx using the 5GTN default packet routes.
Style APA, Harvard, Vancouver, ISO itp.
25

Guarnera, Gregg. "Token bus local area network simulator". Master's thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-02022010-020058/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Naylon, John Benedict Philbin. "A wireless ATM local area network". Thesis, University of Cambridge, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.624129.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Espiritu, Rita V. "Local area network (LAN) compatibility issues". Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28335.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

McGovern, Susan C. "Information security requirements for a coalition wide area network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397542.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Systems Technology (Command, Control, and Communications)) Naval Postgraduate School, June 2001.
Thesis advisor(s): Irvine, Cynthia E. "June 2001." Includes bibliographical references (p. 77-78). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
29

Kriewaldt, Hannah A. "Communications performance of an undersea acoustic wide-area network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FKriewaldt.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Engineering Acoustics)--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Joseph A. Rice. "March 2006." Includes bibliographical references (p.57-59). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
30

Jones, S. T. "Distributed videotex on a local area network". Thesis, University of Essex, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.376743.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

FILIPPO, DENISE DEL RE. "MULTIMEDIA MESSAGE SYSTEM FOR LOCAL AREA NETWORK". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1991. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=14049@1.

Pełny tekst źródła
Streszczenie:
IBM BRASIL
Este trabalho faz parte de projeto LAN Based Real Time Audio Systems (LANBRETAS) que tem como finalidade o desenvolvimento de um sistema de comunicação com integração de voz e dados. Realizado numa cooperação entre a Pontifícia Universidade Católica do Rio de Janeiro (PUC/RJ), o Instituto Militar de Engenharia (IME) e o centro Científico Rio da IBM Brasil, o LANBRETAS oferece, entre outros, um Serviço de Correio Eletrônico. O objetivo desta tese é o propor uma nova versão deste Serviço com base na padronização X.400 do CCITT: novas funcionalidades são oferecidas, assim como previsto o suporte para mensagens multimídia que incluam imagem fixa.
This thesis is a part of the LAN Based Real Time Audio Systems (LANBRETAS) project, cosponsored by Pontifícia Universidade Católica of Rio de Janeiro (PUC/RJ), Instituto Militar de Engenharia (IME) and IBM Brasil. The LANBRETA aims the implementation of a communication system that integrates voice and data. The main objective of this thesis is to propose a new edition, based on the X.400/CCITT padronization, of the Eletronic Mail Service ofered by LANBRETAS to increase the features ofered and to suport multimedia messages that include fixed image informations.
Style APA, Harvard, Vancouver, ISO itp.
32

Lin, Katherine Xiaoyan. "Green optical network design : power optimization of wide area and metropolitan area networks". Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66434.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 133-134).
Advancements in technology are fueling huge growth in network traffic capacity. Demand for low cost, reliable, and high bitrate transmissions grows 40-110% internationally every year. To date, most research has focused on cost minimization of wide area and metropolitan area networks. In this thesis, we concentrate instead on finding scalable WAN designs with respect to power constraints and optimal MAN topologies with minimal capital and operating expenditures. We find optical bypass networks to be most scalable with respect to power consumption, especially when quality of service and network flexibility, reliability, and protection are considered. The power consumption of the standard bypass network can be lowered further through a hybrid design in which whole wavelengths of core, stable traffic between node pairs are routed via direct, fixed lightpaths using patch panelling and unexpected, bursty traffic is switched on a standard optical bypass network. We analyze power distribution among components and find the OXC switch most scalable at each node and O/E/O switches and routers wasteful. Finally, we prove that shortest path and minimum hop routing is power optimal and traffic balanced routing should be avoided. We approximate MAN topologies with regular graphs for tractable analysis. We augment a previous cost-based joint optimization formulation [13] with power expenditure modelling and obtain closed form solutions for optimal node degree and normalized network costs. We find that the optimal node connectivity increases 20-25% due to the added operating expenditures. Normalized network cost and normalized network cost per unit traffic also rise by approximately 25%. Our results show that the Generalized Moore graph with node degree between 0.05N and 0.08N is both power and cost minimal for a purely optical network.
by Katherine Xiaoyan Lin.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
33

Sipahutar, Halomoan. "Web-based network management configuration for the Indonesian Eastern Fleet Wide Area Network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA390446.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 2001.
Thesis advisors, John Osmundson, Rex Buddenberg. Includes bibliographical references (p. 183-184). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
34

Qureshi, Asfandyar. "Flexible application driven network striping over Wireless Wide Area Networks". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33338.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (p. 157-161).
Inverse multiplexing, or network striping, allows the construction of a high-bandwidth virtual channel from a collection of multiple low-bandwidth network channels. Striping systems usually employ a packet scheduling policy that allows applications to be oblivious of the way in which packets are routed to specific network channels. Though this is appropriate for many applications, many other applications can benefit from an approach that explicitly involves the application in the determination of the striping policy. Horde is middleware that facilitates flexible striping over Wireless Wide Area Network (WWAN) channels. Horde is unusual in that it separates the striping policy from the striping mechanism. It allows applications to describe network Quality-of-Service (QoS) objectives that the striping mechanism attempts to satisfy. Horde can be used by a set of data streams, each with its own QoS policy, to stripe data over a set of WWAN channels. The WWAN QoS variations observed across different channels and in time, provide opportunities to modulate stream QoS through scheduling. The key technical challenge in Horde is giving applications control over certain aspects of the data striping operation while at the same time shielding the application from low-level details. Horde exports a set of flexible abstractions replacing the application's network stack. Horde allows applications to express their policy goals as succinct network-QoS objectives. Each objective says something, relatively simple, about the sort of network QoS an application would like for some data stream(s). We present the Horde architecture, describe an early implementation, and examine how different policies can be used to modulate the quality-of-service observed across different independent data streams. Through experiments conducted on real and simulated network channels, we confirm our belief that the kind of QoS modulation Horde aims to achieve is realistic for actual applications.
by Asfandyar Qureshi.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
35

Rajendran, Ashok. "Security Analysis of a Software Defined Wide Area Network Solution". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190193.

Pełny tekst źródła
Streszczenie:
Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the networking service and eases the complexity of conguring and managing the enterprise network by moving these tasks to software and a central controller. The introduction of new technologies causes concerns about their security. Also, this new solution is introduced as a replacement for MPLS, which has been considered secure and has been in use for more than 16 years. Thus, there is a need to analyze the security of SD-WAN, which is the goal of this thesis. In this thesis, we perform a security analysis of a commercial SD-WAN solution, by finding its various attack surfaces, associated vulnerabilities and design weaknesses. We choose Nuage VNS, an SD-WAN product provided by Nuage Networks, as the analysis target. As a result, many attack surfaces and security weaknesses were found and reported, especially in the Customer Premises Equipment (CPE). In particular, we found vulnerabilities in the CPE's secure bootstrapping method and demonstrated some attacks by exploiting them. Finally, we propose mitigation steps to avoid the attacks. The results of this thesis will help both the service provider and the SD-WAN solution vendor to know about the attack surfaces and weaknesses of SD-WAN before o ering it to their customers. We also help in implementing the temporary countermeasures to mitigate the attacks. The results have been presented to the service provider and the vendor of the SD-WAN product.
Style APA, Harvard, Vancouver, ISO itp.
36

Farrell, Alan D. (Alan Douglas) Carleton University Dissertation Engineering Electrical. "Detection of abnormal router behaviour in a Wide Area Network". Ottawa, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Alhaddad, Abdolrauf Gawad. "Balanced antennas for mobile handset applications : simulation and measurement of balanced antennas for mobile handsets, investigating specific absorption rate when operated near the human body, and a coplanar waveguide alternative to the balanced feed". Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/5512.

Pełny tekst źródła
Streszczenie:
The main objectives of this research are to investigate and design low profile antennas for mobile handsets applications using the balanced concept. These antennas are considered to cover a wide range of wireless standards such as: DCS (1710-1880 MHz), PCS (1850-1990 MHz), UMTS (1920-2170 MHz), WLAN (2400-2500 MHz and 5000-5800 MHz) and UWB frequency bands. Various antennas are implemented based on built-in planar dipole with a folded arm structure. The performance of several designed antennas in terms of input return loss, radiation patterns, radiation efficiency and power gain are presented and several remarkable results are obtained. The measurements confirm the theoretical design concept and show reasonable agreement with computations. The stability performance of the proposed antenna is also evaluated by analysing the current distribution on the mobile phone ground plane. The specific absorption rate (SAR) performance of the antenna is also studied experimentally by measuring antenna near field exposure. The measurement results are correlated with the calculated ones. A new dual-band balanced antenna using coplanar waveguide structure is also proposed, discussed and tested; this is intended to eliminate the balanced feed network. The predicted and measured results show good agreement, confirming good impedance bandwidth characteristics and excellent dual-band performance. In addition, a hybrid method to model the human body interaction with a dual band balanced antenna structure covering the 2.4 GHz and 5.2 GHz bands is presented. Results for several test cases of antenna locations on the body are presented and discussed. The near and far fields were incorporated to provide a full understanding of the impact on human tissue. The cumulative distribution function of the radiation efficiency and absorbed power are also evaluated.
Style APA, Harvard, Vancouver, ISO itp.
38

Alhaddad, A. G. "Balanced antennas for mobile handset applications. Simulation and Measurement of Balanced Antennas for Mobile Handsets, investigating Specific Absorption Rate when operated near the human body, and a Coplanar Waveguide alternative to the Balanced Feed". Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/5512.

Pełny tekst źródła
Streszczenie:
The main objectives of this research are to investigate and design low profile antennas for mobile handsets applications using the balanced concept. These antennas are considered to cover a wide range of wireless standards such as: DCS (1710¿1880 MHz), PCS (1850¿1990 MHz), UMTS (1920¿2170 MHz), WLAN (2400¿2500 MHz and 5000 ¿ 5800 MHz) and UWB frequency bands. Various antennas are implemented based on built-in planar dipole with a folded arm structure. The performance of several designed antennas in terms of input return loss, radiation patterns, radiation efficiency and power gain are presented and several remarkable results are obtained. The measurements confirm the theoretical design concept and show reasonable agreement with computations. The stability performance of the proposed antenna is also evaluated by analysing the current distribution on the mobile phone ground plane. The specific absorption rate (SAR) performance of the antenna is also studied experimentally by measuring antenna near field exposure. The measurement results are correlated with the calculated ones. A new dual-band balanced antenna using coplanar waveguide structure is also proposed, discussed and tested; this is intended to eliminate the balanced feed network. The predicted and measured results show good agreement, confirming good impedance bandwidth characteristics and excellent dual-band performance. In addition, a hybrid method to model the human body interaction with a dual band balanced antenna structure covering the 2.4 GHz and 5.2 GHz bands is presented. Results for several test cases of antenna locations on the body are presented and discussed. The near and far fields were incorporated to provide a full understanding of the impact on human tissue. The cumulative distribution function of the radiation efficiency and absorbed power are also evaluated.
UK Engineering and Physical Sciences Research Council (EPSRC)
Style APA, Harvard, Vancouver, ISO itp.
39

BryerJoyner, Susan Heller Scott D. "Secure local area network services for a high assurance multilevel network /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362547.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 1999.
Thesis advisor(s): Cynthia E. Irvine, James P. Anderson. "March 1999:. Includes bibliographical references (p. 213-215). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
40

BryerJoyner, Susan, i Scott D. Heller. "Secure local area network services for a high assurance multilevel network". Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13583.

Pełny tekst źródła
Streszczenie:
To reduce the cost and complexity of the current DoD information infrastructure, a Multilevel Secure (MLS) network solution eliminating hardware redundancies is required. Implementing a high assurance MLS LAN requires the ability to extend a trusted path over a TCP/IP network. No high assurance network trusted path mechanisms currently exist. We present a design and proof- of-concept implementation for a Secure LAN Server that provides the trusted path between a trusted computing base extension (TCBE) servicing a COTS PC and protocol servers executing at single sensitivity levels on the XTS-300. The trusted path establishes high assurance communications (over a TCP/IP network) between a TCBE and the Secure LAN Server. This trusted channel is used first for user authentication, then as a trusted relay between the protocol server and TCBE. All transmitted data passed over the LAN can be protected by encryption, providing assurance of integrity and confidentiality for the data. This thesis documents the implementation of a demonstration prototype Secure LAN Server using existing technology, including high assurance systems, COTS hardware, and COTS software, to provide access to multilevel data in a user-friendly environment. Our accomplishment is crucial to the development of a full scale MLS LAN.
Style APA, Harvard, Vancouver, ISO itp.
41

Doss, David L. Rhodes Dent. "Development of a multimedia instructional local area network". Normal, Ill. Illinois State University, 1992. http://wwwlib.umi.com/cr/ilstu/fullcit?p9227165.

Pełny tekst źródła
Streszczenie:
Thesis (Ed. D.)--Illinois State University, 1992.
Title from title page screen, viewed January 11, 2006. Dissertation Committee: Dent M. Rhodes (chair), Raymond A. Davidson, Janet D. Hartman, Bill E. Swafford. Includes bibliographical references (leaves 82-85) and abstract. Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
42

Horton, Cody L. "K-12 Local Area Network (LAN) design guide". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA353576.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1998.
"March 2006." Thesis advisor(s): Barry Frew, Maxine Reneker. Includes bibliographical references (p. 57-58). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
43

Fu, Qiang. "Building models of Wireless Local Area Network coverage". Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92030.

Pełny tekst źródła
Streszczenie:
Wireless LANs are becoming more and more popular because they can provide high data rate network access to computer users without the tradition cable. Additionally mobile devices allow people to have connectivity, even when moving from place to place, additionally they are small in size and light in weight. While such devices only offer some of the capabilities of PC they are more convenient to use than a desktop PC when traveling. Cellular phone and smart phones have more function than before, with some newer models phone having an embedded GPS receiver. This GPS receiver can provide user with new services, in addition to location information. Many of these handheld devices include wireless LAN functionality, enabling people to walk from one place to another with a continuous network access, via either the WLAN or the cellular network. By using voice over IP, a wireless enabled hand device becomes a Virtual Cell Phone enabling low cost calls via the WLAN when the user is within coverage of an access point which will give them access, or via the normal cellular phone network (when with in coverage). Because the WLAN coverage is not ubiquitous, it is important to build a Wireless Network Coverage model to enable every user to see where there is WLAN network coverage. Present methods to create such a coverage map require a lot of work to collect data, both indoors and outdoors. Currently a lot of human effort is needed to collect, process, and format this data. The method proposed her could provide an easier way of gathering data from the field and be simple enough that even a normal user could collect data and contribute it to help generate a coverage model of areas where they visit. The measurements reported indicate that it is possible to combine data from multiple devices of the same and different types, but only when the signal strength is high. Fortunately, it is just these areas where the signal quality is good which are of interest to users. The thesis also shows one way of presenting this data in an easy to understand visual manner as an overlay on Google Earth.
Trådlös LANs blir mer och mer populär emedan de kanna skaffa hög datanhastighet nätverken tillträde till computern förbrukaren utantraditionen kabel. Ytterligare rörlig anordningen tillåta folk tillhar connectivity, jämn när flyttanden från ställe till ställe, ochblir liten i storlek och ljus i vikt. Fördriva tiden sådan anordningenbara erbjudande något om anlagen av PC de er mer bekväm till användaän en desktopen PC när resande. Cellular telefonerna och "smart"telefonerna har mer funktion än framför, med något nye modellernatelefonerna har inbyggd GPS. Den här GPS ta emot kanna skaffaförbrukaren med ny tjänsten, dessutom till läge informationen. Mångaav de här handheld omfatta trådlös LAN funktionellitet, sättande istånd till folk till gå från en ställe till en annan med enkontinuerlig nätverken tillträde, via WLAN eller den cellularnätverken. Vid användande röst över IP, en trådlös sättet i stånd tillhand anordning blir en Verklig cellular telefonerna sättande i ståndtill låg kostnad telefonsamtalen via den WLAN när förbrukaren ertäckningenhåll av en tillträde punkt vilken vilja ger dem tillträde,eller via den normal cellular telefonerna nätverken (när i täckningenhåll). Emedan den WLAN täckningen är inte allmänt utbredd, den er viktig tillbygga en Trådlös Nätverken Täckningen modell till möjliggöra varjeförbrukaren till se var där er WLAN nätverken täckningen. Föreställametoderna till skapa sådan en täckningen karta behöva mycket verk tillsamla datan, båda indoors och utomhus. Just nu en masse mänskligansträngning är behövde till samla, förlopp, och formaten den härdatan. Metoden föreslå här kunde skaffa en lättare väg av samlingendatan från fält och bli enkel nog så pass jämn en normal förbrukarenkunde samla datan och bidra med den till hjälp generera en täckningenmodell av områdena var de besöka. Måtten rapportera ange så pass den er möjlig till kombinera datan frånmångfaldig anordningen om det lika och olik typen, utom bara närsignalen styrka är hög. Lyckligtvis, den er rättvis de här områdenavar signalen kvalitet är god vilken är om intresse tillförbrukaren. Theses också visar en väg av presenterande den här datani en lätt till förstå visuell sätt så en täcka över på GoogleEarth.
Style APA, Harvard, Vancouver, ISO itp.
44

Au, Albert Kar-Hing 1972. "A scalable fiber optic local area network demonstrator /". Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33322.

Pełny tekst źródła
Streszczenie:
The continuing advances in silicon integrated circuit technology in accordance with Moore's Law have fueled the constant performance improvement of computing systems. At the same time, the deployment of networks of workstations with high-speed processors has driven the need to increase bandwidth capacities in networked environments. Electrical interconnect technologies are plagued by substantial physical problems at high frequencies, that limit their data transmission capacities. With increasing clock rates, high-bandwidth computing and communication architectures become more difficult to implement using electrical interconnects, and therefore creates a strong motivation for exploring both free-space and fiber-based optical interconnect technologies.
In this thesis, the development of a Fiber Optic Local Area Network (LAN) demonstrator is described. The demonstrator will be used as a testbed for research in high-speed networking technologies, lean protocols, and bandwidth-intensive network-oriented applications, which began at McGill University, Canada, and is being continued at McMaster University, Canada. (Abstract shortened by UMI.)
Style APA, Harvard, Vancouver, ISO itp.
45

Buker, Martin E. "A systematic approach to Local Area Network administration". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/27303.

Pełny tekst źródła
Streszczenie:
A systematic approach to Local Area Network (LAN) administration was presented to help new Administrative Science Department LAN lab staff members conducted management tasks. A two dimensional matrix was developed using the four LAN functional modules and five management task groups. Detailed task procedures were then prepared using the rules developed for the functional modules. Local Area network, LAN, administration, LAN management, LAN administration. Theses
Style APA, Harvard, Vancouver, ISO itp.
46

Morling, R. C. S. "Design of a packet-switched local area network". Thesis, City University London, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.384016.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

MASSARANI, LEONARDO COUTINHO. "INTEGRATING VOICE SERVICES IN A LOCAL AREA NETWORK". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1985. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=14039@1.

Pełny tekst źródła
Streszczenie:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
EMPRESA BRASILEIRA DE TELECOMUNICAÇÕES
Redes locais de computadores têm assumido posição de destaque no processo de automação das tarefas do escritório moderno. Nesses escritórios, o ambiente de trabalho é composto, tipicamente, por dois sistemas de comunicação distintos: um sistema de telefonia para transmissão de voz e uma rede local de computadores para transmissão de dados. O presente trabalho é uma contribuição para mais um passo na escala de integração dos serviços no escritório. E apresentado um estudo da viabilidade e conveniência de se integrar serviços de transmissão de voz e dados em um único sistema de comunicação - a rede local. São levantados problemas e propostas soluções para se realizar esta integração, sendo, então, apresentada a implementação (hardware e software) de um sistema funcional para transmissão de voz na rede local REDPUC.
Modern intraoffice communication requires vehicles for transmission and reception of both voice and digital data signals. The typical automated office includes multifunction workstations linked by a local area network and stand-alone telephones conected to a PBX - two isolated systems. This thesis intends to demonstrate the viability and convenience system - a local area network. The major problems associated with digital voice transmission in discrete packets over a local area network are addresssed in search of adequate solutions. The architecture and preliminary implementation of an experimental telephone system is also described and evaluated.
Style APA, Harvard, Vancouver, ISO itp.
48

Poon, Thomas HonChiu 1959. "FIBER OPTIC LOCAL AREA NETWORK FOR IMAGE PROCESSING". Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/276359.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Brown, Alan. "Efficient service discovery in wide area networks". Thesis, University of Stirling, 2008. http://hdl.handle.net/1893/489.

Pełny tekst źródła
Streszczenie:
Living in an increasingly networked world, with an abundant number of services available to consumers, the consumer electronics market is enjoying a boom. The average consumer in the developed world may own several networked devices such as games consoles, mobile phones, PDAs, laptops and desktops, wireless picture frames and printers to name but a few. With this growing number of networked devices comes a growing demand for services, defined here as functions requested by a client and provided by a networked node. For example, a client may wish to download and share music or pictures, find and use printer services, or lookup information (e.g. train times, cinema bookings). It is notable that a significant proportion of networked devices are now mobile. Mobile devices introduce a new dynamic to the service discovery problem, such as lower battery and processing power and more expensive bandwidth. Device owners expect to access services not only in their immediate proximity, but further afield (e.g. in their homes and offices). Solving these problems is the focus of this research. This Thesis offers two alternative approaches to service discovery in Wide Area Networks (WANs). Firstly, a unique combination of the Session Initiation Protocol (SIP) and the OSGi middleware technology is presented to provide both mobility and service discovery capability in WANs. Through experimentation, this technique is shown to be successful where the number of operating domains is small, but it does not scale well. To address the issue of scalability, this Thesis proposes the use of Peer-to-Peer (P2P) service overlays as a medium for service discovery in WANs. To confirm that P2P overlays can in fact support service discovery, a technique to utilise the Distributed Hash Table (DHT) functionality of distributed systems is used to store and retrieve service advertisements. Through simulation, this is shown to be both a scalable and a flexible service discovery technique. However, the problems associated with P2P networks with respect to efficiency are well documented. In a novel approach to reduce messaging costs in P2P networks, multi-destination multicast is used. Two well known P2P overlays are extended using the Explicit Multi-Unicast (XCAST) protocol. The resulting analysis of this extension provides a strong argument for multiple P2P maintenance algorithms co-existing in a single P2P overlay to provide adaptable performance. A novel multi-tier P2P overlay system is presented, which is tailored for service rich mobile devices and which provides an efficient platform for service discovery.
Style APA, Harvard, Vancouver, ISO itp.
50

Callaghan, Bayer Virginia Rose. "Analysis of Naval Air Systems Command wide-area network prototype implementation". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304273.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1995.
"September 1995." Thesis advisor(s): Barry Frew, Susan Page Hocevar. Bibliography: p. 131-132. Also available online.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii