Дисертації з теми "Application layer protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-40 дисертацій для дослідження на тему "Application layer protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Al, Osman Hussein. "Application Layer Protocol for Haptic Networking." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27663.
Повний текст джерелаThorp, Brian J. "Application Layer Multipoint Extension for the Session Initiation Protocol." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/42245.
Повний текст джерелаMaster of Science
Stone, Steven Walter. "A rapidly reconfigurable, application layer, virtual environment network protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA312937.
Повний текст джерелаAgrawal, Ambuj. "Implementation of Application Layer Protocol for an Active RFID System." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34961.
Повний текст джерелаMaster of Science
Diabi, Abdelfettah. "A hybrid application-layer multicasting protocol for distributed simulations on the Internet." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27213.
Повний текст джерелаMehta, Anil. "MAC AND APPLICATION LAYER PROTOCOLS FOR HIGH PERFORMANCE NETWORKING." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/396.
Повний текст джерелаKrontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.
Повний текст джерелаDetta examensarbete analyserar säkerhetsprotokoll av typen ApplicationLayer för certifikatregistrering och hantering. EDHOC, Ephemeral Diffie-Hellman Over COSE, har implementerats, analyserats och utvärderats. EDHOC är ett nyligen utvecklat Application Layer-protokoll som är utformat för att tillhandahålla autentiserings- och nyckelfunktionsfunktioner med kompakta meddelandestorlekar och minimala rundturstider, inriktat på IoT-begränsade enheter. Huvudområdet för examensarbetet är att studera säkerhet, prestanda och skalbarhet (i fallande ordning av betydelse) hos EDHOC jämfört med andra föreslagna Application Layer-säkerhetsprotokoll som utför certifikatsskrivning.
Cousin, Bernard. "Methodologie de validation des systemes structures en couches par reseaux de petri : application au protocole transport." Paris 6, 1987. http://www.theses.fr/1987PA066322.
Повний текст джерелаЖуравльов, Павло Володимирович. "Сервіс автоматизованого перенесення існуючих рішень для Інтернету речей на Thingspeak". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26947.
Повний текст джерелаThe thesis contains 76 pages, 19 figures, 19 tables, 25 references. Relevance. The scope of the Thingspeak platform is limited by the need to use the HTTP protocol to interact with client devices. In recent years, alternative protocols have been developed for the Internet of things and devices on their base are becoming increasingly popular, due to the need to expand the Thingspeak platform to add support for these protocols and devices. Purpose. An analysis of approaches to extending the use of the Thingspeak platform, further enabling the use of existing solutions that implement the protocol but are not supported by the platform under consideration. The main task is to study the design of an intermediate application to interoperate devices that use the MQTT protocol with the Thingspeak platform. Results. As a result of the work, a system that transmits MQTT and HTTP protocols with an intermediate data conversion into a format that matches the Thingspeak data model was implemented. This implementation also includes the ability to set the rules for which the conversion is carried out. To manage the data conversion parameters, a web application with a graphical user interface was developed. The system is easy to deploy and can be used as a complement to existing technology with Thingspeak platform. Object of research. Internet of Things. Subject of research. Networking between Internet applications of things. Approaches to creating applications that perform the function of translating application level protocols. Research methods. In order to solve the problem in this work, methods of analysis, synthesis, system analysis, comparison and logical generalization of the results are used. Scientific novelty. The scientific novelty of the work consists in the analysis and implementation of methods that allow the conversion of the Thingspeak-compliant MQTT protocol to HTTP. Practical value. The developed application can be deployed on the existing university infrastructure. It includes a convenient interface for describing configurations and can be used to integrate existing applications supporting the MQTT protocol and the Thingspeak platform.
Общий объем работы 76 страниц, 19 иллюстраций, 19 таблицы, список литературы из 25 наименований. Актуальность темы. Область применения платформы Thingspeak ограничена необходимостью использования протокола HTTP для взаимодействия с клиентскими устройствами. В последние годы приобретают все большую популярность альтернативные протоколы, разработанные для интернета вещей и устройства на их базе, чем обусловлена необходимость расширения платформы Thingspeak для добавления поддержки данных протоколов и устройств. Цель и задачи исследования. Анализ подходов к расширению области использования платформы Thingspeak с последующим обеспечением возможности использования существующих решений, реализующих протокол, но не поддерживаются рассматриваемой платформой. Главной задачей является исследование, заключающееся в проектировании промежуточного приложения для обеспечения взаимодействия устройств, использующих протокол MQTT с платформой Thingspeak. Решение поставленных задач и достигнутые результатах В результате выполнения работы была реализована система, осуществляющая трансляцию протоколов MQTT и HTTP с промежуточной конвертацией данных в формат, соответствующий модели данных платформы Thingspeak. Данная реализация также включает возможность установки правил, по которым происходит конвертация. Для управления параметрами конвертации данных был разработан веб-приложение с графическим интерфейсом администратора. Система проста в развертывании и может быть использована как дополнение к развернутой платформе Thingspeak. Объект исследования. Интернет вещей. Предмет исследования. Сетевое взаимодействие между приложениями Интернета вещей. Подходы к созданию приложений, которые выполняют функцию трансляции протоколов прикладного уровня. Методи исследования. Для решения проблемы в данной работе используются методы анализа, синтеза, системного анализа, сравнения и логического обобщения результатов. Научная новизна. Научная новизна работы заключается в анализе и реализации методов, позволяющих конвертировать неподдерживаемый системой Thingspeak протокол MQTT в HTTP. Практическое значение полученных результатов Разработанное приложение может быть развернуто на кафедральной инфраструктуре. Оно включает в себя удобный интерфейс для описания конфигураций и может быть использован для интеграции существующих приложений с поддержкой протокола MQTT и кафедральной платформы Thingspeak.
Bian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Повний текст джерелаElmasri, Basil. "Detection of denial of service attacks on application layer protocols." Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/807702/.
Повний текст джерелаGineste, Mathieu. "Spécification d'un cadre générique pour l'expression et le déploiement de la Qualité de Service dans les architectures de communication : application à une architecture de communication par satellite." Paris 6, 2006. http://www.theses.fr/2006PA066267.
Повний текст джерелаSohlman, Patrik. "A study of application layer protocols within the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36100.
Повний текст джерелаAl-Anbagi, Irfan. "Quality of Service for Wireless Sensor Networks in Smart Grid Applications." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/26186.
Повний текст джерелаBakthavachalu, Sivakumar. "SF-SACK a smooth friendly TCP protocol for streaming multimedia applications /." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000608.
Повний текст джерелаJarupan, Boangoat. "CROSS-LAYER DESIGN FOR LOCATION- AND DELAY-AWARE COMMUNICATION IN VEHICULAR NETWORKS." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1306504587.
Повний текст джерелаHurtig, Per. "Transport-Layer Performance for Applications and Technologies of the Future Internet." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-8920.
Повний текст джерелаPaper V was in manuscript form at the time of the defense.
Filiault, Matthew. "Digitization protocols and applications for laser scanning human bone in forensic anthropology." Honors in the Major Thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1531.
Повний текст джерелаID: 031908492; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Accepted in partial fulfillment of the requirements for honors in the major in DEPT HERE.; Thesis (B.A.)--University of Central Florida, 2012.; Includes bibliographical references.
B.A.
Bachelors
Sciences
Anthropology
Yadav, Poonam. "Cross-layer protocols to support periodic data collection and event driven wireless sensor network applications." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/9218.
Повний текст джерелаGuzzo, Natale. "Facing the real challenges in wireless sensor network-based applications : an adaptative cross-layer self-organization WSN protocol." Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10190.
Повний текст джерелаWireless Sensor Networks (WSN) is one of the protagonists contributing to the evolution and the development of the Internet of Things (IoT). Several use cases can be found today in the different fields of the modern technology including the container shipping industry where containerized cargo accounts for about 60 percent of all world seaborne trade. In this context, TRAXENS developed a battery-powered device named TRAX-BOX designed to be attached to the freight containers in order to track and monitor the shipping goods along the whole supply chain. In this thesis, we present a new energy-efficient self-organizing WSN protocol stack named TRAX-NET designed to allow the TRAX-BOX devices to cooperate to deliver the sensed data to the TRAXENS platform.The results of simulations and field tests show that TRAX-NET well perform in the different scenarios in which it is supposed to operate and better fulfil the requirements of the assumed application in comparison with the existing schemes
Atto, Muhsin. "Cross layer based protocols for energy aware and critical data delivery related applications using wireless sensor networks." Thesis, University of Reading, 2016. http://centaur.reading.ac.uk/65727/.
Повний текст джерелаBoussemart, Vincent. "Bénéfices de la communication inter-protocoles au niveau applicatif et des ressources pour contrôler les interférences dans les communications satellites." Thesis, Toulouse, ISAE, 2013. http://www.theses.fr/2013ESAE0013/document.
Повний текст джерелаThis Ph.D. investigates resource management optimisations in the return-link of interference-limited multi-beam satellitesystems which can be seen as virtual MIMO systems. It focuses on the interference that users located in different beamsgenerate towards each other, when transmitting data at the same time and on the same frequency. The number offrequencies (colours) present in the satellite system rules the overall bandwidth and therefore the system capacity. Whenthe number of colours becomes low, e.g. considering one colour, the level of interference increases dramatically but thebandwidth available in each beam gets higher. Hence there is a tradeoff between number of colours and level ofinterference. The influence of the satellite channel is first studied by analysing the BER obtained through interferencecancellation techniques. The Ph.D. then moves towards information theory and investigates the impact of the colours onthe achievable sum rates. MUD schemes are then used to derive the per-user rates, and the max-min criterion is applied tothe user rates showing an improvement of the level of fairness between users. The different outcomes are used to optimisethe resource management. However, scheduling for large scale MIMO systems, as in the return-links of satellitecommunications, represents a challenging task, since the search space is prohibitive large. For this reason this Ph.D. alsoinvestigates low complexity heuristic algorithms based on graph theory with the aim of finding sub-optimal schedules.Finally, the number of spot beams and the number of users considered for scheduling are studied so as to propose newalgorithms aiming to satisfy quality of service constraints
Ramarathinam, Venkatesh. "A control layer algorithm for ad hoc networks in support of urban search and rescue (USAR) applications." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000604.
Повний текст джерелаCastro, Bianca Portes de. "PALMS+: protocolo ALM baseado em desigualdade triangular para distribuição de streaming de vídeo." Universidade Federal de Juiz de Fora (UFJF), 2014. https://repositorio.ufjf.br/jspui/handle/ufjf/4831.
Повний текст джерелаApproved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-06-07T11:04:29Z (GMT) No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5)
Made available in DSpace on 2017-06-07T11:04:29Z (GMT). No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5) Previous issue date: 2014-08-25
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Aplicações multimídia são muito populares na internet. Grande parte delas necessita de multicast para escalar. É sabido que multicast em nível de redes não foi implementado como desejado. Protocolos em nível de aplicação são a solução atual. Apesar do sucesso dos protocolos ALM (Application Layer Multicast), a maioria dos protocolos existentes são custosos e acarretam grande sobrecarga de controle à rede. Neste trabalho, apresentamos um novo protocolo de fluxo contínuo baseado em árvore, utilizando a desigualdade triangular entre cada três peers para gerenciamento dinâmico da topologia (o PALMS+). O novo protocolo é simples e com baixa sobrecarga. Mesmo assim, seu desempenho é tão bom quanto o estado da arte. Experimentos realizados na plataforma Oversim (OMNet++) demonstraram que o PALMS+ manteve desempenho tão bom quanto o estado da arte (e.g. protocolo NICE), mesmo quando submetido a alto churn em uma rede heterogênea. De fato, a sobrecarga nos peers do novo protocolo é menor que 10% da sobrecarga gerada pelo NICE. O protocolo PALMS+ entrega os dados em menos de 1,5s. O novo protocolo mostra-se adequado a vídeo ao vivo, escalando mesmo em cenários realistas e com alto churn.
Multimedia applications are very popular on the internet. Many of these applications need multicast to scale. However, network layer multicast has not been implemented in the internet. Application layer multicast (ALM) protocols are a practical alternative. However, despite their popularity, many existing ALM protocols and mechanisms are expensive and bring a large overhead control on the network. In the present work, a new protocol is proposed for content distribution based on tree, using the triangular inequality between every three peers to dynamic topology control (the PALMS+). The new protocol is simple and with low overhead. Nevertheless, its performance as good as the state of the art. Experimental results conducted with the OverSim platform (OMNet++) suggest that PALMS+ improves the performance of a state-of-art implementation of ALM protocol when compared against the NICE protocol. Furthermore, the control message overhead at peers using the PALMS+ protocol is reduced by 10%, when compared with NICE. In the PALMS+ protocol, chunks are delivered up to 1,5s. Results confirm that proposed implementation of PALMS+ is very suitable to real-time video streaming, even when churn is high.
Oliveira, Marlos Andr? Marques Sim?es de. "Um protocolo de comunica??o multicast na camada de aplica??o com Consci?ncia de Localiza??o." Universidade Federal do Rio Grande do Norte, 2010. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15135.
Повний текст джерелаInternet applications such as media streaming, collaborative computing and massive multiplayer are on the rise,. This leads to the need for multicast communication, but unfortunately group communications support based on IP multicast has not been widely adopted due to a combination of technical and non-technical problems. Therefore, a number of different application-layer multicast schemes have been proposed in recent literature to overcome the drawbacks. In addition, these applications often behave as both providers and clients of services, being called peer-topeer applications, and where participants come and go very dynamically. Thus, servercentric architectures for membership management have well-known problems related to scalability and fault-tolerance, and even peer-to-peer traditional solutions need to have some mechanism that takes into account member's volatility. The idea of location awareness distributes the participants in the overlay network according to their proximity in the underlying network allowing a better performance. Given this context, this thesis proposes an application layer multicast protocol, called LAALM, which takes into account the actual network topology in the assembly process of the overlay network. The membership algorithm uses a new metric, IPXY, to provide location awareness through the processing of local information, and it was implemented using a distributed shared and bi-directional tree. The algorithm also has a sub-optimal heuristic to minimize the cost of membership process. The protocol has been evaluated in two ways. First, through an own simulator developed in this work, where we evaluated the quality of distribution tree by metrics such as outdegree and path length. Second, reallife scenarios were built in the ns-3 network simulator where we evaluated the network protocol performance by metrics such as stress, stretch, time to first packet and reconfiguration group time
Atualmente aplica??es em grupo na Internet est?o em ascens?o, como por exemplo transmiss?o de ?udio e v?deo, computa??o colaborativa e jogos com m?ltiplos participantes. Isso leva ? necessidade de comunica??o multicast, mas infelizmente o suporte a este tipo de servi?o n?o est? amplamente dispon?vel pela camada de rede. Por isso, no atual est?gio tecnol?gico surgiram solu??es de protocolos multicast implementados na camada de aplica??o para suprir tal defici?ncia. Al?m disso, estas aplica??es muitas vezes se apresentam simultaneamente como provedores e clientes dos servi?os utilizados, caracterizando-as como aplica??es denominadas peer-to-peer, possuindo caracter?sticas din?micas, onde os participantes podem entrar e sair de um grupo com uma freq??ncia muito alta. Assim, algoritmos centralizados de ger?ncia de grupo n?o apresentam bom desempenho para essa classe de aplica??es, e mesmo as solu??es peer-to-peer tradicionais necessitam ter algum mecanismo que leve em considera??o essa volatilidade. A id?ia de consci?ncia de localiza??o permite distribuir os participantes na rede virtual de acordo com a sua proximidade na rede f?sica, permitindo um bom desempenho nas opera??es de gerenciamento do grupo. Diante deste contexto, nesta tese ? proposto um protocolo de comunica??o multicast na camada de aplica??o, chamado LAALM, que leva em considera??o a topologia da rede real no processo de montagem da rede virtual, utilizando uma nova m?trica denominada IPXY para prover a consci?ncia de localiza??o, atrav?s do processamento de informa??es locais. O LAALM foi implementado utilizando uma ?rvore distribu?da compartilhada e bi-direcional, possuindo uma heur?stica sub-?tima para o processo de inclus?o de novos participantes que visa minimizar o custo de constru??o da ?rvore de distribui??o de dados. A avalia??o do protocolo foi realizada de duas formas distintas: i) atrav?s de um simulador pr?prio onde se procurou avaliar a qualidade de constru??o da ?rvore de distribui??o gerada, avaliando-se m?tricas como o n?mero de filhos por cada n? e a dist?ncia final entre os n?s; ii) atrav?s de cen?rios real?sticos constru?dos no simulador de redes ns-3, onde foi avaliado o desempenho do protocolo atrav?s de m?tricas como stress, stretch e tempos de associa??o e reconfigura??o dos grupos
Sabil, Mariem. "L’autorité renforcée des accords multilatéraux sur l’environnement : essai sur la nature, la place et la fonction de la procédure de non-conformité." Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30106.
Повний текст джерелаMultilateral agreements on the environment are generally characterized by their normative authority diminished because of the difficulties for states to ensure their effective implementation and efficiency. The non-compliance procedure, for the first time experienced by the Montreal Protocol on Substances that Deplete the Ozone Layer and extended since then, attempts to provide appropriate solutions to the peculiarities of this branch of public international law.The study of its development, its evolution and sophistication through its nature, its place and function and to determine whether this technique helps to strengthen executive authority of multilateral environmental agreements
Su, Yu-Wei, and 蘇昱維. "An Analyser for Application Layer Protocol." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/35843433826341176261.
Повний текст джерела國立高雄第一科技大學
電腦與通訊工程所
94
ABSTRACT Internet brings a lot of facilities to people. Our every day lift almost can’t normal without network. Today, network has already become our part of the daily life, this makes a lot of people want to understand the network science and technology. In the network, the application layer is the one directly contact with users. People use the services applied from application layer to shopping, chat, learning etc. In the network, these has a set of mechanisms that are running behind one''s back, this set of mechanisms is the communication protocol. Essentially on the network, it is packets transmit between server and client. But, when and what message the packet should transmit is the essence of the communication protocol. How to understand the protocol is the key point of this thesis. The open source software snort is a cross-platform, lightweight intrusion detection system. The lightweight means it can easily be deployed on most any node of a network, with minimal disruption to operations. That is to say it can be easily configured by system administrators to suit there requirement. This thesis will utilize this some characteristics. We will use snort as the core to design a system to capture the packages, and design a friendly webpage interface to show these packages systematically. We hope the system could help them want to understand communication protocols.
Chun-HaoTang and 唐君豪. "OM2M Platform with Application-layer Protocol Management and Selection Mechanisms." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q6nhwb.
Повний текст джерелаSen, Souvik. "Restructuring Wireless Systems using PHY Layer Information." Diss., 2012. http://hdl.handle.net/10161/5807.
Повний текст джерелаWireless and mobile systems play an increasingly important role in our lives. Fueled by an array of innovative services and applications, mobile data traffic is surging rapidly. Traditionally, wireless traffic growth is met by acquiring new spectrum. However, wireless spectrum demand is soon going to surpass it's availability. Thus, there is an urgent need for major innovations in wireless network architecture, so that our spectrum utilization can achieve its full potential. Motivated by this problem, we explore an alternative design of physical layer aware wireless systems.
Typical approaches towards improving wireless performance is confined within the physical (PHY) or link layers of the networking stack, providing only partial so- lutions. In this thesis, we advocate to consider the entire network architecture holis- tically. We show how rich PHY layer information can be utilized to address existing challenges in wireless networking - contention resolution, rate control, interference management, etc. We design, implement, and experimentally evaluate protocols to understand network-wide implications of PHY-aware systems. We also pursue the observation that PHY layer not only encode bits but also contain rich information about the ambience, and hence can be viewed as a sensor. This sensing informa- tion can be further coupled with other phone sensors, thereby benefitting pervasive mobile services and applications. We demonstrate how this synergy can contribute towards designing precise indoor localization systems, an important building block for next generation mobile applications.
Dissertation
Jyun-YuKe and 柯均豫. "The Implementation of Application Layer Gateway for Session Initiation Protocol in The IVI Translation Mechanism." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/67677213435543805534.
Повний текст джерела國立成功大學
資訊工程學系碩博士班
100
The progress of Internet technology brings the rapid growth of multimedia application, especially the application of Voice over Internet Protocol such as Skype and MSN which are popular in the world. One of the well-known signaling protocols of VoIP, Session Initiation Protocol (SIP), widely spreads and commonly applies. The software and devices in use of SIP gradually increase. Each VoIP device needs to assign an IPv4 address for communication. Nowadays the IPv4 addresses have been exhausted because it still widely uses IPv4 addresses for network. IPv6 which can provide large address space is proposed to replace IPv4. However the IPv6 deployment is not widespread. The duration of transition from both IPv4 and IPv6 networks can make users or devices in IPv4 and IPv6 networks communicate with each other. One of transition mechanism, the IVI translation mechanism, allows users to access IPv4 and IPv6 networks. But the IVI translation does not translate the payload of packet. We implement a translation for SIP in VoIP with IVI translation mechanism such that it can translate SIP messages form IPv4 or IPv6 networks.
Rutagemwa, Humphrey. "Performance Modeling, Design and Analysis of Transport Mechanisms in Integrated Heterogeneous Wireless Networks." Thesis, 2007. http://hdl.handle.net/10012/2770.
Повний текст джерелаLee, Chao-Hsien, and 李昭賢. "Design and Analysis of Application-layer Mobility Management Protocols." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/98880254820273902728.
Повний текст джерела國立成功大學
資訊工程學系碩博士班
95
As the progress of computing and wireless techniques, mobile communication has changed the modern life style. When users become mobile, they must suffer some kind of the handoff process from one domain to another. Thus, mobility management must be the key issue of mobile communication. From the past research, the handoff process may occur in (1) data link layer, (2) network layer, or (3) application layer. Nevertheless, the handoff problem can usually be resolved using the application-layer approach no matter which layer it occurs. The goal of this dissertation is to design and analyze application-layer mobility management protocols. First, we survey and investigate two application-layer protocols, which are (1) application-layer anycast and (2) Session Initiation Protocol (SIP). Then, we utilize and extend these two application-layer protocols to solve two handoff problems occurred in different layers, which are (1) Proxy Handoff and (2) network mobility, respectively. Next, we evaluate the proposed application-layer mobility management protocols using different methods, i.e., real implementation and simulation. Finally, we discuss and conclude the characteristics of application-layer mobility management protocols.
Huang, Chia-Hui, and 黃家煇. "Design and Analysis of Application Layer Multicast Routing Protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/ww8r8p.
Повний текст джерела國立臺北科技大學
資訊工程系研究所
101
Application Layer Multicast (ALM) routing is an indispensable mechanism for efficient distribution of data from a source or many sources to many receivers. With the growing of Internet real-time and file sharing applications that demand large network resources and call for multicasting mechanism, the necessity of analyzing and deriving the minimum cost of ALM routing protocols and developing an efficient ALM routing protocol is explicit. According to the number of sources, ALM routing protocols can be categorized into single-source and multisource. The main goal of this research is to design a multisource ALM routing protocol with fast route recovery and low cost. With the goal, a multisource ALM routing with fast route recovery mechanism, distributed data forwarding trees (DMFTs), was firstly developed, and the theoretical minimum cost of multisource ALM routing protocols was found by deriving and proving a multiplicative property on the costs of multisource ALM routings relative to single-source ones. With the multiplicative property, the minimum cost of multisource ALM routings can be simply obtained by multiplying the minimum cost of single-source ALM routings by the number of sources. By analyzing the minimum costs of single-source and multisource ALM routings, the research discovered and proved the cost impact that the performance penalty of ALM continuously increases with multicast group size until a certain group size is reached. That is, as the multicast group size is over the certain value, the performance penalty starts to decrease. From theoretical analyses, the research proposed principles to design an ALM routing protocol. The objective of the principles is to reduce the delay and jitter of ALM routing by reducing the total cost of ALM routing tree. Applying the design principles on DMFTs, the research proposed a new multisource ALM routing protocol, cluster based distributed forwarding trees (CDMFTs). Through intensive computer simulations, it can be shown that the control overhead, dealy, jitter, link stress, and total tree length of CDMFTs were reduced by 2% to 80%, comparing to that of DMFTs. The results demonstrated the efficiency of CDMFTs as well as the effectiveness of the proposed design principles. The analytical analysis and design work provided useful insights for the researchers and developers of ALM routing protocols.
Venugopalakrishna, Y. R. "Data Fusion Based Physical Layer Protocols for Cognitive Radio Applications." Thesis, 2016. http://etd.iisc.ernet.in/handle/2005/2683.
Повний текст джерелаHsieh, Chung-Da, and 謝忠達. "Performance Comparison of Robust Application Layer Multicast Protocols with Heterogeneous Hosts." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/75743124972841227134.
Повний текст джерела國立中正大學
通訊工程研究所
95
Recently, researches on Application Layer Multicast (ALM) become more and more popular due to the prevailed broadband network and high performance personal computers. One of the key issues on designing ALM is the robustness to member failures. A noticeable solution is to build node-disjoint multicast trees such that failure of a member only affects one of the multicast trees and other members could still receive data from the rest multicast trees. In the literature, most of the researches focused on the homogeneous environment. However, the real network is the environment fulfilled with the heterogeneous computers and network devices. Therefore, in this thesis, we simulated several ALM protocols in heterogeneous environment to identify the key factor that affects the robustness of ALM protocols. From our simulation results, we have observed that the balanced structure of clusters affects the performance significantly. If the members are more aggregated such that each cluster is composed with large number of members, the system will be more robust to member failures.
Pequegnat, Andrew. "Novel Laser Based NiTi Shape Memory Alloy Processing Protocol for Medical Device Applications." Thesis, 2014. http://hdl.handle.net/10012/8306.
Повний текст джерелаBarroca, Norberto José Gil. "Innovative energy-efficient wireless sensor network applications and MAC sub-layer protocols employing RTS-CTS with packet concatenation." Doctoral thesis, 2014. http://hdl.handle.net/10400.6/3303.
Повний текст джерелаΚιουμουρτζής, Γεώργιος. "Πρωτόκολλα πραγματικού χρόνου για τη μετάδοση πληροφορίας πολυμέσων με δυνατότητα προσαρμογής σε δίκτυα μη εγγυημένης ποιότητας". Thesis, 2010. http://nemertes.lis.upatras.gr/jspui/handle/10889/4061.
Повний текст джерелаMultimedia applications have gained in recent years an increasing demand from Internet users as they offer new opportunities and diverse multimedia services. These applications, however, are subject to restrictions which mainly have to do with its nature and are characterized by high requirements of the transmission rates (bandwidth-consuming applications) and their sensitivity to delays in the transmission of packets by the consignor to consignee (delay-sensitive applications). On the other hand, allegedly these applications are less sensitive to packet losses (packet-loss tolerant applications). The issue, however, with multimedia applications, except for the scope of the services which offer, is the Quality of Services (QoS) that is offered to the end user. This quality of services is directly linked to the above characteristics of multimedia applications. The approach so far by the research community and also the Internet Service Providers (ISPs), as regards ensuring the quality of service, has focused either to individually optimizing the efficiency of transmission protocols, or in the installation of additional equipment (servers) for the establishment of distribution networks (Content Distribution Networks, CDNS) which are normally positioned close to the final user. In addition, the growing effort of the research community with a view to increasing the quality of service offered new innovative solutions in the form of services-architectures like the Integrated Services (Intserv) and Differentiated Services (Diffserv ) which aspire to offer guarantees of quality of services in specific user groups. But these two architectures failed until now to become the solution for the provision of guarantees of quality of services to the end user due to difficulties in applying them which have to do with financial criteria and the structure of the Internet itself. Therefore, we can see that despite the progress made so far in networks technology the provision of QoS across the Internet is not still feasible with the result that multimedia services via the Internet (for example “YouTube”) are significantly affected by the changes of the network conditions. To this course, the research community has directed to the study of mechanisms which will be able to adjust the transmission rate of multimedia data, according to the conditions of the network, so as to offer the best possible quality of service to the end user. This effort could be classified into two broad categories, according to the way the multimedia information is routed, as follows: • Adaptation mechanisms for unicast transmission: In this case the adaptation mechanisms regulate the transmission rate between the sender and the receiver in a unicast connection. • Adaptation mechanisms for multicast transmission: In this case the adaptation mechanisms regulate the transmission rate between the sender and a group of receivers. Regarding the unicast transmission the predominant proposal is the congestion control mechanism that is termed as the “TCP-friendly Rate Control (TFRC) and has been accepted as an international standard by the Internet Engineering Task Force (IETF). In the area of multicast transmission the TCP-friendly Multicast Congestion Control (TFMCC) has also become acceptable as an experimental standard from IETF. Nevertheless, laboratory studies and experiments have shown that both TFRC and TFMCC are not the most suitable adaptation mechanisms for multimedia transmission. The main problems have to do with its friendliness towards the Transmission Connection Protocol (TCP) and the sudden fluctuations in the transmission. rate. These sharp variations of the transmission rates are an attribute non desirable by multimedia applications and particularly by real-time applications. In the area of wireless networks the problems with the transmission of multimedia data are not directly linked to the congestion of the network (this mainly occurs in wired networks) as the packet losses are a direct result of the free space propagation. The approach so far has aimed at the individual optimization of the various protocols of the OSI model so as to reduce the transmission problems and minimize packet losses and the delays from the sender to the end user. In recent years, however, a different approach which has prevailed to be termed internationally as “cross-layer optimization-adaptation” has earned more and more space. Under this approach we could be able to succeed the optimization of the service, regarding the quality of multimedia applications, by means of some adaptation mechanisms which will involve more than one of the OSI layers to current network conditions. The methodology, the challenges, the restrictions and the applications of cross layer adaptation constitute an open research area which is currently in progress. The aim of this dissertation is firs the study of the existing congestion control mechanisms which mainly concern best-effort wired networks, such as the Internet. In this direction we evaluate the existing congestion/flow control mechanisms and record the main problems related to the quality of service. The performance evaluation is based on criteria relating both to TCP-friendliness and the quality of service of multimedia applications. This performance evaluation leads us to the design of new protocols which promise greater TCP-friendliness and better quality of service. An important element that distinguishes these protocols of the other approaches is the “smooth” behavior by which we minimize the high oscillations of the transmission rate, which are not desirable by multimedia applications, while maintaining a high response to sudden changes of network conditions. A second important element of this dissertation is the additions we have made to the libraries of the ns-2 simulator which are already exploited by other researchers. For this purpose the new protocols are fully defined and incorporated into the ns-2 libraries so as to be available to the research community as part of the simulator, for further studies and evaluation. At the same time we expand existing research tools in order to enable the analysis and evaluation of existing and future mechanisms based on quality criteria specific to multimedia applications, along with network-centric criteria. Regarding the wireless networks we study the cross layer adaptation and how it is possible to achieve the increase in the quality of service by implementing such a design. We study the various ways and design methodologies of a cross layer adaptation and propose a new framework with which it is possible to increase the quality of service in hybrid networks consisting of both by wired and wireless users.
Biswas, Jayanta. "Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless Networks." Thesis, 2005. http://etd.iisc.ernet.in/handle/2005/1402.
Повний текст джерелаSteinleitner, Niklas. "Firewall Traversal in Mobile IPv6 Networks." Doctoral thesis, 2008. http://hdl.handle.net/11858/00-1735-0000-0006-B3B0-2.
Повний текст джерела