Дисертації з теми "Fournisseur d'accès à internet"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-38 дисертацій для дослідження на тему "Fournisseur d'accès à internet".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Duhen, Willy. "La responsabilité extra-contractuelle du fournisseur d'accès à Internet." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM1052.
Повний текст джерелаInternet Service Providers are major actors of the Information Society. They offer connections, controls access points, and can also identify their users. Their many liabilities result from their multiple functions as technical services provider, data controller or performers of judicial orders. These legal obligations are numerous and sometimes overabundant. In spite of an existing and specific liability status, the very notion of "Internet service provider" still remains legally undefined. This lacuna entails a profusion of legal status imposing an ISP status to players for which the main activity is not to provide an Internet connection : Universities, companies, individuals. From then on, criminal, civil and administrative liabilities multiply and create an instable, obscure and even abstruse status. This lexical and legal scattering is even worsened by the functional application of the electronic communications and Information Society legal framework to access providing activities. It is then necessary to unify the legal regimes associated to those activities according to stabilized legal concepts. This reconstruction will inevitably affect the Information Society legal framework as a whole. Eventually, it will open on a possible ground for the electronic communications legal framework
Fodil, Idir Bahaa. "Architectures de Gestion par Politiques des Services dans les Réseaux d'Accès Internet." Paris 6, 2004. http://www.theses.fr/2004PA066118.
Повний текст джерелаRichebourg, Aube. "L'internet associatif en France et en Allemagne : sociologie d'une rémanence utopique." Electronic Thesis or Diss., Paris, EHESS, 2024. http://www.theses.fr/2024EHES0134.
Повний текст джерелаOn the fringes of the digital revolution, unknown to the general public, volunteers have been administering and providing non-profit Internet services for thirty years. These associations, some of them very old, are trying to keep alive the organisational utopia that dates back to the beginnings of the network and the values associated with it. But what is it that still drives volunteers to defend this lost cause? What function does their commitment fulfil? And how does it fit into the evolution of the internet over the last thirty years?This thesis offers a sociological analysis of the “utopian practice” and the conditions of its persistence, based on a comparative survey between France and Germany combining ethnography and archival work. Using the perspective of configuration analysis borrowed from Norbert Elias, we will explain how the conservative and adaptive capacity of this associative movement responds to the relative frustrations of those disappointed by the digital revolution, by crossing structural, organisational and individual levels of analysis.The thesis begins by tracing the sociogenesis of the associative Internet in the 1990s, between pioneering practices, economic marginalisation and discreet insertion into local public connection policies. It was in the 2000s that associative activity became ‘utopian’, through the actions of ‘utopian entrepreneurs’, on the fringes of the then emerging activism in defence of digital rights and freedoms. Secondly, the thesis shows, from an organisational point of view, how Internet associations were shaped from the inside by successive waves of volunteers who, according to their own socialisation on the Internet, invested in a sense of the cause and a corresponding organisational model. Finally, on an individual level, thanks to a utopian division of labour that enabled people to practise their profession in a different way, we will explain how involvement in these associations was rewarded for pioneers and later volunteers alike. As a link between the alternative socialisations that make up the relationship to learning, the desire for autonomy, freedom and security, the associations create the conditions for an individual utopia for those who manage to join them, compensating for the power relationships they experience at work.So, while organising the preservation of pre-market practices of collaboration between peers, the associative internet offers its followers avenues of transformation, particularly regarding the individual and collective relationship to activity. The comparison enables us to grasp the contours of a European Internet utopia and what the diversity of utopian practices owes to national power structures, particularly regarding regulation of the telecommunications market. Beyond a normative perspective that sees utopia in society as a factor for unambiguous change, or as a system of ideas opposing conservative fictions and geared towards a better society, this thesis aims to contribute to a sociological understanding of utopian phenomena based on an analysis of their logical practices
Li, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Повний текст джерелаSecurity policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her security requirements and chooses the service providers that fit these requirements.The first part of this dissertation is dedicated to service provider selection. In case that the security policies of the service provider are accessible to the service customer, we provide a method for measuring the similarity between security policies. Another case is that security policies are not accessible to the service customer or not specified explicitly. Our solution is proposing a policy-based framework which enables the derivation from attribute-based security requirements to concrete security policies. The second part of the dissertation focuses on the security policy negotiation. We investigate the process of reaching agreement through bargaining process in which negotiators exchange their offers and counter offers step by step. The positive result of the negotiation generates a policy contract
Fayçal, Marguerite. "Routage efficace pour les réseaux pair-à-pair utilisant des tables de hachage distribuées." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00521935.
Повний текст джерелаThis dissertation is a synthesis of our research at Orange Labs (formerly France Telecom R&D) to answer a problem identified by the aforesaid network operator and concerning peer-to-peer (P2P) streams. The rise of P2P requires new systems to meet the needs of users, but also those of ISPs and other network operators. The former seek permanently quite noticeable high QoS; the latter aim to optimize the use of network resources and to reduce various operations’ and management costs. Hence the interest of this thesis, that aims to let a P2P network be aware of its underlying IP network in order to achieve a system with an efficient routing mechanism that leads to a win-win situation. Our research focuses on systems based on distributed hash tables (DHT), that we study and analyze first. This dissertation begins with an analysis of the main protocols for discovery of dynamic resources in the different P2P architectures. The requirements for efficient P2P routing are then established. Afterwards, discovery techniques for generating and providing underlay network proximity information are presented, followed by techniques and main systems that exploit such information. Our research led to the definition, design, specification and both individual and comparative analysis of two systems: CAP (Context-Aware P2P system) and NETPOPPS (Network Provider Oriented P2P System). The former introduces semantics in the identifiers of peers and objects and is context-aware. The latter simplifies the management of the different identifiers and is network operator oriented: it enables cooperation between P2P traffic and the underlay’s network operator (its policies and network topology)
Fayçal, Marguerite. "Routage Efficace pour les Réseaux Pair-à-Pair utilisant des Tables de Hachage Distribuées." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00521935.
Повний текст джерелаAlbrieux, Sandrine. "La responsabilité du fournisseur de moyens de communication électronique." Paris 2, 2004. http://www.theses.fr/2004PA020057.
Повний текст джерелаThe supplier of electronic ways of communication - who is not the author nor the editor of the informations circulating on internet, but the person who offers to the suppliers of contents the instruments permitting or facilitating the diffusion or the localization to the public of the information they have produced - has never been able to evolve in a " no-go area". His activities do not escape the rulings of the law when he supplies intentionally or unwisely the cause of the offence. Apart a few assumptions where he can put forward his irresponsibility or exemption of responsibility, dedicated by law for the trust in digital economy, he must answer for his harmful attitude towards others or affecting society. His responsibility can be committed as conniving when he is part of the criminal offense of the supplier of contents knowlingly and voluntarily, providing that the offense of the principal author receive the qualification of continuous offense. His attitude is reprehensible from then on he has the knowledge or could not ignore the illicitness of the content being transmitted by him, housed, reference of which is facilitated and do not act promptly to withdraw it from the network or to make access impossible, letting in this way continue the harmful action he could prevent or stop. But in a universe transcending the frontiers, the implementation of the judicial answer can be delicate and the debt of the supplier of electronic ways of communication settled abroad stand unfulfilled, because the authority of the French decisions does not have an international value as to impress the foreign authorities
Roudiere, Gilles. "Détection d'attaques sur les équipements d'accès à Internet." Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0017/document.
Повний текст джерелаNetwork anomalies, and specifically distributed denial of services attacks, are still an important threat to the Internet stakeholders. Detecting such anomalies requires dedicated tools, not only able to perform an accurate detection but also to meet the several constraints due to an industrial operation. Such constraints include, amongst others, the ability to run autonomously or to operate on sampled traffic. Unlike supervised or signature-based approaches, unsupervised detection do not require any kind of knowledge database on the monitored traffic. Such approaches rely on an autonomous characterization of the traffic in production. They require the intervention of the network administrator a posteriori, when it detects a deviation from the usual shape of the traffic. The main problem with unsupervised detection relies on the fact that building such characterization is complex, which might require significant amounts of computing resources. This requirement might be deterrent, especially when the detection should run on network devices that already have a significant workload. As a consequence, we propose a new unsupervised detection algorithm that aims at reducing the computing power required to run the detection. Its detection focuses on distributed denial of service attacks. Its processing is based upon the creation, at a regular interval, of traffic snapshots, which helps the diagnosis of detected anomalies. We evaluate the performances of the detector over two datasets to check its ability to accurately detect anomalies and to operate, in real time, with limited computing power resources. We also evaluate its performances over sampled traffic. The results we obtained are compared with those obtained with FastNetMon and UNADA
Schuers, Matthieu. "Évaluation d'outils d'accès à la connaissance en médecine générale." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR070/document.
Повний текст джерелаPhysicians, and especially general practitioners, are not « all-knowing ». As they areconfronted with a large amount of clinical situations, information and knowledgemanagement are essential topics of interest. This management is mainly based on thedevelopment of numeric literacy, that is the ability to use and understand digital tools andmedia. The aims of this work were to identify the obstacles encountered by generalpractitioners when seeking health information online and to develop and assess tools tohelp them to overcome these barriers.We performed a qualitative study among general practice residents and generalpractitioners. This allowed us to highlight several obstacles encountered by them whenseeking medical information online. These obstacles include both tools and professionals’issues. Institutional obstacles were also identified. Of these barriers, the insufficientcommand of English was cited as an important issue by both residents and physicians.The Department of Medical Information and Informatics of the Rouen University Hospitalhas developed several tools in order to facilitate access to knowledge for healthprofessionals. LiSSa is a bibliographic database containing only articles written in French.It allows health professionals and researchers, whose native language is not English, toaccess to hundreds of thousands of references, from PubMed and from journals notindexed in PubMed. A multi-lingual query builder to facilitate information retrieval wasdesigned. It appears to be an effective tool to improve the quality of PubMed queries inparticular for users whose first native language is not English
Zohore, Dominique. "L'équilibre contractuel entre fournisseur et utilisateur de services de communications électroniques." Aix-Marseille 3, 2010. http://www.theses.fr/2010AIX32091.
Повний текст джерелаMikaelian, Nathalie. "La mutation des droits d'auteur dans l'environnement numérique : l'émergence d'un droit d'accès." Nice, 2004. http://www.theses.fr/2004NICE0043.
Повний текст джерелаThe first copyright laws were passed at the same time as major revolutionary legislation. Their objective was to regulate the convergences between the parties involved in the creation and diffusion of works. Information and communication technologies, stemming from digital technology, have multiplied the possible uses of intellectual works and generated their massive diffusion worldwide. The opportunities for interference with works have, consequently, considerably increased, and this has led to a protectionist movement by copyright holders. Appearances are deceiving and despite an apparent reluctance to act and the maintaining of traditional concepts, copyright law is being transformed in the area of digital technology. Existing concepts, despite an extended field of application, do not enable new uses to be controlled, which means that recourse to digital technology appears to be the only efficient remedy for reinforcing the application of rights by their holders. The digital environment, which has prompted the emergence of new economic players, has increased the already surfacing phenomenon of dispossession of the author in favour of the investor. In addition, it marked the factual convergence of the author's proprietary rights and a new right of access around which the parties involved in the creation and diffusion of the works are gradually taking new positions. Enabling the control and remuneration of each use, this marks the crucial stage in establishing a copyright favourable to investors and appears as an instrument for regulating the art market in the digital environment, in particular in networks. Copyrights, whose original mission was to control a work's exploitation, are gradually evolving towards the control of its uses, which only increases the trading dimension
Akbarinia, Reza. "Techniques d'accès aux données dans des systèmes pair-à-pair." Nantes, 2007. http://www.theses.fr/2007NANT2060.
Повний текст джерелаThe goal of this thesis is to contribute to the development of new data access techniques for query processing services in P2P environments. We focus on novel techniques for two important kinds of queries: queries with currency guarantees and top-k queries. To improve data availability, most P2P systems rely on data replication, but without currency guarantees. However, for many applications which could take advantage of a P2P system (e. G. Agenda management), the ability to get the current data is very important. To support these applications, the query processing service must be able to efficiently detect and retrieve a current, i. E. Up-to-date, replica in response to a user requesting a data. The second problem which we address is supporting top-k queries which are very useful in large scale P2P systems, e. G. They can reduce the network traffic significantly. However, efficient execution of these queries is very difficult in P2P systems because of their special characteristics, in particular in DHTs. In this thesis, we first survey the techniques which have been proposed for query processing in P2P systems. We give an overview of the existing P2P networks, and compare their properties from the perspective of query processing. Second, we propose a complete solution to the problem of current data retrieval in DHTs. We propose a service called Update Management Service (UMS) which deals with updating replicated data and efficient retrieval of current replicas based on timestamping. Third, we propose novel solutions for top-k query processing in structured, i. E. DHTs, and unstructured P2P systems. We also propose new algorithms for top-k query processing over sorted lists which is a general model for top-k queries in many centralized, distributed and P2P systems, especially in super-peer networks. We validated our solutions through a combination of implementation and simulation and the results show very good performance, in terms of communication and response time
Ekongolo, Makake Narcisse Achille Emmanuel. "Modélisation des usagers experts des systèmes d'accès à l'information sur Internet en situation de veille." Paris 10, 2008. http://www.theses.fr/2008PA100046.
Повний текст джерелаThe appropriation of tools to information access create a few problems. First, the problem of immediacy and transparency of the tool. The « naive » believe of the immediacy of the tools which bring a wrong use of the tools. Then the problem of the real knowledge of the tool which is essential to better use and build senses. The purpose of this study is to give an example of steps to use. The behaviors of experts or professional of information are in standby mode because the modelisation of experts can permit a transfer of knowledge. The analysis shows that the professionals of information are given the stable and structural aptitude and attitude which help them to give the right deduction when they give an information. In another way the whole information capitalized on the practical information of users and experts was called « bordereau d'indexation » cognitive artefact which bring help to access information and permit a trace conservation of the process to access information
Dramé-Maigné, Sophie. "Blockchain and access control : towards a more secure Internet of Things." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL018.
Повний текст джерелаThe thesis takes place in the Internet of objects context and meets the need for security and privacy, and more specifically the authorization and token management [RFC6749, UMA, HMM15] in order to regulate interactions between objects and access to data produced by the objects. A first objective of the thesis is to position the authorization delegation with respect to other methods used for authentication and authorization management, such as those traditionally used in a classical information system. For this, the approach will raise on established formal models such as [AG13]. Another objective is to elaborate a critical state of the art on current authorization solutions, as defined in the standard solutions [RFC6749, UMA, HMM15] and as proposed in the literature [HSR14]. Two lines of research are then proposed for investigation in the doctoral thesis. One of them is to propose solutions to simplify the definition of access control rules in the context of the Internet of Things. The idea is to simplify and optimize the definition of these rules for example by defining several levels of abstraction, as done in RBAC [RBAC, BCC07]. The other line of research is to clearly identify the security risks raised by the centralized management of authorization rules which positions the authorization server as a single point of failure, and to propose solutions to reduce these risks. For this, we intend to investigate some methods emerged recently in the literature, which consists in replicating the critical information a large number of times to increase the system attack surface. For example, it could be based on the principle of BlockChain [Zys, DW13] that ensures the integrity of certain transactions (eg Bitcoin) in a fully distributed environment
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Повний текст джерелаFarag, Ahmed. "Les bibliothèques nationales face aux technologies de l'information et de la communication : étude de portails d'accès internet aux ressources documentaires et des services aux utilisateurs : aspects stratégiques." Bordeaux 3, 2004. http://www.theses.fr/2004BOR30038.
Повний текст джерелаThis thesis aims at the study of the internet access portals. It puts in prospect the new services offered to the users for national libraries and wonders about certain numbers of strategic aspects of which especially the definition of the internet portals, the choice of the devices of information and communication, the question of the standardization of the numerical documents and their exchange, the development of the digital libraries. We were based on applications implemented in large libraries, the national Library of France, the national Library of Canada and the Library of the Congress, in particularOur work is also focused on the impact of the TIC on the internet portals of these libraries, in particular services and missions. Two essential problems were the discussion thread of the reflexion developed hereIn what the TIC implemented in a Internet portals will they will increase the capacities of services suggested by the libraries and, consequently, modify the prospects for them? How do the internet access portals optimise the access to the resources, not only electronic, but still conventional?
Gu, Wei. "Robustness against interference in Internet of Things." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10195/document.
Повний текст джерелаInternet of Things brought great interests in recent years for its attractive applications and intelligent structure. However, the implementation of sensor networks still presents important challenges such as the generation of Multiple-Access-Interference (MAI) with impulsive nature and the relatively high energy consumption. Both the MAI and the thermal noise should be considered due to their strong impairments each may cause on the communication quality. We employ the stable and Gaussian distributions to model the MAI and the thermal noise respectively. Firstly we study the performance of turbo codes in the direct link and we propose the p-norm as a decoding metric. This metric allows a considerable error correction performance improvement which is close to the optimal decoder. Then we investigate cooperative communications. The probability densities in the decision statistic of the optimal receiver are estimated using importance sampling approach when both the stable and Gaussian noises are present. Such a method is computationally expensive. Hence we develop an approximation approach based on the Normal Inverse Gaussian (NIG) distribution. This solution is efficient for calculation and is proximate to the optimal receiver. In addition we show that the p-norm receiver has robust performance no matter what kind of noise is dominant. At last we combine the channel coding and cooperative communication works to establish a distributed channel coding strategy. Through some simulation assessments, the energy saving strategy can be realized by choosing an appropriate distributed channel coding scheme based on the direct link quality and target bit error rate
Tembo, Mouafo Serge Romaric. "Applications de l'intelligence artificielle à la détection et l'isolation de pannes multiples dans un réseau de télécommunications." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0004/document.
Повний текст джерелаTelecommunication networks must be reliable and robust to ensure high availability of services. Operators are currently searching to automate as much as possible, complex network management operations such as fault diagnosis.In this thesis we are focused on self-diagnosis of failures in the optical access networks of the operator Orange. The diagnostic tool used up to now, called DELC, is an expert system based on decision rules. This system is efficient but difficult to maintain due in particular to the very large volume of information to analyze. It is also impossible to have a rule for each possible fault configuration, so that some faults are currently not diagnosed.We proposed in this thesis a new approach. In our approach, the diagnosis of the root causes of malfunctions and alarms is based on a Bayesian network probabilistic model of dependency relationships between the different alarms, counters, intermediate faults and root causes at the level of the various network component. This probabilistic model has been designed in a modular way, so as to be able to evolve in case of modification of the physical architecture of the network. Self-diagnosis of the root causes of malfunctions and alarms is made by inference in the Bayesian network model of the state of the nodes not observed in view of observations (counters, alarms, etc.) collected on the operator's network. The structure of the Bayesian network, as well as the order of magnitude of the probabilistic parameters of this model, were determined by integrating in the model the expert knowledge of the diagnostic experts on this segment of the network. The analysis of thousands of cases of fault diagnosis allowed to fine-tune the probabilistic parameters of the model thanks to an Expectation Maximization algorithm. The performance of the developed probabilistic tool, named PANDA, was evaluated over two months of fault diagnosis in Orange's GPON-FTTH network in July-August 2015. In most cases, the new system, PANDA, and the system in production, DELC, make an identical diagnosis. However, a number of cases are not diagnosed by DELC but are correctly diagnosed by PANDA. The cases for which self-diagnosis results of the two systems are different were evaluated manually, which made it possible to demonstrate in each of these cases the relevance of the decisions taken by PANDA
Rakotomalala, Harisoa Ny aina. "Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo." Thesis, La Réunion, 2012. http://www.theses.fr/2012LARE0015.
Повний текст джерелаInternet access points are a place where users can access and use digital equipment and connect to internet. Various terms are used to indicate these places : « espaces publics numériques (EPN) », « Netpublics », «cyberbases », « cybercases », « espaces culturels multimédias (ECM) », « Points-cyb », « cybercommunes », « points d’accès public internet (PAPI) » and « cybercafés ». In France, internet access points help people without computer and internet access to use these technologies, to learn and to be assisted in their uses. In Madagascar, internet access points provide access to computer and internet networks but services are fee-based. The objective of this dissertation is to examine the roles of internet access points in ICTs appropriation process by public who visit these places. This research work analyses the theoretical concept of appropriation by using three approaches: the diffusion, the translation and the appropriation. This is followed by a comparative analysis of the uses of computer and internet in internet access points situated in Brest, Reunion Island and Antananarivo. The analysis shows the important role played by societal, economic and geographic contexts on ICTs appropriation. Beyond the uses of ICT in these places, this research attempts to identify users and discuss the reasons of their visits. The results are based on observations, questionnaire surveys and interviews with users in 18 internet access points in Brest, Reunion Island and Antananarivo
Touati, Lyes. "Internet of things security : towards a robust interaction of systems of systems." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2311/document.
Повний текст джерелаIn this thesis, we deal with security challenges in the Internet of Things. The evolution of the Internet toward an Internet of Things created new challenges relating to the way to secure communications given the new constraints of IoT, namely: resource constrained objects, heterogeneity of network components, the huge size of the network, etc. Indeed, the Internet evolved from a network of computers and servers toward a huge network connecting billions of smart communicating objects. These objects will be integrated into complex systems and use sensors and actuators to observe and interact with their physical environment. The security requirements of the interactions between smart objects depend on the context which evolves in time and space. Consequently, the definition of the security policies should be adaptive and context-aware. In this thesis, we were interested in the problem of access control in IoT relying on Attribute based Encryption (ABE). Indeed, ABE schemes present many advantages in implementing a cryptographic fine-grained access control. However, these schemes raise many implementation challenges because of their complexity and high computation and energy overheads. To overcome this challenge, we leveraged the heterogeneity of IoT to develop collaborative and distributed versions of ABE schemes. Our solutions reduce remarkably the overhead in terms of energy consumption and computation. The second limitation of ABE schemes is the absence of efficient attribute/key revocation techniques. We have proposed batch based mechanisms for attribute/key revocation in CP-ABE. We demonstrated the efficiency of the proposed solutions through simulations. Finally, we have proposed a CP-ABE based solution for the problem of grouping proof. This problem consists of providing the proof that a set of objects are present simultaneously (same time and same location). The propose solution has many applications such as enforcing the security of NFC based payments and the access to sensitive locations
Bitouzet, Christine. "Le concept de communauté : un levier pour le développement du commerce électronique ? : Analyse et études de cas de la construction de l'offre de service en ligne." Palaiseau, Ecole polytechnique, 2001. http://www.theses.fr/2001EPXX0037.
Повний текст джерелаNdiaye, Moustapha. "Approche comparative de l'appropriation de la téléphonie mobile et de l'internet dans les lieux d'accès publics des villes de Rennes et de Thiès." Phd thesis, Université Rennes 2, 2008. http://tel.archives-ouvertes.fr/tel-00299076.
Повний текст джерелаTarek, mohamed ibrahim hafez Dina. "Development of Spectrum Sharing Protocol for Cognitive Radio Internet of Things." Thesis, Avignon, 2020. http://www.theses.fr/2020AVIG0280.
Повний текст джерелаInternet of Things (IoT) presents a new life style by developing smart homes, smart grids, smart city, smart transportation, etc., so IoT is developing rapidly. However recent researches focus on developing the IoT applications disregarding the IoT spectrum scarcity problem facing it. Integrating Internet of Things (IoT) technology and Cognitive Radio Networks (CRNs), forming Cognitive Radio Internet of Things (CRIoTs), is an economical solution for overcoming the IoT spectrum scarcity. The aim of this thesis is to solve the problem of spectrum sharing for CRIoT; the work in thesis is presented in three parts, each represents a contribution. Our first contribution is to propose two new protocols to solve the problem of channel status prediction for interweave CRNs. Both protocols use Hidden Markov Model (HMM). In the training stage of both protocols, the available data are trained to produce two HMM models, an idle HMM model and a busy one. Both models are used together to produce the 2-model HMM. In the prediction stage the first protocol uses Bayes theorem and the 2-model HMM, while the second protocol uses Support Vector Machine (SVM) employing the parameters produced from applying the 2-model HMM, named 2-model HMM-SVM. The 2-model HMM-SVM outperforms the classical HMM and 2-model HMM in terms of the true percentage, the inaccuracy and the probability of primary users’ collision (false negative prediction). In our second contribution, we proposed a centralized time slotted packet scheduling protocol for CRIoTs. It uses Discrete Permutation Particle Swarm Optimization (DP-PSO) for scheduling the IoT device packets among the free slots obtained from applying cognitive radio networks' channel estimation technique proposed in the first part. Our proposed protocol is applied to smart healthcare facility. Configuring three main building blocks for the used application architecture; the IoT devices block, the first layer fog nodes block and the central fog server. Each group of IoT devices is connected to a fog node, the entire fog nodes in the system are connected to the central fog node. The proposed protocol is named Scheduling based-on Discrete Permutation Particle Swarm Optimization (SDP-PSO). An objective fitness function is formulated with three parameters; maximizing the fairness index among fog nodes, minimizing the packets' queuing delay and minimizing the number of dropped packets that exceeded their allowed time in the network without being sent. The performance of the proposed SDP-PSO protocol overcomes an old protocol named spectrum auction in terms of the fairness between fog nodes, the average queuing delay, the number of dropped packets and the time and the space complexity. Finally, in the third contribution, we proposed a distributed packets' scheduling protocol for CRIoTs. Our proposed protocol can be applied to an urban traffic control. The configured system in this part consists of three main building blocks; the IoT devices block, the first fog layer block (Road Side Units (RSUs)) and the second fog layer block. Each group of IoT devices is connected to a RSU, each group of RSU are connected to a fog node which acts as their cluster head. The fog nodes are connected together forming a partial mesh network. The proposed distributed packets' scheduling protocol for CRIoTs is applying three distributed access strategies together with the SDP-PSO proposed in the second part to schedule the packets on the estimated free slots resulted from applying the protocol proposed in the first part. The used access strategies are the classical round robin, in addition to two proposed ones named; the vertex cover and the enhanced round robin. An objective fitness function near similar to that used in the centralized protocol, was applied but with some differences to make it suitable for distributed scheduling
Mahamat, Habib Senoussi Hissein. "Étude et prototypage d'une nouvelle méthode d'accès aléatoire multi-canal multi-saut pour les réseaux locaux sans fil." Thesis, Toulouse 2, 2017. http://www.theses.fr/2017TOU20050/document.
Повний текст джерелаThe emergence of the Internet of Thingsrevolutionizeswireless local area networks and inspiringnumerous applications. One of the main issues for wirelessLANsis the access and sharing of the wireless radio medium. Several single-channel MAC protocols have been proposed and addressthis issue withinteresting solutions. However, some major problemsrelated to the channelaccess (hiddennode, synchronization, propagation of RDV) for a multi-hop transmission context, persist and are still the subject of intensive studies by the scientificcommunity, especiallywhenitcomes to a distributedwirelesssensors networks over extended topologies. Someresearch has proposed multi-channel MAC protocols, oftenaddressingthe ideal case, where all nodes in the network are within range of eachother. The transmissions and receptions of the data frames aregenerallypreceded by controls frames for the establishment of Rendez-Vous (RDV) among the nodesconcerned. Wefindthat the RDVs do not guarantee the channelsreservation in a deterministicwaywithoutconflictamong the nodes in the network, and maymakeitdifficult the multi-hop transmissions. A complex solution wouldbe to propagatetheseRDVs to the neighbors of the receivernodebeyond 2 hops. Facedwiththiscomplexity of multi-hop RDV management thatmakesour contribution. It is important for us to propose arandom multi-channelaccessmethodwithout RDV, in multi-hop topology. Our solution isimplemented on a real testbed made of multi-channel single-interface “WiNo” nodes, of whichweevaluate the performance that are compared to the single-channel case. An analytical model related to the multi-channelcontextwithout RDV wasalsodeveloped, and compared to the results of ourtestbed
Ben, Khalifa Abderrahman. "Medium access control layer for dedicated IoT networks." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI063.
Повний текст джерелаDedicated networks for the Internet of Things appeared with the promise of connecting thousands of nodes, or even more, to a single base station in a star topology. This new logic represents a fundamental change in the way of thinking about networks, after decades during which research work mainly focused on multi-hop networks. Internet of Things networks are characterized by long transmission range, wide geographic coverage, low energy consumption and low set-up costs. This made it necessary to adapt the protocols at different architectural layers in order to meet the needs of these networks. Several players compete in the Internet of Things market, each trying to establish the most efficient solution. These players are mostly focused on modifying the physical layer, on the hardware part or through proposing new modulations. However, with regard to the channel access control solution (known as the MAC protocol), all the solutions proposed by these players are based on classic approaches such as Aloha and CSMA. The objective of this thesis is to propose a dynamic MAC solution for networks dedicated to the Internet of Things. The proposed solution has the ability to adapt to network conditions. This solution is based on a machine learning algorithm that learns from network history in order to establish the relationship between network conditions, MAC layer parameters and network performance in terms of reliability and energy consumption. The solution also has the originality of making possible the coexistence of nodes using different MAC configurations within the same network. The results of simulations have shown that a MAC solution based on machine learning could take advantage of the good properties of different conventional MAC protocols. The results also show that a cognitive MAC solution always offers the best compromise between reliability and energy consumption, while taking into account the fairness between the nodes of the network. The cognitive MAC solution tested for high density networks has proven better scalability compared to conventional MAC protocols, which is another important advantage of our solution
Docquir, Pierre-François. "La liberté d'expression dans le réseau mondial de communication: propositions pour une théorie générale du droit d'accès à l'espace public privatisé." Doctoral thesis, Universite Libre de Bruxelles, 2009. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210368.
Повний текст джерелаToldov, Viktor. "Adaptive MAC layer for interference limited WSN." Thesis, Lille 1, 2017. http://www.theses.fr/2017LIL10002/document.
Повний текст джерелаIn the era of the Internet of Things, the number of connected devices is growing dramatically. Often, connected objects use Industrial, Scientific and Medical radio bands for communication. These kinds of bands are available without license, which facilitates development and implementation of new connected objects. However, it also leads to an increased level of interference in these bands. Interference not only negatively affects the Quality of Service, but also causes energy losses, which is especially unfavorable for the energy constrained Wireless Sensor Networks (WSN). In the present thesis the impact of the interference on the energy consumption of the WSN nodes is studied experimentally. The experimental results were used to estimate the lifetime of WSN nodes under conditions of different levels of interference. Then, a Thompson sampling based Cognitive Radio (CR) adaptive solution is proposed and evaluated via both, simulation and hardware implementation. Results show that this approach finds the best channel quicker than other state of the art solutions. An extension for multihop WSN was proposed for this CR solution and evaluated by hardware implementation in the framework of EWSN Dependability Competition. Finally, an adaptive WildMAC MAC layer protocol is proposed for the usecase of the LIRIMA PREDNET wildlife animal tracking project. Obtained field range test data were used to theoretically estimate cell densities and deployment zone coverage in this Low Power Widea Area Network (LPWAN). Then performance of the protocol was evaluated in WSNet simulation. The results show performance that allows to respect PREDNET project requirements with the given coverage
Papadopoulos, Georgios. "Improving medium access for dynamic wireless sensor networks." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD034/document.
Повний текст джерелаThe Internet of Things brings unique constraints and a huge variety of applications. This forces to be able to establish energy efficient communications (and never the less low-delay) within highly dynamic networks. We focused on improving the medium access control (MAC) to optimize the management of wireless communications, the main source of energy consumption in these networks. This thesis discusses the self-adaptation of asynchronous MAC solutions and shows that a localized cooperation between communicating objects can maintain an efficient sharing of the communication resource in highly dynamic networks (traffic, mobility, failures). In addition to a reasoning on the tools of simulation and experimentation, we conducted comprehensive evaluation campaigns of our contributions that address traffic changes and mobility in dense networks
Choungmo, Fofack Nicaise Éric. "Sur des modèles pour l'évaluation de performance des caches dans un réseau cœur et de la consommation d'énergie dans un réseau d'accès sans-fil." Phd thesis, Université Nice Sophia Antipolis, 2014. http://tel.archives-ouvertes.fr/tel-00968894.
Повний текст джерелаTran, Khanh Toan. "Déploiement efficace de services complexes dans l'infrastructure de cloud." Phd thesis, Université d'Evry-Val d'Essonne, 2013. http://tel.archives-ouvertes.fr/tel-00875818.
Повний текст джерелаMateria, Francesco. "Review and analysis of institutional and regulatory frameworks for fixed Next Generation Access networks." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLED049.
Повний текст джерелаToday, data usage driven by content and service providers over the Internet is constantly increasing and telecoms operators are expected to meet an increasing demand for connectivity. In this context, it is vital that the transition between legacy and ultrabroadband networks is properly managed in order both to preserve or improve the state of competition in the market and to maximize efficient investment to the benefit of consumers through an appropriate combination of different forms of competition, of different technologies and of private and public investment. If properly accompanied, the transition from legacy to next generation access networks can represent a major opportunity for the current European telecommunications markets, definitively transforming them into competitive and modern markets and allowing ex ante regulation to progressively step-back.We review the institutional and regulatory frameworks for fixed next generation access networks currently implemented in France, Germany, Italy, United Kingdom and Spain. Based on a calibrated competition model, we simulate market evolution up to 2050 and appraise to what extent these frameworks seem effective in order to achieve the best long-term results both for the industry and for consumers. The results of our calibrated model suggest that, to a greater or lesser extent, some adjustments might be introduced in the above-mentioned frameworks in order to achieve better outcomes in terms of total welfare in the long run. For each of the countries reviewed, we formulate policy recommendations aimed to accelerate NGA coverage and to improve the state of competition in ultrabroadband
Nicomette, Vincent. "La protection dans les systèmes à objets répartis." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1996. http://tel.archives-ouvertes.fr/tel-00175252.
Повний текст джерелаLahbib, Asma. "Distributed management framework based on the blockchain technology for industry 4.0 environments." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS017.
Повний текст джерелаThe evolution of the Internet of Things (IoT) started decades ago as part of the first face of the digital transformation, its vision has further evolved due to a convergence of multiple technologies, ranging from wireless communication to the Internet and from embedded systems to micro-electromechanical systems. As a consequence thereof, IoT platforms are being heavily developed, smart factories are being planned to revolutionize the industry organization and both security and trust requirements are becoming more and more critical. The integration of such technologies within the manufacturing environment and processes in combination with other technologies has introduced the fourth industrial revolution referred to also as Industry 4.0. In this future world machines will talk to machines (M2M) to organize the production and coordinate their actions. However opening connectivity to the external world raises several questions about data and IT infrastructure security that were not an issue when devices and machines were controlled locally and just few of them were connected to some other remote systems. That’s why ensuring a secure communication between heterogeneous and reliable devices is essential to protect exchanged information from being stolen or tampered by malicious cyber attackers that may harm the production processes and put the different devices out of order. Without appropriate security solutions, these systems will never be deployed globally due to all kinds of security concerns. That’s why ensuring a secure and trusted communication between heterogeneous devices and within dynamic and decentralized environments is essential to achieve users acceptance and to protect exchanged information from being stolen or tampered by malicious cyber attackers that may harm the production processes and put the different devices out of order. However, building a secure system does not only mean protecting the data exchange but it requires also building a system where the source of data and the data itself is being trusted by all participating devices and stakeholders. In this thesis our research focused on four complementary issues, mainly (I) the dynamic and trust based management of access over shared resources within an Industry 4.0 based distributed and collaborative system, (ii) the establishment of a privacy preserving solution for related data in a decentralized architecture while eliminating the need to rely on additional third parties, (iii) the verification of the safety, the correctness and the functional accuracy of the designed framework and (iv) the evaluation of the trustworthiness degree of interacting parties in addition to the secure storage and sharing of computed trust scores among them in order to guarantee their confidentiality, integrity and privacy. By focusing on such issues and taking into account the conventional characteristics of both IoT and IoT enabled industries environments, we proposed in this thesis a secure and distributed framework for resource management in Industry 4.0 environments. The proposed framework, enabled by the blockchain technology and driven by peer to peer networks, allows not only the dynamic access management over shared resources but also the distribute governance of the system without the need for third parties that could be their-selves vulnerable to attacks. Besides and in order to ensure strong privacy guarantees over the access control related procedures, a privacy preserving scheme is proposed and integrated within the distributed management framework. Furthermore and in order to guarantee the safety and the functional accuracy of our framework software components, we focused on their formal modeling in order to validate their safety and compliance with their specification. Finally, we designed and implemented the proposal in order to prove its feasibility and analyze its performances
Sambra, Andrei Vlad. "Data ownership and interoperability for a decentralized social semantic web." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0027.
Повний текст джерелаEnsuring personal data ownership and interoperability for decentralized social Web applications is currently a debated topic, especially when taking into consideration the aspects of privacy and access control. Since the user's data are such an important asset of the current business models for most social Websites, companies have no incentive to share data among each other or to offer users real ownership of their own data in terms of control and transparency of data usage. We have concluded therefore that it is important to improve the social Web in such a way that it allows for viable business models while still being able to provide increased data ownership and data interoperability compared to the current situation. To this regard, we have focused our research on three different topics: identity, authentication and access control. First, we tackle the subject of decentralized identity by proposing a new Web standard called "Web Identity and Discovery" (WebID), which offers a simple and universal identification mechanism that is distributed and openly extensible. Next, we move to the topic of authentication where we propose WebID-TLS, a decentralized authentication protocol that enables secure, efficient and user friendly authentication on the Web by allowing people to login using client certificates and without relying on Certification Authorities. We also extend the WebID-TLS protocol, offering delegated authentication and access delegation. Finally we present our last contribution, the Social Access Control Service, which serves to protect the privacy of Linked Data resources generated by users (e.g. pro le data, wall posts, conversations, etc.) by applying two social metrics: the "social proximity distance" and "social contexts"
Shehadeh, Dareen. "Dynamic network adaptation for energy saving." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0067/document.
Повний текст джерелаThe main goal of the thesis is to design an Energy Proportional Network by taking intelligent decisions into the network such as switching on and off network components in order to adapt the energy consumption to the user needs. Our work mainly focuses on reducing the energy consumption by adapting the number of APs that are operating to the actual user need. In fact, traffic load varies a lot during the day. Traffic is high in urban areas and low in the suburb during day work hours, while it is the opposite at night. Often, peak loads during rush hours are lower than capacities of the networks. Thus they remain lightly utilized for long periods of time. Thus keeping all APs active all the time even when the traffic is low causes a huge waste of energy. Our goal is to benefit from low traffic periods by automatically switch off redundant cells, taking into consideration the actual number of users, their traffic and the bandwidth requested to serve them. Ideally we wish to do so while maintaining reliable service coverage for existing and new coming users. First we consider a home networking scenario. In this case only one AP covers a given area. So when this AP is switched off (when no users are present), there will be no other AP to fill the gap of coverage. Moreover, upon the arrival of new users, no controller or other mechanism exists to wake up the AP. Consequently, new arriving users would not be served and would remain out of coverage. The study of the state of the art allowed us to have a clear overview of the existing approaches in this context. As a result, we designed a platform to investigate different methods to wake up an AP using different technologies. We measure two metrics to evaluate the Switching ON/OFF process for the different methods. The first is the energy consumed by the AP during the three phases it goes through. The second is the delay of time for the AP to wake up and be operational to serve the new users. In the second case we consider a dense network such as the ones found in urban cities, where the coverage area of an AP is also covered by several other APs. In other words, the gap resulting from switching off one or several APs can be covered by other neighbouring ones. Thus the first thing to do was to evaluate the potential of switching off APs using real measurements taken in a dense urban area. Based on this collected information, we evaluate how many APs can be switched off while maintaining the same coverage. To this end, we propose two algorithms that select the minimum set of APs needed to provide full coverage. We compute several performance parameters, and evaluate the proposed algorithms in terms of the number of selected APs, and the coverage they provide
Mushtaq, Mubashar. "QoS provisioning for adaptive video streaming over P2P networks." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13744.
Повний текст джерелаThere is an increasing demand for scalable deployment of real-time multimedia streaming applications over Internet. In this context, Peer-to-Peer (P2P) networks are playing an important role for supporting robust and large-scale transmission of multimedia content to heterogeneous clients. However, the deployment of real-time video streaming applications over P2P networks arises lot of challenges due to heterogeneity of terminals and access networks, dynamicity of peers, and other problems inherited from IP network. Real-time streaming applications are very sensitive to packet loss, jitter / transmission delay, and available end-to-end bandwidth. These elements have key importance in QoS provisioning and need extra consideration for smooth delivery of video streaming applications over P2P networks. Beside the abovementioned issues, P2P applications lack of awareness in constructing their overlay topologies and do not have any explicit interaction with service and network providers. This situation leads to inefficient utilization of network resources and may cause potential violation of peering agreements between providers. The aim of this thesis is to analyze these issues and to propose an adaptive real-time transport mechanism for QoS provisioning of Scalable Video Coding (SVC) applications over P2P networks. Our contributions in this dissertation are threefold. First, we propose a hybrid overlay organization mechanism allowing intelligent organization of sender peers based on network-awareness, media- awareness, and quality-awareness. This overlay organization is further used for an appropriate selection of best sender peers, and the efficient switching of peers to ensure a smooth video delivery when any of the sender peers is no more reliable. Second, we propose a packet video scheduling mechanism to assign different parts of the video content to specific peers. Third, we present a service provider driven P2P network framework that enables effective interaction between service / network providers and P2P applications to perform QoS provisioning mechanism for the video streaming
Sambra, Andrei Vlad. "Data ownership and interoperability for a decentralized social semantic web." Thesis, Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0027/document.
Повний текст джерелаEnsuring personal data ownership and interoperability for decentralized social Web applications is currently a debated topic, especially when taking into consideration the aspects of privacy and access control. Since the user's data are such an important asset of the current business models for most social Websites, companies have no incentive to share data among each other or to offer users real ownership of their own data in terms of control and transparency of data usage. We have concluded therefore that it is important to improve the social Web in such a way that it allows for viable business models while still being able to provide increased data ownership and data interoperability compared to the current situation. To this regard, we have focused our research on three different topics: identity, authentication and access control. First, we tackle the subject of decentralized identity by proposing a new Web standard called "Web Identity and Discovery" (WebID), which offers a simple and universal identification mechanism that is distributed and openly extensible. Next, we move to the topic of authentication where we propose WebID-TLS, a decentralized authentication protocol that enables secure, efficient and user friendly authentication on the Web by allowing people to login using client certificates and without relying on Certification Authorities. We also extend the WebID-TLS protocol, offering delegated authentication and access delegation. Finally we present our last contribution, the Social Access Control Service, which serves to protect the privacy of Linked Data resources generated by users (e.g. pro le data, wall posts, conversations, etc.) by applying two social metrics: the "social proximity distance" and "social contexts"
Salhab, Nazih. "Resource provisioning and dynamic optimization of Network Slices in an SDN/NFV environment." Thesis, Paris Est, 2020. http://www.theses.fr/2020PESC2019.
Повний текст джерелаTo address the enhanced mobile broadband, massive and critical communications for the Internet of things, Fifth Generation (5G) of mobile communications is being deployed, nowadays, relying on multiple enablers, namely: Cloud Radio Access Network (C-RAN), Software-Defined Networking (SDN) and Network Function Virtualization (NFV).C-RAN decomposes the new generation Node-B into: i) Remote Radio Head (RRH), ii) Digital Unit (DU), and iii) Central Unit (CU), also known as Cloud or Collaborative Unit.DUs and CUs are the two blocks that implement the former 4G Baseband Unit (BBU) while leveraging eight options of functional splits of the front-haul for a fine-tuned performance. The RRH implements the radio frequency outdoor circuitry. SDN allows programming network's behavior by decoupling the control plane from the user plane and centralizing the flow management in a dedicated controller node. NFV, on the other hand, uses virtualization technology to run Virtualized Network Functions (VNFs) on commodity servers. SDN and NFV allow the partitioning of the C-RAN, transport and core networks as network slices defined as isolated and virtual end-to-end networks tailored to fulfill diverse requirements requested by a particular application. The main objective of this thesis is to develop resource-provisioning algorithms (Central Processing Unit (CPU), memory, energy, and spectrum) for 5G networks while guaranteeing optimal provisioning of VNFs for a cloud-based infrastructure. To achieve this ultimate goal, we address the optimization of both resources and infrastructure within three network domains: 5G Core Network (5GC), C-RAN and the SDN controllers. We, first formulate the 5GC offloading problem as a constrained-optimization to meet multiple objectives (virtualization cost, processing power and network load) by making optimal decisions with minimum latency. We optimize the usage of the network infrastructure in terms of computing capabilities, power consumption, and bitrate, while meeting the needs per slice (latency, reliability, efficiency, etc.). Knowing that the infrastructure is subject to frequent and massive events such as the arrival/departure of users/devices, continuous network evolution (reconfigurations, and inevitable failures), we propose a dynamic optimization using Branch, Cut and Price, while discussing objectives effects on multiple metrics.Our second contribution consists of optimizing the C-RAN by proposing a dynamic mapping of RRHs to BBUs (DUs and CUs). On first hand, we propose clustering the RRHs in an aim to optimize the downlink throughput. On second hand, we propose the prediction of the Power Headroom (PHR), to optimize the throughput on the uplink.We formulate our RRHs clustering problem as k-dimensional multiple Knapsacks and the prediction of PHR using different Machine Learning (ML) approaches to minimize the interference and maximize the throughput.Finally, we address the orchestration of 5G network slices through the software defined C-RAN controller using ML-based approaches, for all of: classification of performance requirements, forecasting of slicing ratios, admission controlling, scheduling and adaptive resource management.Based on extensive evaluations conducted in our 5G experimental prototype based on OpenAirInterface, and using an integrated performance management stack, we show that our proposals outperform the prominent related strategies in terms of optimization speed, computing cost, and achieved throughput