Дисертації з теми "ISO (Computer network standard)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "ISO (Computer network standard)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Chen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.
Повний текст джерелаNgqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.
Повний текст джерелаAlila, Patrick. "Complementing network security to the ISO/IEC 27000 standard." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96298.
Повний текст джерелаOkcan, Alper. "Automatic Acquisition And Use Of Multimodal Medical Device Observations Based On Iso/ieee 11073 And Hl7 Standards." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608462/index.pdf.
Повний текст джерелаNyström, Jan. "A formalisation of the ITU-T Intelligent Network standard." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-226522.
Повний текст джерелаByrne, Bernadette M. "A longitudinal study of the diffusion of the ISO/IEC information resource dictionary system standard (IRDS.)." Thesis, Aston University, 2001. http://publications.aston.ac.uk/10610/.
Повний текст джерелаCoetzer, Christo. "An investigation of ISO/IEC 27001 adoption in South Africa." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018669.
Повний текст джерелаAkinwale, Olusegun. "DuoTracker tool support for software defect data collection and analysis /." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1447633.
Повний текст джерелаBaalaji, Venkateshwaraiyer S. "Collaborative services in an ad hoc wireless network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBaalaji%5FITM.pdf.
Повний текст джерелаThesis advisor(s): Alex Bordetsky, Gurminder Singh. Includes bibliographical references (p. 71). Also available online.
Goh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.
Повний текст джерелаScience, Faculty of
Computer Science, Department of
Graduate
Aristotelous, Andreas. "Single Board Computer for Standardized Onboard Vehicle Network." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188774.
Повний текст джерелаDetta examensarbete genomfördes i samarbete med Keolis Sverige AB. Ett av företagets mål är att söka efter möjliga system som ersättning till dyra, specialanpassade hårdvaruenheter och istället övergå till billiga enkortsdatorer. Som ett testfall föreslås ett enkelt program, som genomför identifiering av föraren genom att skanna streckkoden på körkortet (personnummer). Huvudsyftet med projektet är att hitta en lämplig enkortsdator, att implementera den föreslagna föraridentifieringsapplikationen, skicka körkortsnumret/personnumret med tidsstämpel till en webbsida och testa funktionaliteten hos enkortsdator enligt testrutiner som beskrivs av ISO- och IEC-standarder för vägfordon. En parser som analyserar indatasträngen av en streckkodsläsare implementerades i programmeringsspråket C. Streckkodsläsaren skannar en streckkod eller en QR-kod och parsern returnerar innehållet i streckkoden på ASCIIteckenformat. Körkortsnumret samt tidsstämpel publiceras på en webbsida. En webbsida har skapats med Django Web Framework, som är en databasdriven webbplats. Varje gång körkortets streckkod skannas, skickas en POST http-begäransmetod som utförs varvid både körkort och tidsstämpel lagras i en SQLite databas. Varje gång en GET-begäran skickas, lagras data i SQLite databasen och presenteras på webbplatsen. Kommunikationen mellan enkortsdatorn Raspberry Pi och ett Django-ramverk uppnås med hjälp av cURL, som är ett kommandoradsverktyg med öppen källkod, och ett bibliotek för att överföra data med URL-syntax. Uppgifterna på webbplatsen manipuleras i backend. Miljötålighetsprovning med avseende på värme- och fuktighet har utförts för att utvärdera systemets funktionalitet under specifika miljöförhållanden. Testerna specificeras i ISO- och IEC-standarder för vägfordon. Dessa tester visade vilka arbetstemperaturer och vilken luftfuktighet som Raspberry Pi klarar. Det kan konstateras att Raspberry Pi kan användas i passagerarutrymmet, där temperaturen förväntas ligga under 100 Celsius, men inte i motorrummet där temperaturer högre än 100 Celsius kan förekomma. Vidare har Raspberry Pi visat sig fungera vid de nivåer av luftfuktighet som har förkommit i testerna. I de fall där systemet skall användas i miljöer med högre temperaturer bör en dyrare och mer robust inbyggd (embedded) Linux-enkortsdator väljas. Det framtida arbetet bör omfatta vibrations- och elstörningstester för att fullt ut säkerställa att systemet klarar gällande ISO- och IEC-standarder. Dessa typer av test är kostsamma och bör därför genomföras av fordonstillverkare eller andra aktörer som förväntas kunna bära en sådan kostnad.
Wilks, Antony John. "The analysis of a computer music network and the implementation of essential subsystems." Thesis, Rhodes University, 1995. http://hdl.handle.net/10962/d1006682.
Повний текст джерелаEriksson, Carl-Henrik. "Standardiserad informationssäkerhet inom systemutveckling : En pragmatisk metod för uppehållande av en hög standard med ramverket ISO 27000." Thesis, Linköpings universitet, Informationskodning, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127525.
Повний текст джерелаEkström, Dan. "Securing a wireless local area network : using standard security techniques." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5662.
Повний текст джерелаKrehling, Daniel E. "Implementing remote image capture/control in a wireless Sensor network utilizing the IEEE 802.15.4 standard." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKrehling.pdf.
Повний текст джерелаThesis Advisor(s): Gibson, John ; Singh, Gurminder. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: IEEE 802.15.4, wireless sensor network, remote imaging, wireless. Includes bibliographical references (p. 79-81). Also available in print.
Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.
Повний текст джерелаKhera, Rajesh. "The design of C++ class hierarchy to model ASN. 1 data types /." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020045/.
Повний текст джерелаde, Oliveira Jaudelice C. "New techniques for end-to-end quality of service provisioning in DiffServ/MPLS networks." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/14790.
Повний текст джерелаPapageorgiou, Nikolaos A. "Development of RF front end prototype compliant with the 802.11a standard for wireless applications." Diss., Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04072004-180131/unrestricted/papageorgiou%5Fnikolaos%5Fa%5F200312%5Fms.pdf.
Повний текст джерелаWilliams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.
Повний текст джерелаAlmantheri, Hamed. "Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FAlmantheri.pdf.
Повний текст джерелаJulie, Ferdie Gavin. "Development of an IEC 61850 standard-based automation system for a distribution power network." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1183.
Повний текст джерелаThe electric power distribution network, an essential section of the electric power system, supplies electrical power to the customer. Automating the distribution network allows for better efficiency, reliability, and level of work through the installation of distribution control systems. Presently, research and development efforts are focused in the area of communication technologies and application of the IEC 61850 protocol to make distribution automation more comprehensive, efficient and affordable. The aim of the thesis is to evaluate the relevance of the IEC61850 standard-based technology in the development and investigation of the distribution automation for a typical underground distribution network through the development of a distribution automation algorithm for fault detection, location, isolation and service restoration and the building of a lab scale test bench Distribution Automation (DA) has been around for many decades and each utility applies its developments for different reasons. Nowadays, due to the advancement in the communication technology, authentic and automatic reconfigurable power system that replies swiftly to instantaneous events is possible. Distribution automation functions do not only supersede legacy devices, but it allows the distribution network to function on another lever. The primary function of a DA system is to enable the devices on the distribution network to be operated and controlled remotely to automatically locate, isolate and reconnect supply during fault conditions. Utilities have become increasingly interested in DA due to the numerous benefits it offers. Operations, maintenance and efficiencies within substations and out on the feeders can be improved by the development of new additional capabilities of DA. Furthermore, the new standard-based technology has advanced further than a traditional Distribution Supervisory and Control Data Acquisition (DSCADA) system. These days the most important components of a DA system include Intelligent Electronic Devices (IEDs). IEDs have evolved through the years and execute various protection related actions, monitoring and control functions and are very promising for improving the operation of the DA systems. The thesis has developed an algorithm for automatic fault detection, location, isolation and system supply restoration using the functions of the IEC61850 standard-based technology. A lab scale system that would meet existing and future requirements for the control and automation of a typical underground distribution system is designed and constructed. The requirement for the lab scale distribution system is to have the ability to clear faults through reliable and fast protection operation, isolate faulted section/s, on the network and restore power to the unaffected parts of the network through automation control operation functions of the IEC61850 standard. Various tests and simulations have been done on the lab scale test bench to prove that the objective of the thesis is achieved. Keywords: IEC61850 Standard, Distribution automation, Distribution automation system, IEDs, Lab scale test bench, Protection, Algorithm for automatic control
Kerdsri, Jiradett. "SNMP over Wi-Fi wireless networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FKerdsri.pdf.
Повний текст джерелаThesis advisor(s): Ted Lewis, Geoffrey Xie, Gurminder Singh. Includes bibliographical references (p. 89). Also available online.
Johnsson, Andreas. "Modeling, Implementation and Evaluation of IP Network Bandwidth Measurement Methods." Doctoral thesis, Västerås : Department of Computer Science and Electronics, Mälardalen University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-195.
Повний текст джерелаAnjali, Tricha. "DiffServ/MPLS Network Design and Management." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5191.
Повний текст джерелаOkai-Tettey, Harold A. "High speed end-to-end connection management in a bridged IEEE 1394 network of professional audio devices." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006638.
Повний текст джерелаVassiliou, Vasos. "An integration framework and a signaling protocol for MPLS/DiffServ/HMIP radio access networks." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/13732.
Повний текст джерелаWahabi, Abdoul Rassaki. "Resource management in IP networks." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52436.
Повний текст джерелаENGLISH ABSTRACT: lP networks offer scalability and flexibility for rapid deployment of value added lP services. However, with the increased demand and explosive growth of the Internet, carriers require a network infrastructure that is dependable, predictable, and offers consistent network performance. This thesis examines the functionality, performance and implementation aspects of the MPLS mechanisms to minimize the expected packet delay in MPLS networks. Optimal path selection and the assignment of bandwidth to those paths for minimizing the average packet delay are investigated. We present an efficient flow deviation algorithm (EFDA) which assigns a small amount of flow from a set of routes connecting each OD pair to the shortest path connecting the OD pair in the network. The flow is assigned in such a way that the network average packet delay is minimized. Bellman's algorithm is used to find the shortest routes between all OD pairs. The thesis studies the problem of determining the routes between an OD pair and assigning capacities to those routes. The EFDA algorithm iteratively determines the global minimum of the objective function. We also use the optimal flows to compute the optimal link capacities in both single and multirate networks. The algorithm has been applied to several examples and to different models of networks. The results are used to evaluate the performance of the EFDA algorithm and compare the optimal solutions obtained with different starting topologies and different techniques. They all fall within a close cost-performance range. They are all within the same range from the optimal solution as well.
AFRIKAANSE OPSOMMING: lP-netwerke voorsien die skaleerbaarheid en buigsaamheid vir die vinnige ontplooing van toegevoegde-waarde lP-dienste. Die vergrote aanvraag en eksplosiewe uitbreiding van die Internet benodig betroubare, voorspelbare en bestendige netwerkprestasie. Hierdie tesis ondersoek die funksionaliteit, prestasie en implementering van die MPLS(multiprotokoletiketskakel)- meganismes om die verwagte pakketvertraging te minimeer. Ons bespreek 'n doeltreffende algoritme vir vloei-afwyking (EFDA) wat 'n klein hoeveelheid vloei toewys uit die versameling van roetes wat elke OT(oorsprong-teiken)- paar verbind aan die kortste pad wat die OT-paar koppel. Die vloei word toegewys sodanig dat die netwerk se gemiddelde pakketvertraging geminimeer word. Bellman se algoritme word gebruik om die kortste roetes tussen alle OT-pare te bepaal. Die tesis bespreek die probleem van die bepaling van roetes tussen 'n OT-paar en die toewysing van kapasiteite aan sulke roetes. Die EFDA-algoritme bepaal die globale minimum iteratief. Ons gebruik ook optimale vloeie vir die berekening van die optimale skakelkapasiteite in beide enkel- en multikoers netwerke. Die algoritme is toegepas op verskeie voorbeelde en op verskillende netwerkmodelle. Die skakelkapasiteite word aangewend om die prestasie van die EFDAalgoritme te evalueer en dit te vergelyk met die optimale oplossings verkry met verskillende aanvangstopologieë en tegnieke. Die resultate val binne klein koste-prestasie perke wat ook na aan die optimale oplossing lê.
Frost, Per. "Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011." Thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138576.
Повний текст джерелаKuncoro, Andreas. "Employing Quality Management Principles to Improve the Performance of Educational Systems: An Empirical Study of the Effect of ISO 9001 Standard on Teachers and Administrators Performance in the Indonesian Vocational Education System." Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5966.
Повний текст джерелаPh.D.
Doctorate
Industrial Engineering and Management Systems
Engineering and Computer Science
Industrial Engineering
Mazandu, Gaston Kuzamunu. "Traffic Engineering using Multipath Routing Approaches." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/679.
Повний текст джерелаPereira, Robson Rogério Dutra. "Protocolo ISO 11783: procedimentos para comunicação serial de dados do controlador de tarefa." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/18/18145/tde-29042010-092136/.
Повний текст джерелаThe recent growth of automation technology and embedded electronic in agricultural machinery has established a new practice in agriculture. These new practices related to precision agriculture (PA) have demanded the use of sensors and communications embedded networks for data acquisition and control devices in the farm field. The incompatibility between hardware, software and data formats has become a major obstacle. The global trend is to use standardized systems in accordance with ISO 11783 (also known as ISOBUS) in the devices, or Electronic Control Units (ECU), used in agricultural production. In Brazil, these tools are not yet implemented. The purpose of this work is to systemize the information necessary of the procedures for communication among the implement ECU with management tractor ECU. This work focuses standardized files format, the program of the implement ECU and the validation tests of the devices communication via ISO 11873 network. It was established the relation among the systematized information and embedded devices on agricultural machinery. The embedded devices consist in five ECUs connected in the ISO 11783 network. Four ECUs are located in the tractor: GPS ECU, Task Controller (TC), Virtual Terminal (VT) and Tractor ECU (TECU). The GPS ECU is responsible to the Differential Global Positioning System (DGPS) positioning. The TC is responsible to manage the prescription map and to control the implement. The VT is responsible monitor the application. The TECU disposes tractor velocity of a radar sensor. The fifth device located in the implement is Working Set Master (WSM), which is responsible to interpret the commands from the tractors ECUs and integrate the mechanical-hidraulical device instruction for agricultural operation. It was presented how to develop the needed standardized files (TaskData.XML and Device Description Object Pool), the capabilities needed of the implement ECU program, the validation of communication between the implement ECU with the TC (management tractor ECU) and was prove that the information systematized has facilitated and provided the communication. It is expect that this work may open opportunities for the ISO 11783 standard can be better understood and enlarge the possibility of providing a great number of applications involving the concept of AP in Brazil.
Melby, Nathaniel J. "Design and Development of a Framework for Traffic Management in a Global Manufacturing Enterprise: The American Standard Case Study." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/27.
Повний текст джерелаKarapetsas, Konstantinos. "Building a simulation toolkit for wireless mesh clusters and evaluating the suitability of different families of ad hoc protocols for the Tactical Network Topology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://handle.dtic.mil/100.2/ADA432399.
Повний текст джерелаThesis Advisor(s): Alexander Bordetsky, Gilbert M. Lundy. Includes bibliographical references (p. 69-75). Also available online.
Alkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.
Повний текст джерелаŠoustar, Jiří. "Modul rozhraní Ethernet pro platformu FITkit." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235428.
Повний текст джерелаKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Повний текст джерелаIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Nezafati, Maysam. "Biomaterial Testing Methodology for Long-Term in vivo Applications: Silicon Carbide Corrosion Resistance, Biocompatibility and Hemocompatibility." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5283.
Повний текст джерелаBagula, Bigomokero Antoine. "Traffic engineering label switched paths." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/53196.
Повний текст джерелаENGLISH ABSTRACT: The Internet is evolving into a commercial platform requiring enhanced protocols and an expanded physical infrastructure allowing a better delivery from IP. Multi-protocol Label Switching (MPLS) is a technology enabling traffic engineering and virtual private network (VPN) provisioning. MPLS achieves traffic engineering by carrying the traffic over virtual connections called Label Switched Paths (LSPs) which are engineered based on QoS requirements such as delay, jitter and packet loss minimization or throughput maximization. This thesis proposes path finding and traffic distribution methods to be deployed in MPLS networks for traffic engineering LSPs. A flow optimization model based on a pre-planned routing approach separating path finding and traffic distribution is presented. This model is augmented by a threshold routing approach which routes the traffic based on thresholds expressing the maximum load level reached by network links. This routing approach moves the traffic away from thresholdmarked links to achieve low-utilized links/paths. The performance and routing capabilities of these methods are evaluated through designed software. A routing architecture implementing a two-layer signalling model for MPLS network is proposed and evaluated through simulation. v
AFRIKAANSE OPSOMMING:Die verandering van die Internet in 'n kommersiele platform met verbeterde protokolle en 'n uitgebreide fisieke infrastruktuur stel die internetprotokol (IP) in staat tot beter lewering. Multiprotokol- etiketskakeling (MPLS), is 'n tegnologie vir die voorsiening van televerkeerbeheer en virtuele privaatnetwerke (VPN). MPLS verskaf televerkeerbeheer deur die verkeer te dra oar virtuele konneksies, wat bekend staan as etiketgeskakelde paaie, waarvan die ontwerp gebaseer is op vereistes vir diensgehalte soos vertraging, ritteling en die minimering van pakketverlies of maksimering van deurvoer. Hierdie tesis stel nuwe padvind- en verkeerdistribusiemetodes voor wat aangewend word in MPLSnetwerke om etiketgeskakelde paaie te beheer. 'n Model vir vloei-optimering-gebaseer op voorafbeplande roetering wat padvinding en verkeerdistribusie skei-word aangebied. Hierdie model word uitgebrei deur 'n benadering van drempelroetering wat die verkeer roeteer en gebaseer is op drempels wat die maksimum ladingsvlak voorstel wat bereik kan word deur netwerkskakels. Hierdie roeteringsbenadering skuif die verkeer weg van drempelgemerkte skakels en bereik daardeur laaggebruikte skakelsjpaaie. Die prestasie en roeteringsvaardigheid van hierdie metodes word gevalueer deur selfontwikkelde programmatuur. 'n Argitektuur vir roetering wat 'n dubbellaagseinmodel implementeer vir 'n MPLS-netwerk, word aangebied en gevalueer met simulasie.
Heidari, Fariba. "Quality of service routing using decentralized learning." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=115672.
Повний текст джерелаWe investigate the performance degradation due to decentralized routing as opposed to centralized optimal routing policies in practical scenarios. The system optimal and the Nash bargaining solutions are two centralized benchmarks used in this study. We provide nonlinear programming formulations of these problems along with a distributed recursive approach to compute the solutions. An on-line partially-decentralized control architecture is also proposed to achieve the system optimal and the Nash bargaining solution performances. Numerical results in some practical scenarios with well engineered networks, where the network resources and traffic demand are well matched, indicate that decentralized learning techniques provide efficient, stable and scalable approaches for routing the bandwidth guaranteed paths.
In the context of on-line learning, we propose a new algorithm to track the best action-selection policy when it abruptly changes over time. The proposed algorithm employs change detection mechanisms to detect the sudden changes and restarts the learning process on the detection of an abrupt change. The performance analysis of this study reveals that when all the changes are detectable by the change detection mechanism, the proposed tracking the best action-selection policy algorithm is rate optimal. On-line routing of bandwidth guaranteed paths with the potential occurrence of network shocks such as significant changes in the traffic demand is one of the applications of the devised algorithm. Simulation results show the merit of the proposed algorithm in tracking the optimal routing policy when it abruptly changes.
Chigwamba, Nyasha. "An investigation into the hardware abstraction layer of the plural node architecture for IEEE 1394 audio devices." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004841.
Повний текст джерелаNordström, Roger. "Framtagning av en informationssäkerhetspolicy." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-521.
Повний текст джерелаThis report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.
The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.
Another question was to investigate the information sources at the company and which threats there are against it.
The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called “Infosäkpulsen”. After the analysis was made of the survey, two reports were present with action plan for better information security for the company. The most important measures were of administrative kind and consist of a risk analysis of information resources and to make an information security policy with instructions for the users.
The risk analysis was made with the tool BITS from Krisberedskapsmyndigheten and the consequence was that base level for IT-security was enough for the company.
To fulfil the demand from the analyses so was an information security policy made and after that so create we information security instructions for the different kind of user group. One instruction was for ordinary users and the other was for management users.
Besides the part with policy and instructions so recommend the company to initiate incident management and register all kind of changes in their IT-system.
For further research it suggests to investigate how different standards can integrate to be only one standard that fulfils the goals in quality, environment and security standard
Rapporten var gjord som examensarbete på HordaGruppen AB och ingår i Breddmagisterprogrammet i Internetteknik på Ingenjörshögskolan i Jönköping.
Problemställningen som rapporten handlar om är hur man skyddar företagets information mot olika sorters hot. Frågeställningen var dels hur man tar fram en informationssäkerhetspolicy och vilka riktlinjer det finns i svensk standard för informationssäkerhet. Frågeställningen skulle också ta reda på företagets informationstillgångar och vilka hot det fanns mot dessa.
Arbetets inleds med en presentation på företaget om informationssäkerhet för Kvalitetschefen och IT-ansvarig. Därefter görs en nulägesanalys över informationssäkerheten med hjälp av verktyget Infosäkpulsen, en enkätundersökning från Länsteknikcentrum i Jönköping AB. Efter att svaren samlats in så sammanställdes en åtgärdsrapport och presenterades för företaget. De åtgärder som ansågs mest aktuella var av det administrativa slaget och bestod i att riskanalysera informationstillgångarna och att ta fram en informationssäkerhetspolicy med anvisningar för användarna.
Riskanalysen gjordes med verktyget BITS från Krisberedskapsmyndigheten och resulterade i att basnivå för it säkerhet räckte överlag för företaget.
För att uppfylla kraven från analyserna så togs en informationssäkerhetspolicy fram och därefter skapades informationssäkerhetsanvisningar till användare och till drift och förvaltning för att kunna uppfölja policyn.
Förutom att följa policyn och anvisningarna så rekommenderas företaget att införa incidenthantering och öka spårbarheten genom att dokumentera vilka ändringar som görs i IT-systemen. Ett uppslag för fortsatt arbete skulle kunna vara att integrera de olika standarderna till en anvisning som uppfyller målen för både kvalitet, miljön och säkerheten.
Bert, Denis. "Systemes d'annuaire osi : specifications de mise en oeuvre pour la messagerie et l'administration de reseau." Paris 6, 1988. http://www.theses.fr/1988PA066075.
Повний текст джерелаNsoh, Stephen Atambire. "Resource allocation in WiMAX mesh networks." Thesis, Lethbridge, Alta. : University of Lethbridge, Dept. of Mathematics and Computer Science, c2012, 2012. http://hdl.handle.net/10133/3371.
Повний текст джерелаix, 77 leaves : ill. ; 29 cm
Zhou, Dong. "Clock synchronization and dominating set construction in ad hoc wireless networks." Columbus, Ohio : Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1131725177.
Повний текст джерелаWiman, Jonathan, and Jonathan Lundström. "Riktlinjers roll i IT-forensiska utredningar." Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37486.
Повний текст джерелаGarige, Naga Siddhardha. "A Distributed Routing Algorithm for ER-LSP Setup in MLPS Networks." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000086.
Повний текст джерелаOrozco, Barbosa Luis. "Developpement et evaluation de performances du protocole de transport de l'iso pour reseaux locaux." Paris 6, 1987. http://www.theses.fr/1987PA066562.
Повний текст джерелаRojanarowan, Jerapong. "MPLS-Based Best-Effort Traffic Engineering." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7496.
Повний текст джерелаScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Повний текст джерела