13 research outputs found

    Design and implementation of a fault-tolerant multimedia network and a local map based (LMB) self-healing scheme for arbitrary topology networks.

    Get PDF
    by Arion Ko Kin Wa.Thesis (M.Phil.)--Chinese University of Hong Kong, 1997.Includes bibliographical references (leaves 101-[106]).Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Overview --- p.1Chapter 1.2 --- Service Survivability Planning --- p.2Chapter 1.3 --- Categories of Outages --- p.3Chapter 1.4 --- Goals of Restoration --- p.4Chapter 1.5 --- Technology Impacts on Network Survivability --- p.5Chapter 1.6 --- Performance Models and Measures in Quantifying Network Sur- vivability --- p.6Chapter 1.7 --- Organization of Thesis --- p.6Chapter 2 --- Design and Implementation of A Survivable High-Speed Mul- timedia Network --- p.8Chapter 2.1 --- An Overview of CUM LAUDE NET --- p.8Chapter 2.2 --- The Network Architecture --- p.9Chapter 2.2.1 --- Architectural Overview --- p.9Chapter 2.2.2 --- Router-Node Design --- p.11Chapter 2.2.3 --- Buffer Allocation --- p.12Chapter 2.2.4 --- Buffer Transmission Priority --- p.14Chapter 2.2.5 --- Congestion Control --- p.15Chapter 2.3 --- Protocols --- p.16Chapter 2.3.1 --- Design Overview --- p.16Chapter 2.3.2 --- ACTA - The MAC Protocol --- p.17Chapter 2.3.3 --- Protocol Layering --- p.18Chapter 2.3.4 --- "Segment, Datagram and Packet Format" --- p.20Chapter 2.3.5 --- Fast Packet Routing --- p.22Chapter 2.3.6 --- Local Host NIU --- p.24Chapter 2.4 --- The Network Restoration Strategy --- p.25Chapter 2.4.1 --- The Dual-Ring Model and Assumptions --- p.26Chapter 2.4.2 --- Scenarios of Network Failure and Remedies --- p.26Chapter 2.4.3 --- Distributed Fault-Tolerant Algorithm --- p.26Chapter 2.4.4 --- Distributed Auto-Healing Algorithm --- p.28Chapter 2.4.5 --- The Network Management Signals --- p.31Chapter 2.5 --- Performance Evaluation --- p.32Chapter 2.5.1 --- Restoration Time --- p.32Chapter 2.5.2 --- Reliability Measures --- p.34Chapter 2.5.3 --- Network Availability During Restoration --- p.41Chapter 2.6 --- The Prototype --- p.42Chapter 2.7 --- Technical Problems Encountered --- p.45Chapter 2.8 --- Chapter Summary and Future Development --- p.46Chapter 3 --- A Simple Experimental Network Management Software - NET- MAN --- p.48Chapter 3.1 --- Introduction to NETMAN --- p.48Chapter 3.2 --- Network Management Basics --- p.49Chapter 3.2.1 --- The Level of Management Protocols --- p.49Chapter 3.2.2 --- Architecture Model --- p.51Chapter 3.2.3 --- TCP/IP Network Management Protocol Architecture --- p.53Chapter 3.2.4 --- A Standard Network Management Protocol On Internet - SNMP --- p.54Chapter 3.2.5 --- A Standard For Managed Information --- p.55Chapter 3.3 --- The CUM LAUDE Network Management Protocol Suite (CNMPS) --- p.56Chapter 3.3.1 --- The Architecture --- p.53Chapter 3.3.2 --- Goals of the CNMPS --- p.59Chapter 3.4 --- Highlights of NETMAN --- p.61Chapter 3.5 --- Functional Descriptions of NETMAN --- p.63Chapter 3.5.1 --- Topology Menu --- p.64Chapter 3.5.2 --- Fault Manager Menu --- p.65Chapter 3.5.3 --- Performance Meter Menu --- p.65Chapter 3.5.4 --- Gateway Utility Menu --- p.67Chapter 3.5.5 --- Tools Menu --- p.67Chapter 3.5.6 --- Help Menu --- p.68Chapter 3.6 --- Chapter Summary --- p.68Chapter 4 --- A Local Map Based (LMB) Self-Healing Scheme for Arbitrary Topology Networks --- p.70Chapter 4.1 --- Introduction --- p.79Chapter 4.2 --- An Overview of Existing DCS-Based Restoration Algorithms --- p.72Chapter 4.3 --- The Network Model and Assumptions --- p.74Chapter 4.4 --- Basics of the LMB Scheme --- p.75Chapter 4.4.1 --- Restoration Concepts --- p.75Chapter 4.4.2 --- Terminology --- p.76Chapter 4.4.3 --- Algorithm Parameters --- p.77Chapter 4.5 --- Performance Assessments --- p.78Chapter 4.6 --- The LMB Network Restoration Scheme --- p.80Chapter 4.6.1 --- Initialization - Local Map Building --- p.80Chapter 4.6.2 --- The LMB Restoration Messages Set --- p.81Chapter 4.6.3 --- Phase I - Local Map Update Phase --- p.81Chapter 4.6.4 --- Phase II - Update Acknowledgment Phase --- p.82Chapter 4.6.5 --- Phase III - Restoration and Confirmation Phase --- p.83Chapter 4.6.6 --- Phase IV - Cancellation Phase --- p.83Chapter 4.6.7 --- Re-Initialization --- p.84Chapter 4.6.8 --- Path Route Monitoring --- p.84Chapter 4.7 --- Performance Evaluation --- p.84Chapter 4.7.1 --- The Testbeds --- p.84Chapter 4.7.2 --- Simulation Results --- p.86Chapter 4.7.3 --- Storage Requirements --- p.89Chapter 4.8 --- The LMB Scheme on ATM and SONET environment --- p.92Chapter 4.9 --- Future Work --- p.94Chapter 4.10 --- Chapter Summary --- p.94Chapter 5 --- Conclusion and Future Work --- p.96Chapter 5.1 --- Conclusion --- p.95Chapter 5.2 --- Future Work --- p.99Bibliography --- p.101Chapter A --- Derivation of Communicative Probability --- p.107Chapter B --- List of Publications --- p.11

    Glossarium BITri 2016 : Interdisciplinary Elucidation of Concepts, Metaphors, Theories and Problems Concerning Information

    Get PDF
    222 p.Terms included in this glossary recap some of the main concepts, theories, problems and metaphors concerning INFORMATION in all spheres of knowledge. This is the first edition of an ambitious enterprise covering at its completion all relevant notions relating to INFORMATION in any scientific context. As such, this glossariumBITri is part of the broader project BITrum, which is committed to the mutual understanding of all disciplines devoted to information across fields of knowledge and practic

    Cyber Security and Critical Infrastructures

    Get PDF
    This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues

    Mytholudics:understanding games as/through myth

    Get PDF
    This dissertation outlines a mythological framework for understanding how games produce meaning. I first theorise mythology as it applies to games and play. This is expressed through a cycle showing how mythology is embedded in the production of games and how it impacts the interpretation of games. This is then operationalised as a method for the analysis of games. I call my theorisation and analytical approach mytholudics. I then apply mytholudics in ten analyses of individual games or game series, split into two lenses: heroism and monstrosity. Finally, I reflect on these analyses and on mytholudics as an approach.Mythology here is understood through two perspectives: Roland Barthes’ theory outlined in Mythologies (1972/2009) and Frog’s (2015, 2021a) understanding of mythology in cultural practice and discourse from a folklore studies perspective. The Barthesian approach establishes myth as a mode of expression rather than as an object. This has naturalisation as a key feature. Otherwise-arbitrary relations between things are made to seem natural. Frog’s mythic discourse approach understands mythology as “constituted of signs that are emotionally invested by people within a society as models for knowing the world” (2021a, p. 161). Mythic discourse analysis focuses on the comparison of mythic discourses over time and across cultures.Barthes and Frog broadly share an understanding of mythology as a particular way of communicating an understanding of the world through discourse. Mythology is then not limited to any genre, medium or cultural context. It can include phenomena as diverse as systems, rules, customs, rituals, stories, characters, events, social roles and so on. What is important is how these elements relate to one another. Games consist of the same diverse elements arranged in comparable configurations, and so this perspective highlights the otherwise hidden parallels between mythology and games.I argue for analysing games as and through myth. Games as myth means viewing the game as an organising structure that works analogously to mythology. Elements are constructed and put into relation with one another within a gameworld, which the player then plays in and interprets. Games through myth means seeing games as embedded within cultural contexts. The cultural context of development affects the mythologies that can be seen to influence the construction of the game, while the cultural context of the player affects how they relate to the game and the mythologies channelled through it.A mytholudic approach helps us to understand how games make meaning because it focuses on the naturalised and hidden premises that go into the construction of games as organising structures. By analysing the underpinnings of those organising structures, we can outline the model for understanding the world that is virtually instantiated and how they are influenced by, influence and relate to models for understanding the world—mythologies—in the real world

    Interdisciplinary elucidation of concepts, metaphors, theories and problems concerning INFORMATION

    Get PDF
    Terms included in this glossary recap some of the main concepts, theories, problems and metaphors concerning INFORMATION in all spheres of knowledge. This is the first edition of an ambitious enterprise covering at its completion all relevant notions relating to INFORMATION in any scientific context. As such, this glossariumBITri is part of the broader project BITrum, which is committed to the mutual understanding of all disciplines devoted to information across fields of knowledge and practice. This glossary pretends to make explicit the conflicts and agreements among use and meaning of terms related to information phenomena. Information is approached from opposing paradigms and also from competing and cooperating disciplines. Both in science and in ordinary life, conceptual, ethical, technical and societal problems regard information in an essential way. This glossary does not endorse or presuppose any paradigm or any theory, but rather locates into a public, explicit and commonly understandable space some of the crucial assumptions dividing informational concepts, theories, problems and metaphors. Moreover, we purport to embrace all distinct paradigms with a critical and comprehensive attitude. The glossary is the result of an original methodology, which places any entrance under the responsibility of its editor. Authors possibly distinct from the editor contribute to different articles with texts, comments or discussions. Since authors come from many distinct fields of knowledge, each article should reflect many perspectival but rigorous approaches. The glossary is an open work: the number and contents of all its entrances are updated and submitted to revision by editors and authors. For this reason, this first edition is only a first step in the active development of this collaborative methodology. Any interested reader wishing to contribute, may contact the general editors. This glossary is most indebted to the enthusiasm and work of José María Díaz Nafría. The editorial team, authors and correctors thank the Universidad de León and Caja España for their support to this initiative

    Genetic and Phenotypic Variation in Tree Crops Biodiversity

    Get PDF
    Recently, there has been a dramatic increase in the use of DNA-derived data and innovative phenotyping to obtain insights into the causative genes underlying traits of agronomical interest or to characterize tree genetic resources. The latter, in particular, could represent an important source of genetic diversity that can be readily used to enhance the adaptability to limiting environmental factors and resistance to biotic stresses or to promote novel genotypes with improved agronomic traits. On the whole, the studies collected in this book report on tree crop biodiversity characterization that could provide the essential building blocks to ensure future improvements in production and quality, as well as for innovations in tree crop development and utilization

    Programme radiation protection. Progress report. EUR 7169

    Get PDF

    Accountants\u27 index. Twenty-seventh supplement, January-December 1978, volume 2: M-Z

    Get PDF
    https://egrove.olemiss.edu/aicpa_accind/1032/thumbnail.jp

    Accountants\u27 index. Twenty-seventh supplement, January-December 1978, volume 1: A-L

    Get PDF
    https://egrove.olemiss.edu/aicpa_accind/1031/thumbnail.jp

    Physiological and Molecular Characterization of Crop Resistance to Abiotic Stresses

    Get PDF
    Abiotic stress represents the main constraint for agriculture, affecting plant growth and productivity worldwide. Yield losses in agriculture will be potentiated in the future by global warming, increasing contamination, and reduced availability of fertile land. The challenge for agriculture of the present and future is that of increasing the food supply for a continuously growing human population under environmental conditions that are deteriorating in many areas of the world. Minimizing the effects of diverse types of abiotic stresses represents a matter of general concern. Research on all topics related to abiotic stress tolerance, from understanding the stress response mechanisms of plants to developing cultivars and crops tolerant to stress, is a priority. This Special Issue is focused on the physiological and molecular characterization of crop resistance to abiotic stresses, including novel research, reviews, and opinion articles covering all aspects of the responses and mechanisms of plant tolerance to abiotic. Contributions on physiological, biochemical, and molecular studies of crop responses to abiotic stresses; the description and role of stress-responsive genes; marker-assisted screening of stress-tolerant genotypes; genetic engineering; and other biotechnological approaches to improve crop tolerance were considered
    corecore