559 research outputs found

    Diffusion of network innovation : implications for adoption of internet services

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.Includes bibliographical references (p. 51-53).by Mark S. Shuster.B.S.M.Eng

    Top 10 technologies and their impact on CPA\u27s

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2474/thumbnail.jp

    Top 10 technology opportunities : tips and tools

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1610/thumbnail.jp

    Modeling network traffic on a global network-centric system with artificial neural networks

    Get PDF
    This dissertation proposes a new methodology for modeling and predicting network traffic. It features an adaptive architecture based on artificial neural networks and is especially suited for large-scale, global, network-centric systems. Accurate characterization and prediction of network traffic is essential for network resource sizing and real-time network traffic management. As networks continue to increase in size and complexity, the task has become increasingly difficult and current methodology is not sufficiently adaptable or scaleable. Current methods model network traffic with express mathematical equations which are not easily maintained or adjusted. The accuracy of these models is based on detailed characterization of the traffic stream which is measured at points along the network where the data is often subject to constant variation and rapid evolution. The main contribution of this dissertation is development of a methodology that allows utilization of artificial neural networks with increased capability for adaptation and scalability. Application on an operating global, broadband network, the Connexion by Boeingʼ network, was evaluated to establish feasibility. A simulation model was constructed and testing was conducted with operational scenarios to demonstrate applicability on the case study network and to evaluate improvements in accuracy over existing methods --Abstract, page iii

    Network Performance Management Using Application-centric Key Performance Indicators

    Get PDF
    The Internet and intranets are viewed as capable of supplying Anything, Anywhere, Anytime and e-commerce, e-government, e-community, and military C4I are now deploying many and varied applications to serve their needs. Network management is currently centralized in operations centers. To assure customer satisfaction with the network performance they typically plan, configure and monitor the network devices to insure an excess of bandwidth, that is overprovision. If this proves uneconomical or if complex and poorly understood interactions of equipment, protocols and application traffic degrade performance creating customer dissatisfaction, another more application-centric, way of managing the network will be needed. This research investigates a new qualitative class of network performance measures derived from the current quantitative metrics known as quality of service (QOS) parameters. The proposed class of qualitative indicators focuses on utilizing current network performance measures (QOS values) to derive abstract quality of experience (QOE) indicators by application class. These measures may provide a more user or application-centric means of assessing network performance even when some individual QOS parameters approach or exceed specified levels. The mathematics of functional analysis suggests treating QOS performance values as a vector, and, by mapping the degradation of the application performance to a characteristic lp-norm curve, a qualitative QOE value (good/poor) can be calculated for each application class. A similar procedure could calculate a QOE node value (satisfactory/unsatisfactory) to represent the service level of the switch or router for the current mix of application traffic. To demonstrate the utility of this approach a discrete event simulation (DES) test-bed, in the OPNET telecommunications simulation environment, was created modeling the topology and traffic of three semi-autonomous networks connected by a backbone. Scenarios, designed to degrade performance by under-provisioning links or nodes, are run to evaluate QOE for an access network. The application classes and traffic load are held constant. Future research would include refinement of the mathematics, many additional simulations and scenarios varying other independent variables. Finally collaboration with researchers in areas as diverse as human computer interaction (HCI), software engineering, teletraffic engineering, and network management will enhance the concepts modeled

    Moving Towards Mobile Third Generation Telecommunications Standards: The Good and Bad of the \u27Anytime/Anywhere\u27 Solutions

    Get PDF
    Mobile communication technologies are changing every aspect of the daily life, bringing new opportunities in many areas. Several converging mobile systems can potentially change organizations significantly by shifting the traditional boundaries of work-life and the workplace. Mobile telephony, combining satellite and terrestrial cellular systems, already transformed the way people work by allowing \u27anytime/anywhere\u27 telephone calling and text messaging. Broadband mobile telephony opens additional avenues to provide information conveniently as quickly and easily as possible, when needed and where needed. The evolution of wireless technologies (from Wireless Personal Area Networks to ubiquitous Third Generation/Universal Mobile Telecommunication System - UMTS) increased the number of services available to business organizations and mobile workers. Machine-to-machine, vertical applications, and mobile office applications are increasingly being deployed. Service providers and mobile operators are also changing the way they operate as a result of the increasing availability of mobile broadband communication services. IT departments need to change their systems, upgrade, and adapt their infrastructure and policies to support these mobile services. These changes are both positive and negative. With this progression, some fundamental questions related to privacy, security, and a new concept of work place and work space are raised. The implications for developing economies, such as China, and their potential for leapfrogging are future attention areas

    A Survey of Satellite Communications System Vulnerabilities

    Get PDF
    The U.S. military’s increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries. Attacks on these satellites could cause military communications to become unavailable at critical moments during a conflict. This research dissected a typical satellite communications system in order to provide an understanding of the possible attacker entry points into the system, to determine the vulnerabilities associated with each of these access points, and to analyze the possible impacts of these vulnerabilities to U.S. military operations. By understanding these vulnerabilities of U.S. communications satellite systems, methods can be developed to mitigate these threats and protect future systems. This research concluded that the satellite antenna is the most vulnerable component of the satellite communications system’s space segment. The antenna makes the satellite vulnerable to intentional attacks such as: RF jamming, spoofing, meaconing, and deliberate physical attack. The most vulnerable Earth segment component was found to be the Earth station network, which incorporates both Earth station and NOC vulnerabilities. Earth segment vulnerabilities include RF jamming, deliberate physical attack, and Internet connection vulnerabilities. The most vulnerable user segment components were found to be the SSPs and PoPs. SSPs are subject to the vulnerabilities of the services offered, the vulnerabilities of Internet connectivity, and the vulnerabilities associated with operating the VSAT central hub. PoPs are susceptible to the vulnerabilities of the PoP routers, the vulnerabilities of Internet and Intranet connectivity, and the vulnerabilities associated with cellular network access

    Systems Issues in E-Commerce

    Get PDF
    This paper profiles critical systems issues in deriving value from e-commerce initiatives.  With the help of several organizational processes and functions, opportunities for accounting are identified to reduce the impending failure rate as companies experiment and adapt to the new business model.  Organizations should adopt a holistic approach to address systems design, implementation and control issues.  The planning and execution of e-commerce activity should focus on glitch free front-end portals that are followed up with tight back-end data integrity across various nodes of the value chain.

    Using Thin-client Architecture to Access the Legacy Training Database Within the Federal Aviation Administration Academy

    Get PDF
    Applied Educational Studie
    • …
    corecore