Endre søk
Begrens søket
1234567 151 - 200 of 806
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 151.
    Dhainaut, Guillaume
    KTH, Skolan för elektro- och systemteknik (EES), Kommunikationsnät.
    A reverse proxy for VoIP: Or how to improve security in a ToIP network2016Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security.

    This thesis presents the reasons of SBC existence, based on the security weaknesse sa ToIP network can show. These reasons are then used to establish a list of features which can be expected from a SBC and discuss its ideal placement in a ToIP network architecture. A test methodology for SBCs is established and used on the free software Kamailio as an illustration. Following this test, improvements of this software, regarding threats prevention and attacks detection, are presented and implemented.

  • 152.
    Di, Shuang
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    USB Attached Network Performance: Uplink Performance2009Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    More and more people all over the world are using a USB modem to connect to the Internet. This is especially true in Sweden- which has the highest 3G coverage in Europe. Comparable to fixed broadband access, using a 3G USB modem is a wonderful experience for the customer. Increasingly, anywhere we can use our cellular phone is a place that we are able to access the Internet, even if we are traveling in a train, walking in a park, or sitting on the beach. This makes working on the move much easier. However, customers do not know if the network throughput, delay, and the cost of connectivity match their needs. Additionally, there is also the question of the time to connect to the network when there has not been some traffic for a period of time. However, the throughput, delay, and "time to connect" when using such a modem to connect to a wireless network depend on several factors. In this thesis we will examine these factors. More specifically, the thesis will analyze in detail the effects of using a USB attached network interface, in order to gain greater understanding of such an interface’s network performance. We have chosen to focus on the uplink, as it was expected to have a low throughput and it has not had as much attention as the downlink performance.

  • 153.
    Dimitriou, Eleftherios
    KTH, Tidigare Institutioner, Teleinformatik.
    An Archive Robot for Video Mail1998Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Today most of the real-time voice communications are carried over the Plain Old Telephone System (POTS). In the future that might well change. Research indicates a strong interest for developing the network to support real-time communications in a satisfactory way. Applications will be needed in this new world of IP (Internet Protocol) based communications.

    In this thesis we present an application called the Video Mail service. The Video Mail service can record and playback audio and video messages over the Internet using standard Internet telephony protocols. It is built on top of a more general platform called the Archive Robot. The Archive Robot provides the real-time functionality of the system. It is not explicitly designed to support the Video Mail service. Other services such as Conference Tool and Interactive Voice Response can also be supported.

    The Video Mail service was designed and implemented. Furthermore, this first prototype was used to evaluate the performance of the overall system.

  • 154.
    Dominique, Torkel
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Mikroelektronik och Informationsteknik, IMIT.
    Push services based on SIP2001Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    The Session Initiation Protocol (SIP) is the most potential protocol for Real Time IP communication, for example IP telephony, today. This M.Sc. thesis project aim to create a solution for information providers to push information to a large numbers of users, using the SIP protocol and a number of proposed extensions to SIP. The system will be built on a SUBSCRIBE/NOTIFY mechanism similar to the one used for instant messages and presence. This system can be used for companies to build information push services (i.e. News, Traffic information, etc.) or to push commercial advertisement.

    The reason to use the SIP protocol for this is that SIP has already solved the addressing problem by introducing email-like addresses that follow the user when he moves around in the system. This is perfect for the push service that wants to reach the user wherever he is.

  • 155.
    Domínguez Sánchez, Carlos
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Speaker Recognition in a handheld computer2010Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Handheld computers are widely used, be it a mobile phone, personal digital assistant (PDA), or a media player. Although these devices are personal, often a small set of persons can use a given device, for example a group of friends or a family.

    The most natural way to communicate for most humans is through speech. Therefore a natural way for these devices to know who is using them is for the device to listen to the user’s speech, i.e., to recognize the speaker based upon their speech.

    This project exploits the microphone built into most of these devices and asks whether it is possible to develop an effective speaker recognition system which can operate within the limited resources of these devices (as compared to a desktop PC). The goal of this speaker recognition is to distinguish between the small set of people that could share a handheld device and those outside of this small set. Therefore the criteria is that the device should work for any of the members of this small set and not work for anyone outside of this small set. Furthermore, within this small set the device should recognize which specific person within this small group is using it.

    An application for a Windows Mobile PDA has been developed using C++. This application and its underlying theoretical concepts, as well as parts of the code and the results obtained (in terms of accuracy rate and performance) are presented in this thesis. The experiments conducted within this research indicate that it is feasible to recognize the user based upon their speech is within a small group and further more to identify which member of the group is the user. This has great potential for automatically configuring devices within a home or office environment for the specific user. Potentially all a user needs to do is speak within hearing range of the device to identify themselves to the device. The device in turn can configure itself for this user. 

  • 156.
    Drugge, Fredrik
    KTH, Tidigare Institutioner, Teleinformatik.
    Design of a Multimedia Help System in UNIX1995Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    The department G at EUA has developed a project management method and tool, PROPS-N. The PROPS-N is an on-line system built in FrameMaker that operates in a SUN/UNIX environment.

    This master's thesis attends to the problem of how to organize and implement a prototype of a multimedia help system for PROPS-N, with the help of the commercial tools available today.

    I have searched for multimedia authoring tools and screen activity recorders, that can be used for the development of the prototype. I have evaluated the multimedia authoring tools IconAuthor 6.0, Gain Momentum 3.1 and MetaCard 1.4. I have also evaluated the screen activity recorders ScreenPlay 2.3 and XRecorder 1.101.

    Some aspects that help you create usable help systems, and ensure learning, are also shown in this thesis. I have used a Multimedia Design and Development Methodology, with the tools ScreenPlay and MetaCard for the implementation of the prototype.

    This thesis also includes suggestions for future development of the prototype.

  • 157.
    Du, Manxing
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Analyzing Caching Gain in Small Geographical Areas in IP Access Networks2012Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Since its emergence, user generated content (UGC) has become the driving force in the growth of Internet traffic. As one of the most successful and popular UGC systems, YouTube contributes a great share of Internet traffic volume and has attracted a lot of academic interest. The continuously increasing amount of IP traffic motivates the need for better network design, more efficient content distribution mechanisms, and more sustainable system development. Web caching is one of the widely used techniques to reduce the inter Internet Service Provider (ISP) traffic. Web caching is considered an important part in the design of a content distribution infrastructure.

    This master’s thesis utilizes a one month trace of YouTube traffic in two residential networks in Sweden. Based upon a systematic and in-depth measurement we focus on analyzing the geographic locality of traffic patterns within small areas for these two networks. We summarize the YouTube traffic characteristics and user replay patterns, and then discuss why caching can be useful for YouTube-like systems.

    We present the optimal caching gain on a per area basis and also divide users into two groups: PC and mobile device users to show the caching gain for these two groups. Overall, an infinite capacity proxy cache for each small area could reduce the YouTube streaming data traffic by 30% to 45%. The result presented in this paper help us to understand YouTube traffic and user behaviors and provides valuable information for the ISPs to enable them to design more efficient caching mechanisms.

    When this work began we thought that a reduction of backhaul traffic (especially for mobile operators) may delay the need to make investments in upgrading their network capacity. However, an important conclusion from this thesis project is that the cache efficiency depends on the terminal type. For mobile terminals (smart phones, iPads, etc) a terminal cache solution is found to be the most efficient. For PCs in fixed networks, a network cache would be more efficient. It should be noted that the mobile terminals covered in the project are connected through home Wi-Fi, so further research is needed in order to draw definite conclusions for caching solutions for cellular networks.

  • 158.
    Du, Tianlong
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Ye, Jie
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    CHAT: City Error Handling through Instagram and FixaMinGata2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Deficient public infrastructure always causes significant complications to citizens’ daily travelling. However, it is hard for authorities to discover all the problems that suddenly occur on the road. To address these issues, one direction is to develop a system that allows citizens to report a problem quickly, so that the authorities could receive the information timely and solve it as soon as possible.

    In our project, instead of developing everything from scratch, we have decided to use Instagram and FixaMinGata as components. Instagram is a smart phone application that is used to share a photo with public. We use it to make a report which related to potholes, broke street lights and other similar problems.  FixaMinGata is a Swedish website that allows people to publish infrastructure problem reports online and forwards them to the authorities.

    Thus, the main purpose of our project is to make an interface between Instagram and FixaMinGata. It involves using the information that extracted from Instagram to create and post a report on FixaMinGata and to forward the feedback from authorities to Instagram users as well.

    This project runs under Ubuntu 12.04, and we have selected Python as the programming language. Besides these development environments, some additional modules are imported as well, such as Bottle, Selenium, Poster and Mechanize.

  • 159.
    Dubroca, Sabrina Marjorie
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Cross-Layer optimization in a satellite communication network2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This thesis aims to improve a satellite communication network which carries both data streams and Voice over IP (VoIP) communication sessions with resource reservation. The resource reservations are made using the standard protocols for Traffic Engineering: MPLS-TE and RSVP-TE. The goal of this thesis project is to optimize the number of concurrent VoIP calls that can be made, in order to use the available bandwidth while maintaining a guaranteed Quality of Service (QoS) level, which is not possible in the existing system.

    This thesis proposes and evaluates a solution to this optimization problem in the specific context of a satellite modem system that was developed by Thales Communications. This optimization improves the system's ability to carry VoIP communications through better use of the available transmission resources. A solution to this problem would also increase the  exibility in bandwidth allocation within the modem system, and could provide a framework for future development.

    The proposed solution allows all of the reservable bandwidth to be used.  The amount of reservable bandwidth must be at least a little lower than the channel's available bandwidth in order to avoid congestion. Some areas of future work are proposed.

  • 160.
    Dully, Michael
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska högskolan.
    Traffic Safety Evaluation of Future Road Lighting Systems2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    While new road lighting technologies, either LED or adaptive road lighting systems, offer a wide range of unique potential benefits (mainly in terms of energy savings), it is necessary to evaluate the safety impacts of these technologies on road users. The literature survey shows that providing light on previous unlit roads has a positive effect on traffic safety. Reducing the amount of light has the opposite effect. These studies are usually conducted by using crash numbers, which makes it impossible to draw conclusions on changes in driving behaviour. Driving behaviour analyses need special approaches and indicators. Therefore indirect indicators such as speed and safety relationship, jerky driving and traffic conflict parameters are presented. The individual character of such data is difficult to deal with and limits big scale analyses. In order to have a practical example of such indicators a case study is conducted. Floating car data collected in Vienna is used to analyse travel speeds of taxi drivers at two LED test sites. A simple before-after analysis is used with data from January 2011 to May 2012 in order to examine an expected increase in speed due to a better visual performance of LED light. However the results show either no changes at all or a trend in speed reduction of 1km/h in average. Unfavourable test site locations might limit the significance of the results.

  • 161.
    Duong, Le
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Fysik och elektroteknik. Linköpings universitet, Tekniska högskolan.
    A model to predict the coverage of VHF transmissions2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    VHF står för "Very High Frequency" och är ett frekvensband som ligger i området 30 - 300 MHz. Maritim VHF är standard för Sjöfartsverket och fungerar över hela världen. Det är ett kommunikationssystem som bidrar till ökad säkerhet och kan rädda liv på sjön. Andra vanliga kommunikationssystem som mobiltelefoni fungerar inte tillförlitligt. Idag fungerar mobiltelefoni i stora delar av skärgården och längs kusterna men när det gäller kommunikation mellan fartyg längre ut till havs är den maritima VHF-kommunikationen överlägsen. Sjöfartsverket driver för sitt eget och kunders behov ett mobilradionätverk kallat kustradionätverket. Radiotrafiken i nätet sker både på Very High Frequency (VHF) och Medium frequency (MF). VHF-systemet är ett internationellt system som bland annat används till att kommunicera till sjöss och den trafiken befinner sig i frekvensbandet 155.5 - 162.025 MHz. Inom VHF-bandet finns det 55 kanaler. Kanalerna vid kustradiostationen kallas för duplexkanaler och innebär att kustradiostationerna sänder och tar emot signaler på två olika frekvenser. Radioutbredningen hos antennen som är installerad på basstationen har riktverkan i vissa riktningar och dämpningar i andra. Detta kan ses i strålningsdiagrammet under kapitlet "Täckningsmodell" och avsnittet antennen. Andra faktorer som kan påverka radioutbredningen är förluster i basstationenssystemet, topologin hos området mellan sändare och mottagare samt väderberoende utbredningsegenskaper. Genom att hitta de tänkbara faktorer som påverkar signalutbredningen kan en täckningsmodell förutses. Det är förluster som finns i basstationen, radiolänken samt förluster vid mottagarantennen.

  • 162.
    Dzaferagic, Samir
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Secure Session Mobility for VoIP2008Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    High data rate wireless packet data networks have made real-time IP based services available through mobile devices. At the same time, differences in the characteristics of radio technologies (802.11/WiFi and 3G networks) make seamless handoff across heterogeneous wireless networks difficult. Despite this, many believe that the ultimate goal of next generation networks (often referred to as the fourth generation) is to allow convergence of such dissimilar heterogeneous networks. Supporting voice over Internet Protocol in next-generation wireless systems is thought by some to require support for mobility and quality of service features. Currently a mobile node can experience interruptions or even sporadic disconnections of an on going real-time session due to handovers between both networks of different types and networks of the same type.

    Many tests have already been done in this area and one may wonder why it is worth spending even more time investigating it? This thesis focuses on the important problem of providing session security despite handovers between networks (be they operated by the same operator or different operators and be they the same link technologies or different). One of the goals in this thesis is to investigate how an ongoing speech session can continue despite a change in transmission media1. Additionally, a number of security threats that could occur due to the handover will be identified and presented. Finally, the most suitable solution to address these threats will be tested in a real environment. Eventual shortcomings and weaknesses will be identified and presented; along with suggestions for future work. 

    1 When utilizing IP over carriers such as wired Ethernet, WLAN, and 3G.

  • 163.
    Díez Rodríguez, Víctor
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi.
    Detournay, Jérôme
    Högskolan i Halmstad, Akademin för informationsteknologi.
    An Approach for Receiver-Side Awareness Control in Vehicular Ad-Hoc Networks2016Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Vehicular Ad-Hoc Network (VANET)s are a key element of Intelligent Transport System (ITS)s. One of the challenges in VANETs is dealing with awareness and congestion due to the high amount of messages received from the vehicles in communication range. As VANETs are used in critical applications, congestion on the receiver side caused by the buffering of the packets is a safety hazard. In this thesis, we propose a stream-wise queuing system on the receiver side and show how it improves the timeliness of the messages received and main- tains the awareness of the system in a congestion situation.

  • 164.
    Eamrurksiri, Techin
    Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem. Linköpings universitet, Tekniska högskolan.
    Implementation and Analysis of Spectrum Sensing Algorithms for SIMO Links2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Cognitive radio is an autonomous transceiver that is continuously sensing theongoing communication in its environment, it then starts the communication whenever it is appropriate. Therefore, cognitive radio helps improving the spectrum utilization of the overall communication system. However, without suitable spectrum sensing techniques, cognitive radio would fail. Hence, in this thesis we investigate and implement various spectrum sensing algorithms via software defined radio for both single antenna and multiple antenna cases. The main communi-cation scheme that we are using is OFDM. Moreover, both computer simulations and real-world measurements, have also been done for comparison and analysis ofthe detector’s performance. The detectors we are using are based on correlationfunction of the received signal and generalized likelihood ratio test with its eigen-value. The results from the simulations and measurements are then representedas probability of missed detection curves for different signal to noise ratios. Ourresults show that the performance of the generalized likelihood ratio test baseddetectors are at least 2 dB better than the correlation based detector in our mea-surement. Moreover, our simulations show that they are able to outperform thecorrelation function detector by more than 6 dB. Although, generalized likelihoodratio test based detectors seem to be better than the correlation function baseddetector, it requires more computational power which may limit its practical use.

  • 165.
    Ebler, Mats
    et al.
    KTH, Tidigare Institutioner, Teleinformatik.
    Flodén, Anders
    KTH, Tidigare Institutioner, Teleinformatik.
    Mobility for Cordless Multimedia1995Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This project has developed a system for cordless multimedia business communication. It supports multimedia conferencing using existing applications across a mix of cordless and wired networks.

  • 166.
    Ebrahimi, Hamid
    KTH, Tidigare Institutioner, Teleinformatik. KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Linjelyssnare för Gränssnitt mot DECT-basestation1998Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    There purpose of this thesis was design and evaluate a device which would listen to the proprietary interface between a Private Automatic Branch Exchange (PBX) and a Digital Enhanced Cordless Telecommunications (DECT) basestation. The signal information has been transfered to a PC in order to collect and analyse data. The analysis has been limited to the bottom 4 layers. The software developed enables the display of the messages in either hex or clear text.

  • 167.
    Eckerström, Johan
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Mikroelektronik och Informationsteknik, IMIT.
    Location Aware Communication2003Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Automotive telematic systems will be as common in future cars as ABS and airbags are in current cars. These systems will provide services such as navigation aid, automatic emergency alerts, traffic and road information, information about parking possibilities, tourist information, and personalized news. All these services need a communication link to the mobile Internet to be able to work properly. In this master’s thesis General Packet Radio Service, GPRS will be investigated and evaluated as a bearer for these kinds of services. A test application was built to test the location aware communication on the field. Upstream and downstream delays, possible bottlenecks in the network, connection set-up time, characteristics of different operators, and connection breakdowns where analyzed.

    The tests showed high network delays, and that many connection breakdowns occurred. The operators did not differ much when it comes to performance. One mayor drawback with GPRS is the low scalability with respect to operator’s lack of IP addresses, which will be discussed.

    Conclusions of the evaluation were that only certain location-based services are suitable over GPRS with the quality of today.

  • 168.
    Edström, Johan
    Högskolan Väst, Institutionen för ingenjörsvetenskap, Avdelningen för data-, elektro- och lantmäteriteknik.
    Redovisning av lantmäterimyndigheternas handläggningstider och hur de påverkar byggbranschen2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Att behovet av bostäder är mycket stort och kommer att vara så under många år är välkänt. För att hantera det akuta läget behöver byggprocessen snabbas på.  Den 19:e januari 2017 publicerades en artikel på regeringens hemsida som beskriver att lantmäteriets handläggningstider behöver granskas då de långa handläggningstiderna saktar ner byggprocessen och därmed påverkar samhällsbyggnadsprocessen negativt.  Lantmäteriet är myndigheterna som, något förenklat, jobbar med att bestämma, reglera och stycka av fastighetsgränser. Detta innebär att lantmäteriet har en viktig roll i Planprocessen. Framförallt under detaljplanearbetet.  Denna C-uppsats har genomförts på Högskolan Väst med syfte att undersöka hur lantmäteriets handläggningstider påverkar bygg och fastighetsbolagen.

     Av Sveriges 39 kommunala lantmäterimyndigheter har 29 bidragit med handläggningsstatistik. Studiens resultat har visat att handläggningstiderna på kommunala lantmäterimyndigheterna i snitt är 47,5 veckor 2016 Hos statliga lantmäteriet låg motsvarande värde 2016 på 55,1 veckor. Studien indikerar ganska tydligt att handläggningstiderna är för långa med tanke på vad byggbranschen har för krav. Majoriteten inom byggbranschen anser att en handläggningstid längre än 26 veckor är orimligt i de flesta typer av ärenden.  I övrigt har studien visat att byggbranschen är nöjd med lantmäteriets prestationer.  2016 trädde en ny paragraf i kraft i ledningsrättslagen som ska ge rätt till bredband för alla Sveriges invånare inom max 4 månader efter ansökan.  Detta innebär att lantmäteriet kan bli tvungna att ge förtur i dessa typer av ärenden och därmed kan övriga handläggningstider komma att påverkas. Resultatet har visat att det finns fyra möjligheter att få förtur i kön men om den nya regeln i ledningsrättslagen har påverkat handläggningstiderna är idag för tidigt att säga.   

  • 169.
    Edström, Petter
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Overhead Impacts on Long-Term Evolution Radio Networks2007Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    As a result of the constant efforts to improve mobile system performance and spectral efficiency, the 3GPP standardization forum is currently defining new architectural and functional requirements that hope to ensure long-term evolution (specifically defined as the “Long-Term Evolution (LTE) concept”) and general future competitiveness of the 2G and 3G radio access technologies.

    Previous discussions on LTE efficiency have been focused on general assumptions on signaling overhead and overall system capacity, based on experience from existing mobile systems. However, as 3GPP standardization has become more mature (although not yet settled), there is a need to investigate how different potential LTE services will be affected by the use of available overhead information and basic scheduling algorithms. This thesis investigates the lower protocol layers’ overhead impacts on the downlink for different packet switched services, in an LTE radio access network (RAN).

    Results show that the use of RTP/TCP/IP header compression (ROHC) is the single most important factor to reduce payload overhead, for packet sizes of ~1kB or smaller. However, for packets larger than ~1 kB, the use of ROHC becomes insignificant.

    Protocol headers – including the AMR frame header, RLC/MAC headers, and CRC where applicable – remain the largest part of payload overhead regardless of packet size and header compression (ROHC). For VoIP over the UDP protocol (with ROHC), RLC/MAC headers constitute the largest part of protocol headers.

    For TCP/IP applications (without ROHC), TCP/IP headers are predominant. Services that require packet sizes beyond ~1 kB will require about the same power per payload bit regardless of percentage of payload overhead.

  • 170.
    Egman, Tommy
    KTH, Tidigare Institutioner, Teleinformatik.
    Solution Verification for Call Centre in BC101999Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This report is about how a Call Centre solution can be verified and what different tools that are needed to be able to do a proper verification. The Call Centre that are being verified is Ericsson’'s MD110 Call Centre for BC10. The different parts that the report is focusing on are how to generate Telephony traffic into the MD110 over ISDN, to measure LAN activities, and to generate Call Centre Agents behaviour. The report will come to conclusions that certain ways of handling the solution can improve the performance of the Call Centre.

  • 171.
    Egnell, Jakob
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Network usage profiling for applications on the Android smart phone2012Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [en]

    Android, a platform for smartphones and mobile devices, is becoming more and more present in the market. Nevertheless, the battery runtime of smartphones is short and strongly influenced by the network usage. Some proposals exist to reduce the energy consumption associated to the network usage and increase the smartphone runtime. But for adjusting them for a real improvement it is required to study the network utilisation triggered by the smartphone applications. With this analysis the applications communication patterns can be obtained and used to predict the network usage and the amount of data expected.

    In order to gather network statistics of the running applications, a logger application is implemented for the Android platform to log network statistics of running applications. The statistics are analysed on a PC computer to obtain the applications' communication patterns. A number of applications are selected, sorted by the rankings of downloads and type. A detailed analysis of the network usage is presented. This analysis identifies some of their patterns, some application characteristics and groups of applications from the determined network usage. The network usages for applications with similar functionalities are compared and lessons learnt from the analysis are discussed. Finally, some improvements for our logger application and analysis are discussed.

  • 172.
    Eidlert, Fredrik
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Messaging and positioning in a dynamic TETRA environment2009Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Advanced communication with capabilities such as voice, data, and messaging usually requires an infrastructure with base stations, servers, and etcetera. The TETRA technology offers such communication not only in TMO (infrastructure-based network) but also in DMO where all nodes communicate directly (or via a repeater) with each other.

    This master’s thesis concerns messaging (specifically short messages) in a dynamic multi link TETRA DMO network. It examines what type of messaging technique to use and how to do path selection. The messages will be clear text, status, and GPS location information. The solution is implemented as a part of the ISIS software (which is developed by Know IT Dataunit). The planned multi link-part of the thesis could not be tested, so there is no implementation or evaluation of this. The evaluation of the implementation concerning sending and reception of messages shows that the proposed solution fulfils the demands for this kind of product. During a four day long test, messages (short text messages and positioning messages) were sent and received while a normal number of voice conversations took place, without packet loss.

  • 173.
    Ejigayehu Teka, Kaleab
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Energy Effcient Design and Bandwidth Assignment in Wireless Access Networks2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In recent years, traffic demands and quality of service requirements in cellular networks is increasing rapidly. Network operators deploymore number of base stations or increase the transmission power of the existing deployment in order to satisfy this user demand. This increases theenergy consumption and operational cost of cellular networks as well as the capital expenditures. Energy efficient design of cellular networks is a promising strategy to reduce energy consumption. Proper utilization of spectrum, high spectral efficiency and application of interference mitigation approaches provides more capacity in wireless access. Traditional bandwidth allocationschemes are intended to maximize the throughput of the system and increase the quality of service. Different resource allocation methods have been proposed as a solution for energy efficient resource management in wireless access networks. We investigate the efficiency of different resource allocation methods and the effect of excess capacity for reducing the total power consumption.

    In this thesis we intend to analyze the impact of excess capacity on reducing energy consumption in the network. Performance of different bandwidth allocation schemes is studied in order to reduce power consumption as much as possible. Three different resource allocation schemes have been studied depending on the way they distribute available resourcesblocks(RBs) to users. The first scheme is equal bandwidth allocation where users are assigned resources equally in a round robin manner. The second scheme is proportional bandwidth allocation scheme with residuals. This scheme assigns the whole resources considering the quality of service of users. The third one is proportional resource allocation without residuals. Here resources are allocated until every user meets the required quality of service and then leaves the residual resources.

  • 174.
    Ejner, Mikael
    KTH, Tidigare Institutioner, Teleinformatik.
    Bi-directional Differentiated Services in aBroadband Access Server1999Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Quality of Service (QoS) is a highly desired feature of an IP network. The best-effort quality of traffic behaviour that the Internet provides by default today is not enough for certain timing-, mission- and throughput-critical applications such as video conferencing. One approach to achieve Quality of Service is Differentiated Services (DiffServ). However, one shortcoming of DiffServ is that it is unidirectional. This means that a user paying for premium FTP service will, when downloading a file, only get premium service for the requests, not for the actual file transfer.

    The goal of this project was to find a suitable method for making DiffServ bi-directional.

    This report presents the background and some available options, and motivates a preferred solution for the bi-directional Differentiated Services problem. The preferred option is, as the discussion shows, a centralised server-based solution with bi-directional DiffServ as an integrated feature of a policy-based network. A primitive prototype system was implemented to validate the concept.

  • 175.
    Eklund, Martin
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Ståhlberg, Patrik
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Distributed denial of service attacks: Protection, Mitigation, and Economic Consequences2015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Distributed Denial of Service attacks is a problem that constantly threatens companies that rely on the internet for major parts of their business. A successful DDoS attack that manages to penetrate a company’s network can lead to devastating damages in the form of lost income, reduced productivity, increase in costs, and damage to the company’s image and reputation.

    The different DDoS attacks are many and of different character and often Offer different parts of the network, which makes it very difficult to defend against. It is also very clear that DDoS attacks are increasing in both numbers and size every year. From our experiments we have proven that anyone with little knowledge and limited resources can perform DDoS attacks that will make a website unavailable. This fact should cause companies that base their business on the internet, aware that they are likely to someday be subject to a DDoS attack.

    From our research we have found a variety of different DDoS solutions on the market that promise to offer protection. Many of which claim to protect against all different types of DDoS attacks. In practice it is impossible to find something that guarantees 100% safety. According to earlier research in the field, there are many different ways of protecting a network against DDoS attacks, e.g. via Software Defined Networking, Hop-Count Filtering, or Kill-bots.

    Our own tests show that a virtual firewall can offer protection against DDoS attacks on a low scale, but that such a solution has a number of weaknesses. If the firewall does protect the website, the attacker could instead shift to attacking the firewall itself.

    Our research also shows that the most common motives behind DDoS attacks are criminal purposes. Criminals use DDoS attacks to earn money by offering directed DDoS attacks against websites or by trying to blackmail companies into paying a fee for not being attacked.

    We have also seen that the economic consequence of DDoS attacks are devastating if not handled with a sufficiently fast response. After investigating the e-commerce company CDON.com we learned that they could potentially lose roughly 36 410 SEK per minute when a DDoS attack is underway against them.

    In today’s business climate it is important for companies to be able to rely on the internet for their activity and for customers to have easy access to the company’s products and services. However, companies’ websites are being attacked and thus these companies need an explicit plan of how to mitigate such attacks.

  • 176.
    Eklöf, William
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Adaptive Video Streaming: Adapting video quality to radio links with different characteristics2008Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    During the last decade, the data rates provided by mobile networks have improved to the point that it is now feasible to provide richer services, such as streaming multimedia, to mobile users. However, due to factors such as radio interference and cell load, the throughput available to a client varies over time. If the throughput available to a client decreases below the media’s bit rate, the client’s buffer will eventually become empty. This causes the client to enter a period of rebuffering, which degrades user experience. In order to avoid this, a streaming server may provide the media at different bit rates, thereby allowing the media’s bit rate (and quality) to be modified to fit the client’s bandwidth. This is referred to as adaptive streaming.

    The aim of this thesis is to devise an algorithm to find the media quality most suitable for a specific client, focusing on how to detect that the user is able to receive content at a higher rate. The goal for such an algorithm is to avoid depleting the client buffer, while utilizing as much of the bandwidth available as possible without overflowing the buffers in the network. In particular, this thesis looks into the difficult problem of how to do adaptation for live content and how to switch to a content version with higher bitrate and quality in an optimal way.

    This thesis examines if existing adaptation mechanisms can be improved by considering the characteristics of different mobile networks. In order to achieve this, a study of mobile networks currently in use has been conducted, as well as experiments with streaming over live networks. The experiments and study indicate that the increased available throughput can not be detected by passive monitoring of client feedback. Furthermore, a higher data rate carrier will not be allocated to a client in 3G networks, unless the client is sufficiently utilizing the current carrier. This means that a streaming server must modify its sending rate in order to find its maximum throughput and to force allocation of a higher data rate carrier. Different methods for achieving this are examined and discussed and an algorithm based upon these ideas was implemented and evaluated. It is shown that increasing the transmission rate by introducing stuffed packets in the media stream allows the server to find the optimal bit rate for live video streams without switching up to a bit rate which the network can not support.

    This thesis was carried out during the summer and autumn of 2008 at Ericsson Research, Multimedia Technologies in Kista, Sweden.

  • 177.
    Ekman, Björn
    Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem.
    Machine Learning for Beam Based Mobility Optimization in NR2017Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    One option for enabling mobility between 5G nodes is to use a set of area-fixed reference beams in the downlink direction from each node. To save power these reference beams should be turned on only on demand, i.e. only if a mobile needs it. An User Equipment (UE) moving out of a beam's coverage will require a switch from one beam to another, preferably without having to turn on all possible beams to find out which one is the best.

    This thesis investigates how to transform the beam selection problem into a format suitable for machine learning and how good such solutions are compared to baseline models. The baseline models considered were beam overlap and average Reference Signal Received Power (RSRP), both building beam-to-beam maps. Emphasis in the thesis was on handovers between nodes and finding the beam with the highest RSRP. Beam-hit-rate and RSRP-difference (selected minus best) were key performance indicators and were compared for different numbers of activated beams.

    The problem was modeled as a Multiple Output Regression (MOR) problem and as a Multi-Class Classification (MCC) problem. Both problems are possible to solve with the random forest model, which was the learning model of choice during this work. An Ericsson simulator was used to simulate and collect data from a seven-site scenario with 40 UEs. Primary features available were the current serving beam index and its RSRP. Additional features, like position and distance, were suggested, though many ended up being limited either by the simulated scenario or by the cost of acquiring the feature in a real-world scenario.

    Using primary features only, learned models' performance were equal to or worse than the baseline models' performance. Adding distance improved the performance considerably, beating the baseline models, but still leaving room for more improvements.

  • 178.
    Ekman, Rasmus
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS, Radio Systems Laboratory (RS Lab).
    Automobile Control Systems: Transition from Controller Area Networks to Ethernets2014Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Due to concerns about the negative impacts of powering vehicles using fossil fuel and the future availability of fossil fuel, there has been an increased focus on electric vehicles. However, current electric vehicle energy efficiency is a key problem as these vehicles are not as efficient as fossil-fueled vehicles. One way of decreasing a vehicle’s energy consumption is to reduce the weight of the vehicle, while still ensuring the safety and reliability of the vehicle. Controller Area Network (CAN) systems have been used in vehicles to realize real-time applications, however the low peak data rates of CAN have begun to limit the applications that can be realized.

    This bachelor’s thesis project focuses on secure communication within a vehicle using Ethernet. Additionally, the use of Power over Ethernet can be used for powering some of the network attached devices within the vehicle. The goal is to reduce the number of components and the weight of the vehicle while continuing to ensure the security and reliability of the communication – even when the network grows in size (either in physical size or in number of connected devices).

    This thesis shows that an Ethernet based system can serve as a possible replacement candidate for the CAN system due to its low latencies and high bandwidth. Ethernet is also a very scalable system with none of the limitations that a CAN system have.

  • 179.
    Ekstrand, Magnus
    KTH, Tidigare Institutioner, Teleinformatik.
    Traffic Prioritization Subject to Cost1999Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In order to carry real-time traffic like video, IP networks -- especially intranets -- recently began to deal with different levels of priority for communication flows. Traffic prioritization is the key to meeting the demands of real-time traffic, which are much more stringent than mere data traffic, such as file transfers. Now that the question: "How should we specify different levels of priority?" is reasonably understood, the challenge is to answer this new one: "How should we charge for these different levels of priority?"

    This document discusses the introduction of Quality of Service (QoS) in the corporate network of a large industrial enterprise. Its main contributions are a charging model for different types of traffic with different levels of priority, and a network simulation for verifying the impact of a QoS implementation.

  • 180.
    Eldh, Axel Fant
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Kirvesniemi, Mattias
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Economical and Political Implications of DNSSEC Deployment2010Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report provides a summary of the current deployment of Domain Name System (DNS) Security Extensions (DNSSEC) as well as a discussion of future deployments and deployment rates. It analyses the problems that have occurred and considers those that may arise. This thesis focuses mainly on economical and political perspectives, rather than the technical perspective used in most reports regarding this subject.

    There were four areas that needed to be examined: the technical basis for DNSSEC, the deployment process, the current level of DNSSEC deployment, and the opinions regarding this subject. The information about the deployment process was obtained mainly through articles, but also through reports from organizations such as the Internet Corporation for Assigned Names and Numbers (ICANN) and the Electronic Privacy Information Centre. To acquire up to date data on DNSSEC deployment, SecSpider was used to research the level of deployment as of 2010-05-06. The search was restricted to the generic Top Level Domains (gTLDs) and country code TLDs (ccTLDs) of the top 20 countries in terms of Internet usage as well as the OECD countries. This restriction was made to narrow down the scope to the TLDs where DNSSEC would have the greatest impact. The “Top 20” comprises 77.27 % of the world’s Internet users, hence it is where DNSSEC deployment would affect the most people. The OECD is in this thesis considered a sufficient ly large selection to represent themost technologically advanced and economically powerful countries in the world regardless of size. Major powers such as China, India, and Russia while not included in the OECD are represented in the “Top 20” due to their size.

    Our results show that some major TLDs have implemented DNSSEC and that the rate of deployment has increased in the last few years. However, the level of DNSSEC deployment in the TLDs is still rather low; 15.00 % in the gTLDs and ccTLDs of the Top 20 countries in Internet usage, and 20.00 % in the OECD’s ccTLDs. Deployment in the root is ongoing during spring 2010, this could have a great impact on the rate of deployment as deployment in a gTLD or ccTLD is highly dependent on deployment high up in the hierarchy due to the nature of DNSSEC. It is unlikely that corporations would implement DNSSEC without a potential return on investment (ROI) and management control measures from governments might be required to increase deployment pace at the lower levels of the DNS hierarchy.

  • 181.
    Eldh, Erik
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Cloud connectivity for embedded systems2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Deploying an embedded system to act as a controller for electronics is not new.  Today these kinds of systems are all around us and are used for a multitude of purposes. In contrast, cloud computing is a relatively new approach for computing as a whole. This thesis project explores these two technologies in order to create a bridge between these two wildly different platforms. Such a bridge should enable new ways of exposing features and doing maintenance on embedded devices. This could save companies not only time and money while dealing with maintenance tasks for embedded systems, but this should also avoid the needed to host this maintenance software on dedicated servers – rather these tasks could use cloud resources only when needed. This thesis explores such a bridge and presents techniques suitable for joining these two computing paradigms together.

    Exploring what is included in cloud computing by examining available technologies for deployment is important to be able to get a picture of what the market has to offer. More importantly is how such a deployment can be done and what the benefits are. How technologies such as databases, load-balancers, and computing environments have been adapted to a cloud environment and what draw-backs and new features are available in this environment are of interest and how a solution can exploit these features in a real-world scenario.  Three different cloud providers and their products have been presented in order to create an overview of the current offerings.  In order to realize a solution a way of communicating and exchanging data is presented and discussed. Again to realize the concept in a real-world scenario.

    This thesis presents the concept of cloud connectivity for embedded systems. Following this the thesis describes a prototype of how such a solution could be realized and utilized. The thesis evaluates current cloud providers in terms of the requirements of the prototype.

    A middle-ware solution drawing strengths from the services offered by cloud vendors for deployment at a vendor is proposed. This middle-ware acts in a stateless manner to provide communication and bridging of functionality between two parties with different capabilities. This approach creates a flexible common ground for end-user clients and reduces the burden of having the embedded systems themselves process and distribute information to the clients.  The solution also provides and abstraction of the embedded systems further securing the communication with the systems by it only being enabled for valid middle-ware services.

  • 182.
    Elofsson, Milosz
    KTH, Tidigare Institutioner, Teleinformatik.
    RAS in VoIP Networks1999Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Traditionally network access servers are used to provide access services for remote dial-up users who want to access packet switched networks. The users can dial-up over public switched telephone network connection when they want to access the Internet or a Corporate LAN. The construction of new telephony networks based on IP-technology gives the possibility to integrate new services in these networks. Such a new service could be a remote access service integrated in the Media Gateways used for IP-telephony. The main goal with this Master Thesis project is to evaluate possible architectures for integrating distributed remote access service in Voice over IP networks.

    The conclusion of my evaluation is that the best way to integrate the dial-up network access service in VoIP networks is the L2TP solution. Traditionally a PPP session is established between the dial-up user and the network access server over a PSTN/ISDN connection. In the L2TP solution a Media Gateway terminates the physical and data link layer and use the L2TP protocol to tunnel the PPP session to a network access server over the IP network. The PPP session is terminated on the network access server.

    Another interesting solution is the PPP solution where the Media Gateway and a router handle all the dial-up network access features that a traditional network access server normally provides. The PPP session is terminated directly on the Media Gateway and the traffic is forwarded out on the external network by the router. In this solution the network access server is no longer needed.

  • 183.
    Emil, Ceder
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för tillämpad fysik och elektronik.
    Detect misconnected Telia customers in the network2015Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    Abstract

    The project consists of creating a program that can detect fiber customers that has been misconnected on the switch connecting them to the Telia network. The program will be able compare what customer is configured on the port against the customer who has received and the Telia router connected to the port. If there is a mismatch then there is a chance the customer has been misconnected.

    The comparison can be done because the unique serial number of the Telia router is both registered in the session database over active Telia routers and also in the database of products delivered to customers. This will only work on customers with Telia routers, but it will still be helpful as it would give an indication of what switches might have misconnect customers. If there is one misconnected customer on a switch there is likely to be more.

    The program was created with MySQL and PHP in the form of a web tool. The program can be run against certain switches or the program can be run against all active Telia routers and look for mismatches.

    To make the program work it required access to the session database over active Telia routers, the database over customer configuration on the port and the database over Telia routers sent to customers. These are three different systems and because of the time constraint only a part of the data was used or retrieved from testing environments.

    With the available data the program could do the comparison against 8627 customers and of those 303 customers had a mismatch in the comparison. This does not necessarily mean that all of them are misconnected. In most cases it was another person in the household receiving the Telia router than the person that was signed up on Telia services. This could be sort out by ensuring that the person receiving the Telia router also was signed up to a Telia service. This left 57 customers out of the 303. Out of those 57 customers a part of them had special services and some had split the services on two persons in one household. After sorting them out manually there was around 15 customers left who was likely misconnected

    There is still no way to be certain those 15 customer are misconnected, however there a possibility they are and if there are several mismatches on a single switch it is certainly worth investigating further as it is a large possibility there are misconnected customers.

  • 184.
    Engberg, Anna
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för tillämpad fysik och elektronik.
    Kommunikation mellan olika märken av växelriktare och tredjepartsprogram2016Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Det finns en mängd olika tillverkare av solcellssystem idag och dessa säljer sina egna programvaror och övervakningsmöjligheter. När en produkt är ny och i sin linda kan det vara oklart vilken teknik som skall bli ledande och därför väljer ett företag att satsa brett och sprida sina risker. Samtidigt som det är en fördel blir påföljden ofta vissa kompabilitetsproblem. Genom att kartlägga Umeå Energis solcellsanläggningar, sammanställa olika växelriktares protokoll och kommunikationsvägar kan en gemensam standard urskiljas. Målet med denna rapport är att föreslå en lösning på loggning och datainsamling genom att hitta ett gemensamt protokoll eller plattform. Det kommunikationsprotokoll alla växelriktare i denna rapport kan använda sig av är Modbus RTU. Men för att bygga ett framtidssäkert kommunikationsnät rekommenderar författaren Modbus TCP.

  • 185.
    Engberg, Emelie
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Landerup, Marina
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Riskidentifiering inom elektronisk kommunikation i Hallands län: Vilka hot föreligger den elektroniska kommunikationen och vilka risker innebär det?2014Independent thesis Basic level (university diploma), 5 poäng / 7,5 hpOppgave
    Abstract [sv]

    Den elektroniska kommunikationen är idag en stor och viktig del i vardagen, därför beslutade sig Länsstyrelsen i Hallands län för att starta ett projekt där de i ett samarbete med Högskolan i Halmstad skulle utföra en fullständig risk- och sårbarhetsanalys inom sektorn elektronisk kommunikation, tillsammans med kommunerna och regionen i Hallands län. Som en första del i en risk- och sårbarhetsanalys, måste en riskidentifiering göras och det är det som är syftet med rapporten. Resultatdelen i rapporten bygger på en sammanställning av svar från intervjuer med anställda inom kommunerna och Region Halland.

    Riskerna som föranletts av de identifierade hoten är relativt många och är av olika form och allvarlighetsgrad. Den vanligaste risken är att system periodvis blir långsamma, ett exempel på detta är att lönesystemet blir långsammare i slutet av månaden då det blir överbelastat för att alla löner ska betalas ut. Genom redundans i systemen reduceras risker som störningar, långsamma system och otillgängliga program och funktioner.

    Mycket ansvar kring säkerheten läggs på IT-avdelningen som många gånger känner att det både saknas ekonomiska medel men också tidsbrist för att upprätthålla en önskvärd säkerhet.

    Slutligen vill vi påstå att hotbildsanalyser och riskidentifieringar är viktiga att utföra för att kunna upprätthålla säkerhet och skydda verksamheten på rätt sätt. 

  • 186.
    Engström, Pontus
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Modernizing forms at KTH: Using Digital Signatures2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Today both government agencies and companies struggle to keep up with the pace of the continuous change of technology. With all new technology there are benefits, but new problems might also occur. Implementing new technology for certain tasks may increase both efficiency and security, resulting in a more sustainable work environment. One technology that is increasingly adopted is digital signatures. Instead of using classical handwritten signatures on documents, a digital signature can be more time efficient and have higher security.

    In order to implement a digital signature technology some security aspects must be addressed and certain properties ensured. In the document signature process, each time an individual verifies a signature attached onto a document a log entry is created. This log contains information about who verified which document, does it have multiple parts that have been signed, does it need multiple signatures in order to be valid, and at what time and date was the document signed. Logs help to ensure the validity of the document and thereby increase the security provided by the digital signatures.

    At KTH, a student must sign an application form with a regular ink-written signature to start a thesis project. This process can in most cases delay the start up to two weeks. This study aims to implement digital signatures for one specific form, an application form for a thesis project. The hypothesis at the start of the project was that the use of digital signature would decrease the time of waiting significantly. Personnel at KTH using digital signature would facilitate their work efficiency, due to less printing and archiving of papers as well fewer meetings.

    This study will provide the reader with the necessary fundamental knowledge of cryptography and how digital signatures use this underlying technology. The methodology used in this study was to identify and modify certain software settings, as well collect data from students and personnel at KTH. The collected data was based on time measurements of digital signature processes from students and a faculty member. The results show digital signatures are faster than the current signing process with traditional ink-written signatures. Additionally, the use of digital signatures is expected to reduce the need for printing, transport, and sorting of paper documents. The resulting reduction in use of physical paper should provide environmental benefits.

  • 187.
    Enlund, Simon
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Jourkovski, Alexander
    KTH, Skolan för informations- och kommunikationsteknik (ICT).
    Implementing a telemedicine system for remote medical consultation2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Telemedicine is the combination of information technology (IT) and health care and is an area that has seen increase during the last few decades due to breakthroughs in IT. Today there are still parts of the health care system that can be counterproductive with regards to the time and commitment necessary. One such part is medical consultations for private individuals where many of the simpler ones are still carried out in-person.

    Presented in this thesis is the implementation of a prototype telemedicine system that could be used as a substitute for in-person doctor-patient consultation. Necessary 3rd party components and their implementations into one system are described on a general use level. The result is a web application that supports login and payment via trusted sources, booking of meetings and carrying them out with video and audio.

    The prototype is a continuation of a telemedicine web application idea that was put on ice by a company that already provides solutions for health controls and blood analysis.

  • 188.
    Enni, Federico
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    The Leaf project: a first application2011Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Today large publishers are developing platforms via which their content, such as magazines, books, and newspapers, are distributed based upon the well established pattern of 'pay-per-content', via a multitude of mobile applications. Despite of the recent flourishing market of subscription possibilities, users currently have to buy single items of content at an average expenditure that is approximately equal to the cost of the printed media, because publishers are still investing in printing hardcover versions of their publications.

    Furthermore currently digital documents are mainly "scanned" versions of the printed ones, an unattractive format which does not exploit the potential of digital publishing. This format is rendered by the device in a way that does not permit the user to take real advantages of a digital environment, making the e-reading experience something that has no real added values, compared to regular printed publications.

    In order to provide to people an improved experience in terms of both accessing and enjoying their favorite material, the Leaf project aims to create a platform in which both publishers and readers can take advantage of an innovative business model and advanced technological solutions.

    As part of the Leaf project, the main objective in this subproject is the realization of a client that can access a set of online contents and offer these to the reader, by streaming content rather than requiring that the complete object should be downloaded in order to be rendered by the device. The access to the material should follow modern security standards, including data encryption, in order to prevent unauthorized use of the content. Furthermore, the client should present the content in an innovative way and allow the development of a mobile platform that could be supported based upon advertising, with an approach based on using information about the user (i.e. favorite places or profile details)as well as content-based advertising.

    In addition to the client application, the development of this subproject includes the development of a series of server-side utilities for the uploading and elaboration of publications on the server infrastructure.

    The document first reviews e-reading systems, focusing on the ePub file definition and e-reading solutions currently in use. The report then describes the Android OS development environment. The document then explains the implementation for both client and server side applications, giving a detailed overview of the chosen strategies and of the applications' structure. Finally the report concludes with a list of the achieved goals, a discussion on the project's limitations and then an exploration on what is the future for this client application.

  • 189.
    Ericsson, Andreas
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Ericsson, Jonas
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Fjärrstyrning av värmepump2013Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Att fjärrstyra sin värmepump gör det möjligt att styra inomhusklimatet även då man inte är hemma. Detta passar mycket bra i exempelvis fritidshus då man enkelt kan höja temperaturen innan man skall dit och därmed kan njuta av ett behagligt inomhusklimat direkt.

    Med dagens fjärrstyrning av Daikins värmepumpar finns två problem. Systemet använder GSM-nätet och användaren måste kunna de olika SMS-koderna utantill. Fjärrstyrning används oftast i fritidshus på landsbygden och 3G-nätet har idag bättre täckning än GSM-nätet på många av dessa platser.

    Målet med examensarbetet är att ta fram ett system som åtgärdar dessa problem.

    Vi börjar med att ta fram en funktionsmodell att utgå från. Går vidare med val av hårdvara för modulen, och därefter vidare till mjukvaruutveckling.

    Resultatet av detta examensarbete är ett system för fjärrstyrning av Daikins värmepumpar som använder 3G-nätet och enkelt kan styras via en androidapplikation.

  • 190.
    Ericsson, Fredrik
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Mikroelektronik och Informationsteknik, IMIT.
    Agent based mobile Internet services2002Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This thesis investigates how to develop mobile SMS services using Personal Internet Agents. A platform for Personal Internet Agents is implemented to serve as a framework in which mobile services can easily be created, executed, and administered. The services are based on extracting information and events from various sources on the Internet, then communicating these to the mobile end user.

    To evaluate the platform several investigations are carried out regarding scalability, integration possibilities, and performance. To illustrate the functionality of the platform a full-blown mobile service is developed that illustrates the gain of the Personal Internet Agents in combination with the mobile Internet. The service, named Spymail, fetches e-mail from Microsoft’s Hotmail and forwards these to the user via SMS.

    Developing services based on agents rises several issues. Since web sites on the Internet sometimes change, go down, etc, agents have to be informed about this to be able to adapt to the situation. Another issue is if it is possible to create a large multi-user agent service or if the bandwidth or computational speed will be a constraint.

  • 191.
    Ericsson, Marcus
    Linköpings universitet, Institutionen för systemteknik, Informationskodning. Linköpings universitet, Tekniska fakulteten.
    Transmission, Storage, and Visualization of Data with ANT+2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Ultra low-powers wireless technology sensors uses when devices is used to consumeslow power. ANT+ sensors can run for years on a single coin battery. In thethesis the ANT+ sensor data is used in an application that can store and visualizethe data.

  • 192.
    Ericsson, Simon
    et al.
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Dalesjö, Jonas
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Viktiga faktorer för användandet av mobila betalningar2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Sammanfattning

    Bara de senaste åren har det lanserats ett flertal nya betalningstjänster för mobiltelefoner, men ingen har fått det genomslag som förväntades. Varför tar inte konsumenterna till sig dessa lösningar?  Denna studie lyfter fram faktorer som har direkt påverkan för användandet av dessa nya tekniker. Faktorerna har identifierats med hjälp av vår litteraturstudie på utökade TAM-modeller från tidigare forskning som försöker förklara acceptans och adoptering av mobila betalningar. Faktorerna som framkom genom litteraturstudien är grunden för vår kvantitativa undersökning, som använder enkäter för insamlandet av data. Dessa faktorer utvärderas tillsammans med två egenhändigt framtagna faktorer för att identifiera vilka faktorer som är viktigast för anammandet av mobila betalningstjänster. Målsättningen var att nå ut till en så stor målgrupp som möjligt för att resultatet skulle bli generaliserbart. Resultatet blev inte helt som vi hade förväntat oss. Faktorer som användarvänlighet, användbarhet och kompabilitet var av ytterst stor vikt, medan säkerhet som tidigare forskning lyfte fram som den viktigaste inte fick alls samma betydelse i vår undersökning.

  • 193.
    Erikson, Gustaf
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Mikroelektronik och Informationsteknik, IMIT.
    Application of inertial sensing to handheld terminals2001Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    We consider the potential for using inertial sensing in handheld terminals.As an example, the implementation of an inertial sensing system in twodimensions for the research terminal Tifón at Ericsson Radio is discussed.The implementation includes hardware design, microcode software for aneight-bit micro-controller, and software for communication with the operat-ing system of the terminal.

  • 194.
    Eriksson, Emil
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper, Signaler och System.
    Refinement of an emulator for the physical layer of the wireless communication of sensor networks2014Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Wireless sensor networks have applications in many different fields and environments, each with their own set of challenges to be overcome. If we can measure and compensate for the properties of the wireless environment at an early stage of the deployment, we will be able to have the sensor network operational in a smaller time frame.

    This report describes the development of an emulator for wireless sensor network of up to eight 802.15.4 complaint sensor nodes. The FPGA-based emulator has been enhanced with several new features to remove some shortcomings of the existing emulator. The emulator now provides the ability to import previously recorded data representing time varying gains of wireless links, the ability to store the signal data generated by the sensor node for later review, as well as a more intuitive user interface to make the emulator more useful as a research tool. A latency issue that previously prevented the use of any communications protocol depending of transmission acknowledgments has been studied and a solution to the issue is presented. A way of introducing external interference to the emulated system has also been investigated and provides a straightforward way of introducing interference to the system without modifying the existing hardware and software.

    Most added features have been designed to be easily modified or expanded upon.

  • 195.
    Eriksson, Hannes
    et al.
    Högskolan i Halmstad.
    Brange Sollie, Ivan
    Högskolan i Halmstad.
    Wireless IO: A wireless accessory for integration of an Axis Communications camera in a sensor network.2017Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
    Abstract [en]

    When installing new network security cameras in buildings, the cameras are often connected to sensors via signal wires. Since most building already have internet and electricity drawn throughout the structure, the procedure of routing a new signal wire can be costly and time demanding. By replacing this wire with a wireless link, the cost and time it takes for the customer to install a camera could be reduced.

    The objective for this thesis is to investigate different wireless technologies used in short range, low power wireless communication networks such as PANs and LANs. Focusing on technologies used in the surveillance segment a decision will be made on which wireless technology that would suit as a link between a sensor and a camera for transmitting trigger signals. The technology will then be implemented in a proof-of-concept accessory, which can give an Axis Communications camera wireless functionality through it’s IO port.

  • 196.
    Eriksson, Henrik
    KTH, Tidigare Institutioner, Teleinformatik. KTH, Skolan för informations- och kommunikationsteknik (ICT).
    The Personal Assistant Framework: Enabling Augmented Reality in OrdinaryWeb Browsers1997Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This paper presents a secure framework for building personal assistants in a web browser environment. These assistants are personal computer programs, working on the behalf of their user. Around a minimal core of system resources, users are free to bring together the components of choice to form their personal assistants.

    While moving around in physical and virtual space, other small computer programs, called guides, can be loaded into the system. Novel, personal services can be created by combining the guide’s understanding of the environment with the personal assistant’s user-specific knowledge.

    To prevent multiple guides from overloading the user, all interactions with the user have to go via a conversation manager. A nightclub-style bouncer administers security, controlling the credentials of guides wanting to enter the system. The use of Internal proxies between components not trusting each other enables malicious or faulty code to be thrown out at any time.

    As a test of concept, a prototype tour guide system for the Exploratory Science Centre in Bristol has been implemented, using Java in Netscape Navigator.

  • 197.
    Eriksson, Marcus
    Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem.
    Analysis of Digital Predistortion in a Wideband Arbitrary Waveform Generator2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Digital predistortion is a signal processing technique used to remove undesired distortions caused by nonlinear system effects. This method is predominately used to linearize power amplifiers in communication systems in order to achieve efficient transmitter circuits. However, the technique can readily be applied to cancel undesired nonlinear behavior in other types of systems.

    This thesis investigates the effectiveness of digital predistortion in the context of a wideband arbitrary waveform generator. A theoretical foundation discussing nonlinear system models, predistortion architectures and system identification methods is complemented with a simulation study and followed by verification on a real system.

    The best predistorter is able to fully suppress the undesired distortions for any fixed two-tone sinusoidal signal. Furthermore, the results indicate the existence of a wideband predistorter which yield acceptable suppression over a frequency range of several hundred MHz.

  • 198.
    Eriksson, Oskar
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper, Signaler och System.
    Error Control in Wireless Sensor Networks: A Process Control Perspective2011Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    The use of wireless technology in the process industry is becoming increasingly important to obtain fast deployment at low cost. However, poor channel quality often leads to retransmissions, which are governed by Automatic Repeat Request (ARQ) schemes. While ARQ is a simple and useful tool to alleviate packet errors, it has considerable disadvantages: retransmissions lead to an increase in energy expenditure and latency. The use of Forward Error Correction (FEC) however offers several advantages. We consider a Hybrid-ARQ-Adaptive-FEC scheme (HAF) based on BCH codes and Channel State Information. This scheme is evaluated on AWGN and fading channels. It is shown that HAF offers significantly improved performance both in terms of energy efficiency and latency, as compared to ARQ.

  • 199.
    Eriksson, Ronny
    Umeå universitet, Teknisk-naturvetenskapliga fakulteten, Institutionen för tillämpad fysik och elektronik.
    Webbutveckling för ett mindre företag: Skapandet av en webbplats2012Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Denna rapport innefattar planering och utveckling av en skräddarsydd webbplats för ett mindre företag inriktat på hydraulik. Detta inkluderar de lösningar som gjorts angående webbplatsens funktioner, innehåll, design samt lösningar för vidare administration av webbplatsen.

  • 200.
    Eriksson, Tobias
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Facilitating communication via the Orc protocol: Facilitating communication via the Orc protocol2007Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This master thesis project took place at Orc Software. This company provides technology for advanced trading, market making, and brokerage. The Orc System is based on a client/server architecture. The ordinary way to communicate with the Orc Server System is via the Orc Client Applications, such as Orc Trader or Orc Broker. Additionally, there is another way to communicate with the Orc Server System without using an Orc Client Application. There is a service within the Orc Server System which provides an interface for communication with the Orc Server System. Clients can communicate via this interface using the Orc Protocol (OP).

    Banks and brokers usually have different systems that are specialized for different needs. Often there is a need to integrate these systems with the Orc Server. In order to simplify the integration for customers with modest programming experience in TCP/IP and parsing techniques, Orc Software would like to provide an example parser/generator capable of communication with the Orc Server System free of charge.

    This thesis introduces a toolkit consisting of a parser/generator and a sample application. The application provides several examples as well as serves as verification to the customers of how simple it is to develop their own applications by utilizing the different OP messages.

    A comparison was made between the newly created OP parser/generator and a manually generated FIX client using the FIX gateway which ORC Software AB also sells. This evaluation shows that OP parser/generator is both faster and less memory demanding than the manually generated FIX client.

1234567 151 - 200 of 806
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf