Search for dissertations about: "network protection"

Showing result 1 - 5 of 114 swedish dissertations containing the words network protection.

  1. 1. Reliability versus Cost in Next Generation Optical Access Networks

    Author : Mozhgan Mahloo; Lena Wosinska; Jiaji Chen; David B Payne; KTH; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Fiber access network; passive optical network; reliability; techno-economic study; next generation optical access; network protection; wavelength division multiplexing;

    Abstract : The ever increasing demands of Internet users caused by the introduction of new high bandwidth applications and online services as well as the growing number of users and devices connected to the Internet, bring many challenges for the operators, especially in the last mile section of the network. Next generation access architectures are expected to offer high sustainable bandwidth per user. READ MORE

  2. 2. Exploring the Dynamics of Security Community-Building in the Post-Cold War Era : Spain, Morocco and the European Union

    Author : Niklas Bremberg; Jan Hallenberg; Charlotte Wagnsson; Jacob Westberg; Ian Manners; Stockholms universitet; []
    Keywords : SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; security; community; practice; institution; constructivism; crisis management; transgovernmental; network; European Union; Spain; Morocco; trade; defence; civil protection; statsvetenskap; Political Science;

    Abstract : This thesis aims to make a theoretical as well as an empirical contribution to the debate on the security community concept in International Relations (IR) by way of conducting a study of the European Union (EU) as a security community-building institution in the case of Spain and Morocco. The security community concept originally sought to define the conditions under which the threat of inter-state war would be mitigated through social transaction and expectations of peaceful change between societies and states. READ MORE

  3. 3. Dynamic Resource Provisioning and Survivability Strategies in Optical Networks

    Author : Jawwad Ahmed; Lena Wosinska; Andrea Fumagalli; KTH; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; optical networks; passive optical networks; wavelength; routing; Survivability; protection; restoration; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : Optical networks based on Wavelength Division Multiplexing (WDM) technology show many clear benefits in terms of high capacity, flexibility and low power consumption. All these benefits make WDM networks the preferred choice for today’s and future transports solutions which are strongly driven by a plethora of emerging online services. READ MORE

  4. 4. Fragmented landscapes : Assessment and communication of landscape connectivity in human-dominated landscapes

    Author : Arvid Bergsten; Örjan Bodin; Bo Ebenman; Stockholms universitet; []
    Keywords : SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; SAMHÄLLSVETENSKAP; NATURAL SCIENCES; SOCIAL SCIENCES; Fragmentation; Connectivity; Network; Spatial; Landscape; Dispersal; Planning; Social-Ecological; Scale; IIC; STS; Natural Resources Management; naturresurshushållning;

    Abstract : This licentiate thesis summarizes the first half of my PhD on the theme of management of fragmented landscapes. The thesis applies – and reflects on the use of – network analysis of connectivity in relation to landscape planning. READ MORE

  5. 5. Modeling and Tuning Security from a Quality of Service Perspective

    Author : Stefan Lindskog; Karlstads universitet; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; network security; quality of service QoS ; tunable security; dependability; security service; data protection; security evaluation; Datavetenskap; Computer Science;

    Abstract : Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g. READ MORE