Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

1990

Computer networks

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Internetworking: An Analysis And Proposal, Gary M. Diana Jan 1990

Internetworking: An Analysis And Proposal, Gary M. Diana

Theses

As the number of computer networks has grown, so has the desire for users on these networks to communicate with each other, thus the need for internetworking. Unfortunately, many of these networks were not designed with internetworking capabilities in mind. The internetworking facilities offered by a typical network range from non-existent to state of the art. Two major efforts towards internetworking are the DARPA Internet protocols and the OSI Internetworking protocols. The goals of this thesis are to acquaint the reader with the qualities which are desired in an internetworking scheme, to describe how internetworking is accomplished currently, and how …


Trek: A Real Time Multi-Player Game For Xerox Networked Workstations, John J. Kemp Jan 1990

Trek: A Real Time Multi-Player Game For Xerox Networked Workstations, John J. Kemp

Theses

The objective of my thesis was to implement Trek, a multi-player real time space combat game, on the Xerox 8010 and 6085 Workstations. The goal of the game is for a player to place one or more of his starbases in all of the solar systems throughout the galaxy, and to prevent others from achieving this goal.


Enhancements To The Xns Authentication-By-Proxy Model, Peter D. Wing Jan 1990

Enhancements To The Xns Authentication-By-Proxy Model, Peter D. Wing

Theses

Authentication is the secure network architecture mechanism by which a pair of suspicious principals communicating over presumably unsecure channels assure themselves that each is that whom it claims to be. The Xerox Network Systems architecture proposes one such authentication scheme. This thesis examines the system consequences of the XNS model's unique proxy variant, by which a principal may temporarily commission a second network entity to assume its identity as a means of authority transfer. Specific attendant system failure modes are highlighted. The student's associated original contributions include proposed model revisions which rectify authentication shortfalls yet facilitate the temporal authority transfer …


Free Space Laser Communications On The Macintosh Computers, Sohrab Modi Jan 1990

Free Space Laser Communications On The Macintosh Computers, Sohrab Modi

Theses

Lasers have proved their reliability in high speed communications through fibre optics. The disadvantage with fibre optics is the high cost and the need for a cable to connect the sender to the receivers, hence making it impractical to have fibre optic cables over large distances. The move today is to communicate between points with a free space laser ( ie. a beam unbounded by cables). Semi conductor lasers as used in fibre optic cables are generally not strong enough to communicate over very large distances. Hence a high power laser is used with a modulation technique to transmit this …