Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
Internetworking: An Analysis And Proposal, Gary M. Diana
Internetworking: An Analysis And Proposal, Gary M. Diana
Theses
As the number of computer networks has grown, so has the desire for users on these networks to communicate with each other, thus the need for internetworking. Unfortunately, many of these networks were not designed with internetworking capabilities in mind. The internetworking facilities offered by a typical network range from non-existent to state of the art. Two major efforts towards internetworking are the DARPA Internet protocols and the OSI Internetworking protocols. The goals of this thesis are to acquaint the reader with the qualities which are desired in an internetworking scheme, to describe how internetworking is accomplished currently, and how …
Trek: A Real Time Multi-Player Game For Xerox Networked Workstations, John J. Kemp
Trek: A Real Time Multi-Player Game For Xerox Networked Workstations, John J. Kemp
Theses
The objective of my thesis was to implement Trek, a multi-player real time space combat game, on the Xerox 8010 and 6085 Workstations. The goal of the game is for a player to place one or more of his starbases in all of the solar systems throughout the galaxy, and to prevent others from achieving this goal.
Enhancements To The Xns Authentication-By-Proxy Model, Peter D. Wing
Enhancements To The Xns Authentication-By-Proxy Model, Peter D. Wing
Theses
Authentication is the secure network architecture mechanism by which a pair of suspicious principals communicating over presumably unsecure channels assure themselves that each is that whom it claims to be. The Xerox Network Systems architecture proposes one such authentication scheme. This thesis examines the system consequences of the XNS model's unique proxy variant, by which a principal may temporarily commission a second network entity to assume its identity as a means of authority transfer. Specific attendant system failure modes are highlighted. The student's associated original contributions include proposed model revisions which rectify authentication shortfalls yet facilitate the temporal authority transfer …
Free Space Laser Communications On The Macintosh Computers, Sohrab Modi
Free Space Laser Communications On The Macintosh Computers, Sohrab Modi
Theses
Lasers have proved their reliability in high speed communications through fibre optics. The disadvantage with fibre optics is the high cost and the need for a cable to connect the sender to the receivers, hence making it impractical to have fibre optic cables over large distances. The move today is to communicate between points with a free space laser ( ie. a beam unbounded by cables). Semi conductor lasers as used in fibre optic cables are generally not strong enough to communicate over very large distances. Hence a high power laser is used with a modulation technique to transmit this …