WorldCat Identities

Toutain, Laurent

Works: 25 works in 56 publications in 3 languages and 865 library holdings
Roles: Author, Other, Thesis advisor, Editor
Classifications: TK5105.7, 004.68
Publication Timeline
Most widely held works by Laurent Toutain
Local networks and the internet : From Protocols to Interconnection by Laurent Toutain( )

12 editions published between 2008 and 2013 in English and held by 437 WorldCat member libraries worldwide

"This title covers the most frequently used elements of the Internet and Intranet and their development. It details the latest developments in research and covers new themes such as IP6, MPLS, and IS-IS routing, as well as explaining the function of standardization committees such as IETF, IEEE, and UIT. The book is punctuated with numerous examples and applications which will help the reader to place protocols in their proper context"--
Réseaux locaux et internet : des protocoles à l'interconnexion by Laurent Toutain( Book )

9 editions published between 1996 and 2003 in French and held by 215 WorldCat member libraries worldwide

Les réseaux : principes fondamentaux by Pierre Rolin( Book )

3 editions published between 1997 and 2017 in French and held by 117 WorldCat member libraries worldwide

"Cette nouvelle édition entièrement revue peut également servir de support "écrit" aux MOOC "Principe des réseaux de données" diffusé sur France Université Numérique, et "Digital Network Essentials" diffusé sur Les exercices et travaux pratiques associés aux différents chapitres de l'ouvrage sont disponibles dans ces deux cours en ligne : ils permettent d'apprendre à utiliser un analyseur de réseau (outil indispensable aux techniciens du réseau) et à construire un schéma de réseau et son plan d'adressage. Des travaux dirigés permettent de vérifier la bonne compréhension des différentes notions décrites dans l'ouvrage."--Page 4 de la couverture
Technique des réseaux locaux sou Unix : des protocoles à l'interconnexion by Laurent Toutain( Book )

2 editions published in 1994 in French and held by 56 WorldCat member libraries worldwide

Le port du Havre by Laurent Toutain( )

3 editions published in 1912 in French and held by 11 WorldCat member libraries worldwide

Cours d'assurances maritimes professé à l'école supérieure de commerce du Havre by Laurent Toutain( Book )

4 editions published between 1916 and 1923 in French and held by 4 WorldCat member libraries worldwide

Samson : un simulateur pour systèmes repartis et temps-réel by Laurent Toutain( Book )

2 editions published in 1991 in French and held by 3 WorldCat member libraries worldwide

L'étude a été effectuée à l'institut national de la recherche en informatique et en automatique (INRIA) dans le projet Reflets. Dans cette thèse nous introduisons une nouvelle méthodologie pour la simulation des systèmes repartis et temps réel. Dans ce type de système pour que la simulation fournisse des résultats intéressants il faut que le modelé soit décrit algorithmiquement. Nous montrons que les formalises habituels (réseaux de file d'attente et réseaux de Petri) ne peuvent pas modéliser précisément de tels systèmes. Le formalisme processus/ressource, développe dans cette thèse, permet une approche objet dans la conception des modelés. Il permet surtout de représenter les contraintes et les conflits qui surviennent sur des ressources partagées dans la vie du système. Le simulateur Samson (« Simulation, Analyses and Monitoring of System and Open Networks ») est une bibliothèque de procédures et de classes qui permettent de transformer le langage C++ en langage de simulation. Nous donnons le fonctionnement d'outils qui permettent la simulation de systèmes répartis et la simulation d'ordonnanceurs. Nous terminons la thèse par la modélisation de différents algorithmes d'ordonnancement
De l'iInterdit utrubi : de la possession des meubles by Joseph Georges Laurent Toutain( Book )

3 editions published in 1888 in French and held by 3 WorldCat member libraries worldwide

Étude et Questionnaire sur les assurances sociales. [Le président de l'Union mutualiste du Havre et des communes suburbaines, Laurent Toutain.] by Laurent Toutain( Book )

2 editions published in 1922 in French and held by 2 WorldCat member libraries worldwide

Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé by Timothy Claeys( )

1 edition published in 2019 in English and held by 2 WorldCat member libraries worldwide

The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Coup d'oeil sur Copenhague et le Danemark autour d'un Congrès de droit maritime : Conférence faite... le 26 mars 1914 by Laurent Toutain( Book )

1 edition published in 1914 in French and held by 2 WorldCat member libraries worldwide

Mécanismes d'optimisation de l'utilisation des technologies dans le Home Network by Hanane El Abdellaouy( Book )

in French and held by 1 WorldCat member library worldwide

The recent improvements in communication technologies and products in terms of services' diversification have a direct effect on home environment. Nowadays, homes host increasingly sophisticated devices providing a wide range of services such as HDTV, VoIP, multimedia storage, gaming, music and so on. This extension does not come for free. Indeed, Information and Communication Technology-enabled (ICT) devices consume about the quarter of the total power consumption within a typical home network, which puts forward the issue of energy e_ciency in the home network. In addition, electromagnetic radiation emissions are increasing within homes and may create fear likely to slow down future innovations for certain community of people. Nevertheless the increasing connectivity may help to solve these problems by disabling redundant devices or select more appropriate paths in the network. The problem can be viewed as a multi-criteria routing protocol generalization with the introduction of new metrics. A home network routing solution has therefore to support additional constraints in conjunction with QoS criteria. It has been a challenging goal to make path selection based on ecological criteria that are closely linked to the external environment (e.g. EM radiation); instead of the conventional routing metrics inherently dependent on network state (e.g. delay). In this thesis, we develop a new concept of radiation-aware routing algorithm for heterogeneous home networks in order to reduce radiated emissions level within a given area. The first contribution is the proposal of two models of electromagnetic radiated emissions stemming from Wi-Fi and PLC links based on a set of assumptions and mathematical approximation methods. We have then formulated a link-adaptive radiation-aware routing metric. The second contribution is the proposal of the Radiant Exposure (RE), which is a new routing metric for finding minimum radiated emissions paths in multi-hop heterogeneous network. The RE of a path is the expected radiated energy in units of W.s/m^2, within the radiation-sensitive area, while transmitting a packet along that path. The RE metric incorporates the effects of the distance between the radiating sources and the radiation-sensitive area as well as the asymmetry of this radiated energy regarding the two directions of each link. We describe the design and implementation of RE as routing metric that can _t any shortest path algorithm. For practical networks, using RE metric also maximizes the network throughput. We show by simulations that using RE metric reduces significantly radiated energy compared to the widely used minimum-hop count metric. The third contribution consists of proposing a mutli-criteria routing algorithm built upon the well-known normalized weighting function. Such method transforms a multi-objective problem into a mono-objective problem by multiplying each objective function by a weighting factor and summing up all the weighted criteria. We involve the user in the process of selecting weights in line with their preferences. The three criteria considered here are radiant exposure (RE), expected energy consumption and bandwidth
Réseaux-Télécommunications( Book )

1 edition published in 2003 in French and held by 1 WorldCat member library worldwide

Le Havre avant et pendant la guerre, 1913-1916 by Laurent Toutain( Book )

1 edition published in 1917 in French and held by 1 WorldCat member library worldwide

Ju yu wang yu hu lian wang yuan li ji ying yong by Laurent Toutain( Book )

1 edition published in 2014 in Chinese and held by 1 WorldCat member library worldwide

Multiple interface management in smart grid networks by François Lemercier( )

1 edition published in 2018 in English and held by 1 WorldCat member library worldwide

Le réseau électrique a subi d'importantes évolutions ces dernières décennies, pour devenir ce qu'on appelle le Smart Grid. Le réseau électrique évolue actuellement d'une architecture centralisée vers une architecture décentralisée, tenant compte des consommations et sources d'énergies à caractère imprédictible et irrégulier. L'Advanced Metering Infrastructure est une architecture clé du Smart Grid qui permet des communications bidirectionnelles entre le consommateur et le fournisseur d'énergie. Les réseaux de compteurs intelligents qui constituent notamment cette architecture reposent communément sur des communications à courant porteur, une technologie qui est hautement sensible aux interférences. Malgré l'utilisation de protocoles de niveau 2 spécifiques, les technologies employées ne permettent pas de respecter les exigences de toutes les applications Smart grid. La plupart des technologies considérées pour les réseaux de compteurs intelligents sont de courte portée, chaque compteur ne peut communiquer directement avec le concentrateur. Les noeuds doivent collaborer entre eux, utilisant un protocole de routage tel que RPL pour atteindre la destination. Le but de cette thèse est d'adapter RPL à un environnement multi interfaces, et étudier comment l'hétérogénéité des interfaces peut améliorer la fiabilité et les performances d'un réseau de compteurs intelligents
Réseaux et mobilité : destiné aux étudiants: systèmes de communication, 2ème cycle( Book )

1 edition published in 2001 in French and held by 1 WorldCat member library worldwide

Routage et performances dans les réseaux CPL pour le Smart Grid by Tanguy Ropitault( Book )

in French and held by 1 WorldCat member library worldwide

The power grid has begun a major evolution in the past decade, laying the foundations of what is known as the Smart Grid. The Smart Grid relies on bidirectional communications in order to enable new functionalities. One of the key components of the Smart Grid is the Advanced Metering Infrastructure that enables the interconnection between users and utilities thanks to a new generation of power meters: the Smart Meter. While Smart Meter deployments have already started worldwide at the instigation of governments, a multitude of choices still remains to be done concerning their technical implementations. Specifically, Smart Meter networking can be based on Power Line Communication (PLC), which is one of the major networking technologies available to utilities. P1901.2, a narrowband PLC has been standardized by the IEEE for usage in the Smart Grid. However, debates are still open for the routing protocol to use for these new high-density, narrowband PLC networks. PLC, being a harsh environment (low bandwidth, noisy, etc.), has most of the characteristics of a Low power and Lossy Network. As a result, the protocol RPL, designed specifically for Low power and Lossy Network, is a prime candidate for routing in IEEE P1901.2 networks. The goal of this thesis is to study RPL¿s behavior in Smart Grid environment and to provide adjustments to its behavior in order to improve the network performance in a narrowband PLC network of Smart Meters
Performance analysis of an header compression protocol : the ROHC unidirectional mode by Alain Couvreur( )

1 edition published in 2004 in English and held by 1 WorldCat member library worldwide

moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.70 (from 0.53 for Local netw ... to 0.98 for Le Havre a ...)

Local networks and the internet : From Protocols to Interconnection
French (35)

English (15)

Chinese (1)