Current Search: info:fedora/fau:CurrentETDs (x) » Department of Computer and Electrical Engineering and Computer Science (x) » Ilyas, Mohammad (x)
View All Items
Pages
- Title
- ENHANCING IOT DEVICES SECURITY: ENSEMBLE LEARNING WITH CLASSICAL APPROACHES FOR INTRUSION DETECTION SYSTEM.
- Creator
- Alotaibi, Yazeed, Ilyas, Mohammad, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
The Internet of Things (IoT) refers to a network of interconnected nodes constantly engaged in communication, data exchange, and the utilization of various network protocols. Previous research has demonstrated that IoT devices are highly susceptible to cyber-attacks, posing a significant threat to data security. This vulnerability is primarily attributed to their susceptibility to exploitation and their resource constraints. To counter these threats, Intrusion Detection Systems (IDS) are...
Show moreThe Internet of Things (IoT) refers to a network of interconnected nodes constantly engaged in communication, data exchange, and the utilization of various network protocols. Previous research has demonstrated that IoT devices are highly susceptible to cyber-attacks, posing a significant threat to data security. This vulnerability is primarily attributed to their susceptibility to exploitation and their resource constraints. To counter these threats, Intrusion Detection Systems (IDS) are employed. This study aims to contribute to the field by enhancing IDS detection efficiency through the integration of Ensemble Learning (EL) methods with traditional Machine Learning (ML) and deep learning (DL) models. To bolster IDS performance, we initially utilize a binary ML classification approach to classify IoT network traffic as either normal or abnormal, employing EL methods such as Stacking and Voting. Once this binary ML model exhibits high detection rates, we extend our approach by incorporating a ML multi-class framework to classify attack types. This further enhances IDS performance by implementing the same Ensemble Learning methods. Additionally, for further enhancement and evaluation of the intrusion detection system, we employ DL methods, leveraging deep learning techniques, ensemble feature selections, and ensemble methods. Our DL approach is designed to classify IoT network traffic. This comprehensive approach encompasses various supervised ML, and DL algorithms with ensemble methods. The proposed models are trained on TON-IoT network traffic datasets. The ensemble approaches are evaluated using a comprehensive metrics and compared for their effectiveness in addressing this classification tasks. The ensemble classifiers achieved higher accuracy rates compared to individual models, a result attributed to the diversity of learning mechanisms and strengths harnessed through ensemble learning. By combining these strategies, we successfully improved prediction accuracy while minimizing classification errors. The outcomes of these methodologies underscore their potential to significantly enhance the effectiveness of the Intrusion Detection System.
Show less - Date Issued
- 2023
- PURL
- http://purl.flvc.org/fau/fd/FA00014304
- Subject Headings
- Internet of things, Intrusion detection systems (Computer security), Machine learning
- Format
- Document (PDF)
- Title
- Achieving Higher Receiver Satisfaction using Multicast-Favored Bandwidth Allocation Protocols.
- Creator
- Yousefizadeh, Hooman, Zilouchian, Ali, Ilyas, Mohammad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher...
Show moreIn recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher level of receiver satisfaction should be achieved. In this dissertation, we propose three new innovative protocols to favor multicast sessions over unicast sessions. Multicast Favored BW Allocation- Logarithmic (MFBA-Log) and Multicast Favored BW Allocation-Linear (MFBALin) protocols allocate BW proportional to the number of down stream receivers. The proposed Multicast Reserved BW Allocation (MRBA) protocol allocates part of the BW in the links only to multicast sessions. Simulation results show the increase in the overall level of Receiver Satisfaction in the network.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012581
- Subject Headings
- Multicasting (Computer networks), Computer network protocols, Computer algorithms
- Format
- Document (PDF)
- Title
- Adaptive hierarchical weighted fair queuing scheduling in WiMAX networks.
- Creator
- AL-Ghanem, Waleed Khalid, Ilyas, Mohammad, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay,...
Show moreThe growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay, throughput and packet loss for different classes of service. In this dissertation work, the performance of uplink schedulers at the fixed WiMAX MAC layer has been considered, we proposed an Adaptive Hierarchical Weighted Fair Queuing Scheduling algorithm, the new scheduling algorithm adapts to changes in traffic, at the same time; it is able to heuristically enhance the performance of WiMAX network under most circumstances. The heuristic nature of this scheduling algorithm enables the MAC layer to meet the QoS requirements of the users. The performance of this adaptive WiMAX Uplink algorithm has been evaluated by simulation using MATLAB. Results indicate that the algorithm is efficient in scheduling the Base Stations’ traffic loads, and improves QoS. The utilization of relay stations is studied and simulation results are compared with the case without using relay stations. The results show that the proposed scheduling algorithm improves Quality of Service of WiMAX system.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004178, http://purl.flvc.org/fau/fd/FA00004178
- Subject Headings
- Computer networks -- Technological innovations, Optical fiber communication, Wireless communication systems -- Technological innovations, Wireless metropolitan area networks -- Security measures
- Format
- Document (PDF)
- Title
- Design and implementation of a wireless ad hoc network.
- Creator
- Neelakanta, Mahesh., Florida Atlantic University, Hsu, Sam, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis addresses issues faced in the practical implementation of a wireless ad hoc network (WAHN) protocol for data transmission. This study focuses on: (1) Evaluating existing hardware and software options available for the WAHN implementation. (2) Appraising the issues faced while implementing a practical wireless ad hoc protocol. (3) Applying a set of MAC protocol specifications developed for a wireless ad hoc data network to a practical test network. Specific to the above topics of...
Show moreThis thesis addresses issues faced in the practical implementation of a wireless ad hoc network (WAHN) protocol for data transmission. This study focuses on: (1) Evaluating existing hardware and software options available for the WAHN implementation. (2) Appraising the issues faced while implementing a practical wireless ad hoc protocol. (3) Applying a set of MAC protocol specifications developed for a wireless ad hoc data network to a practical test network. Specific to the above topics of interest, the following research tasks are performed: (1) An elaborate survey and relevant discussions on wireless MAC protocols. (2) A comprehensive study comparing various wireless transceivers is performed. Range, data rate, frequency, interfacing method and cost are the factors compared. (3) A simple, low-cost and low baud-rate transceiver is modified with appropriate interface circuits to support wireless communications. A more advanced transceiver is also considered and used for the software foundation of a practical implementation of the ad hoc and MAC protocols. The studies enable assessing the problems faced during the implementation and suggest solutions to resolve these problems. Further areas for study are also discussed.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15615
- Subject Headings
- Wireless communication systems, Data transmission systems, Computer networks
- Format
- Document (PDF)
- Title
- Characterization and performance evaluation of video conference traffic in ATM networks.
- Creator
- Nayak, Chandrika Narayana., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In order to effectively transport digital compressed video over Broadband Integrated Services Digital Networks (B-ISDN) with Asynchronous Transfer Mode (ATM), the characteristics of the video source traffic should be understood. The nature of the video traffic depends primarily on the source, the content of the video and the coding algorithm that removes redundancies for efficient transmission over networks. In this study, video conference data encoded using a subband coding scheme, Digital...
Show moreIn order to effectively transport digital compressed video over Broadband Integrated Services Digital Networks (B-ISDN) with Asynchronous Transfer Mode (ATM), the characteristics of the video source traffic should be understood. The nature of the video traffic depends primarily on the source, the content of the video and the coding algorithm that removes redundancies for efficient transmission over networks. In this study, video conference data encoded using a subband coding scheme, Digital Video Compression System (DVCS), is analyzed to determine its characteristics. Several video traffic sources are multiplexed through an ATM network node with limited capacity and the performance of this environment is evaluated by using a simulation technique. The simulation results are presented for the performance measures for varying traffic and network conditions.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15166
- Subject Headings
- Broadband communications systems, Integrated services digital networks, Asynchronous transfer mode, Digital video, Video compression
- Format
- Document (PDF)
- Title
- Design and performance analysis of FDDI and DQDB network architectures.
- Creator
- Khera, Harbinder Singh., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The primary emphasis of this thesis is to study the behavioral characteristics of Fiber Distributed Data Interface (FDDI) and Distributed Queue Dual Bus (DQDB) High Speed Local Area Networks (HSLANs). An FDDI architecture with passive interfaces is proposed to provide a reliable and efficient network topology. This network architecture outperforms the existing FDDI architecture with active interfaces in terms of small asynchronous packet delays and high asynchronous packet throughput. The...
Show moreThe primary emphasis of this thesis is to study the behavioral characteristics of Fiber Distributed Data Interface (FDDI) and Distributed Queue Dual Bus (DQDB) High Speed Local Area Networks (HSLANs). An FDDI architecture with passive interfaces is proposed to provide a reliable and efficient network topology. This network architecture outperforms the existing FDDI architecture with active interfaces in terms of small asynchronous packet delays and high asynchronous packet throughput. The design and implementation issues involved in the design of the hierarchical (multi-level) DQDB and FDDI networks are also presented. The hierarchical network architecture provides modularity and scalability with respect to speed and the number of users. Simulation models are developed for each of these network architectures to study their performance. Simulation results are presented in terms of medium access delay, throughput, and packet delays.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/14976
- Subject Headings
- Fiber Distributed Data Interface (Computer network standard), Computer architecture, Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- A next generation computer network communications architecture.
- Creator
- Thor, Bernice Lynn., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Next Generation Computer Network Communications Architecture, CNCA, is developed in this thesis. Existing communication techniques and available networking technologies are explored. This provides the background information for the development of the architecture. Hardware, protocol, and interface requirements are addressed to provide a practical architecture for supporting high speed communications beyond current implementations. A reduction process is then performed to extract the optimal...
Show moreA Next Generation Computer Network Communications Architecture, CNCA, is developed in this thesis. Existing communication techniques and available networking technologies are explored. This provides the background information for the development of the architecture. Hardware, protocol, and interface requirements are addressed to provide a practical architecture for supporting high speed communications beyond current implementations. A reduction process is then performed to extract the optimal components for the CNCA platform. The resulting architecture describes a next generation communications device that is capable of very fast switching and fast processing of information. The architecture interfaces with existing products, and provides extensive flexibility. This protects existing equipment investments, and supports future enhancements.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14726
- Subject Headings
- Computer network architectures, Computer networks
- Format
- Document (PDF)
- Title
- An advanced intelligent network: Description and performance evaluation.
- Creator
- Kadioglu, Ceri., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
An Advanced Intelligent Network (AIN) is described and its performance is evaluated in this thesis. First, the AIN architecture is presented. This is followed by the description of the operation and the creation of the telephone services in the AIN architecture. Finally, the AIN architecture is evaluated on the performance of the user-network interface and the network elements, and the expandability and cost effectiveness of the architecture. The result of the evaluation shows that the...
Show moreAn Advanced Intelligent Network (AIN) is described and its performance is evaluated in this thesis. First, the AIN architecture is presented. This is followed by the description of the operation and the creation of the telephone services in the AIN architecture. Finally, the AIN architecture is evaluated on the performance of the user-network interface and the network elements, and the expandability and cost effectiveness of the architecture. The result of the evaluation shows that the operation of the telephone services in the AIN architecture are acceptable according to the standards set by Bellcore. Therefore, the AIN architecture meets the objectives set by the telephone operating companies and provides a basis for faster development and deployment of new telephone services in a cost effective manner.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14688
- Subject Headings
- Telecommunication systems, Telephone systems, Data transmission systems
- Format
- Document (PDF)
- Title
- Designing non-proprietary and practical ISDN terminal equipment for basic access.
- Creator
- Mitchell, Todd., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis illustrates the design of non-proprietary and practical ISDN terminal equipment for basic access. Terminal compatibility with the AT&T 5ESS, Northern Telecom DMS100, and Siemens EWSD Class 5 switches is considered. General compliance is dictated by all applicable CCITT recommendations and BELLCORE technical references. A consolidation of the useful information in the CCITT and BELLCORE technical documents is provided from a design engineer's perspective. A practical, cost...
Show moreThis thesis illustrates the design of non-proprietary and practical ISDN terminal equipment for basic access. Terminal compatibility with the AT&T 5ESS, Northern Telecom DMS100, and Siemens EWSD Class 5 switches is considered. General compliance is dictated by all applicable CCITT recommendations and BELLCORE technical references. A consolidation of the useful information in the CCITT and BELLCORE technical documents is provided from a design engineer's perspective. A practical, cost effective implementation is outlined and considerations for flexibility due to the changing requirements are explored. The objective is to specify simplified guidelines which can be followed to create generic ISDN terminal equipment which is non-proprietary and practical for ISDN subscribers today.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14662
- Subject Headings
- Integrated services digital networks, Data transmission systems--Equipment and supplies
- Format
- Document (PDF)
- Title
- Performance analysis of a very fast packet switching system for broadband ISDN.
- Creator
- Rao, Radha Nallur Seshagiri., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Rapid advances in technology have resulted in the evolution of Integrated Services Digital Networks (ISDNs) to Broadband ISDNs (BISDNs). This thesis discusses and evaluates the performance of a high speed and high capacity packet switching system architecture for BISDNs. This system supports various high speed communication services like data, voice, and video services. The main performance criterion is the mean switching delay, which is defined as the packet transfer delay through the bus...
Show moreRapid advances in technology have resulted in the evolution of Integrated Services Digital Networks (ISDNs) to Broadband ISDNs (BISDNs). This thesis discusses and evaluates the performance of a high speed and high capacity packet switching system architecture for BISDNs. This system supports various high speed communication services like data, voice, and video services. The main performance criterion is the mean switching delay, which is defined as the packet transfer delay through the bus and through the loop connecting various switch modules in the system. Other performance criteria are power and system throughput. The performance parameters are evaluated separately for both data and control (signaling) packets. The effects of the number of switch modules in the system, the data packet length, and the ratio of arrival rate of data to control packets are examined. It is observed that the switching delay and throughput increase with an increase in the traffic intensity for any number of switching modules and the ratio of arrival rate of data to control packets. The delay for data packets is found to be higher for lower values of this ratio and vice versa. The power is found to be maximum for about 70% load. The switching delay in this simulation model is found to be less than one millisecond for data packets.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14603
- Subject Headings
- Packet switching (Data transmission), Integrated services digital networks, Broadband communication systems
- Format
- Document (PDF)
- Title
- Performance analysis of token-passing local area networks.
- Creator
- Sadiku, Matthew, Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A unified performance analysis of token-passing local area networks is reported in this thesis. The primary performance criterion is the mean transfer delay of a message, which is defined as the time from the instant a message becomes available for transmission at a station until the end of its successful reception at the destination. Other performance criteria are power and effective transmission ratio. Analytical expressions for the criteria are derived for exhaustive, gated, and limited...
Show moreA unified performance analysis of token-passing local area networks is reported in this thesis. The primary performance criterion is the mean transfer delay of a message, which is defined as the time from the instant a message becomes available for transmission at a station until the end of its successful reception at the destination. Other performance criteria are power and effective transmission ratio. Analytical expressions for the criteria are derived for exhaustive, gated, and limited service disciplines. Simulation models are also used to support the investigations. The effects of service time distribution (constant, exponential, and hyperexponential) are examined. It is found that under any traffic intensity, service discipline or packet length distribution, token bus gives higher delay and has lower power and lower effective transmission ratio than token ring. Also, the token bus is found to be less sensitive to message length distribution, performing about the same for constant, exponential, and hyperexponential distribution.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14471
- Subject Headings
- Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- Flow control in interconnected token ring local area networks.
- Creator
- Varughese, Sicely Babu., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis investigates some of the flow control issues in a system of Local Area Networks consisting of multiple token rings interconnected through bridges via a backbone ring. Flow control is realized by a window mechanism, i.e., a sender is permitted to transmit not more than a fixed number, W (the window size), of frames without having to wait for an acknowledgment. The solution is based on an existing approximation of the mean end-to-end delay in a stand-alone token ring LAN, which is...
Show moreThis thesis investigates some of the flow control issues in a system of Local Area Networks consisting of multiple token rings interconnected through bridges via a backbone ring. Flow control is realized by a window mechanism, i.e., a sender is permitted to transmit not more than a fixed number, W (the window size), of frames without having to wait for an acknowledgment. The solution is based on an existing approximation of the mean end-to-end delay in a stand-alone token ring LAN, which is extended by approximating the arrival rates at the bridges as a function of the throughput of each subnetwork and the probability that, the throughput is directed to the other subnetworks. The packet-lengths are assumed to be exponentially distributed. The performance of the system is evaluated by varying the window size.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14447
- Subject Headings
- IBM Token-Ring Network (Local area network system)
- Format
- Document (PDF)
- Title
- Acknowledgement overhead in local area networks.
- Creator
- Lyford, Avery Martin., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the...
Show moreThe throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the impact of different acknowledgement structures on throughput. Possible ways to alleviate the problem, such as peripheral processors and modified protocol layers, are also briefly examined.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14424
- Subject Headings
- Local area networks, Acknowledgements
- Format
- Document (PDF)
- Title
- PERFORMANCE ANALYSIS OF INTEGRATED SERVICES DIGITAL NETWORK D-CHANNEL BASIC RATE ACCESS.
- Creator
- MUTH, THERESA ANN., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis evaluates the performance of the D-channel which is part of the Basic Rate interface in an Integrated Services Digital Network (ISDN). A channel is a specified portion of the information-carrying capacity of the interface. The Basic Rate interface supports three channels; two B-channels and one D-channel. As ISDN user, physically connected on a passive bus, contends and resolves access for the D-channel, or signalling channel. In this thesis the D-channel and the contention...
Show moreThis thesis evaluates the performance of the D-channel which is part of the Basic Rate interface in an Integrated Services Digital Network (ISDN). A channel is a specified portion of the information-carrying capacity of the interface. The Basic Rate interface supports three channels; two B-channels and one D-channel. As ISDN user, physically connected on a passive bus, contends and resolves access for the D-channel, or signalling channel. In this thesis the D-channel and the contention resolution are modeled and simulated as a queueing system. Simulation results using the non-preemptive priority queueing discipline with deterministic and truncated exponential service times are presented. Performance is measured in terms of delay and queue length characteristics.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14406
- Subject Headings
- Integrated services digital networks, Computer interfaces
- Format
- Document (PDF)
- Title
- A COMPARATIVE EVALUATION OF SERVICE DISCIPLINES IN A TOKEN RING LOCAL AREA NETWORK: A SIMULATION STUDY.
- Creator
- Syed, Majid Ali, Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The primary emphasis of this thesis is to evaluate in comparative terms the performance of three types of service disciplines in a Token Ring Local Area Network. The service disciplines studied are exhaustive, gated and limited service. These service disciplines play an important role in the network performance, especially when some users are relatively less active than others in contributing traffic load to the network. Network performance for these service disciplines are compared to...
Show moreThe primary emphasis of this thesis is to evaluate in comparative terms the performance of three types of service disciplines in a Token Ring Local Area Network. The service disciplines studied are exhaustive, gated and limited service. These service disciplines play an important role in the network performance, especially when some users are relatively less active than others in contributing traffic load to the network. Network performance for these service disciplines are compared to determine which one of them gives better performance. Simulation is used for this study and results are presented in terms of average delay, queue lengths and delay histograms versus traffic intensity.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14388
- Subject Headings
- Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- PERFORMANCE EVALUATION OF THE EFFECTS OF MESSAGE SEGMENTATION IN TANDEM NODE COMPUTER NETWORKS.
- Creator
- LAMANNA, PETER JOHN., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Analytical and simulation performance evaluation results are presented on the effects of message segmentation and the validity of the Independence Assumption when applied to analytically modeling tandem node computer networks. Simulation results indicate that increasing message segmentation threshold will increase the network traffic intensity and consequently the total packet delay. Simulation and analytical results for total packet delay compared well only at low traffic intensities. At...
Show moreAnalytical and simulation performance evaluation results are presented on the effects of message segmentation and the validity of the Independence Assumption when applied to analytically modeling tandem node computer networks. Simulation results indicate that increasing message segmentation threshold will increase the network traffic intensity and consequently the total packet delay. Simulation and analytical results for total packet delay compared well only at low traffic intensities. At higher traffic intensities the discrepancy is due to the Independence Assumption since it does not account for the increasing dependency of interarrival times and service times as packets are made to wait at the nodes.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14327
- Subject Headings
- Computer networks, Data transmission systems
- Format
- Document (PDF)
- Title
- MULTI-LEVEL FLOW CONTROL IN COMPUTER NETWORKS (SIMULATION).
- Creator
- ROY, KAUSHIK., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Several different flow control methods for computer communications networks have been analyzed in this thesis. Isarithmic, end-to-end, and link level flow control have been dealt with in detail. A simulation program has been written to compare the performance of these flow control techniques. It has been found that the system performance of computer networks degrades at high values of data traffic when no flow control is implemented. This is due to congestion and buffer overflow problem. One...
Show moreSeveral different flow control methods for computer communications networks have been analyzed in this thesis. Isarithmic, end-to-end, and link level flow control have been dealt with in detail. A simulation program has been written to compare the performance of these flow control techniques. It has been found that the system performance of computer networks degrades at high values of data traffic when no flow control is implemented. This is due to congestion and buffer overflow problem. One flow control technique when implemented alone does not generally produce optimal results. A judicious mixture of several flow control techniques should be implemented together so as to get the desired throughput and delay performance in a computer communication network. The simulation program is quite versatile. It uses the eventscheduling method for faster computation. Several simulation results have been presented to illustrate the effects of multi-level flow on delay and throughput performance of a network under different traffic load conditions.
Show less - Date Issued
- 1985
- PURL
- http://purl.flvc.org/fcla/dt/14286
- Subject Headings
- Computer networks--Testing, Computer networks--Evaluation
- Format
- Document (PDF)
- Title
- SIMULATION STUDY OF TOKEN-PASSING BUS LOCAL AREA NETWORK.
- Creator
- RAO, SUHAS PALAKURTI., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis deals with simulation of a conflict-free token-passing protocol for local area bus networks. The primary emphasis of this simulation study is to observe the effects of token holding time on the performance of the network. Token holding time is adjusted to account for three types of service disciplines: purely non-exhaustive, non-exhaustive and exhaustive. Network performance for these three service disciplines is compared to determine, which one of the three gives a relatively...
Show moreThis thesis deals with simulation of a conflict-free token-passing protocol for local area bus networks. The primary emphasis of this simulation study is to observe the effects of token holding time on the performance of the network. Token holding time is adjusted to account for three types of service disciplines: purely non-exhaustive, non-exhaustive and exhaustive. Network performance for these three service disciplines is compared to determine, which one of the three gives a relatively better performance. Besides throughput and delay, a more compact form of performance measure called "power", has also been used in this study. Power is simply a ratio of throughput and delay. This study has shown that the token holding time has significant effect on the performance of a local area network. Simulation results of this study, are presented in terms of throughput, delay, power, logical ring size, token circulation time, efficiency/overhead versus offered load and token holding time. Some results are also presented in terms of histograms.
Show less - Date Issued
- 1985
- PURL
- http://purl.flvc.org/fcla/dt/14275
- Subject Headings
- Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- Mobility management in voice over IP networks.
- Creator
- Sugunan, Shiby., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless Internet access has recently gained significant attention as wireless/mobile communications and networking become widespread. Voice over IP service is likely to play a key role in the convergence of IP based Internet and mobile cellular networks. The mobility management performance for Mobile IP and Session Initiation Protocol is the focus of this thesis. After illustrating the operation of the protocols, the discrete event simulator, Network Simulator 2 (ns2), is used to compare the...
Show moreWireless Internet access has recently gained significant attention as wireless/mobile communications and networking become widespread. Voice over IP service is likely to play a key role in the convergence of IP based Internet and mobile cellular networks. The mobility management performance for Mobile IP and Session Initiation Protocol is the focus of this thesis. After illustrating the operation of the protocols, the discrete event simulator, Network Simulator 2 (ns2), is used to compare the performance of the two protocols. The comparison of the protocols is done by comparing average end-to-end delay and the ratio of the number of packets received to the number of packets originally sent (Packet Delivery Fraction). The impact of mobility is analyzed by studying the performance of the protocols, for various mobility scenarios. The effect of an increase in the number of nodes and increase in velocity of the mobile node on the performance of the Mobile IP and SIP is compared. The performance of the Mobile IP and SIP is compared by measuring the performance metrics of the two protocols for similar simulations. The results obtained as a result of the simulations leads us to some interesting conclusions.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13113
- Subject Headings
- Internet telephony, Wireless Internet, Mobile computing, TCP/IP (Computer network protocol)
- Format
- Document (PDF)
- Title
- Analysis of a new protocol for Bluetooth network formation.
- Creator
- Madhusoodanan, Vishakh., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the...
Show moreThis research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the number of devices in the network. Also, the network diameter, the number of piconets formed and the impact of device failures are analyzed. Simulation results show that the protocol handles the failures of the devices with minimum delay except at the time of failure of a master. The scope for further improvement of this protocol is also discussed.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13036
- Subject Headings
- Bluetooth technology, Computer network protocols
- Format
- Document (PDF)