Current Search: Ilyas, Mohammad (x)
View All Items
Pages
- Title
- Effect of message latency in an ATM network on signal processing.
- Creator
- Weber, Ralph Lawrence., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
Signal processing requires a steady flow of sampled data to be able to properly manipulate the signal to get the desired output. By using Asynchronous Transfer Mode (ATM) networks, it is possible to divide signal processing amongst a number of stations where each station can be specialized to a single function. Unfortunately, most commercially available ATM Network Interface Cards (NIC) only support message mode ATM Adaptation Layer 5 (AAL5) which is unsuitable to signal processing due to the...
Show moreSignal processing requires a steady flow of sampled data to be able to properly manipulate the signal to get the desired output. By using Asynchronous Transfer Mode (ATM) networks, it is possible to divide signal processing amongst a number of stations where each station can be specialized to a single function. Unfortunately, most commercially available ATM Network Interface Cards (NIC) only support message mode ATM Adaptation Layer 5 (AAL5) which is unsuitable to signal processing due to the delays of having to wait for an entire message to be formed prior to sending. It is shown that by using an ATM NIC using streaming mode AAL5, where cells are sent as soon as enough data to create an ATM cell of 48 bytes, leads to better quality signal processing. It is also shown that the message latency (time it takes for a message to traverse the network) is reduced by using streaming mode AAL5.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15371
- Subject Headings
- Signal processing, Asynchronous transfer mode, Telecommunication--Message processing, Computer networks
- Format
- Document (PDF)
- Title
- Delay characteristics of file transfer in token ring local area networks.
- Creator
- Horvath, Elizabeth Iren., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
The purpose of this thesis is to examine the delay characteristics of a token ring local area network with file transfers. The delay characteristics of the network are investigated by varying the file packet lengths, the variance in the length of the packets, and the utilization. The simulation model used has file packets which are assumed to be represented by a normal distribution. The results obtained indicate that at a designated utilization an increase in the variance of the packet's...
Show moreThe purpose of this thesis is to examine the delay characteristics of a token ring local area network with file transfers. The delay characteristics of the network are investigated by varying the file packet lengths, the variance in the length of the packets, and the utilization. The simulation model used has file packets which are assumed to be represented by a normal distribution. The results obtained indicate that at a designated utilization an increase in the variance of the packet's length causes the delay to increase. The results can be used for capacity planning for networks whose primary task is file transfer.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14466
- Subject Headings
- IBM Token-Ring Network (Local area network system)
- Format
- Document (PDF)
- Title
- Dual Bus R-Net: A new local/metropolitan area network.
- Creator
- Chauhan, Sanjeev Birbal., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
In this thesis we have proposed and analyzed a new architecture for high speed fiber optic LANs/MANs, called the Dual Bus R-Net. The scheme is based on a slotted unidirectional dual bus structure. It uses a reservation mechanism to generate slotted frames on each bus. Frames consist of a reservation slot and one or many information slots. Stations reserve slots by transmitting reservation requests on the bus carrying information in the opposite direction. The scheme has the advantage of...
Show moreIn this thesis we have proposed and analyzed a new architecture for high speed fiber optic LANs/MANs, called the Dual Bus R-Net. The scheme is based on a slotted unidirectional dual bus structure. It uses a reservation mechanism to generate slotted frames on each bus. Frames consist of a reservation slot and one or many information slots. Stations reserve slots by transmitting reservation requests on the bus carrying information in the opposite direction. The scheme has the advantage of superior channel utilization, bounded delay, fair access to all stations, dynamic bandwidth allocation to network users, and implementation simplicity. Extensive simulations have been carried out to verify the characteristics of the network. Simulation results reinforce the initial claims of the advantages offered by Dual Bus R-Net. Performance analysis is presented in terms of network delay and channel utilization. Simulation results are compared with similar results of X-Net, R-Net, DQDB, and Expressnet.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15006
- Subject Headings
- Local area networks (Computer networks), Metropolitan area networks (Computer networks), Computer network architectures, Computer network protocols
- Format
- Document (PDF)
- Title
- Performance analysis of Signaling System no. 7 for ISDN applications.
- Creator
- Eskamaei, Mehdi., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
This thesis deals with the major concepts, evolution, and the implementation of common channel signaling systems in current telecommunications networks. An analytical model for performance evaluation of networks design, using Signaling System #7, is presented. The primary emphasis is to calculate the average delay of messages based upon error probability and data transmission rate. The thesis describes existing common channel signaling systems. CCITT Signaling System #6 and #7 are explained....
Show moreThis thesis deals with the major concepts, evolution, and the implementation of common channel signaling systems in current telecommunications networks. An analytical model for performance evaluation of networks design, using Signaling System #7, is presented. The primary emphasis is to calculate the average delay of messages based upon error probability and data transmission rate. The thesis describes existing common channel signaling systems. CCITT Signaling System #6 and #7 are explained. United States versions of signaling systems, CCIS #6 and CCS #7 are examined in detail. The move toward Integrated Services Digital Networks (ISDNs) is discussed in terms of interfaces, and standards. CCS architectures in support of ISDNs are outlined.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14460
- Subject Headings
- Signal theory (Telecommunication), Integrated services digital networks
- Format
- Document (PDF)
- Title
- PERFORMANCE EVALUATION OF INTERCONNECTED TOKEN-RING LOCAL AREA NETWORKS.
- Creator
- DA RE, MARIA., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
This thesis gives an approximate analytical solution in terms of mean end-to-end delay of a system of token-ring local area networks interconnected via a backbone ring. The solution is based on an existing approximation (see chapter 2) of the mean end-to-end delay in a stand-alone token ring LAN, and it is extended by approximating the arrival rates at the bridges (that are function of the throughput of each subnetwork and the percentage of it that is directed to the other subnetworks). A new...
Show moreThis thesis gives an approximate analytical solution in terms of mean end-to-end delay of a system of token-ring local area networks interconnected via a backbone ring. The solution is based on an existing approximation (see chapter 2) of the mean end-to-end delay in a stand-alone token ring LAN, and it is extended by approximating the arrival rates at the bridges (that are function of the throughput of each subnetwork and the percentage of it that is directed to the other subnetworks). A new packet-length distribution is defined and its detailed derivation is described in Appendix B.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14309
- Subject Headings
- Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- PERFORMANCE ANALYSIS OF TOKEN-RING LOCAL AREA NETWORK WITH GATED SERVICE DISCIPLINE (LAN).
- Creator
- HUYNH, LAP THIET., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
This thesis investigates the waiting-time in a token-ring local area network (LAN) with gated service discipline. It gives an analytical approximati.on for a network with an arbitrary number of stations, non-identical Poisson arrival streams and general service time distributions at each station, and non-zero switch-over time (also referred to as walking time) between adjacent stations. This approximation method is an alternative to the complicated O(N^2) numerical evaluation of the waiting...
Show moreThis thesis investigates the waiting-time in a token-ring local area network (LAN) with gated service discipline. It gives an analytical approximati.on for a network with an arbitrary number of stations, non-identical Poisson arrival streams and general service time distributions at each station, and non-zero switch-over time (also referred to as walking time) between adjacent stations. This approximation method is an alternative to the complicated O(N^2) numerical evaluation of the waiting-time currently available in the literature. Extensive simulation results with different parameters are presented to show the degree of accuracy of the approximation, which is generally good for a practical range of parameters.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14364
- Subject Headings
- Local area networks (Computer networks), Queuing theory
- Format
- Document (PDF)
- Title
- STUDY OF BANDWIDTH ALLOCATION STRATEGIES FOR NETWORKS INTEGRATING VOICE AND DATA.
- Creator
- IZQUIERDO, MICHAEL ROBERT., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
The purpose of this thesis is to study three types of bandwidth allocation strategies for a network integrating voice and data, commonly referred to as Integrated Services Digital Network or ISDN, using GPSS V simulati ons. The strategies are Non-Boundary, Movable-Boundary, and Non- and Movable- Boundary with Digital Speech Interpolation. The theoretical behavior of each strategy is discussed. Exact solutions for small systems with one or two slots is shown along with approximations for...
Show moreThe purpose of this thesis is to study three types of bandwidth allocation strategies for a network integrating voice and data, commonly referred to as Integrated Services Digital Network or ISDN, using GPSS V simulati ons. The strategies are Non-Boundary, Movable-Boundary, and Non- and Movable- Boundary with Digital Speech Interpolation. The theoretical behavior of each strategy is discussed. Exact solutions for small systems with one or two slots is shown along with approximations for larger systems. General descriptions of the GPSS models for each strategy is provided. The GPSS model source code for each strategy is presented in the Appendix. Simulation is used to explore the effects of the service time ratio a of voice and data on system performance. Also, the performance of Time Division Multiplex or TDM systems with 24 channels, commonly referred to as Tl, is shown.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14355
- Subject Headings
- Integrated services digital networks, Time management
- Format
- Document (PDF)
- Title
- Virtual leaky bucket for congestion control in high-speed ATM networks.
- Creator
- AlFadhel, Fahad A., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
High speed ATM networks support a variety of communication services, that have different traffic characteristics, which causes the network to be congested quickly. An ATM network with different communication services, data, voice and video, is simulated to study the effect of congestion on network operation. A modified leaky bucket mechanism is used to shape the traffic entering the network, which improved the performance in terms of cell losses and cell delay. The original leaky bucket...
Show moreHigh speed ATM networks support a variety of communication services, that have different traffic characteristics, which causes the network to be congested quickly. An ATM network with different communication services, data, voice and video, is simulated to study the effect of congestion on network operation. A modified leaky bucket mechanism is used to shape the traffic entering the network, which improved the performance in terms of cell losses and cell delay. The original leaky bucket mechanism is so conservative, that it drops a large number of ATM cells. Another scheme called virtual leaky bucket is proposed in this thesis. In this scheme violating cells are marked and then allowed to enter the network. The scheme is simulated and its performance is compared to the leaky bucket mechanism. Shaped virtual leaky bucket with marking is shown to have much better performance as long as the minimum requirements of non-violating cells are guaranteed.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15644
- Subject Headings
- Asynchronous transfer mode, Telecommunication--Traffic, Computer networks
- Format
- Document (PDF)
- Title
- GSM network simulation and performance analysis.
- Creator
- Bothra, Piyush., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
This research focuses on analyzing the effect of change in network parameters on the performance of GSM cellular network. A simulation model is created using visual C++ and network performance in terms of call failures and handover failures are studied. A cellular network architecture and its performance are based on so many parameters and complexities that it is very difficult to analyze the effect of a parameter on any one aspect of performance. The purpose of this thesis is to study the...
Show moreThis research focuses on analyzing the effect of change in network parameters on the performance of GSM cellular network. A simulation model is created using visual C++ and network performance in terms of call failures and handover failures are studied. A cellular network architecture and its performance are based on so many parameters and complexities that it is very difficult to analyze the effect of a parameter on any one aspect of performance. The purpose of this thesis is to study the performance of network with respect to some of those parameters while neglecting other effects. The simulated network takes parameters like cell diameter, traffic intensity and mobility pattern as input and a simulation run results in the evaluation of the call failure and success statistics.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12952
- Subject Headings
- Database management, SQL (Computer program language), Java (Computer program language)
- Format
- Document (PDF)
- Title
- Integration of dissimilar network management systems.
- Creator
- Frost, Sandra Lynn., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
The purpose of this thesis is to examine the issues involved in centralizing network control of two dissimilar network management systems, through the use of a protocol translator. In particular, we consider communication between a Programmable Communications Processor (PCP) and an Access Communications Processor (ACP) for the purposes of control, configuration, software updating and backup. The integration should maintain backwards compatibility to both systems, as well as providing value...
Show moreThe purpose of this thesis is to examine the issues involved in centralizing network control of two dissimilar network management systems, through the use of a protocol translator. In particular, we consider communication between a Programmable Communications Processor (PCP) and an Access Communications Processor (ACP) for the purposes of control, configuration, software updating and backup. The integration should maintain backwards compatibility to both systems, as well as providing value-added functionality. Issues to be examined include protocol translator design criteria, an implementation strategy for a state/event driven handler and performance testing.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14619
- Subject Headings
- Computer network protocols, Computer networks--Management
- Format
- Document (PDF)
- Title
- A second order leaky bucket algorithm for traffic shaping in ATM networks.
- Creator
- Bansal, Atul., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
Asynchronous Transfer Mode (ATM) Networks are based on connections that are multiplexed dynamically on a single link. For satisfactory performance in an ATM network, congestion control is extremely necessary to guarantee the negotiated Quality of Service (QoS) for every connection. Traffic shaping is a congestion control mechanism that alters the traffic characteristics of a stream of cells on a connection to achieve better network efficiency by meeting the QoS objectives. We study a model...
Show moreAsynchronous Transfer Mode (ATM) Networks are based on connections that are multiplexed dynamically on a single link. For satisfactory performance in an ATM network, congestion control is extremely necessary to guarantee the negotiated Quality of Service (QoS) for every connection. Traffic shaping is a congestion control mechanism that alters the traffic characteristics of a stream of cells on a connection to achieve better network efficiency by meeting the QoS objectives. We study a model for Traffic Shaping, Second Order Leaky Bucket, which consists of two leaky buckets to police the Sustained Cell Rate (SCR) and Burst Tolerance (BT) for each ATM connection. With this algorithm, ATM cells enter the first leaky bucket and the Cells conforming to the first leaky bucket enter the ATM network with Cell Loss Priority set to zero (CLP = 0). Any cell non-conforming to the first leaky bucket is sent to a second leaky bucket, and will be tagged CLP = 1 only if found to be non-conforming to the second leaky bucket. Cells conforming to the second leaky bucket are allowed to enter the ATM network with CLP = 0. We simulate the second-order leaky bucket for traffic shaping and show the effectiveness of second order leaky bucket in protecting the QoS experienced by connections passing through a common internodal link queue.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15607
- Subject Headings
- Asynchronous transfer mode, Telecommunication--Traffic, Computer networks
- Format
- Document (PDF)
- Title
- A simulation study of mobile computing protocols.
- Creator
- Ahson, Syed Alamdar., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
With the advent of cellular technology and portable computers we are on the verge of a new computing paradigm. This computing paradigm is now widely known as "mobile" or "nomadic" computing. Mobile systems frequently change their point of attachment to the network. Mobile computing systems also need to communicate with the existing pool of information and file servers. Mobility defies the very principles that the TCP/IP protocol suite is based on. We study the Internet Engineering Task Force ...
Show moreWith the advent of cellular technology and portable computers we are on the verge of a new computing paradigm. This computing paradigm is now widely known as "mobile" or "nomadic" computing. Mobile systems frequently change their point of attachment to the network. Mobile computing systems also need to communicate with the existing pool of information and file servers. Mobility defies the very principles that the TCP/IP protocol suite is based on. We study the Internet Engineering Task Force (IETF) Mobile IPv4 protocol and find it to be a highly scale solution. We study some of the other proposed mobile IP solutions. We establish a criterion, call-to-mobility ratio, to compare various mobile IP schemes. Two hypothetical schemes, Static Update and Triangular Routing, are introduced solely for the purpose of comparing the performance of Mobile IPv4. In our simulation we concentrate on calculating the update costs and the routing costs for Triangular Routing, Static update and Mobile IPv4 schemes. The simulation program to simulate Triangular Routing, Static Update and Mobile IPv4 is written in C++. Minetsim, our simulation program is written using object-oriented analysis and design. Minetsim is used to obtain routing and update costs for Triangular Routing, Static Update and Mobile IPv4 schemes. Four different host configurations are simulated for travelling salesman and random motion mobility models.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15567
- Subject Headings
- Mobile computing, Portable computers, Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Simulation study of reservation scheme to improve the quality of service in wireless cellular network.
- Creator
- Chokshi, Patheek G., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
In the present computer age, cellular technology and portable computers are becoming an integral part of the life. Each computer user wants to access the computing resources, irrespective of the location. Because of this need the computing paradigm "Mobile Computing" has assumed a primary role in modern computer communication technology. While dimensioning the network resources, it is very important to know how the users move around the geographical area covered by the cellular network. This...
Show moreIn the present computer age, cellular technology and portable computers are becoming an integral part of the life. Each computer user wants to access the computing resources, irrespective of the location. Because of this need the computing paradigm "Mobile Computing" has assumed a primary role in modern computer communication technology. While dimensioning the network resources, it is very important to know how the users move around the geographical area covered by the cellular network. This knowledge allows us to plan the system resources in order to achieve the QoS required. The major factors that affect the performance, along with the mobility pattern of the mobile user, are the speed at which the user is moving and the load on the network. In this research, we study different types of mobility patterns the user can follow and it's impact on the network services. We have proposed and evaluated a reservation scheme to improve the QoS in the cellular network. The reservation scheme reserves some part of the bandwidth for handoff connections. We have developed simulation programs and have studied three mobility patterns namely leading movement type, random motion, and square-street mobility pattern for measuring the QoS for cellular network. It has been observed from the results that at an average speed of 50 miles per hour with the average loading of the network, a significant improvement in QoS has been achieved for all the mobility patterns by using the reservation scheme.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15706
- Subject Headings
- Wireless communication systems, Mobile computing, Cellular telephone systems
- Format
- Document (PDF)
- Title
- SIMULATION STUDY OF FLOW-CONTROL IN A TOKEN-RING LOCAL AREA NETWORK.
- Creator
- BALACHANDRAN, CHITRA., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
This thesis deals with simulation of flow control in token-ring local area networks. The primary emphasis of this simulation study is to observe the effects of token holding time on the performance of the network. Token holding time is adjusted to account for two types of service disciplines: gated and limited. Network performance for these two service disciplines is compared to determine which one of the two gives a relatively better performance. Besides throughput and delay, a more compact...
Show moreThis thesis deals with simulation of flow control in token-ring local area networks. The primary emphasis of this simulation study is to observe the effects of token holding time on the performance of the network. Token holding time is adjusted to account for two types of service disciplines: gated and limited. Network performance for these two service disciplines is compared to determine which one of the two gives a relatively better performance. Besides throughput and delay, a more compact form of performance measure called "power", has also been used in the study . Power is simply a ratio of throughput and delay . This study has shown that the token holding time has a significant effect on the performance of a local area network . Simulation results of this study are presented in terms of throughput, delay, power, token circulation time and efficiency/overhead versus offered load. The results are presented in the form of graphs.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14311
- Subject Headings
- Local area networks (Computer networks)--Simulation methods
- Format
- Document (PDF)
- Title
- Globalization and Higher Education in Florida's State University System.
- Creator
- Ilyas, Mohammad, Bogotch, Ira, Florida Atlantic University, College of Education, Department of Educational Leadership and Research Methodology
- Abstract/Description
-
The purpose of this research was to assess how prepared Florida's State University System (SUS) institutions have been during the past five years (2008-2013) in responding to the challenges of globalization. The research also established institutional trends for the past five years (2008-2013) and projections for the next five years to seize the opportunities offered by globalization and to produce graduates with global competency skills. Ten of the 12 SUS institutions studied in this...
Show moreThe purpose of this research was to assess how prepared Florida's State University System (SUS) institutions have been during the past five years (2008-2013) in responding to the challenges of globalization. The research also established institutional trends for the past five years (2008-2013) and projections for the next five years to seize the opportunities offered by globalization and to produce graduates with global competency skills. Ten of the 12 SUS institutions studied in this research were Florida A&M University (FAMU), Florida Atlantic University (FAU), Florida Gulf Coast University (FGCU), Florida International University (FIU), Florida State University (FSU), University of Central Florida (UCF), University of Florida (UF), University of North Florida (UNF), University of South Florida (USF), and University of West Florida (UWF). The research was conducted as a case study using multi-method approach. The quantitative analysis was based on the information collected from the institutions and from the integrated postsecondary education data system (IPEDS). The qualitative analysis was based on the institutional mission statements, vision statements, and strategic plans. The quantitative analysis used six data parameters to compute a globalization composite index (GCI) for institutional comparisons and for establishing trends and future projections. Integrating quantitative and qualitative analyses led to the research findings of this study. Based on this study, the institutional preparedness for globalization has been low for six SUS institutions (FAMU, FAU, FGCU, UCF, UNF, and UWF) and has been medium for the remaining four (FIU, FSU, UF, and USF). The trend analysis showed that institutional preparedness could be improved significantly if robust and focused efforts are made over the next five years. In that case, the institutional preparedness for FAMU, FGCU, UNF, and UWF could ascend to medium; for FAU and UCF, it could improve to medium+; and for FIU, FSU, UF, and USF, it could reach high. The research concluded with some recommendations to help the leadership of Florida and the SUS institutions in responding effectively to the challenges of globalization. A few recommendations for future research in this field also are provided.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004507, http://purl.flvc.org/fau/fd/FA00004507
- Subject Headings
- Education and globalization, Education, Higher -- Effect of technological innovations on, Education, Higher -- Florida, Educational change -- Florida
- Format
- Document (PDF)
- Title
- ADAPTIVE HYBRID MULTIPLE ACCESS PROTOCOLS WITH SATELLITE NETWORK APPLICATIONS.
- Creator
- SARDANA, KARAMVIR., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for...
Show moreA general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for satellite communication networks, a sub-class of ART protocols called Adaptive Satellite Hybrid Access (ASHA)+ is proposed.Two ASHA protocols named ASHA1 and ASHA2 that combine the features of S-ALOHA, TDMA-Reservation and TDMA protocols by using a proposed generalized design technique, are described in detail and their analytical models are formulated. The ASHA protocols are analyzed using Equilibrium Point Analysis technique and then their analytical results are presented. A fairly sophisticated and new simulator, modeled basically as a 3-state finite state machine, to simulate the ASHA protocols is designed, described and implemented. A new phenomenon called "protocol oscillations" is observed, in which a hybrid protocol oscillates back and forth between its two adjacent states without accomplishing much, and becomes literally unstable. Traffic measures and threshold values to remedy this problem are discussed. As a by-product of simulator validation, it is found that SRUC protocol, previously thought to be stable at all traffic levels, also suffers from this problem. In addition, some previous simulation results of SRUC protocol are felt not to be correct, and its simulation results that we believe to be correct instead, are given. Detailed simulation results of ASHA protocols are presented and also compared with their analytical results. These results provide a large amount of practical and valuable insight, heretofore unknown, into the workings of adaptive hybrid protocols in general and of ASHA protocols in particular. Moreover, these results show that ASHA protocols provide better delay versus throughput performance over the entire range of throughput compared to any of their individual constituent protocols, and extend the channel capacity to unity. ftn$\sp+$As an aside, ASHA means "hope" in Hindi language.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/11907
- Subject Headings
- Computer network protocols, Artificial satellites in telecommunication
- Format
- Document (PDF)
- Title
- Acknowledgement overhead in local area networks.
- Creator
- Lyford, Avery Martin., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the...
Show moreThe throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the impact of different acknowledgement structures on throughput. Possible ways to alleviate the problem, such as peripheral processors and modified protocol layers, are also briefly examined.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14424
- Subject Headings
- Local area networks, Acknowledgements
- Format
- Document (PDF)
- Title
- Analysis of a new protocol for Bluetooth network formation.
- Creator
- Madhusoodanan, Vishakh., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the...
Show moreThis research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the number of devices in the network. Also, the network diameter, the number of piconets formed and the impact of device failures are analyzed. Simulation results show that the protocol handles the failures of the devices with minimum delay except at the time of failure of a master. The scope for further improvement of this protocol is also discussed.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13036
- Subject Headings
- Bluetooth technology, Computer network protocols
- Format
- Document (PDF)
- Title
- A COMPARATIVE EVALUATION OF SERVICE DISCIPLINES IN A TOKEN RING LOCAL AREA NETWORK: A SIMULATION STUDY.
- Creator
- Syed, Majid Ali, Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The primary emphasis of this thesis is to evaluate in comparative terms the performance of three types of service disciplines in a Token Ring Local Area Network. The service disciplines studied are exhaustive, gated and limited service. These service disciplines play an important role in the network performance, especially when some users are relatively less active than others in contributing traffic load to the network. Network performance for these service disciplines are compared to...
Show moreThe primary emphasis of this thesis is to evaluate in comparative terms the performance of three types of service disciplines in a Token Ring Local Area Network. The service disciplines studied are exhaustive, gated and limited service. These service disciplines play an important role in the network performance, especially when some users are relatively less active than others in contributing traffic load to the network. Network performance for these service disciplines are compared to determine which one of them gives better performance. Simulation is used for this study and results are presented in terms of average delay, queue lengths and delay histograms versus traffic intensity.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14388
- Subject Headings
- Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- Characterization and performance evaluation of video conference traffic in ATM networks.
- Creator
- Nayak, Chandrika Narayana., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In order to effectively transport digital compressed video over Broadband Integrated Services Digital Networks (B-ISDN) with Asynchronous Transfer Mode (ATM), the characteristics of the video source traffic should be understood. The nature of the video traffic depends primarily on the source, the content of the video and the coding algorithm that removes redundancies for efficient transmission over networks. In this study, video conference data encoded using a subband coding scheme, Digital...
Show moreIn order to effectively transport digital compressed video over Broadband Integrated Services Digital Networks (B-ISDN) with Asynchronous Transfer Mode (ATM), the characteristics of the video source traffic should be understood. The nature of the video traffic depends primarily on the source, the content of the video and the coding algorithm that removes redundancies for efficient transmission over networks. In this study, video conference data encoded using a subband coding scheme, Digital Video Compression System (DVCS), is analyzed to determine its characteristics. Several video traffic sources are multiplexed through an ATM network node with limited capacity and the performance of this environment is evaluated by using a simulation technique. The simulation results are presented for the performance measures for varying traffic and network conditions.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15166
- Subject Headings
- Broadband communications systems, Integrated services digital networks, Asynchronous transfer mode, Digital video, Video compression
- Format
- Document (PDF)