Current Search: Computer network protocols (x) » Computer networks (x)
View All Items
Pages
- Title
- Integration of dissimilar network management systems.
- Creator
- Frost, Sandra Lynn., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
The purpose of this thesis is to examine the issues involved in centralizing network control of two dissimilar network management systems, through the use of a protocol translator. In particular, we consider communication between a Programmable Communications Processor (PCP) and an Access Communications Processor (ACP) for the purposes of control, configuration, software updating and backup. The integration should maintain backwards compatibility to both systems, as well as providing value...
Show moreThe purpose of this thesis is to examine the issues involved in centralizing network control of two dissimilar network management systems, through the use of a protocol translator. In particular, we consider communication between a Programmable Communications Processor (PCP) and an Access Communications Processor (ACP) for the purposes of control, configuration, software updating and backup. The integration should maintain backwards compatibility to both systems, as well as providing value-added functionality. Issues to be examined include protocol translator design criteria, an implementation strategy for a state/event driven handler and performance testing.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14619
- Subject Headings
- Computer network protocols, Computer networks--Management
- Format
- Document (PDF)
- Title
- Analysis of a new protocol for Bluetooth network formation.
- Creator
- Madhusoodanan, Vishakh., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the...
Show moreThis research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the number of devices in the network. Also, the network diameter, the number of piconets formed and the impact of device failures are analyzed. Simulation results show that the protocol handles the failures of the devices with minimum delay except at the time of failure of a master. The scope for further improvement of this protocol is also discussed.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13036
- Subject Headings
- Bluetooth technology, Computer network protocols
- Format
- Document (PDF)
- Title
- Dual Bus R-Net: A new local/metropolitan area network.
- Creator
- Chauhan, Sanjeev Birbal., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
In this thesis we have proposed and analyzed a new architecture for high speed fiber optic LANs/MANs, called the Dual Bus R-Net. The scheme is based on a slotted unidirectional dual bus structure. It uses a reservation mechanism to generate slotted frames on each bus. Frames consist of a reservation slot and one or many information slots. Stations reserve slots by transmitting reservation requests on the bus carrying information in the opposite direction. The scheme has the advantage of...
Show moreIn this thesis we have proposed and analyzed a new architecture for high speed fiber optic LANs/MANs, called the Dual Bus R-Net. The scheme is based on a slotted unidirectional dual bus structure. It uses a reservation mechanism to generate slotted frames on each bus. Frames consist of a reservation slot and one or many information slots. Stations reserve slots by transmitting reservation requests on the bus carrying information in the opposite direction. The scheme has the advantage of superior channel utilization, bounded delay, fair access to all stations, dynamic bandwidth allocation to network users, and implementation simplicity. Extensive simulations have been carried out to verify the characteristics of the network. Simulation results reinforce the initial claims of the advantages offered by Dual Bus R-Net. Performance analysis is presented in terms of network delay and channel utilization. Simulation results are compared with similar results of X-Net, R-Net, DQDB, and Expressnet.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15006
- Subject Headings
- Local area networks (Computer networks), Metropolitan area networks (Computer networks), Computer network architectures, Computer network protocols
- Format
- Document (PDF)
- Title
- Cloud-assisted reliable user datagram protocol.
- Creator
- Dimitrov, Volen, Bullard, Lofton A.
- Date Issued
- 2013-04-05
- PURL
- http://purl.flvc.org/fcla/dt/3361078
- Subject Headings
- Cloud computing, Internet, TCP/IP (Computer network protocol), File Transfer Protocol (Computer network protocol)
- Format
- Document (PDF)
- Title
- Achieving Higher Receiver Satisfaction using Multicast-Favored Bandwidth Allocation Protocols.
- Creator
- Yousefizadeh, Hooman, Zilouchian, Ali, Ilyas, Mohammad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher...
Show moreIn recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher level of receiver satisfaction should be achieved. In this dissertation, we propose three new innovative protocols to favor multicast sessions over unicast sessions. Multicast Favored BW Allocation- Logarithmic (MFBA-Log) and Multicast Favored BW Allocation-Linear (MFBALin) protocols allocate BW proportional to the number of down stream receivers. The proposed Multicast Reserved BW Allocation (MRBA) protocol allocates part of the BW in the links only to multicast sessions. Simulation results show the increase in the overall level of Receiver Satisfaction in the network.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012581
- Subject Headings
- Multicasting (Computer networks), Computer network protocols, Computer algorithms
- Format
- Document (PDF)
- Title
- Unifying the conceptual levels of network security through the use of patterns.
- Creator
- Kumar, Ajoy, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Network architectures are described by the International Standard for Organization (ISO), which contains seven layers. The internet uses four of these layers, of which three are of interest to us. These layers are Internet Protocol (IP) or Network Layer, Transport Layer and Application Layer. We need to protect against attacks that may come through any of these layers. In the world of network security, systems are plagued by various attacks, internal and external, and could result in Denial...
Show moreNetwork architectures are described by the International Standard for Organization (ISO), which contains seven layers. The internet uses four of these layers, of which three are of interest to us. These layers are Internet Protocol (IP) or Network Layer, Transport Layer and Application Layer. We need to protect against attacks that may come through any of these layers. In the world of network security, systems are plagued by various attacks, internal and external, and could result in Denial of Service (DoS) and/or other damaging effects. Such attacks and loss of service can be devastating for the users of the system. The implementation of security devices such as Firewalls and Intrusion Detection Systems (IDS), the protection of network traffic with Virtual Private Networks (VPNs), and the use of secure protocols for the layers are important to enhance the security at each of these layers.We have done a survey of the existing network security patterns and we have written the missing patterns. We have developed security patterns for abstract IDS, Behavior–based IDS and Rule-based IDS and as well as for Internet Protocol Security (IPSec) and Transport Layer Security (TLS) protocols. We have also identified the need for a VPN pattern and have developed security patterns for abstract VPN, an IPSec VPN and a TLS VPN. We also evaluated these patterns with respect to some aspects to simplify their application by system designers. We have tried to unify the security of the network layers using security patterns by tying in security patterns for network transmission, network protocols and network boundary devices.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004132, http://purl.flvc.org/fau/fd/FA00004132
- Subject Headings
- Computer architecture, Computer network architectures, Computer network protocols, Computer network protocols, Computer networks -- Security measures, Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- Distributed management of heterogeneous networks using hypermedia data repositories.
- Creator
- Anderson, James M., Florida Atlantic University, Ilyas, Mohammad, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Current management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the...
Show moreCurrent management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the Network Management Server (NMS), the Network Element Web Server (NEWS), and the Operator's Logic and Processing Platform (OLAPP). The NMS stores the management functions used by both the NEWS and the user. The NEWS is a Web server which collects and processes network element data in order to support management functions. The OLAPP executes the management functions and interfaces with the user.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/12502
- Subject Headings
- Computer network architectures, Internetworking (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- Geographic Routing Reliability Enhancement in Urban Vehicular Ad Hoc Networks.
- Creator
- Alzamzami, Ohoud, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is...
Show moreVehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is a challenging problem where the routing performance is highly affected by the variable link quality and bandwidth availability. In this dissertation, a number of enhancements to improve geographic routing reliability in VANETs are proposed. To minimize packet losses, the direction and link quality of next-hop nodes using the Expected Transmission Count (ETX) are considered to select links with low loss ratios. To consider the available bandwidth, a cross-layer enchantment of geographic routing, which can select more reliable links and quickly react to varying nodes load and channel conditions, is proposed. We present a novel model of the dynamic behavior of a wireless link. It considers the loss ratio on a link, in addition to transmission and queuing delays, and it takes into account the physical interference e ect on the link. Then, a novel geographic routing protocol based on fuzzy logic systems, which help in coordinating di erent contradicting metrics, is proposed. Multiple metrics related to vehicles' position, direction, link quality and achievable throughput are combined using fuzzy rules in order to select the more reliable next-hop nodes for packet forwarding. Finally, we propose a novel link utility aware geographic routing protocol, which extends the local view of the network topology using two-hop neighbor information. We present our model of link utility, which measures the usefulness of a two-hop neighbor link by considering its minimum residual bandwidth and packet loss rate. The proposed protocol can react appropriately to increased network tra c and to frequent topology dis-connectivity in VANETs. To evaluate the performance of the proposed protocols, extensive simulation experiments are performed using network and urban mobility simulation tools. Results confirm the advantages of the proposed schemes in increased traffic loads and network density.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013037
- Subject Headings
- Vehicular ad hoc networks (Computer networks), Traffic safety, Routing protocols (Computer network protocols), Fuzzy logic
- Format
- Document (PDF)
- Title
- ADAPTIVE HYBRID MULTIPLE ACCESS PROTOCOLS WITH SATELLITE NETWORK APPLICATIONS.
- Creator
- SARDANA, KARAMVIR., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for...
Show moreA general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for satellite communication networks, a sub-class of ART protocols called Adaptive Satellite Hybrid Access (ASHA)+ is proposed.Two ASHA protocols named ASHA1 and ASHA2 that combine the features of S-ALOHA, TDMA-Reservation and TDMA protocols by using a proposed generalized design technique, are described in detail and their analytical models are formulated. The ASHA protocols are analyzed using Equilibrium Point Analysis technique and then their analytical results are presented. A fairly sophisticated and new simulator, modeled basically as a 3-state finite state machine, to simulate the ASHA protocols is designed, described and implemented. A new phenomenon called "protocol oscillations" is observed, in which a hybrid protocol oscillates back and forth between its two adjacent states without accomplishing much, and becomes literally unstable. Traffic measures and threshold values to remedy this problem are discussed. As a by-product of simulator validation, it is found that SRUC protocol, previously thought to be stable at all traffic levels, also suffers from this problem. In addition, some previous simulation results of SRUC protocol are felt not to be correct, and its simulation results that we believe to be correct instead, are given. Detailed simulation results of ASHA protocols are presented and also compared with their analytical results. These results provide a large amount of practical and valuable insight, heretofore unknown, into the workings of adaptive hybrid protocols in general and of ASHA protocols in particular. Moreover, these results show that ASHA protocols provide better delay versus throughput performance over the entire range of throughput compared to any of their individual constituent protocols, and extend the channel capacity to unity. ftn$\sp+$As an aside, ASHA means "hope" in Hindi language.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/11907
- Subject Headings
- Computer network protocols, Artificial satellites in telecommunication
- Format
- Document (PDF)
- Title
- Energy-efficient protocols for wireless sensor networks.
- Creator
- Du, Kemei., Florida Atlantic University, Wu, Jie
- Abstract/Description
-
This thesis describes energy-conserving techniques in wireless sensor networks. In wireless sensor networks the sensor nodes gather information and send the information to a base station periodically. Some important messages need be broadcast to all nodes. Due to the limited battery capacity in sensor nodes, energy efficiency is becoming a major challenging problem in these power-constrained networks. Chain-based protocols construct a transmission chain connecting all nodes to save energy...
Show moreThis thesis describes energy-conserving techniques in wireless sensor networks. In wireless sensor networks the sensor nodes gather information and send the information to a base station periodically. Some important messages need be broadcast to all nodes. Due to the limited battery capacity in sensor nodes, energy efficiency is becoming a major challenging problem in these power-constrained networks. Chain-based protocols construct a transmission chain connecting all nodes to save energy dissipation of data transmission. We propose a multiple-chain scheme for all-to-all broadcasting. Furthermore, we develop an energy-efficient chain-construction algorithm which uses a sequence of insertions to minimize the energy consumption along the chain. We propose an energy-based adaptive clustering protocol, in which cluster-head elections depend on not only a probabilistic model but also the remaining energy in each node. This protocol improves the life time of the network by distributing energy usage effectively among the sensor nodes.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12912
- Subject Headings
- Wireless communication systems, Computer network protocols
- Format
- Document (PDF)
- Title
- Simulation-based performance evaluation of AODV routing protocol for ad hoc mobile wireless networks.
- Creator
- Suryaprasad, Deepa., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
An ad hoc wireless network is a network composed of mobile communication devices, which is designed to provide communication capability to satisfy the need of a temporary nature in an infrastructure-less environment. A routing protocol is necessary in ad hoc networks to ensure effective communication among nodes. This thesis presents a simulation-based study on the performance evaluation of Ad hoc on-demand distance vector (AODV) routing protocol, which is one of the core routing protocols...
Show moreAn ad hoc wireless network is a network composed of mobile communication devices, which is designed to provide communication capability to satisfy the need of a temporary nature in an infrastructure-less environment. A routing protocol is necessary in ad hoc networks to ensure effective communication among nodes. This thesis presents a simulation-based study on the performance evaluation of Ad hoc on-demand distance vector (AODV) routing protocol, which is one of the core routing protocols being promoted by the Mobile Ad Hoc Networking (MANET) group of the Internet Engineering Task Force. An event-advanced simulation program was developed in C++ to simulate the ad hoc wireless network implementing the AODV protocol. The performance metrics evaluated were throughput, average delay, route acquisition time and routing overhead. The network traffic was monitored in terms of the data packets created and successfully delivered within the simulation time. A discussion on the effect of different network parameters such as the mobility of the nodes, the number of nodes in the network, the size of the network and the data packet size on the performance characteristics of AODV protocol is also presented.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/12989
- Subject Headings
- Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Mutual interference in a Bluetooth Scatternet under different environmental conditions.
- Creator
- Godani, Amee Mahendrabhai., Florida Atlantic University, Mahgoub, Imad
- Abstract/Description
-
Wireless Personal Area Networks (WPANs) are becoming popular with mobile professionals. Bluetooth is a Wireless Protocol proposed by the Bluetooth SIG (Special Interest Group). Bluetooth allows a user to create a WPAN just by inserting a chip into a mobile device. Such devices are called Bluetooth enabled devices. The market for Bluetooth enabled devices is going to boom in the coming few years. For this reason, it is important to analyze the performance of a Bluetooth network in proximity to...
Show moreWireless Personal Area Networks (WPANs) are becoming popular with mobile professionals. Bluetooth is a Wireless Protocol proposed by the Bluetooth SIG (Special Interest Group). Bluetooth allows a user to create a WPAN just by inserting a chip into a mobile device. Such devices are called Bluetooth enabled devices. The market for Bluetooth enabled devices is going to boom in the coming few years. For this reason, it is important to analyze the performance of a Bluetooth network in proximity to other Bluetooth networks. Important issues addressed by such analysis include data security and interference caused by other Bluetooth devices and non-Bluetooth devices. The objective of this research is to evaluate the performance of a Bluetooth network in the presence of interference caused by neighboring Bluetooth networks. This is called mutual interference. The simulation is done with consideration of different packet lengths, where packet lengths are distributed geometrically. The research also considers the near-far effect on the throughput of a Bluetooth unit. The effect of environmental conditions on the performance of Bluetooth Scatternet is also examined.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12744
- Subject Headings
- Bluetooth technology, Wireless Application Protocol (Computer network protocol)
- Format
- Document (PDF)
- Title
- Design and implementation of an energy model for JiST/SWANS simulator.
- Creator
- Sutaria, Trishla., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can...
Show moreWireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can not be used to accurately simulate sensor networks. The JiST/SWANS simulator is one of the newer simulators that has been developed by Cornell University for simulating ad-hoc networks and is highly scalable which makes it appropriate for use in evaluating sensor networks. Since this simulator lack energy model our objective is to design and implement an energy model for JiST/SWANS so that it can adequately and accurately calculate the amount of energy consumption in the simulation of sensor networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13275
- Subject Headings
- Sensor networks, Wireless LANs, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Adaptive on-demand routing protocol for mobile ad hoc networks.
- Creator
- Omer, Ismail., Florida Atlantic University, Mahgoub, Imad, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Existing MANET routing protocols can be classified into three categories: On-demand, Proactive, and Proactive-On-demand hybrid protocols. This dissertation presents a novel hybrid MANET routing protocol, Adaptive On-demand MANET Routing (AOMAR) protocol. AOMAR borrowed the concepts of temporal location updates in operating systems and cache memories to reconstruct broken routes. Each route entry in a mobile host will have a reference field that is set to indicate whether the route is used...
Show moreExisting MANET routing protocols can be classified into three categories: On-demand, Proactive, and Proactive-On-demand hybrid protocols. This dissertation presents a novel hybrid MANET routing protocol, Adaptive On-demand MANET Routing (AOMAR) protocol. AOMAR borrowed the concepts of temporal location updates in operating systems and cache memories to reconstruct broken routes. Each route entry in a mobile host will have a reference field that is set to indicate whether the route is used within a certain period of time called refresh time. Using the refresh time parameter and the route reference field, AOMAR behavior can be controlled to behave as pure On-demand, Adaptive, or history related Proactive protocol. The three versions of AOMAR, On-demand, Adaptive and Proactive, have been simulated using different network sizes, loads and mobility patterns. Three performance metrics---throughput, delay and overhead---are collected. The results show that AOMAR on-demand has the same pattern of results when compared with other exiting on-demand protocols. On-demand AOMAR shows better performance when compared to Adaptive AOMAR for simulation sessions with uniform workloads. On the other hand Adaptive AOMAR outperforms On-demand AOMAR for simulation sessions with non-uniform workloads. Proactive AOMAR reconstructs recently used routes that have broken. Therefore, its routing overhead results change with the change of the network loads and mobility rates. This is not the case for traditional proactive protocols. Proactive AOMAR has lower control overhead and saves the bandwidth when compared with traditional existing proactive routing protocols. In addition to developing and simulating AOMAR, a new mobility model is proposed. Synchronized Random Direction Model of Motion with Constant Speed (SRDMCS) is a model that is suitable to emulate objects that move in random directions with a constant speed and within a certain area of movement. A new formula, Movement Related Update (MRU), is proposed and implemented. In MRU, the refresh period parameter value is linked to the network mobility level. Using MRU in the simulation gives AOMAR a third dimension such that the protocol not only adapts with how frequently the routes are used and how frequently they are broken, but also with how dynamic the network is.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/11972
- Subject Headings
- Mobile computing, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Evaluation of usage scenarios in Mobile People Architecture.
- Creator
- Shang, Hongtao., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the explosive growth of the Internet and other types of networks, such as cell phones and pager networks, more and more people expect to communicate with each other personally anywhere and at anytime. This thesis studies a new architecture Mobile People Architecture (MPA) proposed by MosquitoNet research group at Stanford University, which is designed to put people, rather than the devices that people use, at the endpoints of communication session. Three usage scenarios in MPA are...
Show moreWith the explosive growth of the Internet and other types of networks, such as cell phones and pager networks, more and more people expect to communicate with each other personally anywhere and at anytime. This thesis studies a new architecture Mobile People Architecture (MPA) proposed by MosquitoNet research group at Stanford University, which is designed to put people, rather than the devices that people use, at the endpoints of communication session. Three usage scenarios in MPA are simulated using SES/Workbench. The Response Time and the Update Cost are used to evaluate the performance of above scenarios. The advantages and disadvantages of different scenarios are also analyzed and discussed in this thesis.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15742
- Subject Headings
- TCP/IP (Computer network protocol), Mobile computing, Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Misuse Patterns for the SSL/TLS Protocol.
- Creator
- Alkazimi, Ali, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The SSL/TLS is the main protocol used to provide secure data connection between a client and a server. The main concern of using this protocol is to avoid the secure connection from being breached. Computer systems and their applications are becoming more complex and keeping these secure connections between all the connected components is a challenge. To avoid any new security flaws and protocol connections weaknesses, the SSL/TLS protocol is always releasing newer versions after discovering...
Show moreThe SSL/TLS is the main protocol used to provide secure data connection between a client and a server. The main concern of using this protocol is to avoid the secure connection from being breached. Computer systems and their applications are becoming more complex and keeping these secure connections between all the connected components is a challenge. To avoid any new security flaws and protocol connections weaknesses, the SSL/TLS protocol is always releasing newer versions after discovering security bugs and vulnerabilities in any of its previous version. We have described some of the common security flaws in the SSL/TLS protocol by identifying them in the literature and then by analyzing the activities from each of their use cases to find any possible threats. These threats are realized in the form of misuse cases to understand how an attack happens from the point of the attacker. This approach implies the development of some security patterns which will be added as a reference for designing secure systems using the SSL/TLS protocol. We finally evaluate its security level by using misuse patterns and considering the threat coverage of the models.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004873, http://purl.flvc.org/fau/fd/FA00004873
- Subject Headings
- Computer networks--Security measures., Computer network protocols., Computer software--Development., Computer architecture.
- Format
- Document (PDF)
- Title
- Performance analysis of multi-base station slotted ALOHA for wireless LAN in a Nakagami fading environment.
- Creator
- Chopra, Anju S., Florida Atlantic University, Aalo, Valentine A.
- Abstract/Description
-
Capture effect has shown considerable improvement on performance of slotted ALOHA systems. Further, improvement is expected by increasing the number of base stations. The performance of such slotted ALOHA systems is analyzed with the aid of Equilibrium point analysis. Packet dropping due to finite number of retransmissions is taken into account. The numerical results indicate that the finite number of retransmission trials mainly contribute to the improvement of the packet dropping...
Show moreCapture effect has shown considerable improvement on performance of slotted ALOHA systems. Further, improvement is expected by increasing the number of base stations. The performance of such slotted ALOHA systems is analyzed with the aid of Equilibrium point analysis. Packet dropping due to finite number of retransmissions is taken into account. The numerical results indicate that the finite number of retransmission trials mainly contribute to the improvement of the packet dropping probability in the range of light input traffic. The use of multiple base stations improves the overall throughput and the average transmission delay in the range of heavy input traffic.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15268
- Subject Headings
- Local area networks (Computer networks), Wireless communication systems, Packet switching (Data transmission), Computer network protocols
- Format
- Document (PDF)
- Title
- Context-aware hybrid data dissemination in vehicular networks.
- Creator
- Rathod, Monika M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not...
Show moreThis work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not limited to traffic and routing, weather, construction and road hazard alerts, as well as advertisement and entertainment. The core of V2V communication relies on the efficient dispersion of relevant data through wireless broadcast protocols for these varied applications. The challenges of vehicular networks demand an adaptive broadcast protocol capable of handling diverse applications. This research work illustrates the design of a wireless broadcast protocol that is context-aware and adaptive to vehicular environments taking into consideration vehicle density, road topology, and type of data to be disseminated. The context-aware hybrid data dissemination scheme combines store-and-forward and multi-hop broadcasts, capitalizing on the strengths of both these categories and mitigates the weaknesses to deliver data with maximum efficiency to a widest possible reach. This protocol is designed to work in both urban and highway mobility models. The behavior and performance of the hybrid data dissemination scheme is studied by varying the broadcast zone radius, aggregation ratio, data message size and frequency of the broadcast messages. Optimal parameters are determined and the protocol is then formulated to become adaptive to node density by keeping the field size constant and increasing the number of nodes. Adding message priority levels to propagate safety messages faster and farther than non-safety related messages is the next context we add to our adaptive protocol. We dynamically set the broadcast region to use multi-hop which has lower latency to propagate safety-related messages. Extensive simulation results have been obtained using realistic vehicular network scenarios. Results show that Context-Aware Hybrid Data Dissemination Protocol benefits from the low latency characteristics of multi-hop broadcast and low bandwidth consumption of store-and-forward. The protocol is adaptive to both urban and highway mobility models.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004152, http://purl.flvc.org/fau/fd/FA00004152
- Subject Headings
- Context aware computing, Convergence (Telecommunication), Intelligent transportation systems, Internetworking (Telecommunication), Routing (Computer network management), Routing protocols (Computer network protocols), Vehicular ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- Enhanced ticket-based QoS routing protocols in ad hoc networks.
- Creator
- Huang, Chun-Jung, Florida Atlantic University, Wu, Jie
- Abstract/Description
-
This thesis describes QoS routing techniques in ad hoc networks. QoS routing is to find paths between given source and destinations that fulfill a set of QoS requirements. QoS routing in ad hoc networks is a challenging problem due to the dynamical nature of ad hoc networks and the complexity of the QoS routing problem. Ticket-based probing scheme (TBP) is a creative approach to solve QoS routing problem, however, its proactive nature makes it deficient and unscalable. In this thesis, we...
Show moreThis thesis describes QoS routing techniques in ad hoc networks. QoS routing is to find paths between given source and destinations that fulfill a set of QoS requirements. QoS routing in ad hoc networks is a challenging problem due to the dynamical nature of ad hoc networks and the complexity of the QoS routing problem. Ticket-based probing scheme (TBP) is a creative approach to solve QoS routing problem, however, its proactive nature makes it deficient and unscalable. In this thesis, we first present the adaptive ticket-based routing protocol (ATBR), a proactive protocol enhanced from TBP, by introducing a new imprecise QoS state model. We then present the location-aided, ticket-based routing protocol (LTBR), an integration of locate-based routing and ticket-based routing, where tickets are dynamically generated and guided by location and QoS metric. Our simulations show that, in networks under any density, LTBR achieves close performances to flooding with considerably lower routing overhead.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13060, http://purl.flvc.org/fau/fd/FADT13060
- Subject Headings
- Computer network protocols, Mobile computing, Wireless communication systems, Routers (Computer networks)
- Format
- Document (PDF)
- Title
- Properties of Static and Mobile Unreliable Networks and their effects on Combating Malicious Objects.
- Creator
- Ruocco, John, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks or WSNs continually become more common in todays world. They are able to give us a constant view into the world as they gather information and make this information more readily available. The infonnation these networks gather and contain is valuable and protecting it is of great importance. Today more and more devices are becoming wireless and mobile. This is allowing for very diverse networks to be created and they are constantly changing. Nodes in these networks...
Show moreWireless sensor networks or WSNs continually become more common in todays world. They are able to give us a constant view into the world as they gather information and make this information more readily available. The infonnation these networks gather and contain is valuable and protecting it is of great importance. Today more and more devices are becoming wireless and mobile. This is allowing for very diverse networks to be created and they are constantly changing. Nodes in these networks are either moving to different positions or going offi ine which constantly changes the overall layout of the network. With this increasing connectivity of today's devices this opens the door for possibility for these types of networks to become targets by malicious objects designed to bring harm to the network. Many unre liable networks already face many problems such as having to optimize battety life and being deployed in areas where they can be damaged. A malicious object in this type of network has the power to destroy data and deplete the networks limited resources such as bandwidth and power. Removal of these malicious objects can also have a negative effect on these limited resources. We must find a way to remove these malicious objects in a way that minimizes loss to the network. In this paper we will look at the information survival threshold of these types of networks. Certain controllable parameters exist that directly impact the survival rate of all data in the network. We will combine this with the addition our own self-replicating objects to the network designed to neutralize their malicious counterparts. We will examine these information survival threshold parameters along with specific parameters available to the network. We shall see how these parameters affect overall survival of data in the network and their impact on our own good data.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012545
- Subject Headings
- Wireless communication systems--Security measures, Computer network protocols, Computer security, Computer networks--Security measures
- Format
- Document (PDF)