Current Search: Computer networks -- Management (x)
View All Items
- Title
- Integration of dissimilar network management systems.
- Creator
- Frost, Sandra Lynn., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
The purpose of this thesis is to examine the issues involved in centralizing network control of two dissimilar network management systems, through the use of a protocol translator. In particular, we consider communication between a Programmable Communications Processor (PCP) and an Access Communications Processor (ACP) for the purposes of control, configuration, software updating and backup. The integration should maintain backwards compatibility to both systems, as well as providing value...
Show moreThe purpose of this thesis is to examine the issues involved in centralizing network control of two dissimilar network management systems, through the use of a protocol translator. In particular, we consider communication between a Programmable Communications Processor (PCP) and an Access Communications Processor (ACP) for the purposes of control, configuration, software updating and backup. The integration should maintain backwards compatibility to both systems, as well as providing value-added functionality. Issues to be examined include protocol translator design criteria, an implementation strategy for a state/event driven handler and performance testing.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14619
- Subject Headings
- Computer network protocols, Computer networks--Management
- Format
- Document (PDF)
- Title
- Technoeconomic aspects of next-generation telecommunications including the Internet service.
- Creator
- Tourinho Sardenberg, Renata Cristina., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research is concerned with the technoeconomic aspects of modern and next-generation telecommunications including the Internet service. The goal of this study thereof is tailored to address the following: (i) Reviewing the technoeconomic considerations prevailing in telecommunication (telco) systems and their implicating futures; (ii) studying relevant considerations by depicting the modern/next-generation telecommunications as a digital ecosystem viewed in terms of underlying complex...
Show moreThis research is concerned with the technoeconomic aspects of modern and next-generation telecommunications including the Internet service. The goal of this study thereof is tailored to address the following: (i) Reviewing the technoeconomic considerations prevailing in telecommunication (telco) systems and their implicating futures; (ii) studying relevant considerations by depicting the modern/next-generation telecommunications as a digital ecosystem viewed in terms of underlying complex system evolution (akin to biological systems); (iii) pursuant to the digital ecosystem concept, co-evolution modeling of competitive business structures in the technoeconomics of telco services using dichotomous (flip-flop) states as seen in prey-predator evolution; (iv) specific to Internet pricing economics, deducing the profile of consumer surplus versus pricing model under DiffServ QoS architecture pertinent to dynamic- , smart- and static-markets; (v) developing and exemplifying decision-making pursuits in telco business under non-competitive and competitive markets (via gametheoretic approach); (vi) and modeling forecasting issues in telco services addressed in terms of a simplified ARIMA-based time-series approach, (which includes seasonal and non-seasonal data plus goodness-fit estimations in time- and frequency-domains). Commensurate with the topics indicated above, necessary analytical derivations/models are proposed and computational exercises are performed (with MatLabTM R2006b and other software as needed). Extensive data gathered from open literature are used thereof and, ad hoc model verifications are performed. Lastly, results are discussed, inferences are made and open-questions for further research are identified.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1930492
- Subject Headings
- Computer networks, Management, Telecommunication, Traffic, Management, Intranets (Computer networks), Evaluation, Network performance (Telecommunication), High performance computing, Engineering economy
- Format
- Document (PDF)
- Title
- Active networking and innovation: An evaluation of active networking as a driver of accelerated Internet innovation.
- Creator
- Wood, James L., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Innovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by...
Show moreInnovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by modularization. This argument is valid to the extent that the router market is similar to the computer market; however, contemporary innovation theories cast doubt on this likelihood. These theories indicate that for active networking technology to accelerate Internet innovation, extraordinary measures will be required to break the status quo. This paper analyzes this situation and makes recommendations, based on innovation theory, on how active networking can be successful in accelerating Internet innovation.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13161
- Subject Headings
- Computer industry--Technological innovations, Computer networks--Management, Computer networks--Software, Routers (Computer networks), Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Modeling and analysis of security.
- Creator
- Ajaj, Ola, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Cloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security...
Show moreCloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security standards for Cloud Computing and web services, we have surveyed Cloud standards focusing more on the standards for security, and we classified them by groups of interests. Cloud Computing leverages a number of technologies such as: Web 2.0, virtualization, and Service Oriented Architecture (SOA). SOA uses web services to facilitate the creation of SOA systems by adopting different technologies despite their differences in formats and protocols. Several committees such as W3C and OASIS are developing standards for web services; their standards are rather complex and verbose. We have expressed web services security standards as patterns to make it easy for designers and users to understand their key points. We have written two patterns for two web services standards; WS-Secure Conversation, and WS-Federation. This completed an earlier work we have done on web services standards. We showed relationships between web services security standards and used them to solve major Cloud security issues, such as, authorization and access control, trust, and identity management. Close to web services, we investigated Business Process Execution Language (BPEL), and we addressed security considerations in BPEL and how to enforce them. To see how Cloud vendors look at web services standards, we took Amazon Web Services (AWS) as a case-study. By reviewing AWS documentations, web services security standards are barely mentioned. We highlighted some areas where web services security standards could solve some AWS limitations, and improve AWS security process. Finally, we studied the security guidance of two major Cloud-developing organizations, CSA and NIST. Both missed the quality of attributes offered by web services security standards. We expanded their work and added benefits of adopting web services security standards in securing the Cloud.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004001
- Subject Headings
- Cloud Computing, Computational grids (Computer systems), Computer network architectures, Expert systems (Computer science), Web services -- Management
- Format
- Document (PDF)
- Title
- Context-aware hybrid data dissemination in vehicular networks.
- Creator
- Rathod, Monika M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not...
Show moreThis work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not limited to traffic and routing, weather, construction and road hazard alerts, as well as advertisement and entertainment. The core of V2V communication relies on the efficient dispersion of relevant data through wireless broadcast protocols for these varied applications. The challenges of vehicular networks demand an adaptive broadcast protocol capable of handling diverse applications. This research work illustrates the design of a wireless broadcast protocol that is context-aware and adaptive to vehicular environments taking into consideration vehicle density, road topology, and type of data to be disseminated. The context-aware hybrid data dissemination scheme combines store-and-forward and multi-hop broadcasts, capitalizing on the strengths of both these categories and mitigates the weaknesses to deliver data with maximum efficiency to a widest possible reach. This protocol is designed to work in both urban and highway mobility models. The behavior and performance of the hybrid data dissemination scheme is studied by varying the broadcast zone radius, aggregation ratio, data message size and frequency of the broadcast messages. Optimal parameters are determined and the protocol is then formulated to become adaptive to node density by keeping the field size constant and increasing the number of nodes. Adding message priority levels to propagate safety messages faster and farther than non-safety related messages is the next context we add to our adaptive protocol. We dynamically set the broadcast region to use multi-hop which has lower latency to propagate safety-related messages. Extensive simulation results have been obtained using realistic vehicular network scenarios. Results show that Context-Aware Hybrid Data Dissemination Protocol benefits from the low latency characteristics of multi-hop broadcast and low bandwidth consumption of store-and-forward. The protocol is adaptive to both urban and highway mobility models.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004152, http://purl.flvc.org/fau/fd/FA00004152
- Subject Headings
- Context aware computing, Convergence (Telecommunication), Intelligent transportation systems, Internetworking (Telecommunication), Routing (Computer network management), Routing protocols (Computer network protocols), Vehicular ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- An efficient and scalable core allocation strategy for multicore systems.
- Creator
- Rani, Manira S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better...
Show moreMultiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better heat dissipation. We introduce a multi-stage power management scheme to reduce the total power consumption by managing the power states of the cores. We simulate three multicore systems, with 16, 32, and 64 cores, respectively, using synthetic workload. Experimental results show that our proposed strategy performs better than Square-shaped, Rectangle-shaped, L-Shaped, and Hybrid (contiguous and non-contiguous) schemes in multicore systems in terms of fragmentation and completion time. Among these strategies, our strategy provides a better heat dissipation mechanism.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172698
- Subject Headings
- Modularity (Engineering), Multicasting (Computer networks), Convergence (Telecommunication), Computer architecture, Memory management (Computer science), Cache memory
- Format
- Document (PDF)
- Title
- YACAD: Yet Another Congestion Avoidance Design for ATM-based networks.
- Creator
- Hsu, Sam, Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation proposes YACAD (Yet Another Congestion Avoidance Design for ATM-based Networks), a congestion prevention model that includes admission control, traffic shaping, and link-by-link flow control for ATM-based networks. Network traffic in this model is composed of real-time traffic and data traffic. As real-time traffic is delay-sensitive and connection-oriented, its call acceptance is based upon the effective bandwidth at all nodes. Effective bandwidth is defined as a vector of...
Show moreThis dissertation proposes YACAD (Yet Another Congestion Avoidance Design for ATM-based Networks), a congestion prevention model that includes admission control, traffic shaping, and link-by-link flow control for ATM-based networks. Network traffic in this model is composed of real-time traffic and data traffic. As real-time traffic is delay-sensitive and connection-oriented, its call acceptance is based upon the effective bandwidth at all nodes. Effective bandwidth is defined as a vector of bandwidth and maximum node delay. As data traffic can be either connection-oriented or connectionless, it is subject to link-by-link flow control based on a criterion known as effective buffer which is defined as a scalar of buffer size. Data traffic is not delay-sensitive but is loss-sensitive. Traffic shaping is imposed on real-time traffic to ensure a smooth inflow of real-time cells. YACAD also allocates a large buffer (fat bucket) to data traffic to accommodate sudden long bursts of data cells. Absence of data cell loss is a major feature of YACAD. Two simulation studies on the performance of the model are conducted. Analyses of the simulation results show that the proposed congestion avoidance model can achieve congestion-free networking and bounded network delays for real-time traffic at high levels of channel utilization. The maximum buffer requirements for loss-free cell delivery for data traffic, and the cell loss probabilities for real-time traffic are also obtained. In addition, results of performance comparisons to other similar models have shown that YACAD outperforms several other leaky-bucket based congestion control methods in terms of cell loss probability for real-time traffic. The simulation source program has also been verified using existing queueing theories, and the Paired-t Confidence Interval method with satisfactory results at 99% confidence level.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/12336
- Subject Headings
- Integrated services digital networks, Broadband communications systems, Packet switching (Data transmission), Computer networks--Management
- Format
- Document (PDF)
- Title
- A unified end-to-end priority strategy for traffic control in an ATM-based broadband ISDN.
- Creator
- Bemmel, Vincent Egbert., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In order to guarantee a committed Quality of Service (QoS) to the users of a Broadband Integrated Services Digital Network (B-ISDN), preventive congestion control becomes critical, and is implemented through Call Acceptance Control (CAC) and Usage Parameter Control (UPC) functions. Currently, Asynchronous Transfer Mode (ATM) cells are equipped with a 1-bit Cell Loss Priority (CLP) field, which can be used for service-oriented and/or UPC marking. This creates a conflict, since these two...
Show moreIn order to guarantee a committed Quality of Service (QoS) to the users of a Broadband Integrated Services Digital Network (B-ISDN), preventive congestion control becomes critical, and is implemented through Call Acceptance Control (CAC) and Usage Parameter Control (UPC) functions. Currently, Asynchronous Transfer Mode (ATM) cells are equipped with a 1-bit Cell Loss Priority (CLP) field, which can be used for service-oriented and/or UPC marking. This creates a conflict, since these two marking approaches may have contradicting objectives, and are designed to operate independently. Moreover, by admitting excessive cells as marked traffic, this group is allowed to grow uncontrollably, thereby jeopardizing the QoS committed to other marked cells. This dissertation presents a solution to these problems by proposing a new 4-class priority strategy that unifies the two marking approaches, and is based on a 2-bit CLP field. The impacts of the new priority scheme are triple-fold: (I) For the UPC, a new scheme, the Forgiving Leaky Bucket (FLB), not only carries priorities through subnetwork boundaries, but also has the power of unmarking, i.e. forgiving, previously marked cells, depending on the bandwidth availability in the entering subnetwork. Forgiving will correct access-point bias, a phenomenon observed in internetworked ATM subnetworks of different congestion conditions. (II) At ATM switching nodes, a new space priority scheme is based on a hybrid of the Nested Threshold, and Push-Out cell discarding methods. This scheme is designed for the 4-class priority strategy, and improves the quality of the low priority traffic. (III) In interfacing High Speed Local Area Networks and Metropolitan Area Networks, idle bandwidth due to STM multiplexing is utilized to carry marked excessive cells of connection-oriented variable bit rate traffic, in addition to the service-oriented marking performed at transmitting stations. The resulting stream is then carried through internetworking points, subject to FLB adjustments. As a result, the STM and ATM subnetworks will support a uniform end-to-end priority strategy, essential for a B-ISDN. The proposed impacts are analyzed and compared with conventional implementations, and future directions are indicated.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/12334
- Subject Headings
- Integrated services digital networks, Broadband communication systems, Computer networks--Management, Packet switching (Data transmission)
- Format
- Document (PDF)
- Title
- Progress towards push button verification for business process execution language artifacts.
- Creator
- Vargas, Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic...
Show moreWeb Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369386
- Subject Headings
- Electronic commerce, Computer programs, Computer network architectures, Expert systems (Computer science), Web servers, Management, Computer systems, Verification
- Format
- Document (PDF)
- Title
- Reliable Vehicle-to-Vehicle Weighted Localization in Vehicular Networks.
- Creator
- Altoaimy, Lina, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad Hoc Network (VANET) supports wireless communication among vehicles using vehicle-to-vehicle (V2V) communication and between vehicles and infrastructure using vehicle-to-infrastructure (V2I) communication. This communication can be utilized to allow the distribution of safety and non-safety messages in the network. VANET supports a wide range of applications which rely on the messages exchanged within the network. Such applications will enhance the drivers' consciousness and...
Show moreVehicular Ad Hoc Network (VANET) supports wireless communication among vehicles using vehicle-to-vehicle (V2V) communication and between vehicles and infrastructure using vehicle-to-infrastructure (V2I) communication. This communication can be utilized to allow the distribution of safety and non-safety messages in the network. VANET supports a wide range of applications which rely on the messages exchanged within the network. Such applications will enhance the drivers' consciousness and improve their driving experience. However, the efficiency of these applications depends on the availability of vehicles real-time location information. A number of methods have been proposed to fulfill this requirement. However, designing a V2V-based localization method is challenged by the high mobility and dynamic topology of VANET and the interference noise due to objects and buildings. Currently, vehicle localization is based on GPS technology, which is not always reliable. Therefore, utilizing V2V communication in VANET can enhance the GPS positioning. With V2V-based localization, vehicles can determine their locations by exchanging mobility data among neighboring vehicles. In this research work, we address the above challenges and design a realistic V2V-based localization method that extends the centroid localization (CL) by assigning a weight value to each neighboring vehicle. This weight value is obtained using a weighting function that utilizes the following factors: 1) link quality distance between the neighboring vehicles 2) heading information and 3) map information. We also use fuzzy logic to model neighboring vehicles' weight values. Due to the sensitivity and importance of the exchanged information, it is very critical to ensure its integrity and reliability. Therefore, in this work, we present the design and the integration of a mobility data verification component into the proposed localization method, so that only verified data from trusted neighboring vehicles are considered. We also use subjective logic to design a trust management system to evaluate the trustworthiness of neighboring vehicles based on the formulated subjective opinions. Extensive experimental work is conducted using simulation programs to evaluate the performance of the proposed methods. The results show improvement on the location accuracy for varying vehicle densities and transmission ranges as well as in the presence of malicious/untrusted neighboring vehicles.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004564, http://purl.flvc.org/fau/fd/FA00004564
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Mathematical models., Computer communication systems., Wireless communication systems., Routing (Computer network management), Intelligent transportation systems., Intelligent control systems.
- Format
- Document (PDF)
- Title
- A pattern-driven process for secure service-oriented applications.
- Creator
- Delessy, Nelly A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
During the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies...
Show moreDuring the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies the MDA approach to the design of service-oriented applications but also because it allows their securing by dynamically applying security patterns throughout the whole process. Security patterns capture security knowledge and describe security mechanisms. In our process, we present a structured map of security patterns for SOA and web services and its corresponding catalog. At the different steps of a software lifecycle, the architect or designer needs to make some security decisions., An approach using a decision tree made of security pattern nodes is proposed to help making these choices. We show how to extract a decision tree from our map of security patterns. Model-Driven Architecture (MDA) is an approach which promotes the systematic use of models during a system's development lifecycle. In the dissertation we describe a chain of transformations necessary to obtain secure models of the service-oriented application. A main benefit of this process is that it decouples the application domain expertise from the security expertise that are both needed to build a secure application. Security knowledge is captured by pre-defined security patterns, their selection is rendered easier by using the decision trees and their application can be automated. A consequence is that the inclusion of security during the software development process becomes more convenient for the architects/designers., A second benefit is that the insertion of security is semi-automated and traceable. Thus, the process is flexible and can easily adapt to changing requirements. Given that SOA was developed in order to provide enterprises with modular, reusable and adaptable architectures, but that security was the principal factor that hindered its use, we believe that our process can act as an enabler for service-oriented applications.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/58003
- Subject Headings
- Computer network architectures, Web servers, Management, Software engineering, Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- A Comparison of Model Checking Tools for Service Oriented Architectures.
- Creator
- Venkat, Raghava, Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recently most of the research pertaining to Service-Oriented Architecture (SOA) is based on web services and how secure they are in terms of efficiency and effectiveness. This requires validation, verification, and evaluation of web services. Verification and validation should be collaborative when web services from different vendors are integrated together to carry out a coherent task. For this purpose, novel model checking technologies have been devised and applied to web services. "Model...
Show moreRecently most of the research pertaining to Service-Oriented Architecture (SOA) is based on web services and how secure they are in terms of efficiency and effectiveness. This requires validation, verification, and evaluation of web services. Verification and validation should be collaborative when web services from different vendors are integrated together to carry out a coherent task. For this purpose, novel model checking technologies have been devised and applied to web services. "Model Checking" is a promising technique for verification and validation of software systems. WS-BPEL (Business Process Execution Language for Web Services) is an emerging standard language to describe web service composition behavior. The advanced features of BPEL such as concurrency and hierarchy make it challenging to verify BPEL models. Based on all such factors my thesis surveys a few important technologies (tools) for model checking and comparing each of them based on their "functional" and "non-functional" properties. The comparison is based on three case studies (first being the small case, second medium and the third one a large case) where we construct synthetic web service compositions for each case (as there are not many publicly available compositions [1]). The first case study is "Enhanced LoanApproval Process" and is considered a small case. The second is "Enhanced Purchase Order Process" which is of medium size and the third, and largest is based on a scientific workflow pattern, called the "Service Oriented Architecture Implementing BOINC Workflow" based on BOINC (Berkeley Open Infrastructure Network Computing) architecture.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012565
- Subject Headings
- Computer network architectures, Expert systems (Computer science), Software engineering, Web servers--Management
- Format
- Document (PDF)
- Title
- Patterns for web services standards.
- Creator
- Ajaj, Ola, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to...
Show moreWeb services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927300
- Subject Headings
- Computational grids (Computer systems), Computer systems, Verification, Expert systems (Computer science), Computer network architectures, Web servers, Management, Electronic commerce, Computer programs
- Format
- Document (PDF)
- Title
- Analysis of quality of service (QoS) in WiMAX networks.
- Creator
- Talwalkar, Rohit., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In last few years there has been significant growth in the area of wireless communication. Quality of Service (QoS) has become an important consideration for supporting variety of applications that utilize the network resources. These applications include voice over IP, multimedia services, like, video streaming, video conferencing etc. IEEE 802.16/WiMAX is a new network which is designed with quality of service in mind. This thesis focuses on analysis of quality of service as implemented by...
Show moreIn last few years there has been significant growth in the area of wireless communication. Quality of Service (QoS) has become an important consideration for supporting variety of applications that utilize the network resources. These applications include voice over IP, multimedia services, like, video streaming, video conferencing etc. IEEE 802.16/WiMAX is a new network which is designed with quality of service in mind. This thesis focuses on analysis of quality of service as implemented by the WiMAX networks. First, it presents the details of the quality of service architecture in WiMAX network. In the analysis, a WiMAX module developed based on popular network simulator ns-2, is used. Various real life scenarios like voice call, video streaming are setup in the simulation environment. Parameters that indicate quality of service, such as, throughput, packet loss, average jitter and average delay, are analyzed for different types of service flows as defined in WiMAX. Results indicate that better quality of service is achieved by using service flows designed for specific applications.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fcla/flaent/EN00154040/68_2/98p0143h.pdf, http://purl.flvc.org/FAU/58012
- Subject Headings
- Wireless communication systems, Broadband communication systems, Wireless LANs, Design and construction, Computer networks, Management, Quality control
- Format
- Document (PDF)
- Title
- A class-based search system in unstructured peer-to-peer networks.
- Creator
- Huang, Juncheng., Florida Atlantic University, Wu, Jie
- Abstract/Description
-
Efficient searching is one of the important design issues in peer-to-peer (P2P) networks. Among various searching techniques, semantic-based searching has drawn significant attention recently. Gnutella-like efficient searching system (GES) [29] is such a system. GES derives node vector , a semantic summary of all documents on a node based on vector space model (VSM). The node-based topology adaptation algorithm and search protocol are then discussed. However, when there are many categories of...
Show moreEfficient searching is one of the important design issues in peer-to-peer (P2P) networks. Among various searching techniques, semantic-based searching has drawn significant attention recently. Gnutella-like efficient searching system (GES) [29] is such a system. GES derives node vector , a semantic summary of all documents on a node based on vector space model (VSM). The node-based topology adaptation algorithm and search protocol are then discussed. However, when there are many categories of documents at each node, the node vector representation may be inaccurate. We extend the idea of GES and present a class-based search system (CSS). It makes use of a document clustering algorithm: OSKM [27] to cluster all documents on a node into several classes. Each class can be viewed as a virtual node. As a result, class vector replaces node vector and plays an important role in class-based topology adaptation and search process, which makes CSS very efficient. Our simulation demonstrates that CSS outperforms GES.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13367
- Subject Headings
- Peer-to-peer architecture (Computer networks), Management information systems, Computer security, Cascading style sheets, Web sites--Design
- Format
- Document (PDF)
- Title
- Exploring teachers' perceptions of professional development in virtual learning teams.
- Creator
- Purnell, Courtney Paschal., College of Education, Department of Educational Leadership and Research Methodology
- Abstract/Description
-
The demand for virtual education is rapidly increasing due to the proliferation of legislation demanding class size limitations, funding cuts, and school choice across the United States. Virtual education leaders are discovering new ways to enhance and develop teachers to become more efficient and increase quality of learning online. Learning teams are one tool implemented by professional development departments in order to obtain a community of shared best practices and increase professional...
Show moreThe demand for virtual education is rapidly increasing due to the proliferation of legislation demanding class size limitations, funding cuts, and school choice across the United States. Virtual education leaders are discovering new ways to enhance and develop teachers to become more efficient and increase quality of learning online. Learning teams are one tool implemented by professional development departments in order to obtain a community of shared best practices and increase professional learning for teachers. ... The purpose of this exploratory case study was to investigate teachers' perceptions of the contribution of virtual learning teams to their professional development in a completely online K-12 environment. ... Five major themes emerged from the interviews, which were teacher professional development as it relates to student success, collaboration, balance, knowledge gained from being part of a virtual learning team, and teachers' perception of student success.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3358964
- Subject Headings
- Education, Effect of technological innovations on, Educational leadership, School management and organization, Teams in the workplace, Group work in education, Professional learning communities, Mentoring in education, Computer networks
- Format
- Document (PDF)
- Title
- Big 4 global networks: degree of homogeneity of audit quality among affiliates and relevance of PCAOB inspections.
- Creator
- Kassawat, Paulina M., Higgs, Julia, Florida Atlantic University, College of Business, School of Accounting
- Abstract/Description
-
The Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S....
Show moreThe Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S. offices, hereafter). The recent suspension of the China-based Big 4 affiliates from auditing U.S.-listed companies calls into question whether these global networks can deliver the same level of audit quality across all their members and whether those located in jurisdictions denying access to the Public Company Accounting Oversight Board (PCAOB or Board, hereafter) to conduct inspections may benefit from such inspections. This study examines the effect of being an affiliate and the effect of PCAOB inspections on perceived audit quality. I use earnings response coefficients (ERCs) as a proxy for perceived audit quality.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004385, http://purl.flvc.org/fau/fd/FA00004385
- Subject Headings
- Auditing standards -- United States, Business enterprises -- Computer networks, Corporate governance, Disclosure in accounting -- United States, Financial services industry -- Management, Government accountability, Intternational standard on auditing, Public Company Accounting Oversight Board
- Format
- Document (PDF)