Current Search: Internetworking Telecommunication (x)
View All Items
- Title
- A simulation study of mobile computing protocols.
- Creator
- Ahson, Syed Alamdar., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
With the advent of cellular technology and portable computers we are on the verge of a new computing paradigm. This computing paradigm is now widely known as "mobile" or "nomadic" computing. Mobile systems frequently change their point of attachment to the network. Mobile computing systems also need to communicate with the existing pool of information and file servers. Mobility defies the very principles that the TCP/IP protocol suite is based on. We study the Internet Engineering Task Force ...
Show moreWith the advent of cellular technology and portable computers we are on the verge of a new computing paradigm. This computing paradigm is now widely known as "mobile" or "nomadic" computing. Mobile systems frequently change their point of attachment to the network. Mobile computing systems also need to communicate with the existing pool of information and file servers. Mobility defies the very principles that the TCP/IP protocol suite is based on. We study the Internet Engineering Task Force (IETF) Mobile IPv4 protocol and find it to be a highly scale solution. We study some of the other proposed mobile IP solutions. We establish a criterion, call-to-mobility ratio, to compare various mobile IP schemes. Two hypothetical schemes, Static Update and Triangular Routing, are introduced solely for the purpose of comparing the performance of Mobile IPv4. In our simulation we concentrate on calculating the update costs and the routing costs for Triangular Routing, Static update and Mobile IPv4 schemes. The simulation program to simulate Triangular Routing, Static Update and Mobile IPv4 is written in C++. Minetsim, our simulation program is written using object-oriented analysis and design. Minetsim is used to obtain routing and update costs for Triangular Routing, Static Update and Mobile IPv4 schemes. Four different host configurations are simulated for travelling salesman and random motion mobility models.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15567
- Subject Headings
- Mobile computing, Portable computers, Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Multimedia systems: an overview.
- Creator
- Furht, Borko
- Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/358140
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations., Internetworking (Telecommunication) --Computer programs.
- Format
- Document (PDF)
- Title
- Distributed management of heterogeneous networks using hypermedia data repositories.
- Creator
- Anderson, James M., Florida Atlantic University, Ilyas, Mohammad, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Current management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the...
Show moreCurrent management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the Network Management Server (NMS), the Network Element Web Server (NEWS), and the Operator's Logic and Processing Platform (OLAPP). The NMS stores the management functions used by both the NEWS and the user. The NEWS is a Web server which collects and processes network element data in order to support management functions. The OLAPP executes the management functions and interfaces with the user.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/12502
- Subject Headings
- Computer network architectures, Internetworking (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- Evaluation of usage scenarios in Mobile People Architecture.
- Creator
- Shang, Hongtao., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the explosive growth of the Internet and other types of networks, such as cell phones and pager networks, more and more people expect to communicate with each other personally anywhere and at anytime. This thesis studies a new architecture Mobile People Architecture (MPA) proposed by MosquitoNet research group at Stanford University, which is designed to put people, rather than the devices that people use, at the endpoints of communication session. Three usage scenarios in MPA are...
Show moreWith the explosive growth of the Internet and other types of networks, such as cell phones and pager networks, more and more people expect to communicate with each other personally anywhere and at anytime. This thesis studies a new architecture Mobile People Architecture (MPA) proposed by MosquitoNet research group at Stanford University, which is designed to put people, rather than the devices that people use, at the endpoints of communication session. Three usage scenarios in MPA are simulated using SES/Workbench. The Response Time and the Update Cost are used to evaluate the performance of above scenarios. The advantages and disadvantages of different scenarios are also analyzed and discussed in this thesis.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15742
- Subject Headings
- TCP/IP (Computer network protocol), Mobile computing, Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Processor architectures for multimedia: A survey.
- Creator
- Furht, Borko
- Date Issued
- 1997-11-17 - 1997-11-20
- PURL
- http://purl.flvc.org/fcla/dt/345865
- Subject Headings
- Microprocessors --Design and construction., Streaming technology (Telecommunications), Broadband communication systems., Internetworking (Telecommunication), Multimedia systems.
- Format
- Document (PDF)
- Title
- Interactive progressive encoding system for transmission of complex images.
- Creator
- Furht, Borko, Wang, Yingli, Celli, Joseph
- Date Issued
- 1998-11
- PURL
- http://purl.flvc.org/fcla/dt/351011
- Subject Headings
- Internetworking (Telecommunication), Digital video., Image transmission., JPEG (Image coding standard), Data compression (Telecommunication) --Standards., Image compression --Standards.
- Format
- Document (PDF)
- Title
- Efficient and Effective Searching m Unstructured FileSharing Peer-to-Peer Networks.
- Creator
- Li, Xiuqi, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Peer-to-peer (P2P) networking has been receiving increasing attention from the research community recently. How to conduct efficient and effective searching in such networks has been a challenging research topic. This dissertation focuses on unstructured file-sharing peer-to-peer networks. Three novel searching schemes are proposed, implemented, and evaluated. In the first scheme named ISRL (Intelligent Search by Reinforcement Learning), we propose to systematically learn the best route to...
Show morePeer-to-peer (P2P) networking has been receiving increasing attention from the research community recently. How to conduct efficient and effective searching in such networks has been a challenging research topic. This dissertation focuses on unstructured file-sharing peer-to-peer networks. Three novel searching schemes are proposed, implemented, and evaluated. In the first scheme named ISRL (Intelligent Search by Reinforcement Learning), we propose to systematically learn the best route to desired files through reinforcement learning when topology adaptation is impossible or infeasible. To discover the best path to desired files, ISRL not only explores new paths by forwarding queries to randomly chosen neighbors, but also exploits the paths that have been discovered for reducing the cumulative query cost. Three models of ISRL are put forwarded: a basic version for finding one desired file, MP-ISRL (MP stands for Multiple-Path ISRL) for finding at least k files, and C-ISRL (C refers to Clustering) for reducing maintenance overhead through clustering when there are many queries. ISRL outperforms existing searching approaches in unstructured peer-to-peer networks by achieving similar query quality with lower cumulative query cost. The experimental results confirm the performance improvement of ISRL. The second approach, HS-SDBF (Hint-based Searching by Scope Decay Bloom Filter), addresses the issue of effective and efficient hint propagation. We design a new data structure called SDBF (Scope Decay Bloom Filter) to represent and advertise probabilistic hints. Compared to existing proactive schemes, HSSDBF can answer many more queries successfully at a lower amortized cost considering both the query traffic and hint propagation traffic. Both the analytic and the experimental results support the performance improvement of our protocol. The third algorithm, hybrid search, seeks to combine the benefits of both forwarding and non-forwarding searching schemes. In this approach, a querying source directly probes its own extended neighbors and forwards a query to a subset of its extended neighbors and guides these neighbors to probe their own extended neighbors on its behalf. The hybrid search is able to adapt query execution to the popularity of desired files without generating too much state maintenance overhead because of the 1-hop forwarding inherent in the approach. It achieves a higher query efficiency than the forwarding scheme and a better success rate than the non-forwarding approach. To the best of our knowledge, this work is the first attempt to integrate forwarding and non-forwarding schemes. Simulation results demonstrate the effectiveness of the hybrid search.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012572
- Subject Headings
- Peer-to-peer architecture (Computer networks), Computer security, Database searching, Internetworking (Telecommunication), Heterogeneous computing
- Format
- Document (PDF)
- Title
- Context-aware hybrid data dissemination in vehicular networks.
- Creator
- Rathod, Monika M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not...
Show moreThis work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not limited to traffic and routing, weather, construction and road hazard alerts, as well as advertisement and entertainment. The core of V2V communication relies on the efficient dispersion of relevant data through wireless broadcast protocols for these varied applications. The challenges of vehicular networks demand an adaptive broadcast protocol capable of handling diverse applications. This research work illustrates the design of a wireless broadcast protocol that is context-aware and adaptive to vehicular environments taking into consideration vehicle density, road topology, and type of data to be disseminated. The context-aware hybrid data dissemination scheme combines store-and-forward and multi-hop broadcasts, capitalizing on the strengths of both these categories and mitigates the weaknesses to deliver data with maximum efficiency to a widest possible reach. This protocol is designed to work in both urban and highway mobility models. The behavior and performance of the hybrid data dissemination scheme is studied by varying the broadcast zone radius, aggregation ratio, data message size and frequency of the broadcast messages. Optimal parameters are determined and the protocol is then formulated to become adaptive to node density by keeping the field size constant and increasing the number of nodes. Adding message priority levels to propagate safety messages faster and farther than non-safety related messages is the next context we add to our adaptive protocol. We dynamically set the broadcast region to use multi-hop which has lower latency to propagate safety-related messages. Extensive simulation results have been obtained using realistic vehicular network scenarios. Results show that Context-Aware Hybrid Data Dissemination Protocol benefits from the low latency characteristics of multi-hop broadcast and low bandwidth consumption of store-and-forward. The protocol is adaptive to both urban and highway mobility models.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004152, http://purl.flvc.org/fau/fd/FA00004152
- Subject Headings
- Context aware computing, Convergence (Telecommunication), Intelligent transportation systems, Internetworking (Telecommunication), Routing (Computer network management), Routing protocols (Computer network protocols), Vehicular ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- Physical Layer Security of Wireless Transmissions Over Fading Channels.
- Creator
- Blanc, Sadrac, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the...
Show moreThe open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the presence of an eavesdropper. We investigate the performance of the wireless network at the physical layer that is subject to a variety of fading environments that may be modeled by the Rayleigh, Nakagami-m, and Generalized-K distributions, to mention a few. We use the secrecy outage probability (SOP) as the standard performance metrics to study the performance of the wireless networks. We propose two different approaches to compute the secrecy outage probability, and derive explicit expressions for the secrecy outage probability that allow us to characterize the performance of the wireless networks. Specifically, we use a direct integration approach as well as a Taylor series base approach to evaluate the secrecy outage probability. Finally, we use computer simulations, based on MATLAB, to confirm the analytical results.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004729, http://purl.flvc.org/fau/fd/FA00004729
- Subject Headings
- Data encryption (Computer science), Digital communications -- Reliability -- Mathematics, Internetworking (Telecommunication), Radio wave propagation, Wireless communication systems -- Security measures
- Format
- Document (PDF)
- Title
- Active networking and innovation: An evaluation of active networking as a driver of accelerated Internet innovation.
- Creator
- Wood, James L., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Innovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by...
Show moreInnovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by modularization. This argument is valid to the extent that the router market is similar to the computer market; however, contemporary innovation theories cast doubt on this likelihood. These theories indicate that for active networking technology to accelerate Internet innovation, extraordinary measures will be required to break the status quo. This paper analyzes this situation and makes recommendations, based on innovation theory, on how active networking can be successful in accelerating Internet innovation.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13161
- Subject Headings
- Computer industry--Technological innovations, Computer networks--Management, Computer networks--Software, Routers (Computer networks), Internetworking (Telecommunication)
- Format
- Document (PDF)