Current Search: FAU Theses and Dissertations (x) » Ilyas, Mohammad (x)
View All Items
Pages
- Title
- Achieving Higher Receiver Satisfaction using Multicast-Favored Bandwidth Allocation Protocols.
- Creator
- Yousefizadeh, Hooman, Zilouchian, Ali, Ilyas, Mohammad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher...
Show moreIn recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher level of receiver satisfaction should be achieved. In this dissertation, we propose three new innovative protocols to favor multicast sessions over unicast sessions. Multicast Favored BW Allocation- Logarithmic (MFBA-Log) and Multicast Favored BW Allocation-Linear (MFBALin) protocols allocate BW proportional to the number of down stream receivers. The proposed Multicast Reserved BW Allocation (MRBA) protocol allocates part of the BW in the links only to multicast sessions. Simulation results show the increase in the overall level of Receiver Satisfaction in the network.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012581
- Subject Headings
- Multicasting (Computer networks), Computer network protocols, Computer algorithms
- Format
- Document (PDF)
- Title
- Acknowledgement overhead in local area networks.
- Creator
- Lyford, Avery Martin., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the...
Show moreThe throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the impact of different acknowledgement structures on throughput. Possible ways to alleviate the problem, such as peripheral processors and modified protocol layers, are also briefly examined.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14424
- Subject Headings
- Local area networks, Acknowledgements
- Format
- Document (PDF)
- Title
- Adaptive hierarchical weighted fair queuing scheduling in WiMAX networks.
- Creator
- AL-Ghanem, Waleed Khalid, Ilyas, Mohammad, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay,...
Show moreThe growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay, throughput and packet loss for different classes of service. In this dissertation work, the performance of uplink schedulers at the fixed WiMAX MAC layer has been considered, we proposed an Adaptive Hierarchical Weighted Fair Queuing Scheduling algorithm, the new scheduling algorithm adapts to changes in traffic, at the same time; it is able to heuristically enhance the performance of WiMAX network under most circumstances. The heuristic nature of this scheduling algorithm enables the MAC layer to meet the QoS requirements of the users. The performance of this adaptive WiMAX Uplink algorithm has been evaluated by simulation using MATLAB. Results indicate that the algorithm is efficient in scheduling the Base Stations’ traffic loads, and improves QoS. The utilization of relay stations is studied and simulation results are compared with the case without using relay stations. The results show that the proposed scheduling algorithm improves Quality of Service of WiMAX system.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004178, http://purl.flvc.org/fau/fd/FA00004178
- Subject Headings
- Computer networks -- Technological innovations, Optical fiber communication, Wireless communication systems -- Technological innovations, Wireless metropolitan area networks -- Security measures
- Format
- Document (PDF)
- Title
- ADAPTIVE HYBRID MULTIPLE ACCESS PROTOCOLS WITH SATELLITE NETWORK APPLICATIONS.
- Creator
- SARDANA, KARAMVIR., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for...
Show moreA general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for satellite communication networks, a sub-class of ART protocols called Adaptive Satellite Hybrid Access (ASHA)+ is proposed.Two ASHA protocols named ASHA1 and ASHA2 that combine the features of S-ALOHA, TDMA-Reservation and TDMA protocols by using a proposed generalized design technique, are described in detail and their analytical models are formulated. The ASHA protocols are analyzed using Equilibrium Point Analysis technique and then their analytical results are presented. A fairly sophisticated and new simulator, modeled basically as a 3-state finite state machine, to simulate the ASHA protocols is designed, described and implemented. A new phenomenon called "protocol oscillations" is observed, in which a hybrid protocol oscillates back and forth between its two adjacent states without accomplishing much, and becomes literally unstable. Traffic measures and threshold values to remedy this problem are discussed. As a by-product of simulator validation, it is found that SRUC protocol, previously thought to be stable at all traffic levels, also suffers from this problem. In addition, some previous simulation results of SRUC protocol are felt not to be correct, and its simulation results that we believe to be correct instead, are given. Detailed simulation results of ASHA protocols are presented and also compared with their analytical results. These results provide a large amount of practical and valuable insight, heretofore unknown, into the workings of adaptive hybrid protocols in general and of ASHA protocols in particular. Moreover, these results show that ASHA protocols provide better delay versus throughput performance over the entire range of throughput compared to any of their individual constituent protocols, and extend the channel capacity to unity. ftn$\sp+$As an aside, ASHA means "hope" in Hindi language.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/11907
- Subject Headings
- Computer network protocols, Artificial satellites in telecommunication
- Format
- Document (PDF)
- Title
- Adaptive on-demand routing protocol for mobile ad hoc networks.
- Creator
- Omer, Ismail., Florida Atlantic University, Mahgoub, Imad, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Existing MANET routing protocols can be classified into three categories: On-demand, Proactive, and Proactive-On-demand hybrid protocols. This dissertation presents a novel hybrid MANET routing protocol, Adaptive On-demand MANET Routing (AOMAR) protocol. AOMAR borrowed the concepts of temporal location updates in operating systems and cache memories to reconstruct broken routes. Each route entry in a mobile host will have a reference field that is set to indicate whether the route is used...
Show moreExisting MANET routing protocols can be classified into three categories: On-demand, Proactive, and Proactive-On-demand hybrid protocols. This dissertation presents a novel hybrid MANET routing protocol, Adaptive On-demand MANET Routing (AOMAR) protocol. AOMAR borrowed the concepts of temporal location updates in operating systems and cache memories to reconstruct broken routes. Each route entry in a mobile host will have a reference field that is set to indicate whether the route is used within a certain period of time called refresh time. Using the refresh time parameter and the route reference field, AOMAR behavior can be controlled to behave as pure On-demand, Adaptive, or history related Proactive protocol. The three versions of AOMAR, On-demand, Adaptive and Proactive, have been simulated using different network sizes, loads and mobility patterns. Three performance metrics---throughput, delay and overhead---are collected. The results show that AOMAR on-demand has the same pattern of results when compared with other exiting on-demand protocols. On-demand AOMAR shows better performance when compared to Adaptive AOMAR for simulation sessions with uniform workloads. On the other hand Adaptive AOMAR outperforms On-demand AOMAR for simulation sessions with non-uniform workloads. Proactive AOMAR reconstructs recently used routes that have broken. Therefore, its routing overhead results change with the change of the network loads and mobility rates. This is not the case for traditional proactive protocols. Proactive AOMAR has lower control overhead and saves the bandwidth when compared with traditional existing proactive routing protocols. In addition to developing and simulating AOMAR, a new mobility model is proposed. Synchronized Random Direction Model of Motion with Constant Speed (SRDMCS) is a model that is suitable to emulate objects that move in random directions with a constant speed and within a certain area of movement. A new formula, Movement Related Update (MRU), is proposed and implemented. In MRU, the refresh period parameter value is linked to the network mobility level. Using MRU in the simulation gives AOMAR a third dimension such that the protocol not only adapts with how frequently the routes are used and how frequently they are broken, but also with how dynamic the network is.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/11972
- Subject Headings
- Mobile computing, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- An advanced intelligent network: Description and performance evaluation.
- Creator
- Kadioglu, Ceri., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
An Advanced Intelligent Network (AIN) is described and its performance is evaluated in this thesis. First, the AIN architecture is presented. This is followed by the description of the operation and the creation of the telephone services in the AIN architecture. Finally, the AIN architecture is evaluated on the performance of the user-network interface and the network elements, and the expandability and cost effectiveness of the architecture. The result of the evaluation shows that the...
Show moreAn Advanced Intelligent Network (AIN) is described and its performance is evaluated in this thesis. First, the AIN architecture is presented. This is followed by the description of the operation and the creation of the telephone services in the AIN architecture. Finally, the AIN architecture is evaluated on the performance of the user-network interface and the network elements, and the expandability and cost effectiveness of the architecture. The result of the evaluation shows that the operation of the telephone services in the AIN architecture are acceptable according to the standards set by Bellcore. Therefore, the AIN architecture meets the objectives set by the telephone operating companies and provides a basis for faster development and deployment of new telephone services in a cost effective manner.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14688
- Subject Headings
- Telecommunication systems, Telephone systems, Data transmission systems
- Format
- Document (PDF)
- Title
- Analysis of a new protocol for Bluetooth network formation.
- Creator
- Madhusoodanan, Vishakh., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the...
Show moreThis research work deals with analyzing the performance of a new protocol for distributed network formation and re-formation in Bluetooth ad-hoc networks. The Bluetooth network may be a piconet or a scatternet consisting of a number of piconets. One of the salient features of this protocol is that, there is no leader election process involved. We can establish simultaneous multiple connections between masters and slaves. The delay in formation of the network is analyzed with respect to the number of devices in the network. Also, the network diameter, the number of piconets formed and the impact of device failures are analyzed. Simulation results show that the protocol handles the failures of the devices with minimum delay except at the time of failure of a master. The scope for further improvement of this protocol is also discussed.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13036
- Subject Headings
- Bluetooth technology, Computer network protocols
- Format
- Document (PDF)
- Title
- Characterization and performance evaluation of video conference traffic in ATM networks.
- Creator
- Nayak, Chandrika Narayana., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In order to effectively transport digital compressed video over Broadband Integrated Services Digital Networks (B-ISDN) with Asynchronous Transfer Mode (ATM), the characteristics of the video source traffic should be understood. The nature of the video traffic depends primarily on the source, the content of the video and the coding algorithm that removes redundancies for efficient transmission over networks. In this study, video conference data encoded using a subband coding scheme, Digital...
Show moreIn order to effectively transport digital compressed video over Broadband Integrated Services Digital Networks (B-ISDN) with Asynchronous Transfer Mode (ATM), the characteristics of the video source traffic should be understood. The nature of the video traffic depends primarily on the source, the content of the video and the coding algorithm that removes redundancies for efficient transmission over networks. In this study, video conference data encoded using a subband coding scheme, Digital Video Compression System (DVCS), is analyzed to determine its characteristics. Several video traffic sources are multiplexed through an ATM network node with limited capacity and the performance of this environment is evaluated by using a simulation technique. The simulation results are presented for the performance measures for varying traffic and network conditions.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15166
- Subject Headings
- Broadband communications systems, Integrated services digital networks, Asynchronous transfer mode, Digital video, Video compression
- Format
- Document (PDF)
- Title
- A COMPARATIVE EVALUATION OF SERVICE DISCIPLINES IN A TOKEN RING LOCAL AREA NETWORK: A SIMULATION STUDY.
- Creator
- Syed, Majid Ali, Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The primary emphasis of this thesis is to evaluate in comparative terms the performance of three types of service disciplines in a Token Ring Local Area Network. The service disciplines studied are exhaustive, gated and limited service. These service disciplines play an important role in the network performance, especially when some users are relatively less active than others in contributing traffic load to the network. Network performance for these service disciplines are compared to...
Show moreThe primary emphasis of this thesis is to evaluate in comparative terms the performance of three types of service disciplines in a Token Ring Local Area Network. The service disciplines studied are exhaustive, gated and limited service. These service disciplines play an important role in the network performance, especially when some users are relatively less active than others in contributing traffic load to the network. Network performance for these service disciplines are compared to determine which one of them gives better performance. Simulation is used for this study and results are presented in terms of average delay, queue lengths and delay histograms versus traffic intensity.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14388
- Subject Headings
- Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- Counter-rotating slotted ring: A new metropolitan area network architecture.
- Creator
- Choi, Kwok K., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this dissertation a new architecture, Counter Rotating Slotted Ring (CRSR), is proposed for Metropolitan Area Networks (MANs). MANs are newly developed optical fiber based networks that have high data transmission rates and wide area coverage. They provide voice, video and data services. A CRSR has a dual-ring architecture that consists of two uni-directional transmission media, which are shared among the network nodes. The transmission time in a CRSR is divided into fixed length slots....
Show moreIn this dissertation a new architecture, Counter Rotating Slotted Ring (CRSR), is proposed for Metropolitan Area Networks (MANs). MANs are newly developed optical fiber based networks that have high data transmission rates and wide area coverage. They provide voice, video and data services. A CRSR has a dual-ring architecture that consists of two uni-directional transmission media, which are shared among the network nodes. The transmission time in a CRSR is divided into fixed length slots. These slots are generated by a head station during the system initialization phase. They flow inside the dual-ring in opposite directions: clockwise and counter clockwise. In each slot, there is an Access Control Field, a Segment Header Field and a Segment Payload Field. These fields contain slot control bits, segment identification and data respectively. One of the control bits is used to indicate if a slot has data or not. Once a busy slot, i.e. a slot with data, reaches its destination, it is marked as 'read'. An eraser node is used to identify 'read' slots and erase the data in the slots. In CRSR, there are two possible routes to send data from one node to another. The route with fewer nodes in between is always selected. This Minimum Node Count Routing reduces traffic on the transmission medium. IEEE has issued a Distributed Queue Dual Bus (DQDB) 802.6 standard for the subnetwork of a MAN. Under most circumstances, DQDB performs better than Fiber Distributed Data Interface (FDDI), an ANSI MAN standard. However, DQDB has two drawbacks: positional unfairness and poor channel efficiency. A number of solutions have been proposed to solve the unfairness problem, but these approaches do not improve the situation without negative effects on network performance. A CRSR with eraser in all its nodes has two times as much maximum throughput as an equivalent DQDB and at the same time, it is a positionally fair network. Although CRSRs with fewer eraser nodes are unfair, they always outperform equivalent DQDBs both in throughput and fairness.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/12340
- Subject Headings
- Metropolitan area networks (Computer networks), Computer network architectures
- Format
- Document (PDF)
- Title
- Delay characteristics of file transfer in token ring local area networks.
- Creator
- Horvath, Elizabeth Iren., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
The purpose of this thesis is to examine the delay characteristics of a token ring local area network with file transfers. The delay characteristics of the network are investigated by varying the file packet lengths, the variance in the length of the packets, and the utilization. The simulation model used has file packets which are assumed to be represented by a normal distribution. The results obtained indicate that at a designated utilization an increase in the variance of the packet's...
Show moreThe purpose of this thesis is to examine the delay characteristics of a token ring local area network with file transfers. The delay characteristics of the network are investigated by varying the file packet lengths, the variance in the length of the packets, and the utilization. The simulation model used has file packets which are assumed to be represented by a normal distribution. The results obtained indicate that at a designated utilization an increase in the variance of the packet's length causes the delay to increase. The results can be used for capacity planning for networks whose primary task is file transfer.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14466
- Subject Headings
- IBM Token-Ring Network (Local area network system)
- Format
- Document (PDF)
- Title
- Design and implementation of a wireless ad hoc network.
- Creator
- Neelakanta, Mahesh., Florida Atlantic University, Hsu, Sam, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis addresses issues faced in the practical implementation of a wireless ad hoc network (WAHN) protocol for data transmission. This study focuses on: (1) Evaluating existing hardware and software options available for the WAHN implementation. (2) Appraising the issues faced while implementing a practical wireless ad hoc protocol. (3) Applying a set of MAC protocol specifications developed for a wireless ad hoc data network to a practical test network. Specific to the above topics of...
Show moreThis thesis addresses issues faced in the practical implementation of a wireless ad hoc network (WAHN) protocol for data transmission. This study focuses on: (1) Evaluating existing hardware and software options available for the WAHN implementation. (2) Appraising the issues faced while implementing a practical wireless ad hoc protocol. (3) Applying a set of MAC protocol specifications developed for a wireless ad hoc data network to a practical test network. Specific to the above topics of interest, the following research tasks are performed: (1) An elaborate survey and relevant discussions on wireless MAC protocols. (2) A comprehensive study comparing various wireless transceivers is performed. Range, data rate, frequency, interfacing method and cost are the factors compared. (3) A simple, low-cost and low baud-rate transceiver is modified with appropriate interface circuits to support wireless communications. A more advanced transceiver is also considered and used for the software foundation of a practical implementation of the ad hoc and MAC protocols. The studies enable assessing the problems faced during the implementation and suggest solutions to resolve these problems. Further areas for study are also discussed.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15615
- Subject Headings
- Wireless communication systems, Data transmission systems, Computer networks
- Format
- Document (PDF)
- Title
- Design and performance analysis of FDDI and DQDB network architectures.
- Creator
- Khera, Harbinder Singh., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The primary emphasis of this thesis is to study the behavioral characteristics of Fiber Distributed Data Interface (FDDI) and Distributed Queue Dual Bus (DQDB) High Speed Local Area Networks (HSLANs). An FDDI architecture with passive interfaces is proposed to provide a reliable and efficient network topology. This network architecture outperforms the existing FDDI architecture with active interfaces in terms of small asynchronous packet delays and high asynchronous packet throughput. The...
Show moreThe primary emphasis of this thesis is to study the behavioral characteristics of Fiber Distributed Data Interface (FDDI) and Distributed Queue Dual Bus (DQDB) High Speed Local Area Networks (HSLANs). An FDDI architecture with passive interfaces is proposed to provide a reliable and efficient network topology. This network architecture outperforms the existing FDDI architecture with active interfaces in terms of small asynchronous packet delays and high asynchronous packet throughput. The design and implementation issues involved in the design of the hierarchical (multi-level) DQDB and FDDI networks are also presented. The hierarchical network architecture provides modularity and scalability with respect to speed and the number of users. Simulation models are developed for each of these network architectures to study their performance. Simulation results are presented in terms of medium access delay, throughput, and packet delays.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/14976
- Subject Headings
- Fiber Distributed Data Interface (Computer network standard), Computer architecture, Local area networks (Computer networks)
- Format
- Document (PDF)
- Title
- Designing non-proprietary and practical ISDN terminal equipment for basic access.
- Creator
- Mitchell, Todd., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis illustrates the design of non-proprietary and practical ISDN terminal equipment for basic access. Terminal compatibility with the AT&T 5ESS, Northern Telecom DMS100, and Siemens EWSD Class 5 switches is considered. General compliance is dictated by all applicable CCITT recommendations and BELLCORE technical references. A consolidation of the useful information in the CCITT and BELLCORE technical documents is provided from a design engineer's perspective. A practical, cost...
Show moreThis thesis illustrates the design of non-proprietary and practical ISDN terminal equipment for basic access. Terminal compatibility with the AT&T 5ESS, Northern Telecom DMS100, and Siemens EWSD Class 5 switches is considered. General compliance is dictated by all applicable CCITT recommendations and BELLCORE technical references. A consolidation of the useful information in the CCITT and BELLCORE technical documents is provided from a design engineer's perspective. A practical, cost effective implementation is outlined and considerations for flexibility due to the changing requirements are explored. The objective is to specify simplified guidelines which can be followed to create generic ISDN terminal equipment which is non-proprietary and practical for ISDN subscribers today.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14662
- Subject Headings
- Integrated services digital networks, Data transmission systems--Equipment and supplies
- Format
- Document (PDF)
- Title
- Distributed management of heterogeneous networks using hypermedia data repositories.
- Creator
- Anderson, James M., Florida Atlantic University, Ilyas, Mohammad, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Current management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the...
Show moreCurrent management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the Network Management Server (NMS), the Network Element Web Server (NEWS), and the Operator's Logic and Processing Platform (OLAPP). The NMS stores the management functions used by both the NEWS and the user. The NEWS is a Web server which collects and processes network element data in order to support management functions. The OLAPP executes the management functions and interfaces with the user.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/12502
- Subject Headings
- Computer network architectures, Internetworking (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- Dual Bus R-Net: A new local/metropolitan area network.
- Creator
- Chauhan, Sanjeev Birbal., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
In this thesis we have proposed and analyzed a new architecture for high speed fiber optic LANs/MANs, called the Dual Bus R-Net. The scheme is based on a slotted unidirectional dual bus structure. It uses a reservation mechanism to generate slotted frames on each bus. Frames consist of a reservation slot and one or many information slots. Stations reserve slots by transmitting reservation requests on the bus carrying information in the opposite direction. The scheme has the advantage of...
Show moreIn this thesis we have proposed and analyzed a new architecture for high speed fiber optic LANs/MANs, called the Dual Bus R-Net. The scheme is based on a slotted unidirectional dual bus structure. It uses a reservation mechanism to generate slotted frames on each bus. Frames consist of a reservation slot and one or many information slots. Stations reserve slots by transmitting reservation requests on the bus carrying information in the opposite direction. The scheme has the advantage of superior channel utilization, bounded delay, fair access to all stations, dynamic bandwidth allocation to network users, and implementation simplicity. Extensive simulations have been carried out to verify the characteristics of the network. Simulation results reinforce the initial claims of the advantages offered by Dual Bus R-Net. Performance analysis is presented in terms of network delay and channel utilization. Simulation results are compared with similar results of X-Net, R-Net, DQDB, and Expressnet.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15006
- Subject Headings
- Local area networks (Computer networks), Metropolitan area networks (Computer networks), Computer network architectures, Computer network protocols
- Format
- Document (PDF)
- Title
- Effect of message latency in an ATM network on signal processing.
- Creator
- Weber, Ralph Lawrence., Florida Atlantic University, Ilyas, Mohammad
- Abstract/Description
-
Signal processing requires a steady flow of sampled data to be able to properly manipulate the signal to get the desired output. By using Asynchronous Transfer Mode (ATM) networks, it is possible to divide signal processing amongst a number of stations where each station can be specialized to a single function. Unfortunately, most commercially available ATM Network Interface Cards (NIC) only support message mode ATM Adaptation Layer 5 (AAL5) which is unsuitable to signal processing due to the...
Show moreSignal processing requires a steady flow of sampled data to be able to properly manipulate the signal to get the desired output. By using Asynchronous Transfer Mode (ATM) networks, it is possible to divide signal processing amongst a number of stations where each station can be specialized to a single function. Unfortunately, most commercially available ATM Network Interface Cards (NIC) only support message mode ATM Adaptation Layer 5 (AAL5) which is unsuitable to signal processing due to the delays of having to wait for an entire message to be formed prior to sending. It is shown that by using an ATM NIC using streaming mode AAL5, where cells are sent as soon as enough data to create an ATM cell of 48 bytes, leads to better quality signal processing. It is also shown that the message latency (time it takes for a message to traverse the network) is reduced by using streaming mode AAL5.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15371
- Subject Headings
- Signal processing, Asynchronous transfer mode, Telecommunication--Message processing, Computer networks
- Format
- Document (PDF)
- Title
- ENHANCING IOT DEVICES SECURITY: ENSEMBLE LEARNING WITH CLASSICAL APPROACHES FOR INTRUSION DETECTION SYSTEM.
- Creator
- Alotaibi, Yazeed, Ilyas, Mohammad, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
The Internet of Things (IoT) refers to a network of interconnected nodes constantly engaged in communication, data exchange, and the utilization of various network protocols. Previous research has demonstrated that IoT devices are highly susceptible to cyber-attacks, posing a significant threat to data security. This vulnerability is primarily attributed to their susceptibility to exploitation and their resource constraints. To counter these threats, Intrusion Detection Systems (IDS) are...
Show moreThe Internet of Things (IoT) refers to a network of interconnected nodes constantly engaged in communication, data exchange, and the utilization of various network protocols. Previous research has demonstrated that IoT devices are highly susceptible to cyber-attacks, posing a significant threat to data security. This vulnerability is primarily attributed to their susceptibility to exploitation and their resource constraints. To counter these threats, Intrusion Detection Systems (IDS) are employed. This study aims to contribute to the field by enhancing IDS detection efficiency through the integration of Ensemble Learning (EL) methods with traditional Machine Learning (ML) and deep learning (DL) models. To bolster IDS performance, we initially utilize a binary ML classification approach to classify IoT network traffic as either normal or abnormal, employing EL methods such as Stacking and Voting. Once this binary ML model exhibits high detection rates, we extend our approach by incorporating a ML multi-class framework to classify attack types. This further enhances IDS performance by implementing the same Ensemble Learning methods. Additionally, for further enhancement and evaluation of the intrusion detection system, we employ DL methods, leveraging deep learning techniques, ensemble feature selections, and ensemble methods. Our DL approach is designed to classify IoT network traffic. This comprehensive approach encompasses various supervised ML, and DL algorithms with ensemble methods. The proposed models are trained on TON-IoT network traffic datasets. The ensemble approaches are evaluated using a comprehensive metrics and compared for their effectiveness in addressing this classification tasks. The ensemble classifiers achieved higher accuracy rates compared to individual models, a result attributed to the diversity of learning mechanisms and strengths harnessed through ensemble learning. By combining these strategies, we successfully improved prediction accuracy while minimizing classification errors. The outcomes of these methodologies underscore their potential to significantly enhance the effectiveness of the Intrusion Detection System.
Show less - Date Issued
- 2023
- PURL
- http://purl.flvc.org/fau/fd/FA00014304
- Subject Headings
- Internet of things, Intrusion detection systems (Computer security), Machine learning
- Format
- Document (PDF)
- Title
- A feedback-based multimedia synchronization technique for distributed systems.
- Creator
- Ehley, Lynnae Anne., Florida Atlantic University, Ilyas, Mohammad, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multimedia applications incorporate the use of more than one type of media, i.e., voice, video, data, text and image. With the advances in high-speed communication, the ability to transmit multimedia is becoming widely available. One of the means of transport for multimedia in distributed networks is Broadband Integrated Services Digital Network (B-ISDN). B-ISDN supports the transport of large volumes of data with a low error rate. It also handles the burstiness of multimedia traffic by...
Show moreMultimedia applications incorporate the use of more than one type of media, i.e., voice, video, data, text and image. With the advances in high-speed communication, the ability to transmit multimedia is becoming widely available. One of the means of transport for multimedia in distributed networks is Broadband Integrated Services Digital Network (B-ISDN). B-ISDN supports the transport of large volumes of data with a low error rate. It also handles the burstiness of multimedia traffic by providing dynamic bandwidth allocation. When multimedia is requested for transport in a distributed network, different Quality of Service (QOS) may be required for each type of media. For example, video can withstand more errors than voice. In order to provide, the most efficient form of transfer, different QOS media are sent using different channels. By using different channels for transport, jitter can impose skews on the temporal relations between the media. Jitter is caused by errors and buffering delays. Since B-ISDN uses Asynchronous Transfer Mode (ATM) as its transfer mode, the jitter that is incurred can be assumed to be bounded if traffic management principles such as admission control and resource reservation are employed. Another network that can assume bounded buffering is the 16 Mbps token-ring LAN when the LAN Server (LS) Ultimedia(TM) software is applied over the OS/2 LAN Server(TM) (using OS/2(TM)). LS Ultimedia(TM) reserves critical resources such as disk, server processor, and network resources for multimedia use. In addition, it also enforces admission control(1). Since jitter is bounded on the networks chosen, buffers can be used to realign the temporal relations in the media. This dissertation presents a solution to this problem by proposing a Feedback-based Multimedia Synchronization Technique (FMST) to correct and compensate for the jitter that is incurred when media are received over high speed communication channels and played back in real time. FMST has been implemented at the session layer for the playback of the streams. A personal computer was used to perform their synchronized playback from a 16 Mbps token-ring and from a simulated B-ISDN network.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12382
- Subject Headings
- Multimedia systems, Broadband communication systems, Data transmission systems, Integrated services digital networks, Electronic data processing--Distributed processing
- Format
- Document (PDF)
- Title
- Flow control in interconnected token ring local area networks.
- Creator
- Varughese, Sicely Babu., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis investigates some of the flow control issues in a system of Local Area Networks consisting of multiple token rings interconnected through bridges via a backbone ring. Flow control is realized by a window mechanism, i.e., a sender is permitted to transmit not more than a fixed number, W (the window size), of frames without having to wait for an acknowledgment. The solution is based on an existing approximation of the mean end-to-end delay in a stand-alone token ring LAN, which is...
Show moreThis thesis investigates some of the flow control issues in a system of Local Area Networks consisting of multiple token rings interconnected through bridges via a backbone ring. Flow control is realized by a window mechanism, i.e., a sender is permitted to transmit not more than a fixed number, W (the window size), of frames without having to wait for an acknowledgment. The solution is based on an existing approximation of the mean end-to-end delay in a stand-alone token ring LAN, which is extended by approximating the arrival rates at the bridges as a function of the throughput of each subnetwork and the probability that, the throughput is directed to the other subnetworks. The packet-lengths are assumed to be exponentially distributed. The performance of the system is evaluated by varying the window size.
Show less - Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14447
- Subject Headings
- IBM Token-Ring Network (Local area network system)
- Format
- Document (PDF)