Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Engineering

Computer network protocols

Publication Year

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Hot Swapping Protocol Implementations In The Opnet Modeler Development Environment, Mark E. Coyne Mar 2008

Hot Swapping Protocol Implementations In The Opnet Modeler Development Environment, Mark E. Coyne

Theses and Dissertations

This research effort demonstrates hot swapping protocol implementations in OPNET via the building of a dependency injection testing framework. The thesis demonstrates the externalization (compiling as stand-alone code) of OPNET process models, and their inclusion into custom DLL's (Dynamically Linked Libraries). A framework then utilizes these process model DLL's, to specify, or “inject,” process implementations post-compile time into an OPNET simulation. Two separate applications demonstrate this mechanism. The first application is a toolkit that allows for the testing of multiple routing related protocols in various combinations without code re-compilation or scenario re-generation. The toolkit produced similar results as the same …


Scripted Mobile Network Routing In A Contested Environment, Anthony R. Otto Mar 2008

Scripted Mobile Network Routing In A Contested Environment, Anthony R. Otto

Theses and Dissertations

Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds. Optimistic routing has several weaknesses. Optimistic routing suffers from increased network overhead during increased frequency of node movement and increased node density per area, and optimistic routing also suffers from non-optimistic access change for individual nodes. The overall communication throughput of a network may be increased if the network topology change is scripted; a scripted plan can allow messages to travel along a more efficient topological path while creating less topology control traffic. …


Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts Jun 2007

Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts

Theses and Dissertations

The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft to route data across large regions. The Zone Routing Protocol (ZRP) has the potential to provide seamless large-scale routing for DOD under the Joint Tactical Radio System program. The goal of this study is to determine if there is a difference between routing protocol performance when operating in a large-area MANET with high-speed mobile nodes. This study analyzes MANET performance when using reactive, proactive, and hybrid routing protocols, specifically AODV, DYMO, Fisheye, and ZRP. This analysis compares the performance of the four routing protocols …


Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon Mar 2007

Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon

Theses and Dissertations

It is well documented that assumptions made in the popular Transmission Control Protocol's (TCP) development, while essential in the highly reliable wired environment, are incompatible with today's wireless network realities in what we refer to as a challenged environment. Challenged environments severely degrade the capability of TCP to establish and maintain a communication connection with reasonable throughput. This thesis proposes and implements an intermediate buffering scheme, implemented at the transport layer, which serves as a TCP helper protocol for use in network routing equipment to overcome short and bursty, but regular, link failures. Moreover, the implementation requires no modifications to …


Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney Mar 2005

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney

Theses and Dissertations

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the network-layer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand. The problem with this approach is static keying is much less secure than dynamic key generation through the …


Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar Mar 2005

Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar

Theses and Dissertations

Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the …


Geolocation Of A Node On A Local Area Network, John R. Clarson Mar 2005

Geolocation Of A Node On A Local Area Network, John R. Clarson

Theses and Dissertations

Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Locating a node on a LAN poses particular challenges due to the small scale of the problem and the increased significance of queuing delay. This study builds upon existing research in the area of geolocation and develops a heuristic tailored to the difficulties inherent in LANs called the LAN Time to Location Heuristic (LTTLH). LTTLH uses several polling nodes to measure latencies to end nodes, known locations within the LAN. The Euclidean distance algorithm is used to compare the results with the latency of a …


Internet Protocol (Ip) Over Link-16, Clinton W. Stinson Mar 2003

Internet Protocol (Ip) Over Link-16, Clinton W. Stinson

Theses and Dissertations

The purpose of Link- 16 is to exchange real-time tactical data among units of the United States and allied forces. Primary Link- 16 functions include exchange of friendly unit position and status data, fl%the dissemination of tactical surveillance track data, and the control/management of air, surface, and subsurface engagements. Because Link- 16 will play an integral role in fl% network-centric Joint Battlespace Infosphere (JBI), the performance of Internet Protocol version six (IPv6) and IP Security (IPSec) over Link-16 needs to be determined. Using OPNET modeling software to simulate a Link- 16 network, the investigation of this research revealed that the …


Performance Analysis Of Protocol Independent Multicasting-Dense Mode In Low Earth Orbit Satellite Networks, Mark D. Saeger Mar 2003

Performance Analysis Of Protocol Independent Multicasting-Dense Mode In Low Earth Orbit Satellite Networks, Mark D. Saeger

Theses and Dissertations

This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM) in a LEO satellite constellation. PIM-DM is a terrestrial protocol for distributing traffic efficiently between subscriber nodes by combining data streams into a tree-based structure, spreading from the root of the tree to the branches. Using this structure, a minimum number of connections are required to transfer data, decreasing the load on intermediate satellite routers. The PIM-DM protocol was developed for terrestrial systems and this research implemented an adaptation of this protocol in a satellite system. This research examined the PIM-DM performance characteristics which were compared to …