Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Survivability Through Pre-Configured Protection In Optical Mesh Networks, Quoc V. Phung Jan 2005

Survivability Through Pre-Configured Protection In Optical Mesh Networks, Quoc V. Phung

Theses: Doctorates and Masters

Network survivability is a very important issue, especially in optical networks that carry huge amount of traffic. Network failures which may be caused by human errors, malfunctional systems and natural disaster (eg. Earthquakes and lightening storms), have occurred quite frequently and sometimes with unpredictable consequences. Survivability is defined as the ability of the network to maintain the continuity of service against failures of network components. Pre-configuration and dynamic restoration are two schemes for network survivability. For each scheme, survivability algorithms can be applied at either Optical Channel sublayer (Och) known as link-based. Or, Optical Multiplex Section sublayer (OMS) known as …


Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb Jan 2003

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb

Theses : Honours

Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.

This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …


Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta Jan 2003

Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta

Theses: Doctorates and Masters

Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …


Bandwidth Management And Quality Of Service, Adalbert Engel Jan 2000

Bandwidth Management And Quality Of Service, Adalbert Engel

Theses: Doctorates and Masters

With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses …