Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
- Keyword
-
- Available bandwidth (1)
- BYOD (1)
- Bandwidth estimation (1)
- Communication (1)
- Data Center (1)
-
- Free Space Optical (1)
- Future Internet Architectures (1)
- Internet of Things (IoT) (1)
- Intrabody Communication (1)
- Large-scale distributed system (1)
- Large-scale sensor network application (1)
- Latency and energy efficiency (1)
- MobilityFirst (1)
- Multimedia streaming (1)
- NS-3 (1)
- Networking simlator (1)
- Networks (1)
- Neurobiological Networks (1)
- Neurons (1)
- Optical Switching (1)
- Optical Wireless Communication (1)
- P2P (1)
- Packet sequence (1)
- Policy-based Management (1)
- Protocol (1)
- Real-time and reliable communication (1)
- Resource allocation (1)
- Security (1)
- Software Defined Networks (1)
- Subthreshold Stimulation (1)
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao
Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique …
Optical Wireless Data Center Networks, Abdelbaset S. Hamza
Optical Wireless Data Center Networks, Abdelbaset S. Hamza
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance, heat …
Analytical Modeling Of A Communication Channel Based On Subthreshold Stimulation Of Neurobiological Networks, Alireza Khodaei
Analytical Modeling Of A Communication Channel Based On Subthreshold Stimulation Of Neurobiological Networks, Alireza Khodaei
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The emergence of wearable and implantable machines manufactured artificially or synthesized biologically opens up a new horizon for patient-centered health services such as medical treatment, health monitoring, and rehabilitation with minimized costs and maximized popularity when provided remotely via the Internet. In particular, a swarm of machines at the scale of a single cell down to the nanoscale can be deployed in the body by the non-invasive or minimally invasive operation (e.g., swallowing and injection respectively) to perform various tasks. However, an individual machine is only able to perform basic tasks so it needs to exchange data with the others …
Bandwidth Estimation For Virtual Networks, Ertong Zhang
Bandwidth Estimation For Virtual Networks, Ertong Zhang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Cloud computing is transforming a large part of IT industry, as evidenced by the increasing popularity of public cloud computingservices, such as Amazon Web Service, Google Cloud Platform, Microsoft Windows Azure, and Rackspace Public Cloud. Manycloud computing applications are bandwidth-intensive, and thus the network bandwidth information of clouds is important for theirusers to manage and troubleshoot the application performance.
The current bandwidth estimation methods originally developed for the traditional Internet, however, face great challenges in clouds dueto virtualization that is the main enabling technique of cloud computing. First, virtual machine scheduling, which is an importantcomponent of computer virtualization for processor …
Using Software-Defined Networking To Improve Campus, Transport And Future Internet Architectures, Adrian Lara
Using Software-Defined Networking To Improve Campus, Transport And Future Internet Architectures, Adrian Lara
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Software-defined Networking (SDN) promises to redefine the future of networking. Indeed, SDN-based networks have unique capabilities such as centralized control, flow abstraction, dynamic updating of forwarding rules and software-based traffic analysis. SDN-based networks decouple the data plane from the control plane, migrating the latter to a software controller. By adding a software layer between network devices and applications, features such as network virtualization and automated management are simpler to achieve.
In this dissertation, we show how SDN-based deployments simplify network management at multiple scales such as campus and transport networks, as well as future Internet architectures. First, we propose OpenSec, …
Remote Mobile Screen (Rms): An Approach For Secure Byod Environments, Santiago Manuel Gimenez Ocano
Remote Mobile Screen (Rms): An Approach For Secure Byod Environments, Santiago Manuel Gimenez Ocano
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices. BYOD increases job satisfaction and productivity in the employees, as they can choose which device to use and do not need to carry two or more devices.
However, BYOD policies create an insecure environment, as the corporate network is extended and it becomes harder to protect it from attacks. In this scenario, the corporate information can be leaked, personal and corporate spaces …
On Heterogeneous User Demands In Peer-To-Peer Video Streaming Systems, Zhipeng Ouyang
On Heterogeneous User Demands In Peer-To-Peer Video Streaming Systems, Zhipeng Ouyang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
A Peer-to-Peer (P2P) video streaming system usually consists of a large number of peers, which have heterogeneous physical properties. Orthogonal to the physical heterogeneity, there is another type of heterogeneity called demand heterogeneity. Namely, peers have their own demands on the quality and type of the streaming service. The problem of demand heterogeneity has received little attention and as a result current P2P video streaming systems cannot achieve satisfactory performance due to demand heterogeneity. In this dissertation, we study how to design efficient P2P video streaming systems with heterogeneous user demands.
First, we study the problem of heterogeneous user demands …
Service-Differentiated And Reliable Communication In Event-Based Wireless Sensor Networks, Yuyan Xue
Service-Differentiated And Reliable Communication In Event-Based Wireless Sensor Networks, Yuyan Xue
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Wireless Sensor Networks (WSNs) consist of low-power embedded devices with integrated sensing, computing and wireless communication capabilities. These devices, called sensor nodes or motes, are often battery-powered and deployed in a distributed manner to provide observations on the physical world. Reliably and promptly collecting the sensing data to convey the features of a surveillance area, especially the events of interest, to the sink is one of the most critical requirements of WSN design. However, dynamic wireless channel conditions and the constrained energy resources make it a challenging task to provide the end-to-end performance guarantees in multi-hop WSNs.
The objective of …