Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
Articles 1 - 17 of 17
Full-Text Articles in Computer Engineering
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi
Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi
Williams Honors College, Honors Research Projects
Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Honors Projects
As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …
Service Competition And Data-Centric Protocols For Internet Access, Thiago Teixeira
Service Competition And Data-Centric Protocols For Internet Access, Thiago Teixeira
Doctoral Dissertations
The Internet evolved in many aspects, from the application to the physical layers. However, the evolution of the Internet access technologies, most visible in dense urban scenarios, is not easily noticeable in sparsely populated and rural areas. In the United States, for example, the FCC identified that 50% of the census blocks have access to up to two broadband providers; however, these providers do not necessarily compete. Additionally, due to the methodology of the study, there is evidence that the number of actual customers without broadband access is higher since the FCC considers the entire block to have broadband if …
Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li
Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li
Masters Theses
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers defense mechanism based on a proof-of-work protocol. This thesis proposes a new protocol to protect controllers against such attacks, shows implementation of the system and analyze the its performance. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of work, its adjustable difficulty, its ability to work withmultiple network providers, and its use of existing TCP/IP header fields, ensure that this approach can be used in practice.
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Electronic Theses and Dissertations
Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.
“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy
“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy
Computer Engineering
Online multiplayer games allow competition with other opponents using the internet. Their development is difficult as it involves many complex areas of computer science - optimization, security, big data, and thread safety. Many multiplayer game frameworks have been published, but very few are generic.
In this project, we focus on the framework design of a web service which allows users to easily create multiplayer games, and artificial intelligence bots to compete in them. It handles turn-based multiplayer communication, and allows the games and bots to ignore the concepts of multiplayer systems. Multiple game instances can run simultaneously, where each game’s …
Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour
Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour
Electrical Engineering
This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.
LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an updated …
San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta
San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta
Computer Engineering
This document gives the rationale, design process, technical implementation, testing procedures, and testing results of a back-end server used for the San Luis Obispo (SLO) Transit Tracker System. The SLO Transit Tracker System (SLOTTS) includes client software installed on mobile devices and a back-end server. The purpose of this system is to encourage SLO residents to utilize the transit system by having the client software present current bus location, navigation instructions, and bus schedule in a simple, fast, and easy to use mobile application.
Due to the limited central processing unit (CPU) and limited power supplied by the battery, route …
Http 1.2: Distributed Http For Load Balancing Server Systems, Graham M. O'Daniel
Http 1.2: Distributed Http For Load Balancing Server Systems, Graham M. O'Daniel
Master's Theses
Content hosted on the Internet must appear robust and reliable to clients relying on such content. As more clients come to rely on content from a source, that source can be subjected to high levels of load. There are a number of solutions, collectively called load balancers, which try to solve the load problem through various means. All of these solutions are workarounds for dealing with problems inherent in the medium by which content is served thereby limiting their effectiveness. HTTP, or Hypertext Transport Protocol, is the dominant mechanism behind hosting content on the Internet through websites. The entirety of …
Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez
Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez
Theses and Dissertations
Identification of cyber attacks and network services is a robust field of study in the machine learning community. Less effort has been focused on understanding the domain space of real network data in identifying important features for cyber attack and network service classification. Motivations for such work allow for anomaly detection systems with less requirements on data “sniffed” off the network, extraction of features from the traffic, reduced learning time of algorithms, and ideally increased classification performance of anomalous behavior. This thesis evaluates the usefulness of a good feature subset for the general classification task of identifying cyber attacks and …
Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch
Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch
Theses and Dissertations
Malicious logic, specifically worms, has caused monetary expenditure problems to network users in the past. Worms, like Slammer and Code Red, have infected thousands of systems and brought the Internet to a standstill. This research examines the ability of the original Slammer worm, the Slammer based routing worm proposed by Zou et al, and a new Single Slash Eight (SSE) routing worm proposed by this research to infect vulnerable systems within a given address space. This research investigates the Slammer worm's ability to generate a uniform random IP addresses in a given address space. Finally, a comparison of the speed …
Spider Iii: A Multi-Agent-Based Distributed Computing System, Jianhua Ruan, Han-Shen Yuh, Koping Wang
Spider Iii: A Multi-Agent-Based Distributed Computing System, Jianhua Ruan, Han-Shen Yuh, Koping Wang
Theses Digitization Project
The project, Spider III, presents architecture and protocol of a multi-agent-based internet distributed computing system, which provides a convenient development and execution environment for transparent task distribution, load balancing, and fault tolerance. Spider is an on going distribution computing project in the Department of Computer Science, California State University San Bernardino. It was first proposed as an object-oriented distributed system by Han-Sheng Yuh in his master's thesis in 1997. It has been further developed by Koping Wang in his master's project, of where he made large contribution and implemented the Spider II System.
Bandwidth Management And Quality Of Service, Adalbert Engel
Bandwidth Management And Quality Of Service, Adalbert Engel
Theses: Doctorates and Masters
With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses …
Multicast Services For Multimedia Collaborative Applications, Emad Eldin Mohamed Mohamed
Multicast Services For Multimedia Collaborative Applications, Emad Eldin Mohamed Mohamed
Computer Science Theses & Dissertations
This work aims at providing multicast services for multimedia collaborative applications over large inter-networks such as the Internet. Multimedia collaborative applications are typically of small group size, slow group membership dynamics, and awareness of participants' identities and locations. Moreover, they usually consist of several components such as audio, video, shared whiteboard, and single user application sharing engines that collectively help make the collaboration session successful. Each of these components has its demands from the communication layer that may differ from one component to another. This dissertation identifies the overall characteristics of multimedia collaborative applications and their individual components. It also …
Student Database Access From The Web, Prashanthi Sundaram
Student Database Access From The Web, Prashanthi Sundaram
Theses Digitization Project
This project, Database Access through the Web (DAW), implements a database to store academic and general information of graduate students in the Department of Computer Science, CSUSB and provides access to the database from the web. The motivation of the project comes from needs of the Graduate Coordinator, professors and department staff to access through the Internet student information concurrently.
A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King
A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King
Theses and Dissertations
The Air Force Core Competency of Information Superiority will be achieved in an age of decreasing AF manpower and corporate expertise. Increased AF reliance on COTS solutions, coupled with nearly ubiquitous points of entry to communication networks, create unique challenges in maintaining the Information Superiority edge. The protection of the internet is part of this equation. The internet supports the daily business traffic of the Air Force. Personnel, finance, and supply data flow through its routers. Controlling an adversary's access to our information systems, either the data, or the hardware and software that control the data and transform it into …