Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Internet

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 33

Full-Text Articles in Computer Engineering

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only devices cannot communicate directly with IPv6-only devices and vice-versa. Consequently, organizations wishing to take full advantage of the ...


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over ...


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Aaron Shull, Paul Twomey, Christopher S. Yoo Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Aaron Shull, Paul Twomey, Christopher S. Yoo

Faculty Scholarship at Penn Law

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity ...


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change ...


The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond Jan 2017

The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond

Journal of International Technology and Information Management

The goal of this study is to deliver both an in-depth comprehensive analysis of the current state of IPv6 adoption and an assessment of the quality of services over the IPv6 Internet. Our assessment comprises an examination of eight data sets used to produce a comprehensive picture of IPv6 adoption across 12 metrics. We assessed the quality of services over the IPv6 Internet using eight globally distributed monitoring agents to compare the HTTP load times to targeted websites over IPv6 and IPv4. The results of our analysis confirm the findings of previous studies showing that IPv6 is in an accelerating ...


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play ...


Unified Messaging Systems: An Evolutionary Overview, Declan Barber Nov 2015

Unified Messaging Systems: An Evolutionary Overview, Declan Barber

The ITB Journal

Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This ...


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Migrating The Internet To Ipv6: An Exploration Of The When And Why, Mehdi Nikkhah, Roch Guerin Feb 2015

Migrating The Internet To Ipv6: An Exploration Of The When And Why, Mehdi Nikkhah, Roch Guerin

Departmental Papers (ESE)

The paper documents and to some extent elucidates the progress of IPv6 across major Internet stakeholders since its introduction in the mid 90’s. IPv6 offered an early solution to a well-understood and well-documented problem IPv4 was expected to encounter. In spite of early standardization and awareness of the issue, the Internet’s march to IPv6 has been anything but smooth, even if recent data point to an improvement. The paper documents this progression for several key Internet stakeholders using available measurement data, and identifies changes in the IPv6 ecosystem that may be in part responsible for how it has ...


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Aug 2014

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Wenbing Zhao

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed ...


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

Faculty Scholarship at Penn Law

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) networks ...


“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy Jun 2014

“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy

Computer Engineering

Online multiplayer games allow competition with other opponents using the internet. Their development is difficult as it involves many complex areas of computer science - optimization, security, big data, and thread safety. Many multiplayer game frameworks have been published, but very few are generic.

In this project, we focus on the framework design of a web service which allows users to easily create multiplayer games, and artificial intelligence bots to compete in them. It handles turn-based multiplayer communication, and allows the games and bots to ignore the concepts of multiplayer systems. Multiple game instances can run simultaneously, where each game’s ...


Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour Jun 2012

Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour

Electrical Engineering

This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.

LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an ...


Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai Jan 2012

Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai

Masters Theses 1911 - February 2014

The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique that ...


Ipv6 Overview.Pdf, Douglas Huber Oct 2011

Ipv6 Overview.Pdf, Douglas Huber

Douglas Huber

Overview of the IPv6 Protocol


San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta Jun 2011

San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta

Computer Engineering

This document gives the rationale, design process, technical implementation, testing procedures, and testing results of a back-end server used for the San Luis Obispo (SLO) Transit Tracker System. The SLO Transit Tracker System (SLOTTS) includes client software installed on mobile devices and a back-end server. The purpose of this system is to encourage SLO residents to utilize the transit system by having the client software present current bus location, navigation instructions, and bus schedule in a simple, fast, and easy to use mobile application.

Due to the limited central processing unit (CPU) and limited power supplied by the battery, route ...


Http 1.2: Distributed Http For Load Balancing Server Systems, Graham M. O'Daniel Jun 2010

Http 1.2: Distributed Http For Load Balancing Server Systems, Graham M. O'Daniel

Master's Theses and Project Reports

Content hosted on the Internet must appear robust and reliable to clients relying on such content. As more clients come to rely on content from a source, that source can be subjected to high levels of load. There are a number of solutions, collectively called load balancers, which try to solve the load problem through various means. All of these solutions are workarounds for dealing with problems inherent in the medium by which content is served thereby limiting their effectiveness. HTTP, or Hypertext Transport Protocol, is the dominant mechanism behind hosting content on the Internet through websites. The entirety of ...


Some Skepticism About Search Neutrality, James Grimmelmann Jan 2010

Some Skepticism About Search Neutrality, James Grimmelmann

Faculty Scholarship

In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.

Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the ...


Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande Jan 2010

Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande

Masters Theses 1911 - February 2014

Disaster management and emergency response mechanisms are coming of age post 9/11. Paper based triaging and evacuation is slowly being replaced with much advanced mechanisms using remote clients (Laptops, Thin clients, PDAs), RFiDs etc. This reflects a modern trend to deploy Information Technology (IT) in disaster management. IT elements provide a great a deal of flexibility and seamlessness in the communication of information. The information flowing is so critical that, loss of data is not at all acceptable. Loss of data would mean loss of critical medical information portraying the disaster scenario. This would amount to a wrong picture ...


Interactions, Competition And Innovation In A Service-Oriented Internet: An Economic Model, Zhi-Li Zhang, Papak Nabipay, Andrew Odlyzko, Roch A. Guérin Dec 2009

Interactions, Competition And Innovation In A Service-Oriented Internet: An Economic Model, Zhi-Li Zhang, Papak Nabipay, Andrew Odlyzko, Roch A. Guérin

Departmental Papers (ESE)

This paper presents a new economic approach for studying competition and innovation in a complex and highly interactive system of network providers, users, and suppliers of digital goods and services (i.e., service providers). It employs Cournot and Bertrand games to model competition among service providers and network providers, respectively, and develops a novel unified model to capture the interaction and competition among these players in a “service-oriented” Internet. Incentives for service and network innovation are studied in this model.


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

Faculty Scholarship at Penn Law

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence ...


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Apr 2009

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Electrical Engineering & Computer Science Faculty Publications

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed ...


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

Faculty Scholarship at Penn Law

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it ...


Broadband Adoption And Content Consumption, Lorin M. Hitt, Prasanna B Tambe Oct 2007

Broadband Adoption And Content Consumption, Lorin M. Hitt, Prasanna B Tambe

Operations, Information and Decisions Papers

We explore how broadband access drives changes in the quantity and diversity of consumption of online content by using panel data that describes household Internet usage before and after broadband adoption. Our data suggests that on average, broadband adoption increases usage by over 1300 min per month. We also find that information consumption becomes more evenly distributed within the population, driven in part by post-adoption usage gains of almost 1800 min per month among individuals who were in the lowest usage quintile before adopting broadband. After adopting broadband, this pre-adoption lowest-usage quintile consumes content in greater quantities than users in ...


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most ...


Spider Iii: A Multi-Agent-Based Distributed Computing System, Jianhua Ruan, Han-Shen Yuh, Koping Wang Jan 2002

Spider Iii: A Multi-Agent-Based Distributed Computing System, Jianhua Ruan, Han-Shen Yuh, Koping Wang

Theses Digitization Project

The project, Spider III, presents architecture and protocol of a multi-agent-based internet distributed computing system, which provides a convenient development and execution environment for transparent task distribution, load balancing, and fault tolerance. Spider is an on going distribution computing project in the Department of Computer Science, California State University San Bernardino. It was first proposed as an object-oriented distributed system by Han-Sheng Yuh in his master's thesis in 1997. It has been further developed by Koping Wang in his master's project, of where he made large contribution and implemented the Spider II System.


Cyberpsychology And Virtual Reality: Is An Update Necessary, Editor Feb 2001

Cyberpsychology And Virtual Reality: Is An Update Necessary, Editor

International Bulletin of Political Psychology

This article explores the notion that something called "human nature" may be changing in an era of significant information technology developments.


Internet News And Website Reviews, Margaret Sylvia Jan 2000

Internet News And Website Reviews, Margaret Sylvia

Faculty Publications

A book chapter devoted to keeping up with news about the Internet and website reviews for subject librarians and educators.


Bandwidth Management And Quality Of Service, Adalbert Engel Jan 2000

Bandwidth Management And Quality Of Service, Adalbert Engel

Theses: Doctorates and Masters

With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses ...