Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Intelligent Networks For High Performance Computing, William Whitney Schonbein Dec 2020

Intelligent Networks For High Performance Computing, William Whitney Schonbein

Computer Science ETDs

There exists a resurgence of interest in `smart' network interfaces that can operate on data as it flows through a network. However, while smart capabilities have been expanding, what they can do for high-performance computing (HPC) is not well-understood. In this work, we advance our understanding of the capabilities and contributions of smart network interfaces to HPC. First, we show current offloaded message demultiplexing can mitigate (but not eliminate) overheads incurred by multithreaded communication. Second, we demonstrate current offloaded capabilities can be leveraged to provide Turing complete program execution on the interface. We elaborate with a framework for offloading arbitrary …


Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki Jul 2020

Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki

Doctoral Dissertations

Networked systems today are hyper-scaled entities that provide core functionality for distributed services and applications spanning personal, business, and government use. It is critical to maintain correct operation of these networks to avoid adverse business outcomes. The advent of programmable networks has provided much needed fine-grained network control, enabling providers and operators alike to build some innovative networking architectures and solutions. At the same time, they have given rise to new challenges in network management. These architectures, coupled with a multitude of devices, protocols, virtual overlays on top of physical data-plane etc. make network management a highly challenging task. Existing …


Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke Jul 2020

Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke

Master's Theses

Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …


Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo Dec 2017

Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo

Master's Theses

Campus Area Networks (CANs) are a subset of enterprise networks, comprised of a network core connecting multiple Local Area Networks (LANs) across a college campus. Traditionally, hosts connect to the CAN via a single point of attachment; however, the past decade has seen the employment of mobile computing rise dramatically. Mobile devices must obtain new Internet Protocol (IP) addresses at each LAN as they migrate, wasting address space and disrupting host services. To prevent these issues, modern CANs should support IP mobility: allowing devices to keep a single IP address as they migrate between LANs with low-latency handoffs. Traditional approaches …


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez Dec 2016

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …


Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh Jul 2015

Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh

Graduate Theses and Dissertations

This dissertation is devoted to developing multiple access interference (MAI) reduction techniques for multi-carrier multi-user wireless communication networks.

In multi-carrier code division multiple access (MC-CDMA) systems, a full multipath diversity can be achieved by transmitting one symbol over multiple orthogonal subcarriers by means of spreading codes. However, in frequency selective fading channels, orthogonality among users can be destroyed leading to MAI. MAI represents the main obstacle to support large number of users in multi-user wireless systems. Consequently, MAI reduction becomes a main challenge when designing multi-carrier multi-user wireless networks. In this dissertation, first, we study MC-CDMA systems with different existing …


On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji Jan 2013

On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji

Theses: Doctorates and Masters

Wireless sensor networks (WSNs) are distributed networks comprising small sensing devices equipped with a processor, memory, power source, and often with the capability for short range wireless communication. These networks are used in various applications, and have created interest in WSN research and commercial uses, including industrial, scientific, household, military, medical and environmental domains. These initiatives have also been stimulated by the finalisation of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate wireless personal area networks (LR-WPAN).

Future applications may require large WSNs consisting of huge numbers of inexpensive wireless sensor …


A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi Apr 2002

A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi

Electrical & Computer Engineering Theses & Dissertations

This work presents an abstract formal model of the interconnection structure of the Open Systems Interconnection Reference Model (OSI-RM) developed using Object-Oriented modeling principles permitting it to serve as a re-usable platform in supporting the development of simulations and formal methods applied to layered network protocols. A simulation of the object model using MODSIM III was developed and Prototype Verification System (PVS) was used to show the applicability of the object model to formal methods by formally specifying and verifying a Global Systems for Mobile communications (GSM) protocol. This application has proved to be successful in two aspects. The first …


Multicast Services For Multimedia Collaborative Applications, Emad Eldin Mohamed Mohamed Jan 2000

Multicast Services For Multimedia Collaborative Applications, Emad Eldin Mohamed Mohamed

Computer Science Theses & Dissertations

This work aims at providing multicast services for multimedia collaborative applications over large inter-networks such as the Internet. Multimedia collaborative applications are typically of small group size, slow group membership dynamics, and awareness of participants' identities and locations. Moreover, they usually consist of several components such as audio, video, shared whiteboard, and single user application sharing engines that collectively help make the collaboration session successful. Each of these components has its demands from the communication layer that may differ from one component to another. This dissertation identifies the overall characteristics of multimedia collaborative applications and their individual components. It also …