Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee Aug 2003

Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee

Theses

This thesis provides results on trace data collecting and modeling of the Internet traffic over a Wide Area Network. The study is based on extensive data, gathered by tracing the actual packet exchange at the interfaces of devices on the WAN of BCCLS (Bergen County Cooperative Library System). A powerful network monitoring system WhatsUp Gold was employed to monitor the WAN, and logged the byte rates and packet rates sent and received at the interfaces. Different statistical distributions were employed to model the data traces. In comparison with some other statistical models - normal, lognormal, Weibull, and Pareto, which are …


Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta Aug 2003

Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta

Theses

In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.

This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …


Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan Aug 2003

Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan

Theses

Finding paths that satisfy the performance requirements of applications according to link state information in a network is known as the Quality-of- Service (QoS) routing problem and has been extensively studied. However, distributing link state information may introduce a significant protocol overhead on network resources. In this thesis, the issue on how to update link state information efficiently and effectively is investigated. A theoretical framework is presented, and a high performance link state policy that is capable of minimizing the false blocking probability of connections under a given update rate constraint is proposed. Through theoretical analysis, it is shown that …


Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora May 2003

Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora

Theses

To improve network reliability and management in today's high-speed communication system, a statistical anomaly network intrusion detection system (NIDS) has been investigated, for network soft faults using the Management Information Base (Mm) traffic parameters provided by Simple Network Management Protocol (SNMP), for both wired and wireless networks. The work done would be a contribution to a system to be designed MIB Anomaly Intrusion Detection, a hierarchical multi-tier and multiobservation-window Anomaly Intrusion Detection system. The data was derived from many experiments that had been carried out in the test bed that monitored 27 MIB traffic parameters simultaneously, focusing on the soft …


Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas May 2003

Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas

Theses

Solving a system of linear equations is a key problem in the field of engineering and science. Matrix factorization is a key component of many methods used to solve such equations. However, the factorization process is very time consuming, so these problems have traditionally been targeted for parallel machines rather than sequential ones. Nevertheless, commercially available supercomputers are expensive and only large institutions have the resources to purchase them or use them. Hence, efforts are on to develop more affordable alternatives. This thesis presents one such approach.

The work presented here is an implementation of a parallel version of the …


Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta May 2003

Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta

Theses

Power flow analysis consists of computationally intensive calculations on large matrices, consumes several hours of computational time, and has shown the need for the implementation of application-specific parallel machines. The potential of Single-Instruction stream Multiple-Data stream (SIMD) parallel architectures for efficient operations on large matrices has been demonstrated as seen in the case of many existing supercomputers. The unsuitability of existing parallel machines for low-cost power system applications, their long design cycles, and the difficulty in using them show the need for application-specific SIMI) machines. Advances in VLSI technology and Field-Programmable Gate-Arrays (FPGAs) enable the implementation of Custom Computing Machines …


Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake May 2003

Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake

Theses

The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem.

Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background …


Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr. May 2003

Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.

Theses

Wireless networks are becoming more popular in all types of environments from home office, to business infrastructure, to mobile computing. As more of these networks flourish, so does the attraction for hackers. The thesis examines the bandwidth of wireless networks and the effects of intrusions in three different scenarios. First, it looks at a wireless network that is connected to a wired infrastructure. Next, the thesis examines a wireless ad hoc network and how bandwidth plays a valuable part in the communication with neighboring nodes. And finally, the thesis attempts to simulate a wireless network by using a bandwidth configuration …


Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah May 2003

Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah

Theses

This report describes several experiments used to characterize and test a network of radiation sensors. The purpose of these tests is to assess the feasibility of using these sensors to detect and track radioactive sources in a large field, as in a battlefield or on a military campus. Simulated radiation measurements are used to compare the result of radiation detection accuracy in tracking the moving target and to find its path as early as possible. This is done via changing the number of sensing nodes deployed (deployment density), as well as the models of the detectors. This thesis describes algorithms …


Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer May 2003

Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer

Theses

In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …


Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti May 2003

Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti

Theses

This thesis develops a system for laser eye surgery that is a significant improvement over existing technology. The new system uses image matching and MEMS micromirrors to introduce feedback control, automation and record keeping to the laser surgery process, eliminating the unwanted effects of eye movement during surgery and introducing a wide range of other benefits. It is expected that this improvement can be implemented as an addition to existing systems as well as a foundation for new tools, perhaps even remote, internet enabled ones.

The basic components of the new system are described and demonstrated, including image matching between …


Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan May 2003

Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan

Theses

This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …


Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe May 2003

Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe

Theses

Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …


Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta May 2003

Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta

Theses

This thesis discusses the techniques to improve the TCP over wireless. The loss-intensive wireless communication results in high retransmission rates to recover lost packets and bandwidth consumption. In addition, the retransmitted segments have significant chance of being dropped. To make the retransmission process more granular, large segments at the transport layer (540 bytes, by default) can be subdivided into smaller sub-segments. This document introduces a split TCP based solution and describes how to produce a series of smaller-sized segments that share the same transport layer header. A new header format is introduced to support the transmission of smaller segments …


Evaluation Of Intrusion Detection Systems With Automatic Traffic Generation Programs, Friday Bassey Akpan Jan 2003

Evaluation Of Intrusion Detection Systems With Automatic Traffic Generation Programs, Friday Bassey Akpan

Theses

In this master's thesis work, a program was developed using the Perl programming language to enable user defined attack programs to run automatically. A similar program was also developed for background traffic. With this program, the different features of the Nmap exploration and scanning tool were exploited to build scenarios of attacks.

Automated scenarios of attacks running in to the order of hundreds were developed. Also, different sets of automated stealthy attacks scenarios running in to the order of hundreds were developed using the timing modes, stealthy scans and scan delay features of Nmap.

These automated attacks scenarios were employed …