Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 85

Full-Text Articles in Computer Engineering

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only devices cannot communicate directly with IPv6-only devices and vice-versa. Consequently, organizations wishing to take full advantage of the ...


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol ...


Me2b Jul 2018

Me2b

SIGNED: The Magazine of The Hong Kong Design Institute

Fixing the internet's biggest flaw


Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos Jan 2018

Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos

Computational Medicine Center Faculty Papers

MINTbase is a repository that comprises nuclear and mitochondrial tRNA-derived fragments ('tRFs') found in multiple human tissues. The original version of MINTbase comprised tRFs obtained from 768 transcriptomic datasets. We used our deterministic and exhaustive tRF mining pipeline to process all of The Cancer Genome Atlas datasets (TCGA). We identified 23 413 tRFs with abundance of ≥ 1.0 reads-per-million (RPM). To facilitate further studies of tRFs by the community, we just released version 2.0 of MINTbase that contains information about 26 531 distinct human tRFs from 11 719 human datasets as of October 2017. Key new elements include: the ...


Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto Jan 2018

Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto

Electronic Theses and Dissertations

The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Oct 2017

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

UBT International Conference

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol ...


Measuring The Evolving Internet Ecosystem With Exchange Points, Mohammad Zubair Ahmad May 2017

Measuring The Evolving Internet Ecosystem With Exchange Points, Mohammad Zubair Ahmad

Zubair Ahmad

The Internet ecosystem comprising of thousands of Autonomous Systems (ASes) now include Internet eXchange Points (IXPs) as another critical component in the infrastructure. Peering plays a significant part in driving the economic growth of ASes and is contributing to a variety of structural changes in the Internet. IXPs are a primary component of this peering ecosystem and are playing an increasing role not only in the topology evolution of the Internet but also inter-domain path routing. In this dissertation we study and analyze the overall affects of peering and IXP infrastructure on the Internet. We observe IXP peering is enabling ...


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over ...


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Aaron Shull, Paul Twomey, Christopher S. Yoo Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Aaron Shull, Paul Twomey, Christopher S. Yoo

Faculty Scholarship at Penn Law

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity ...


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change ...


The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond Jan 2017

The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond

Journal of International Technology and Information Management

The goal of this study is to deliver both an in-depth comprehensive analysis of the current state of IPv6 adoption and an assessment of the quality of services over the IPv6 Internet. Our assessment comprises an examination of eight data sets used to produce a comprehensive picture of IPv6 adoption across 12 metrics. We assessed the quality of services over the IPv6 Internet using eight globally distributed monitoring agents to compare the HTTP load times to targeted websites over IPv6 and IPv4. The results of our analysis confirm the findings of previous studies showing that IPv6 is in an accelerating ...


Iseconf: A Management Tool For The Iseage Environment To Allow Users To Create A Custom Mock Internet For Testbed Research, Jeffrey Lincoln Neel Jan 2017

Iseconf: A Management Tool For The Iseage Environment To Allow Users To Create A Custom Mock Internet For Testbed Research, Jeffrey Lincoln Neel

Graduate Theses and Dissertations

The ISEAGE (Internet-Scale Event and Attack Generation Environment) has grown

and changed since it was originally created. ISEAGE was the original testbed environment

that was developed on physical hardware. Since virtualization has become more widely

available ISEAGE has shifted into a distributable environment that anyone working in the

academic filed can download and use for free, this environment is known as ISERink. This

paper details the improvements that I have made while working with Dr. Jacobson to add to

the core of the ISERink environment. The improvements are intended to help the ISERink

environment be more customizable by upgrading the ...


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play ...


Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib Jan 2016

Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib

Theses and Dissertations

In this age of ubiquitous communication in which we can stay constantly connected with the rest of the world, for most of the part, we have to be grateful for one particular invention - the Internet. But as the popularity of Internet connectivity grows, it has become a very dangerous place where objects of malicious content and intent can be hidden in plain sight. In this dissertation, we investigate different ways to detect and capture these malicious contents hidden in the Internet. First, we propose an automated system that mimics high-risk browsing activities such as clicking on suspicious online ads, and ...


Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana Jan 2016

Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana

Conference papers

A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture ...


Unified Messaging Systems: An Evolutionary Overview, Declan Barber Nov 2015

Unified Messaging Systems: An Evolutionary Overview, Declan Barber

The ITB Journal

Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This ...


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Migrating The Internet To Ipv6: An Exploration Of The When And Why, Mehdi Nikkhah, Roch Guerin Feb 2015

Migrating The Internet To Ipv6: An Exploration Of The When And Why, Mehdi Nikkhah, Roch Guerin

Departmental Papers (ESE)

The paper documents and to some extent elucidates the progress of IPv6 across major Internet stakeholders since its introduction in the mid 90’s. IPv6 offered an early solution to a well-understood and well-documented problem IPv4 was expected to encounter. In spite of early standardization and awareness of the issue, the Internet’s march to IPv6 has been anything but smooth, even if recent data point to an improvement. The paper documents this progression for several key Internet stakeholders using available measurement data, and identifies changes in the IPv6 ecosystem that may be in part responsible for how it has ...


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to ...


New Challenges For The Archiving Of Digital Writing, Heiko Zimmermann Dec 2014

New Challenges For The Archiving Of Digital Writing, Heiko Zimmermann

CLCWeb: Comparative Literature and Culture

In his article "New Challenges for the Archiving of Digital Writing" Heiko Zimmermann discusses the challenges of the preservation of digital texts. In addition to the problems already at the focus of attention of digital archivists, there are elements in digital literature which need to be taken into consideration when trying to archive them. Zimmermann analyses two works of digital literature, the collaborative writing project A Million Penguins (2006-2007) and Renée Tuner's She… (2008) and shows how the ontology of these texts is bound to elements of performance, to direct social interaction of writers and readers to the uniquely ...


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Aug 2014

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Wenbing Zhao

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed ...


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

Faculty Scholarship at Penn Law

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) networks ...


“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy Jun 2014

“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy

Computer Engineering

Online multiplayer games allow competition with other opponents using the internet. Their development is difficult as it involves many complex areas of computer science - optimization, security, big data, and thread safety. Many multiplayer game frameworks have been published, but very few are generic.

In this project, we focus on the framework design of a web service which allows users to easily create multiplayer games, and artificial intelligence bots to compete in them. It handles turn-based multiplayer communication, and allows the games and bots to ignore the concepts of multiplayer systems. Multiple game instances can run simultaneously, where each game’s ...


Measuring The Evolving Internet Ecosystem With Exchange Points, Mohammad Zubair Ahmad Jan 2013

Measuring The Evolving Internet Ecosystem With Exchange Points, Mohammad Zubair Ahmad

Electronic Theses and Dissertations

The Internet ecosystem comprising of thousands of Autonomous Systems (ASes) now include Internet eXchange Points (IXPs) as another critical component in the infrastructure. Peering plays a significant part in driving the economic growth of ASes and is contributing to a variety of structural changes in the Internet. IXPs are a primary component of this peering ecosystem and are playing an increasing role not only in the topology evolution of the Internet but also inter-domain path routing. In this dissertation we study and analyze the overall affects of peering and IXP infrastructure on the Internet. We observe IXP peering is enabling ...


Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour Jun 2012

Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour

Electrical Engineering

This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.

LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an ...


Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai Jan 2012

Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai

Masters Theses 1911 - February 2014

The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique that ...


Ipv6 Overview.Pdf, Douglas Huber Oct 2011

Ipv6 Overview.Pdf, Douglas Huber

Douglas Huber

Overview of the IPv6 Protocol


San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta Jun 2011

San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta

Computer Engineering

This document gives the rationale, design process, technical implementation, testing procedures, and testing results of a back-end server used for the San Luis Obispo (SLO) Transit Tracker System. The SLO Transit Tracker System (SLOTTS) includes client software installed on mobile devices and a back-end server. The purpose of this system is to encourage SLO residents to utilize the transit system by having the client software present current bus location, navigation instructions, and bus schedule in a simple, fast, and easy to use mobile application.

Due to the limited central processing unit (CPU) and limited power supplied by the battery, route ...


Weaving A Computing Fabric, Michael N. Huhns, Larry M. Stevens, John W. Keele, Jim E. Wray, Warren M. Snelling, Greg P. Harhay, Randy R. Bradley Dec 2010

Weaving A Computing Fabric, Michael N. Huhns, Larry M. Stevens, John W. Keele, Jim E. Wray, Warren M. Snelling, Greg P. Harhay, Randy R. Bradley

Michael N. Huhns

As sources of information relevant to a particular domain proliferate, we need a methodology for locating, aggregating, relating, fusing, reconciling, and presenting information to users. Interoperability thus must occur not only among the information, but also among the different software applications that process it. Given the large number of potential sources and applications, interoperability becomes an extremely large problem for which manual solutions are impractical. A combination of software agents and ontologies can supply the necessary methodology for interoperability.