Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Digital Communications and Networking

Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla Jan 2018

Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla

Theses: Doctorates and Masters

The rapid growth in global mobile phone users has resulted in an ever-increasing demand for bandwidth and enhanced quality-of-service (QoS). Several consortia comprising major international mobile operators, infrastructure manufacturers, and academic institutions are working to develop the next generation wireless communication systems fifth generation (5G) - to support high data rates and increased QoS. 5G systems are also expected to represent a greener alternative for communication systems, which is important because power consumption from the information and communication technology (ICT) sector is forecast to increase significantly by 2030. The deployment of ultra-dense heterogeneous small cell networks (SCNs) is expected to …


Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari Jan 2015

Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari

Theses: Doctorates and Masters

With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems.

Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never completely …


On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji Jan 2013

On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji

Theses: Doctorates and Masters

Wireless sensor networks (WSNs) are distributed networks comprising small sensing devices equipped with a processor, memory, power source, and often with the capability for short range wireless communication. These networks are used in various applications, and have created interest in WSN research and commercial uses, including industrial, scientific, household, military, medical and environmental domains. These initiatives have also been stimulated by the finalisation of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate wireless personal area networks (LR-WPAN).

Future applications may require large WSNs consisting of huge numbers of inexpensive wireless sensor …


An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt Jan 2012

An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt

Theses: Doctorates and Masters

The IEEE 802.11 Wireless Local Area Network (WLAN), commonly known as Wi-Fi, has emerged as a popular internet access technology and researchers are continuously working on improvement of the quality of service (QoS) in WLAN by proposing new and efficient schemes. Voice and video over Internet Protocol (VVoIP) applications are becoming very popular in Wi-Fi enabled portable/handheld devices because of recent technological advancements and lower service costs. Different from normal voice and video streaming, these applications demand symmetric throughput for the upstream and downstream. Existing Wi-Fi standards are optimised for generic internet applications and fail to provide symmetric throughput due …


An Investigation Into Internetworking Education, Woratat Makasiranondh Jan 2011

An Investigation Into Internetworking Education, Woratat Makasiranondh

Theses: Doctorates and Masters

Computer network technology and the Internet grew rapidly in recent years. Their growth created a large demand from industry for the development of IT and internetworking professionals. These professionals need to be equipped with both technical hands-on skills and non-technical or soft skills. In order to supply new professionals to the industry, educational institutions need to address these skills training in their curricula. Technical hands-on skills in internetworking education can be emphasised through the practical use of equipment in classrooms. The provision of the networking equipment to the internetworking students is a challenge. Particularly, university students in developing countries may …


Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen Jan 2009

Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen

Theses: Doctorates and Masters

Every second, vast amounts of data are transferred over communication systems around the world, and as a result, the demands on optical infrastructures are extending beyond the traditional, ring-based architecture. The range of content and services available from the Internet is increasing, and network operations are constantly under pressure to expand their optical networks in order to keep pace with the ever increasing demand for higher speed and more reliable links.


Design Of Survivable Wdm Network Based On Pre-Configured Protection Cycle, Byungkyu Kang Jan 2006

Design Of Survivable Wdm Network Based On Pre-Configured Protection Cycle, Byungkyu Kang

Theses: Doctorates and Masters

Wavelength Division Multiplexing (WDM) is an important technique which allows the trans- port of large quantities of data over optical networks. All optical WDM-based networks have been used to improve overall communication capacity and provide an excellent choice for the design of backbone networks. However, due to the high traffic load that each link can carry in a WDM network, survivability against failures becomes very important. Survivability in this context is the ability of the network to maintain continuity of service against failures, since a failure can lead to huge data losses. In recent years, many survivability mechanisms have been …


An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli Jan 2005

An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli

Theses: Doctorates and Masters

This thesis consists of a series of internationally published, peer reviewed, conference research papers and one journal paper. The papers evaluate and further develop two modelling methods for use in Information Technology (IT) design and for the educational and training needs of students within the area of computer and network technology. The IT age requires technical talent to fill positions such as network managers, web administrators, e-commerce consultants and network security experts as IT is changing rapidly, and this is placing considerable demands on higher educational institutions, both within Australia and internationally, to respond to these changes.


Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb Jan 2003

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb

Theses : Honours

Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.

This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …


The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai Jan 2003

The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai

Theses: Doctorates and Masters

The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …


Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao Jan 2001

Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao

Theses: Doctorates and Masters

Asynchronous Transfer Mode (ATM) technology is widely employed for the transport of network traffic, and has the potential to be the base technology for the next generation of global communications. Connection Admission Control (CAC) is the effective traffic control mechanism which is necessary in ATM networks in order to avoid possible congestion at each network node and to achieve the Quality-of-Service (QoS) requested by each connection. CAC determines whether or not the network should accept a new connection. A new connection will only be accepted if the network has sufficient resources to meet its QoS requirements without affecting the QoS …


Bluetooth Software On Linux, Wireless Hand-Held Devices, Teck Khoon Low Jan 2001

Bluetooth Software On Linux, Wireless Hand-Held Devices, Teck Khoon Low

Theses : Honours

In order to enable existing computers (non-Bluetooth ready) to connect to a Bluetooth piconet, a Bluetooth hardware device comprising of the Radio antenna, the baseband and control circuit is used. The digital portion of this device is also known as a Host Controller, HC. In the traditional communication lingo, the Bluetooth Hardware functions, as the Data Communication Equipment (DCE) while the Host is the Data terminal Equipment (DTE). This report discusses the theory and implementation of the communication protocol between the Host and the Host Controller, enabling communication between the computer and the Bluetooth hardware


Development Of Self-Adaptive Back Propagation And Derivative Free Training Algorithms In Artificial Neural Networks, Shamsuddin Ahmed Jan 2000

Development Of Self-Adaptive Back Propagation And Derivative Free Training Algorithms In Artificial Neural Networks, Shamsuddin Ahmed

Theses: Doctorates and Masters

Three new iterative, dynamically self-adaptive, derivative-free and training parameter free artificial neural network (ANN) training algorithms are developed. They are defined as self-adaptive back propagation, multi-directional and restart ANN training algorithms. The descent direction in self-adaptive back propagation training is determined implicitly by a central difference approximation scheme, which chooses its step size according to the convergence behavior of the error function. This approach trains an ANN when the gradient information of the corresponding error function is not readily available. The self- adaptive variable learning rates per epoch are determined dynamically using a constrained interpolation search. As a result, appropriate …


Bandwidth Management And Quality Of Service, Adalbert Engel Jan 2000

Bandwidth Management And Quality Of Service, Adalbert Engel

Theses: Doctorates and Masters

With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses …


Analysis Of Background Noise For Wireless Microwave Lan Channels, Jason C. Hislop Jan 1996

Analysis Of Background Noise For Wireless Microwave Lan Channels, Jason C. Hislop

Theses : Honours

Perusal of the details within, should provide the reader with an insight into general wireless indoor communications within the microwave spectrum, with respect to the problems laced, specific to noise corruption of the transmitted signal. Indoor communication systems are difficult to model, due to the largely random nature of the relevant environment, and the compounding factors that degrade system performance. These factors are many and varied, in accordance with the operational topologies of possible application area. However, there exists a common and increasing need to effectively model the communication links in question. Part of this strategy involves having an understanding …


The Mobile Telephone: The Transportation Of Social Relationships, Kenneth C. Staples Jan 1996

The Mobile Telephone: The Transportation Of Social Relationships, Kenneth C. Staples

Theses: Doctorates and Masters

In the studies of contemporary electronic media artifacts and their effects on society, television, satellites, and computers have been extensively investigated and their various impacts well documented. With regards to telecommunication technologies, academic scholarship is somewhat less, with most comment being restricted to either historic evolution, or technical description. Exceptions to this are, Marvin's reference to the telephone in her publication, When Old Technologies Were New: Thinking About Electronic Communication in the Late Nineteenth Century (1988}, and Umble's The Amish and the telephone: resistance and reconstruction (1992). Both of these publications are used for supporting arguments in my thesis investigating …


Simulator For The Performance Analysis Of Cpm Schemes In An Indoor Wireless Environment, Ronald Chua Jan 1996

Simulator For The Performance Analysis Of Cpm Schemes In An Indoor Wireless Environment, Ronald Chua

Theses : Honours

A software simulator for characterising Continuous Phase Modulation (CPM) schemes in an indoor multipath environment has been developed using SIMULINK and MATLAB. The simulator is capable of simulating a wide range of CPM schemes to determine bandwidth efficiency and robustness to additive white Gaussian noise (AWGN) and Rician fading. Initial trials of the simulator indicate that the simulator is functioning correctly. Eventually, the simulator will be used to determine the most suitable modulation scheme for the development of an actual indoor wireless system.