Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Physical Sciences and Mathematics (8)
- OS and Networks (5)
- Computer and Systems Architecture (4)
- Electrical and Computer Engineering (4)
-
- Electrical and Electronics (3)
- Information Security (3)
- Hardware Systems (2)
- Other Computer Sciences (2)
- Other Electrical and Computer Engineering (2)
- Systems and Communications (2)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Civic and Community Engagement (1)
- Communication (1)
- Computational Engineering (1)
- Curriculum and Instruction (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Digital Circuits (1)
- Education (1)
- Graphics and Human Computer Interfaces (1)
- Management Information Systems (1)
- Multivariate Analysis (1)
- Other Communication (1)
- Other Computer Engineering (1)
- Power and Energy (1)
- Institution
- Publication Year
- Publication
-
- Williams Honors College, Honors Research Projects (6)
- Computer Engineering (2)
- Computer Science and Software Engineering (2)
- Computer Science ETDs (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
-
- Doctoral Dissertations (1)
- Doctoral Dissertations and Master's Theses (1)
- Electrical Engineering (1)
- Graphic Communication (1)
- Master's Theses (1)
- Maurice Dawson (1)
- Ole J Mengshoel (1)
- Physics (1)
- Publications and Research (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- Undergraduate Research (1)
- Publication Type
Articles 1 - 23 of 23
Full-Text Articles in Digital Communications and Networking
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Defense Of A Small Network, Isabella Adkins
Defense Of A Small Network, Isabella Adkins
Williams Honors College, Honors Research Projects
A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.
Leveraging Ansible To Locate Network Devices, Elijah Hadden
Leveraging Ansible To Locate Network Devices, Elijah Hadden
Williams Honors College, Honors Research Projects
This report demonstrates the collection of Layer 2 and Layer 3 network device information using Ansible and explains the limitations identified performing such a procedure. Maintaining dynamic documentation of network information using automation would benefit network security with improvements to attack surface visibility and cyberattack incident response time. After the procedure was conducted, it was determined that Ansible alone is incapable of producing the intended information base due to the way it handles numerical variables. This report identifies limitations in Ansible’s ability to manipulate large quantities of network information and necessitates further discussion regarding what Ansible can and should be …
Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz
Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz
Williams Honors College, Honors Research Projects
This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Doctoral Dissertations and Master's Theses
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …
Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith
Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith
Doctoral Dissertations
The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet's success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet's functionality is the way in which traffic on the Internet gets from one destination …
Creature Care, Alexander Weber
Creature Care, Alexander Weber
Williams Honors College, Honors Research Projects
Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a …
Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza
Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza
Publications and Research
This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …
Dynamic Routing And Network Monitoring For The Polywog Protocol, Ryan Lawrence, Josh Pfeffer
Dynamic Routing And Network Monitoring For The Polywog Protocol, Ryan Lawrence, Josh Pfeffer
Computer Science and Software Engineering
This document analyzes the implementation of dynamic routing for router nodes in a mesh network. It examines the algorithm used to populate both the minimum-distance and the routing tables. Furthermore, it describes the node configurations used for testing and applications for mesh networks.
Additionally, this document describes the implementation and testing of network monitoring in a mesh network. It discusses the steps used to forward active nodes in the network between router nodes, a gateway node, and a network monitor.
Lastly, this paper details our future plans for implementing additional features for a network monitor.
Active Directory And Group Policy From The Ground Up, Nicholas Maurer
Active Directory And Group Policy From The Ground Up, Nicholas Maurer
Undergraduate Research
In this paper, I describe my experience in building a virtual network using VMware’s ESXI platform along with my experience with using Group Policy and Active Directory to administrate a network. I also detail some of my goals and my intentions with this project and where I intend on taking it in the future.
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Computer Science ETDs
As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …
Musictrakr, Benjamin Lin
Musictrakr, Benjamin Lin
Computer Engineering
MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color …
Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson
Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson
Computer Engineering
No abstract provided.
Home Networking With Enterprise Equipment, Alex Lowers
Home Networking With Enterprise Equipment, Alex Lowers
Williams Honors College, Honors Research Projects
This project tested various wired and wireless topologies and benchmarked download speeds and quality for various types of media. For music, topology had a negligible impact. High quality video streams were impacted by latency introduced in the wireless topologies. Likewise, video game streaming, especially games of high graphical fidelity, were negatively impacted when streamed over a wireless network. For all types of media, a fully wired topology is recommended.
Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson
Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson
Williams Honors College, Honors Research Projects
This research project explores the operation of the IS-IS routing protocol, as well as DHCP and DNS services provided by a Raspberry Pi computer. IS-IS is a routing protocol that is commonly ignored in most training and certification programs, because it is most frequently used by service providers. However, IS-IS solutions are also deployed in some large enterprise networks, making experience with the protocol a valuable skill.
In order to gain a deeper understanding of the routing domains, route propagation, and general operation of IS-IS, additional services were implemented in this project. A Raspberry Pi computer was used as an …
Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman
Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman
Physics
The scope of this senior project was to make a wireless vehicle controlled via Internet Protocol. This vehicle operates remotely and without direct line of sight. Commands are sent from a program running on a laptop and transmitted using a wireless router. Visual data is retrieved from a network camera, mounted on the vehicle, in real-time, to see where you are going.
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Ole J Mengshoel
Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour
Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour
Electrical Engineering
This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.
LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an updated …
Sports-Tool, Bryant Ung
Sports-Tool, Bryant Ung
Computer Science and Software Engineering
Creating events and finding people to play sports is a hard thing to do. The solution to this problem is to provide a web based interactive site that allows people to create and join different type of events and interact with each other by creating teams.
Design And Usability Of Social Networking Web Sites, Robert Pessagno
Design And Usability Of Social Networking Web Sites, Robert Pessagno
Graphic Communication
This study began by designing the layout of a new social networking Web site and putting it to practical use. A team of computer science students at Cal Poly developed this social networking site for their senior project, and called it Friend Riot. The new and innovative features that Friend Riot consists of set it apart from other popular social networking Web sites, but its interface was lacking a good design. When the new design was implemented, it was tested against the competition: Facebook, MySpace, and YouTube.
The purpose of this study is to determine the effects that Web design …
General Direction Routing Protocol, Sean Michael Lydon
General Direction Routing Protocol, Sean Michael Lydon
Master's Theses
The General Direction Routing Protocol (GDRP) is a Wireless Sensor Network (WSN)
multi-path routing protocol which abstracts localization information (commonly GPS
coordinates) into relative direction information in order to perform routing decisions. By
generating relative direction information GDRP is able to operate with fewer precision
requirements than other protocols. This abstraction also allows the integration of other emerging
hardware-based localization techniques, for example, Beamforming Sensor Arrays.
GDRP does not specifically address the next hop a packet should take, but instead specifies a
direction it should travel. This direction abstraction allows for multiple paths to be taken through
the network thus …
Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine
Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine
UNLV Theses, Dissertations, Professional Papers, and Capstones
This thesis presents both a review of current MANET routing protocols and a new MANET routing algorithm. The routing protocols reviewed include representative samples from the three primary forms of routing found in MANETS: proactive routing, reactive routing and hybrid routing. Secure algorithms are given special treatment in the review. In addition several protocol enhancements are discussed.
The proposed routing protocol is designed to support networks of a medium size, containing over 200 nodes but less than 3,000 nodes. The design is intentionally simple to allow ease of implementation in comparison with other MANET protocols that provide similar functionality.