Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Dartmouth Internet Security Testbed (Dist): Building A Campus-Wide Wireless Testbed, Sergey Bratus, David Kotz, Keren Tan, William Taylor, Anna Shubina, Bennet Vance, Michael E. Locasto Aug 2009

Dartmouth Internet Security Testbed (Dist): Building A Campus-Wide Wireless Testbed, Sergey Bratus, David Kotz, Keren Tan, William Taylor, Anna Shubina, Bennet Vance, Michael E. Locasto

Dartmouth Scholarship

We describe our experiences in deploying a campus-wide wireless security testbed. The testbed gives us the capability to monitor security-related aspects of the 802.11 MAC layer in over 200 diverse campus locations. We describe both the technical and the social challenges of designing, building, and deploying such a system, which, to the best of our knowledge, is the largest such testbed in academia (with the UCSD's Jigsaw infrastructure a close competitor). In this paper we focus on the \em testbed setup, rather than on the experimental data and results.


A Hop-By-Hop Architecture For Multicast Transport In Ad Hoc Wireless Networks, Manoj Kumar Pandey Jul 2009

A Hop-By-Hop Architecture For Multicast Transport In Ad Hoc Wireless Networks, Manoj Kumar Pandey

Theses and Dissertations

Ad hoc wireless networks are increasingly being used to provide connectivity where a wired networking infrastructure is either unavailable or inaccessible. Many deployments utilize group communication, where several senders communicate with several receivers; multicasting has long been seen as an efficient way to provide this service. While there has been a great deal of research on multicast routing in ad hoc networks, relatively little attention has been paid to the design of multicast transport protocols, which provide reliability and congestion control. In this dissertation we design and implement a complete multicast transport architecture that includes both routing and transport protocols. …


Deamon: Energy-Efficient Sensor Monitoring, Minho Shin, Patrick Tsang, David Kotz, Cory Cornelius Jun 2009

Deamon: Energy-Efficient Sensor Monitoring, Minho Shin, Patrick Tsang, David Kotz, Cory Cornelius

Dartmouth Scholarship

In people-centric opportunistic sensing, people offer their mobile nodes (such as smart phones) as platforms for collecting sensor data. A sensing application distributes sensing `tasks,' which specify what sensor data to collect and under what conditions to report the data back to the application. To perform a task, mobile nodes may use on-board sensors, a body-area network of personal sensors, or sensors from neighboring nodes that volunteer to contribute their sensing resources. In all three cases, continuous sensor monitoring can drain a node's battery. \par We propose DEAMON (Distributed Energy-Aware MONitoring), an energy-efficient distributed algorithm for long-term sensor monitoring. Our …


Evaluating The Use Of Snmp As A Wireless Network Monitoring Tool For Ieee 802.11 Wireless Networks, Robert Johnson May 2009

Evaluating The Use Of Snmp As A Wireless Network Monitoring Tool For Ieee 802.11 Wireless Networks, Robert Johnson

All Theses

The increasing popularity of wireless networks has led to instances of high utilization and congestion, some of which have resulted in an interruption of network service. A thorough understanding of how IEEE 802.11 wireless networks operate is crucial to predicting and preventing future interruptions. There have been many studies performed on wireless networks. Of those that have captured data from the wireless side, most have used a form of wireless network monitoring known as Vicinity Sniffing (wireless sniffing from a location that is physically close to an access point to be in the broadcast range) as the primary means of …


Search And Delivery Techniques In Peer-To-Peer Networks, Tai Do Jan 2009

Search And Delivery Techniques In Peer-To-Peer Networks, Tai Do

Electronic Theses and Dissertations

The presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To fully realize the potential of the peer-to-peer technology, there is a need to define and provide a set of core competencies, serving as the basic services upon …


Characterising The Behaviour Of Ieee 802.11 Broadcast Transmissions In Ad Hoc Wireless Lans, Mehran Abolhasan, Farzad Safaei, Jerry Chun-Ping Wang, Daniel R. Franklin Jan 2009

Characterising The Behaviour Of Ieee 802.11 Broadcast Transmissions In Ad Hoc Wireless Lans, Mehran Abolhasan, Farzad Safaei, Jerry Chun-Ping Wang, Daniel R. Franklin

Faculty of Informatics - Papers (Archive)

This paper evaluates the performance of the IEEE 802.11 broadcast traffic under both saturation and nonsaturation conditions. The evaluation highlights some important characteristics of IEEE 802.11 broadcast traffic as compared to corresponding unicast traffic. Moreover, it underlines the inaccuracy of the broadcast saturation model proposed by Ma and Chen due to the absence of backoff counter freeze process when channel is busy. Computer simulations are used to validate the accuracy of the new model and demonstrate the importance of capturing the freezing of backoff counter in the analytical study of IEEE 802.11 broadcast.


Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli Jan 2009

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


A Model For Using Managed Services In Designing And Supporting A Wireless Local Area Network For The Navy Marine Corps Intranet, Joseph L. Roth Jan 2009

A Model For Using Managed Services In Designing And Supporting A Wireless Local Area Network For The Navy Marine Corps Intranet, Joseph L. Roth

CCE Theses and Dissertations

The purpose and content of this work are to explore the proper strategy on how to deploy multi-service mobile net centric warfare, or FORCEnet, the Navy's concept for Net Centric Warfare. In this research, the author examined where the Navy Marine Corps Intranet (NMCI) fits into this vision and how it is mobile and multi-service compatible. It also explored how low-cost commercial approaches such as IEEE 802.11 wireless local area network technologies can be implemented as a joint notion of Net Centric Warfare in terms of a Service Oriented Architecture (SOA). The problem investigated in this study was to evaluate …