Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Fault-tolerance (2)
- Management (2)
- Networking (2)
- Routing (2)
- #KRKTR (1)
-
- 5G (1)
- ASL (1)
- Accessibility (1)
- Action learning (1)
- Action research (1)
- Agency (1)
- Algorithms (1)
- Allies (1)
- American Sign Language (1)
- Anthropology (1)
- Apache (1)
- Appreciative inquiry (1)
- Art (1)
- Asylum (1)
- Asymptotic analysis (1)
- Automation (1)
- BGP (1)
- Backward chaining (1)
- Barrier coverage (1)
- Beamforming (1)
- Blockchain (1)
- Bloom Filter (1)
- Broadcast (1)
- CDNs (1)
- Cache (1)
Articles 1 - 21 of 21
Full-Text Articles in Engineering
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Doctoral Dissertations
Caching is a simple yet powerful technique that has had a significant impact on improving the performance of various computer systems. From internet content delivery to CPUs, domain name systems, and database systems, caching has played a pivotal role in making these systems faster and more efficient. The basic idea behind caching is to store frequently accessed data locally, so that future requests for that data can be served more quickly. For example, a Content Delivery Network (CDN) like Akamai deploys thousands of edge caches across the globe, so that end-user requests can be served from a nearby cache, rather …
Enabling Novel Network Economics Using Multi-Hop, Asynchronous Resource Exchanges, Puming Fang
Enabling Novel Network Economics Using Multi-Hop, Asynchronous Resource Exchanges, Puming Fang
Doctoral Dissertations
Economic transactions typically involve only the parties directly involved, known as single-hop economic exchange. However, this model has limitations since only the final contributors participate in the resource exchange and acquire ownership of resources from previous contributors. In contrast, distributed systems aggregate resources from multiple entities across multiple hops. In Web 3.0, everyone can be a content creator and take ownership of their creations. To address this issue, we propose a value tree model that includes all contributors and enables multi-hop and asynchronous resource exchange. We propose two different approaches to implement the value tree model: value tree single contract, …
Resource Allocation In Distributed Service Networks, Nitish Kumar Panigrahy
Resource Allocation In Distributed Service Networks, Nitish Kumar Panigrahy
Doctoral Dissertations
The past few years have witnessed significant growth in the use of distributed network analytics involving agile code, data and computational resources. In many such networked systems, for example, Internet of Things (IoT), a large number of smart devices, sensors, processing and storage resources are widely distributed in a geographic region. These devices and resources distributed over a physical space are collectively called a distributed service network. Efficient resource allocation in such high performance service networks remains one of the most critical problems. In this thesis, we model and optimize the allocation of resources in a distributed service network. This …
Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong
Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong
Doctoral Dissertations
As the scale of High-performance Computing (HPC) systems continues to grow, researchers are devoted themselves to achieve the best performance of running long computing jobs on these systems. My research focus on reliability and efficiency study for HPC software.
First, as systems become larger, mean-time-to-failure (MTTF) of these HPC systems is negatively impacted and tends to decrease. Handling system failures becomes a prime challenge. My research aims to present a general design and implementation of an efficient runtime-level failure detection and propagation strategy targeting large-scale, dynamic systems that is able to detect both node and process failures. Using multiple overlapping …
Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan
Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan
Doctoral Dissertations
The Transmission Control Protocol (TCP) is a robust and reliable method used to transport data across a network. Many variants of TCP exist, e.g., Scalable TCP, CUBIC, and H-TCP. While some of them have been studied from empirical and theoretical perspectives, others have been less amenable to a thorough mathematical analysis. Moreover, some of the more popular variants had not been analyzed in the context of the high-speed environments for which they were designed. To address this issue, we develop a generalized modeling technique for TCP congestion control under the assumption of high bandwidth-delay product. In a separate contribution, we …
Multi-Layer Utilization Of Beamforming In Millimeter Wave Mimo Systems, Mustafa S. Aljumaily
Multi-Layer Utilization Of Beamforming In Millimeter Wave Mimo Systems, Mustafa S. Aljumaily
Doctoral Dissertations
mmWave frequencies ranging between (30-300GHz) have been considered the perfect solution to the scarcity of bandwidth in the traditional sub-6GHz band and to the ever increasing demand of many emerging applications in today's era. 5G and beyond standards are all considering the mmWave as an essential part of there networks. Beamforming is one of the most important enabling technologies for the mmWave to compensate for the huge propagation lose of these frequencies compared to the sub-6GHz frequencies and to ensure better spatial and spectral utilization of the mmWave channel space. In this work, we tried to develop different techniques to …
Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith
Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith
Doctoral Dissertations
The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet's success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet's functionality is the way in which traffic on the Internet gets from one destination …
Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki
Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki
Doctoral Dissertations
Networked systems today are hyper-scaled entities that provide core functionality for distributed services and applications spanning personal, business, and government use. It is critical to maintain correct operation of these networks to avoid adverse business outcomes. The advent of programmable networks has provided much needed fine-grained network control, enabling providers and operators alike to build some innovative networking architectures and solutions. At the same time, they have given rise to new challenges in network management. These architectures, coupled with a multitude of devices, protocols, virtual overlays on top of physical data-plane etc. make network management a highly challenging task. Existing …
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Doctoral Dissertations
Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers. Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose …
Service Competition And Data-Centric Protocols For Internet Access, Thiago Teixeira
Service Competition And Data-Centric Protocols For Internet Access, Thiago Teixeira
Doctoral Dissertations
The Internet evolved in many aspects, from the application to the physical layers. However, the evolution of the Internet access technologies, most visible in dense urban scenarios, is not easily noticeable in sparsely populated and rural areas. In the United States, for example, the FCC identified that 50% of the census blocks have access to up to two broadband providers; however, these providers do not necessarily compete. Additionally, due to the methodology of the study, there is evidence that the number of actual customers without broadband access is higher since the FCC considers the entire block to have broadband if …
Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo
Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo
Doctoral Dissertations
Wideband is a booming technology in the field of wireless communications. The receivers in wideband communication systems are expected to cover a very wide spectrum and adaptively extract the parts of interest. The literature has focused on mixing the input spectrum to baseband using a pseudorandom sequence modulation and recovering the received signals from linearly independent measurements by parallel branches to mitigate the pressures from required extreme high sampling frequency. However, a pseudorandom sequence provides no rejection for the strong interferers received together with weak signals from distant sources. The interferers cause significant distortion due to the nonlinearity of the …
Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani
Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani
Doctoral Dissertations
This dissertation focuses on covert communication in channels where the communication takes place by the transmission of packets. Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate $\lambda$ packets per second for a time period $T$. Jack's transmitted packet visit Alice, Willie, Bob and Steve, respectively. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob without being detected by a watchful adversary Willie. We consider three sets of assumptions for this channel. For each set of assumptions, we present a technique for establishing covert communication …
Inference In Networking Systems With Designed Measurements, Chang Liu
Inference In Networking Systems With Designed Measurements, Chang Liu
Doctoral Dissertations
Networking systems consist of network infrastructures and the end-hosts have been essential in supporting our daily communication, delivering huge amount of content and large number of services, and providing large scale distributed computing. To monitor and optimize the performance of such networking systems, or to provide flexible functionalities for the applications running on top of them, it is important to know the internal metrics of the networking systems such as link loss rates or path delays. The internal metrics are often not directly available due to the scale and complexity of the networking systems. This motivates the techniques of inference …
Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang
Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang
Doctoral Dissertations
Stability is a critical concern in the design and maintenance of power systems. Different approaches have been proposed for the analysis of power grid stability in various scenarios depending on small or large perturbations and the speed of the phenomenon of interest. In this work, we consider the power grid as a group of flocking birds, as synchronization is the key issue in both contexts. The framework of partial difference equation (PdE) is used to analyze the system stability, when designing the communication network of the power grid network for conveying measurements between different power stations. Both the cases where …
Energy-Efficient Content Delivery Networks, Vimal Mathew
Energy-Efficient Content Delivery Networks, Vimal Mathew
Doctoral Dissertations
Internet-scale distributed systems such as content delivery networks (CDNs) operate hundreds of thousands of servers deployed in thousands of data center locations around the globe. Since the energy costs of operating such a large IT infrastructure are a significant fraction of the total operating costs, we argue for redesigning them to incorporate energy optimization as a first-order principle. We focus on CDNs and demonstrate techniques to save energy while meeting client-perceived service level agreements (SLAs) and minimizing impact on hardware reliability. Servers deployed at individual data centers can be switched off at low load to save energy. We show that …
Data Security And Privacy In Smart Grid, Yue Tong
Data Security And Privacy In Smart Grid, Yue Tong
Doctoral Dissertations
This dissertation explores novel data security and privacy problems in the emerging smart grid.
The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Doctoral Dissertations
This thesis work is concerned with communication in large random wireless ad hoc networks. We mathematically model the wireless network as a collection of randomly located nodes, and explore how its performance scales as the network size increases. In particular, we study three important properties: broadcasting ability, rate of information exchange, and secret communication capability. In addition, we study connectivity properties of large random graphs in a more general context, where the graph does not necessarily represent a wireless communication network. Broadcasting, i.e., delivering a message from a single node to the entire network in a wireless ad hoc network …
Interpreting, Stephanie Jo Kent
Interpreting, Stephanie Jo Kent
Doctoral Dissertations
What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …
Barrier Coverage In Wireless Sensor Networks, Zhibo Wang
Barrier Coverage In Wireless Sensor Networks, Zhibo Wang
Doctoral Dissertations
Barrier coverage is a critical issue in wireless sensor networks (WSNs) for security applications, which aims to detect intruders attempting to penetrate protected areas. However, it is difficult to achieve desired barrier coverage after initial random deployment of sensors because their locations cannot be controlled or predicted. In this dissertation, we explore how to leverage the mobility capacity of mobile sensors to improve the quality of barrier coverage.
We first study the 1-barrier coverage formation problem in heterogeneous sensor networks and explore how to efficiently use different types of mobile sensors to form a barrier with pre-deployed different types of …
Achieving Energy Efficiency On Networking Systems With Optimization Algorithms And Compressed Data Structures, Yanjun Yao
Doctoral Dissertations
To cope with the increasing quantity, capacity and energy consumption of transmission and routing equipment in the Internet, energy efficiency of communication networks has attracted more and more attention from researchers around the world. In this dissertation, we proposed three methodologies to achieve energy efficiency on networking devices: the NP-complete problems and heuristics, the compressed data structures, and the combination of the first two methods.
We first consider the problem of achieving energy efficiency in Data Center Networks (DCN). We generalize the energy efficiency networking problem in data centers as optimal flow assignment problems, which is NP-complete, and then propose …
Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya
Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya
Doctoral Dissertations
Visual sensor networks (VSNs) merge computer vision, image processing and wireless sensor network disciplines to solve problems in multi-camera applications in large surveillance areas. Although potentially powerful, VSNs also present unique challenges that could hinder their practical deployment because of the unique camera features including the extremely higher data rate, the directional sensing characteristics, and the existence of visual occlusions.
In this dissertation, we first present a collaborative approach for target localization in VSNs. Traditionally; the problem is solved by localizing targets at the intersections of the back-projected 2D cones of each target. However, the existence of visual occlusions among …