Two new medium access protocols for ring type local area networks,
CTR (Concurrent Token Ring) protocol and DRUID (Destination Removal
withoUt Intermediate node Delay) ring protocol, are proposed, designed and
analyzed. A destination partial removal technique is designed and used in
these two protocols to support concurrent message transmission and...
Most general purpose protocols are found to suffer from
inefficiency in an Ethernet LAN environment when used for large
volume data transfer. This is especially true with the TCP/IP family
which was designed for a wide area network. This research work
presents a proof of this inefficiency and proposes a...
High Definition video streaming over WLANs faces many challenges because video data requires not only data integrity but also frames have strict playout deadline. Traditional streaming methods that rely solely on either UDP or TCP have difficulties meeting both requirements because UDP incurs packet loss while TCP incurs delay. This...
Traditionally, networking protocol designs have placed much emphasis on point-to-point reliability and efficiency. With the recent rise of mobile and multimedia applications, other considerations such as power consumption and/or Quality of Service (QoS) are becoming increasingly important factors in designing network protocols. As such, we present a new flexible framework...
Since its introduction in the early 1990s, the quick growth of the World Wide Web
(WWW) traffic raises the question of whether past Local Area Network (LAN) packet
traces still reflect the current situation or whether they have become obsolete. For this
thesis, several LAN packet traces were obtained by...
The widespread use of TCP as a transport layer protocol for mobile ad-hoc networks and wireline networks has motivated the need to make its implementation highly power efficient specially with respect to ad hoc radio networks. Over the past years many researchers have developed energy efficient protocols for mobile ad-hoc...
An important objective of tactical ad hoc networks is to deliver threat information from sensors to shooters efficiently and quickly. The information sent to a particular shooter should contain warnings about threats that are within some distance and/or within some time of the shooter's current location. In this thesis we...
Ad Hoc networks are multi-hop wireless networks consisting of mobile hosts. They do not have any pre-existing network infrastructure and are characterized by constantly changing topology, limited battery power and bandwidth. Typical applications of such networks are battlefield networks, medical relief during natural calamities or disasters, conference room networking, and...
This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. In particular, this project focuses on an implementation of...
In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed, self-organizing, scalable and does not employ online key distribution authority or group manager. Two different group authentication and group key establishment protocols are proposed for...