This paper is concerned with the application of
hierarchial and parallel computing structures to digital
data communications processing in a multi-access telecommunications
environment. Designs are analyzed and
evaluated in terms of data collected from remote access
tele-communications traffic and in terms of the application
to several processing problems in the...
An advanced forward 'area tactical radar network, now under
conceptual development by the Air Force Electronic Systems Division,
can be viewed as a novel form of computer network but with
other unique problems resulting from the specialized nature of the
application. The proposed network will link together a number of...
Local computer networks are being installed in diverse application areas. Many of the networks employ a distributed control scheme, which has advantages in performance and reliability over a centralized one. However, distribution of control increases the difficulty in locating faulty hardware elements. Consequently, advantages may not be fully realized unless...
An important objective of tactical ad hoc networks is to deliver threat information from sensors to shooters efficiently and quickly. The information sent to a particular shooter should contain warnings about threats that are within some distance and/or within some time of the shooter's current location. In this thesis we...
Interconnection networks play important roles in designing high performance computers. Recently two new classes of interconnection networks based on the concept of Gaussian and Eisenstein-Jacobi integers were introduced. In this research, efficient routing and broadcasting algorithms for these networks are developed. Furthermore, constructing edge disjoint Hamiltonian cycles in Gaussian networks...
Network coding is a transmission paradigm that is known to achieve better network throughput in certain multicast topologies; however, the practicality of network coding has been questioned due to its high computational complexity. One of the drawbacks of using network coding is the long decoding times, this is mainly due...
Two new medium access protocols for ring type local area networks,
CTR (Concurrent Token Ring) protocol and DRUID (Destination Removal
withoUt Intermediate node Delay) ring protocol, are proposed, designed and
analyzed. A destination partial removal technique is designed and used in
these two protocols to support concurrent message transmission and...
Rapid advances in technology have seen computing move from a
large central computer to desktop microcomputers.
This advance was also
seen in the design of dedicated computers, computers designed to perform a
few specialized tasks or duties.
These computers, or microcontrollers, are
often controlled by a central computer and themselves...
This paper describes the design and implementation of
COLAN V, a High Performance Local Area Network for
Communications and Control utilizing a Communications Coprocessor.
The main objective of this thesis is to improve upon
the performance of previous COLANs in speed, switching
techniques and error detection techniques. This was
possible...
EDLAN is a simple, inexpensive local area network suitable for
educational applications. In EDLAN, a number of personal computers are
connected through an RS-485 global bus which carries the data
transmission among the computers. CSMA/CD protocol is used to control
the access of the global bus. The communications are controlled...
This thesis discusses the design and development of a
viable local area network (LAN) which supports both
communications and control applications. The emphasis was
to develop a practical and cost effective system which
offered high performance while utilizing low cost
components. System cost was kept low by utilizing a
twisted-pair...
COLAN (Control Oriented Local Area Network ) is a
redesign of the Task-Master, a daisy-chain structure
distributed control system. COLAN is a simple bus structure
communication subnetwork intended for distributed control
applications. Low cost and simplicity are two main design
criteria. Point-to-point and broadcast communications are
possible. A packet switching...
COLAN III is a control oriented LAN designed to achieve reasonable
network performance and flexibility at low cost. These objectives are
achieved by utilizing inexpensive microcontrollers (8031s) and hardware
support. The CSMA/CD network protocol with single bus structure has
been employed in COLAN III as an arbitration method to control...
The performance of multi-user workstations that access files
over a local area network is studied. Such file systems, called
distributed file systems, provide access of remote file systems with a
great degree of transparency. The main objectives are
To study the principles of distributed file systems. specifically
NFS from Sun...
A Hybrid Meshnet LAN, a new local area network architecture, has been proposed by Dr. Cheoul-Shin Kang and Dr. James Herzog. It provides for distributed control hybrid architecture which is good for effective load sharing under various local area network environments. Hybrid Meshnet has a dual channel structure, a token...
Routing from a single source node to multiple destination nodes using node disjoint paths (NDP) has many important applications in parallel systems. For example, if a source node wants to send distinct messages to distinct destination nodes, then the one-to-many NDP routing is useful.
Unlike parallel systems with shared-memory, each...
TASKMASTER is an experimental microcontroller node of a real-time control
oriented network which was proposed by James H. Herzog and Tinggui Zhang to
demonstrate the feasibility of a task oriented control structure in performing distributed
control actions. This study is a continuation of research involving the TASKMASTER
network.
A high...
Quotient rings of Gaussian and Eisenstein-Jacobi(EJ) integers can be deployed to construct interconnection networks with good topological properties. In this thesis, we propose deadlock-free deterministic and partially adaptive routing algorithms for hexagonal networks, one special class of EJ networks. Then we discuss higher dimensional Gaussian networks as an alternative to...
As broadband Internet becomes widely available, Peer-to-Peer (P2P) applications over the Internet are becoming increasingly popular. Such an example is a video multicast application in which, one source streams a video to a large number of destination nodes through an overlay multicast tree consisting of peers.
These overlay multicast-based applications,...
Popular applications such as P2P file sharing, multiplayer gaming, videoconferencing, etc. rely on the efficiency of content distribution from a single source to multiple receivers. Most users of these applications are on the widely prevalent source constraint networks such as the Digital Subscriber Line (DSL) and wireless networks. Overlay multicast...
Traditionally, networking protocol designs have placed much emphasis on point-to-point reliability and efficiency. With the recent rise of mobile and multimedia applications, other considerations such as power consumption and/or Quality of Service (QoS) are becoming increasingly important factors in designing network protocols. As such, we present a new flexible framework...
This paper discusses current network technologies and protocols and presents a simulation study of the most common networking protocol used today, TCP/IP. The TCP/IP protocol stack has many inherent problems that will be shown through this simulation study. Using the SimpleScalar Toolset, the significance of the data copying and checksumming...
This paper provides a measurement-based performance evaluation of the Optimized Link State Routing (OLSR) protocol. Two versions of OLSR, OLSR-ETX and OLSR-ETT, are implemented and evaluated on a mesh network that we built from off-the-shelf commercial components. OLSR-ETX uses the Expected Transmission Count (ETX) metric whereas, OLSR-ETT uses the Expected...
Linear wireless sensor networks (LWSN) are special class of wireless sensor networks where sensor nodes are deployed in a straight line. Monitoring industrial pipelines, railroads, tunnels, power lines, and borders are applications of LWSNs. Wireless sensors are tiny devices with limited energy resources; therefore, efficient energy routing in LWSNs is...
This paper describes the design and implementation of
"A multiprocessor node for communication and control"
(MPCC). MPCC is a high speed, high performance local area
network capable of performing real time control tasks. This
is achieved by the concurrent operation of two 8051
microcontrollers, a dual port RAM and the...
This thesis work researches the theory and application
of systems performing omnidirectional, non-direct
path optical data communication (ONP systems). Such
systems are characterized by 1) the communication involves
a local, usually circular area; 2) Obstacles are allowed
between a transmitter and the receivers. This is in
contrast to the point-to-point...
The most important part of parallel computation is communication. Except in the most embarassingly parallel examples, processors cannot work cooperatively to solve a problem unless they can communicate. One way to solve the problem of communication is to use an interconnection network. Processors are located at nodes of the network,...
MANETs are known to be useful in situations where mobile nodes need to communicate and coordinate in dynamic environments with no access to fixed network infrastructure. However, connectivity problems can occur when sub-groups within a MANET move out of communication range from one another. The increasingly prolific use of UAVs...
Network coding, as the next generation of data routing protocols, enables each intermediate node in a network to process and encode its received data before forwarding it to the next nodes. Hence, the core idea in network coding is to allow a network to encode the data that is being...
This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. In particular, this project focuses on an implementation of...
Since its introduction in the early 1990s, the quick growth of the World Wide Web
(WWW) traffic raises the question of whether past Local Area Network (LAN) packet
traces still reflect the current situation or whether they have become obsolete. For this
thesis, several LAN packet traces were obtained by...
High Definition video streaming over WLANs faces many challenges because video data requires not only data integrity but also frames have strict playout deadline. Traditional streaming methods that rely solely on either UDP or TCP have difficulties meeting both requirements because UDP incurs packet loss while TCP incurs delay. This...
Internet appliances at home are still at the beginning stage of development now. Many solutions are provided to connect those home appliances on net by wireless way or through wire. However, this thesis only focuses on the key issue of internet appliances, which is connectivity symbolized by the TCP/IP layer...
Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) is an area of artificial intelligence that studies algorithms that dynamically optimize their performance based on experience in an environment. RL, thus,...
Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or providers such as...
This dissertation investigates the use of a hardware mechanism called Eager Data Transfer (EDT) for achieving the reduction of communication latency for user-level network protocol. To reach the goal, the dissertation addresses the following research issues. First, the development of a communication system performance evaluation tool called Linux/SimOS is presented....
Peer-to-Peer (P2P) based distributed storage systems have gain much popularity in recent years. These systems rely greatly on the data redundancy to be robust under network dynamics, i.e., the dynamics of peer entering and departing the network. Hence, it is important to implement mechanisms for maintaining a certain level of...
Since free riders in P2P network reduce the system's performance, how to maintain and encourage the nodes' cooperation is an important aspect of P2P related research. In this thesis, a P2P system is modeled based on two games: stag hunt game and snowdrift game. To relate the model to the...
Trends in wireless networks are increasingly pointing towards a future with multi-hop
networks deployed in multi-channel environments. In this thesis, we present the design
for iMAC—a protocol targeted at medium access control in such environments. iMAC
uses control packets on a common control channel to faciliate a three-way handshake
between...
GEMS (Graphical Ethernet Monitoring System) is an
enhancement to the SU-PC/IP NETWATCH program, for the
graphical display and recording of computer network packets.
SU-PC/IP (Stanford University Personal Computer/Internet
Protocol) NETWATCH displays one line of information per
packet, including the packet type, IP addresses, packet
size, and protocol type, etc. This...
This note briefly discusses some of the classical results of McCulloch and Pitts. It then deals with some current research in neural nets. Several questions about neural nets are shown to be computationally difficult by showing that they are NP-Complete or worse. The size of neural nets necessary to compute...
The proliferation of mobile users and internet content has advanced a plethora of research areas. Among these areas include mobile networks, transport layer protocols, and smart cities. Research shows that global mobile data traffic will increase sevenfold reaching 49 exabytes per month by 2021, most of which will be mobile...
Ad Hoc networks are multi-hop wireless networks consisting of mobile hosts. They do not have any pre-existing network infrastructure and are characterized by constantly changing topology, limited battery power and bandwidth. Typical applications of such networks are battlefield networks, medical relief during natural calamities or disasters, conference room networking, and...
The current state of research on gossip techniques for wireless broadcasting is very limited because past research efforts have mostly focused on using gossip techniques for multicast communication. On the other hand, those research efforts that have focused on using gossip techniques for wireless broadcast communications ignore energy efficiency and...
This paper describes the design and implementation
of COLAN II, a control oriented local area network (LAN).
COLAN II employs a bus interconnection structure and
a token passing method to control the access to the bus.
Major emphasis of the work is on the system structure and
the software operating...