This paper is concerned with the application of
hierarchial and parallel computing structures to digital
data communications processing in a multi-access telecommunications
environment. Designs are analyzed and
evaluated in terms of data collected from remote access
tele-communications traffic and in terms of the application
to several processing problems in the...
An advanced forward 'area tactical radar network, now under
conceptual development by the Air Force Electronic Systems Division,
can be viewed as a novel form of computer network but with
other unique problems resulting from the specialized nature of the
application. The proposed network will link together a number of...
Local computer networks are being installed in diverse application areas. Many of the networks employ a distributed control scheme, which has advantages in performance and reliability over a centralized one. However, distribution of control increases the difficulty in locating faulty hardware elements. Consequently, advantages may not be fully realized unless...
An important objective of tactical ad hoc networks is to deliver threat information from sensors to shooters efficiently and quickly. The information sent to a particular shooter should contain warnings about threats that are within some distance and/or within some time of the shooter's current location. In this thesis we...
Interconnection networks play important roles in designing high performance computers. Recently two new classes of interconnection networks based on the concept of Gaussian and Eisenstein-Jacobi integers were introduced. In this research, efficient routing and broadcasting algorithms for these networks are developed. Furthermore, constructing edge disjoint Hamiltonian cycles in Gaussian networks...
Network coding is a transmission paradigm that is known to achieve better network throughput in certain multicast topologies; however, the practicality of network coding has been questioned due to its high computational complexity. One of the drawbacks of using network coding is the long decoding times, this is mainly due...
Two new medium access protocols for ring type local area networks,
CTR (Concurrent Token Ring) protocol and DRUID (Destination Removal
withoUt Intermediate node Delay) ring protocol, are proposed, designed and
analyzed. A destination partial removal technique is designed and used in
these two protocols to support concurrent message transmission and...
Rapid advances in technology have seen computing move from a
large central computer to desktop microcomputers.
This advance was also
seen in the design of dedicated computers, computers designed to perform a
few specialized tasks or duties.
These computers, or microcontrollers, are
often controlled by a central computer and themselves...
This paper describes the design and implementation of
COLAN V, a High Performance Local Area Network for
Communications and Control utilizing a Communications Coprocessor.
The main objective of this thesis is to improve upon
the performance of previous COLANs in speed, switching
techniques and error detection techniques. This was
possible...
EDLAN is a simple, inexpensive local area network suitable for
educational applications. In EDLAN, a number of personal computers are
connected through an RS-485 global bus which carries the data
transmission among the computers. CSMA/CD protocol is used to control
the access of the global bus. The communications are controlled...
This thesis discusses the design and development of a
viable local area network (LAN) which supports both
communications and control applications. The emphasis was
to develop a practical and cost effective system which
offered high performance while utilizing low cost
components. System cost was kept low by utilizing a
twisted-pair...
COLAN (Control Oriented Local Area Network ) is a
redesign of the Task-Master, a daisy-chain structure
distributed control system. COLAN is a simple bus structure
communication subnetwork intended for distributed control
applications. Low cost and simplicity are two main design
criteria. Point-to-point and broadcast communications are
possible. A packet switching...
COLAN III is a control oriented LAN designed to achieve reasonable
network performance and flexibility at low cost. These objectives are
achieved by utilizing inexpensive microcontrollers (8031s) and hardware
support. The CSMA/CD network protocol with single bus structure has
been employed in COLAN III as an arbitration method to control...
The performance of multi-user workstations that access files
over a local area network is studied. Such file systems, called
distributed file systems, provide access of remote file systems with a
great degree of transparency. The main objectives are
To study the principles of distributed file systems. specifically
NFS from Sun...
A Hybrid Meshnet LAN, a new local area network architecture, has been proposed by Dr. Cheoul-Shin Kang and Dr. James Herzog. It provides for distributed control hybrid architecture which is good for effective load sharing under various local area network environments. Hybrid Meshnet has a dual channel structure, a token...
Routing from a single source node to multiple destination nodes using node disjoint paths (NDP) has many important applications in parallel systems. For example, if a source node wants to send distinct messages to distinct destination nodes, then the one-to-many NDP routing is useful.
Unlike parallel systems with shared-memory, each...
TASKMASTER is an experimental microcontroller node of a real-time control
oriented network which was proposed by James H. Herzog and Tinggui Zhang to
demonstrate the feasibility of a task oriented control structure in performing distributed
control actions. This study is a continuation of research involving the TASKMASTER
network.
A high...
Quotient rings of Gaussian and Eisenstein-Jacobi(EJ) integers can be deployed to construct interconnection networks with good topological properties. In this thesis, we propose deadlock-free deterministic and partially adaptive routing algorithms for hexagonal networks, one special class of EJ networks. Then we discuss higher dimensional Gaussian networks as an alternative to...
As broadband Internet becomes widely available, Peer-to-Peer (P2P) applications over the Internet are becoming increasingly popular. Such an example is a video multicast application in which, one source streams a video to a large number of destination nodes through an overlay multicast tree consisting of peers.
These overlay multicast-based applications,...
Popular applications such as P2P file sharing, multiplayer gaming, videoconferencing, etc. rely on the efficiency of content distribution from a single source to multiple receivers. Most users of these applications are on the widely prevalent source constraint networks such as the Digital Subscriber Line (DSL) and wireless networks. Overlay multicast...
Traditionally, networking protocol designs have placed much emphasis on point-to-point reliability and efficiency. With the recent rise of mobile and multimedia applications, other considerations such as power consumption and/or Quality of Service (QoS) are becoming increasingly important factors in designing network protocols. As such, we present a new flexible framework...
This paper discusses current network technologies and protocols and presents a simulation study of the most common networking protocol used today, TCP/IP. The TCP/IP protocol stack has many inherent problems that will be shown through this simulation study. Using the SimpleScalar Toolset, the significance of the data copying and checksumming...
This paper provides a measurement-based performance evaluation of the Optimized Link State Routing (OLSR) protocol. Two versions of OLSR, OLSR-ETX and OLSR-ETT, are implemented and evaluated on a mesh network that we built from off-the-shelf commercial components. OLSR-ETX uses the Expected Transmission Count (ETX) metric whereas, OLSR-ETT uses the Expected...
Linear wireless sensor networks (LWSN) are special class of wireless sensor networks where sensor nodes are deployed in a straight line. Monitoring industrial pipelines, railroads, tunnels, power lines, and borders are applications of LWSNs. Wireless sensors are tiny devices with limited energy resources; therefore, efficient energy routing in LWSNs is...
This paper describes the design and implementation of
"A multiprocessor node for communication and control"
(MPCC). MPCC is a high speed, high performance local area
network capable of performing real time control tasks. This
is achieved by the concurrent operation of two 8051
microcontrollers, a dual port RAM and the...
This thesis work researches the theory and application
of systems performing omnidirectional, non-direct
path optical data communication (ONP systems). Such
systems are characterized by 1) the communication involves
a local, usually circular area; 2) Obstacles are allowed
between a transmitter and the receivers. This is in
contrast to the point-to-point...
The most important part of parallel computation is communication. Except in the most embarassingly parallel examples, processors cannot work cooperatively to solve a problem unless they can communicate. One way to solve the problem of communication is to use an interconnection network. Processors are located at nodes of the network,...
MANETs are known to be useful in situations where mobile nodes need to communicate and coordinate in dynamic environments with no access to fixed network infrastructure. However, connectivity problems can occur when sub-groups within a MANET move out of communication range from one another. The increasingly prolific use of UAVs...
Network coding, as the next generation of data routing protocols, enables each intermediate node in a network to process and encode its received data before forwarding it to the next nodes. Hence, the core idea in network coding is to allow a network to encode the data that is being...
This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. In particular, this project focuses on an implementation of...
Since its introduction in the early 1990s, the quick growth of the World Wide Web
(WWW) traffic raises the question of whether past Local Area Network (LAN) packet
traces still reflect the current situation or whether they have become obsolete. For this
thesis, several LAN packet traces were obtained by...
High Definition video streaming over WLANs faces many challenges because video data requires not only data integrity but also frames have strict playout deadline. Traditional streaming methods that rely solely on either UDP or TCP have difficulties meeting both requirements because UDP incurs packet loss while TCP incurs delay. This...
Internet appliances at home are still at the beginning stage of development now. Many solutions are provided to connect those home appliances on net by wireless way or through wire. However, this thesis only focuses on the key issue of internet appliances, which is connectivity symbolized by the TCP/IP layer...
Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) is an area of artificial intelligence that studies algorithms that dynamically optimize their performance based on experience in an environment. RL, thus,...
Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or providers such as...
This dissertation investigates the use of a hardware mechanism called Eager Data Transfer (EDT) for achieving the reduction of communication latency for user-level network protocol. To reach the goal, the dissertation addresses the following research issues. First, the development of a communication system performance evaluation tool called Linux/SimOS is presented....
Peer-to-Peer (P2P) based distributed storage systems have gain much popularity in recent years. These systems rely greatly on the data redundancy to be robust under network dynamics, i.e., the dynamics of peer entering and departing the network. Hence, it is important to implement mechanisms for maintaining a certain level of...
Since free riders in P2P network reduce the system's performance, how to maintain and encourage the nodes' cooperation is an important aspect of P2P related research. In this thesis, a P2P system is modeled based on two games: stag hunt game and snowdrift game. To relate the model to the...
Trends in wireless networks are increasingly pointing towards a future with multi-hop
networks deployed in multi-channel environments. In this thesis, we present the design
for iMAC—a protocol targeted at medium access control in such environments. iMAC
uses control packets on a common control channel to faciliate a three-way handshake
between...
GEMS (Graphical Ethernet Monitoring System) is an
enhancement to the SU-PC/IP NETWATCH program, for the
graphical display and recording of computer network packets.
SU-PC/IP (Stanford University Personal Computer/Internet
Protocol) NETWATCH displays one line of information per
packet, including the packet type, IP addresses, packet
size, and protocol type, etc. This...
This note briefly discusses some of the classical results of McCulloch and Pitts. It then deals with some current research in neural nets. Several questions about neural nets are shown to be computationally difficult by showing that they are NP-Complete or worse. The size of neural nets necessary to compute...
The proliferation of mobile users and internet content has advanced a plethora of research areas. Among these areas include mobile networks, transport layer protocols, and smart cities. Research shows that global mobile data traffic will increase sevenfold reaching 49 exabytes per month by 2021, most of which will be mobile...
Ad Hoc networks are multi-hop wireless networks consisting of mobile hosts. They do not have any pre-existing network infrastructure and are characterized by constantly changing topology, limited battery power and bandwidth. Typical applications of such networks are battlefield networks, medical relief during natural calamities or disasters, conference room networking, and...
The current state of research on gossip techniques for wireless broadcasting is very limited because past research efforts have mostly focused on using gossip techniques for multicast communication. On the other hand, those research efforts that have focused on using gossip techniques for wireless broadcast communications ignore energy efficiency and...
This paper describes the design and implementation
of COLAN II, a control oriented local area network (LAN).
COLAN II employs a bus interconnection structure and
a token passing method to control the access to the bus.
Major emphasis of the work is on the system structure and
the software operating...
Most general purpose protocols are found to suffer from
inefficiency in an Ethernet LAN environment when used for large
volume data transfer. This is especially true with the TCP/IP family
which was designed for a wide area network. This research work
presents a proof of this inefficiency and proposes a...
Hybrid-Meshnet is a communication subnet architecture for local area networks (LANs) designed to achieve a high degree of network performance and flexibility. These objectives are achieved by utilizing a dual channel structure. A token ring is used for short or prioritized data transmissions. A complimentary mesh network with arbitrary data...
Interest in personal computer networks has grown
rapidly in recent years. As the personal computer
becomes more and more popular, implementing computer
networks on those small computers has become an
interesting topic. Such networks are usually inexpensive
and can be easily installed and maintained.
In this thesis work, CLASSLAN, such...
In wireless sensor networks (WSNs) nodes are battery powered. Therefore, the available
energy resources of sensor nodes should be managed efficiently in order to increase
the network lifetime. As a result, researchers have proposed routing schemes in order to
maximize network lifetime. Even though these schemes increase the network lifetime,...
In recent years, the new integrated circuit technology has spawned the
development of many low cost high performance microcontrollers. With the
improvement in the processor speed, instruction sets, and memory capacities,
these microcontrollers are ideal for the implementation of Control-Oriented
Local Area Networks (COLAN) for real-time distributed control systems. The...
The problem of ensuring Quality of Service (QoS) on a TCP/IP based fixed-infrastructure network has been well studied and several working proposals exist. An allied problem is that of ensuring QoS on an ad-hoc wireless network, where the requirements are similar, but the operating conditions are different enough to warrant...
Efficient routing of messages is critical to the performance of multicomputers. Many adaptive routing algorithms have been proposed to improve the network efficiency; however, they can make only short-sighted decisions to choose a channel for message routing because of limited information about network condition. The short-sighted decisions may cause unnecessary...
In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed, self-organizing, scalable and does not employ online key distribution authority or group manager. Two different group authentication and group key establishment protocols are proposed for...
With the increase in demand for streaming media capabilities across the Internet, the focus has shifted from traditional client-server to peer-to-peer approaches. Content Distribution Networks (CDNs) have also recently moved from web acceleration to media streaming. P2P CDNs can be used both as a delivery mechanism and as an independent...
Finding an efficient way of distributing content in Peer-to-Peer (P2P) networks has become important with the growing popularity of media streaming applications. Video multicast applications rely on the efficiency of content distribution from a single source to multiple receivers where one source streams a video to a large number of...
The widespread use of TCP as a transport layer protocol for mobile ad-hoc networks and wireline networks has motivated the need to make its implementation highly power efficient specially with respect to ad hoc radio networks. Over the past years many researchers have developed energy efficient protocols for mobile ad-hoc...
Fisheries researchers and the general public can greatly benefit from the rapid data sharing and collaborative research that is facilitated by the both the internet and modern digital technology. One of the pioneers of this new strategy of conducting and utilizing fisheries research is Project CROOS (Collaborative Research on Oregon...
The purpose of this study was to design and to implement
a practical Ethernet Local Area Network (LAN)
board for the Macintosh II computer system. A survey
of the literature provided a general definition of
LANs, a reference model for network layers, specifications
for an Ethernet LAN, and information on...
The Control-Oriented Local Area Network (COLAN) is a
distributed control system for a series of networked
microcontrollers, which has been under development at Oregon
State University since 1986. A reliable master controller, functioning
both as a task scheduler and as a network controller, is
required to allow users to perform...
We took the back-propagation algorithms of Werbos for recurrent and feed-forward neural networks and implemented them on machines with graphics processing units (GPU). The parallelism of these units gave our implementations a 10 to 100 fold increase in speed. For nets with less than 20 neurons the machine performed faster...
Control oriented local area networks (COLANs) are being installed in factories at an increasing rate. Traditionally, process control has operated with a master scheduler (computer) monitoring a number of points in a control grid. As the complexity of today's process control needs grow, the need to process information locally increases....
In recent years, integrated circuit technology has
spawned the development of many low cost and high performance
microprocessors and microcontrollers. With these devices,
there is an increasing interest in the implementation of
distributed control networks, utilizing microprocessors in the
control nodes.
In this work, a low-cost liquid crystal display (LCD)...
Analog computation in the form of neural networks is currently
receiving much attention. Existing algorithms cannot be easily
implemented in hardware because of the large number of neurons needed
and the number of connections necessary between them. These problems
have motivated development of alternatives to a conventional
implementation. Hence, a...
Generalized Radial Basis Functions were used to construct networks
that learn input-output mappings from given data. They are
developed out of a theoretical framework for approximation based
on regularization techniques and represent a class of three-layer
networks similar to backpropagation networks with one hidden
layer.
A network using Gaussian base...
This thesis discusses a special type of a versatile, distributed control system, the Taskmaster II. It includes a detailed specification of a readily realizable Taskmaster system utilizing a layered communication among units, oriented on the ISO OSI seven layer model. The specification was developed from the analysis of previous research...
E-commerce has begun to evolve beyond simple web pages to more sophisticated ways of conducting e-business transactions, such as through electronic advertising, negotiation, and delivery. However, to participate in these advances requires the skills of professional programmers, and end-user owners of small businesses often cannot justify this expense. In this...
This thesis discusses an approach whereby
Microsoft's MS OS/2 is provided with a means of running
the Department of Defense's Transmission Control
Protocol/Internet Protocol (TCP/IP).
This is done by developing a Packet Protocol Device
Driver. This device driver complies with the Packet
Driver Specification from FTP Software Inc. and with...
Web applications are popular attack targets. Misuse detection systems use signature databases to detect known attacks. However, it is difficult to keep the database up to date with the rate of discovery of vulnerabilities. They also cannot detect zero-day attacks. By contrast, anomaly detection systems learn the normal behavior of...
The brain has long attracted the interest of researchers. Some tasks, such as pattern
recognition and optimization, have proven to be exceptionally difficult for conventional
computing systems to perform, but are executed by the brain almost effortlessly. Due to
the large number of neurons and interconnections, it has proven impossible...
Amateur Packet Radio Networking presently uses the NET/ROM
protocol to establish the network. NET/ROM is considered to be
insufficient to support the expected growth of the network. This
research work proposes to use the TCP/IP protocol suite instead to
build the network. A comparison between features of both protocols
supports...
It is possible to purchase, for as little as $10,000, a cluster of computers with the capability to rival the supercomputers of only a few years ago. Now, users that have little to no experience developing distributed applications or managing a cluster are in a position to do so. To...
Using network architecture to describe a biological system is an effective organizational method. The utility of this approach, which generally applies to qualitative models, is enhanced by the addition of quantitative models characterizing the interactions between network nodes. A chromatophore-based signal transduction network is developed, and the highly interconnected major...
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access...
A distributed system is a network of multiple autonomous computational nodes designed primarily for performance scalability and robustness. The performance of a distributed system depends critically on how tasks and resources are distributed among the nodes. Thus, a main thrust in distributed system research is to design schemes for distributing...
Recent advances in wireless technologies have helped the proliferation of wireless devices, ranging from hand-held devices such as cellular phones to more powerful mobile computing platforms as such laptops [1]. Along with that, the end users’
applications running on these devices, ranging from text message to multimedia applications such as...
Packet loss, delay and time-varying bandwidth are three main problems facing multimedia streaming applications over the Internet. Existing techniques such as Media-aware network protocol, network adaptive source and channel coding, etc. have been proposed to either overcome or alleviate these drawbacks of the Internet. But these techniques either need specialized...
Media application on the internet has become more and more popular as the bandwidth of the network links increase. The bottleneck of the existing media systems is no longer the link bandwidth at user’s end, but the server’s ability to handle streaming requests. These existing streaming systems do not scale...
Machine learning models for natural language processing have traditionally relied on large numbers of discrete features, built up from atomic categories such as word forms and part-of-speech labels, which are considered completely distinct from each other. Recently however, the advent of dense feature representations coupled with deep learning techniques has...
Deep learning has greatly improved visual recognition in recent years. However, recent research has shown that there exist many adversarial examples that can negatively impact the performance of such an architecture. Different from previous perspectives that focus on improving the classifiers to detect the adversarial examples, this work focuses on...
Electric grid is a critical cyber-physical infrastructure that serves as lifeline for modern society. With the increasing trend of cyber-attacks, electric grid security has become a significant concern. Electric grid operators are working hard to reduce the risk of these attacks towards the system. Having security metrics for monitoring the...
Natural disasters could result in unnecessary loss of life and disproportionate suffering to families and communities if evacuation plans are not in place or understood by the public. In the Pacific Northwest, a magnitude 9.0 earthquake and tsunami from the Cascadia Subduction Zone (CSZ) represents one of the most pressing...
This thesis focuses on the problem of object tracking. Given a video, the general objective of tracking is to track the location over time of one or more targets in the image sequence. This is a very challenging task as algorithms need to deal with problems such as appearance variations,...
Sustainable product design is becoming an important component of the development of consumer products. Currently there are limited design resources to aid in the creation of environmentally sustainable products. The purpose of this research is to theorize a new method for integrating sustainable design knowledge into the early design phase...
Forecasting of ocean waves over a short duration on the order of tens of seconds was approached with the optimization of wave energy conversion in mind. This study outlines the development of an artificial neural network model, specifically the Nonlinear Autoregressive Network with Exogenous Input (NARX), to predict a wave-by-wave...
The main focus of this work is on the problem of existence of nonlinear optimal controllers
realizable by artificial neural networks. Theoretical justification, currently
available for control applications of neural networks, is rather limited. For example,
it is unclear which neural architectures are capable of performing which control
tasks. This...
Bayesian networks are used for building intelligent agents that act under uncertainty. They are a compact representation of agents' probabilistic knowledge. A Bayesian network can be viewed as representing a factorization of a full joint probability distribution into the multiplication of a set of conditional probability distributions. Independence of causal...
Graphics resource allocation has often existed on the periphery of graphics research, taking second place to faster or more realistic algorithms for global illumination and modeling. Most research has focused on generating sets of images that best match the effects one might see in photographs. While this approach works well...
Summary of results. After implementing the plain ID3 algorithm, I experimented with
various modifi cations. Two improvements of the process of finding a legal phoneme/stress
could be made by using statistical information about the letter to phoneme/stress-mapping
in the training set.
Adding the CHI-SQUARE test to the ID3 algorithm was...
Most statistical surveys and data collection studies encounter missing data. A common solution to this problem is to discard observations with missing data while reporting the percentage of missing observations in different output tables. Imputation is a tool used to fill in the missing values. This dissertation introduces the missing...
Introduction: Management of complex systems is facilitated through effective information systems that provide real-time data to decision makers. For example, instrument panels in airplanes ensure that pilots have well-designed feedback concerning the status of mission-critical variables. Problem: While pilots have dashboards for feedback and communication, healthcare executives may be unaware...
Subject reference librarians at OSU create subject guides to assist library patrons to locate pertinent sources on their own. These guides direct patrons to information in a variety of formats, including books, series, and journals, but often lack Internet resources. The original intent of the CAMEL Project was to set...
Agricultural systems are inherently complex; understanding these systems requires knowledge of climatology, plant physiology, soil physics, economics, and the human psychology of the farmers themselves. Decision support tools strive to leverage existing data to help guide stakeholders towards the best policies and practices for their situation. Quantitative crop simulation models...