Current Search: routing (x)
Pages
-
-
Title
-
Opportunistic Networks in Campus Environments.
-
Creator
-
Bacanli, Salih Safa, Turgut, Damla, Guha, Ratan, Bassiouni, Mostafa, University of Central Florida
-
Abstract / Description
-
Opportunistic communication is an active research area in wireless sensor networks. Exploiting the opportunities to communicate between devices in an unstable network is one of the main challenges of the opportunistic communication. In this thesis, we propose an infrastructure-independent opportunistic mobile social networking strategy for efficient message broadcasting in campus environments. Specifically, we focus on the application scenario of university campuses. In our model, the...
Show moreOpportunistic communication is an active research area in wireless sensor networks. Exploiting the opportunities to communicate between devices in an unstable network is one of the main challenges of the opportunistic communication. In this thesis, we propose an infrastructure-independent opportunistic mobile social networking strategy for efficient message broadcasting in campus environments. Specifically, we focus on the application scenario of university campuses. In our model, the students' smartphones forward messages to each other. The messages are created spontaneously as independent events in various places of the campus. The events can be either urgent security alerts or private announcements to the students who are currently on the campus. Our proposed state-based campus routing (SCR) protocol is based on the idle and active states of the students in indoor and outdoor environments. The proposed model is analyzed through extensive network simulations using mobility datasets collected from students on University of Milano, University of Cambridge and University of St Andrews campuses. The opportunistic network model and the SCR protocol is compared with epidemic, epidemic with TTS (Times-To-Send), PROPHET(Probabilistic Routing on History of Encounters), NDAO (Nodes Density Aware Opportunistic) and random routing protocols. We observe that the message delivery performance of SCR is close to Epidemic, PROPHET and NDAO while SCR reduces the amount of message transmissions.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0006258, ucf:51038
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006258
-
-
Title
-
A HYBRID ROUTING PROTOCOL FOR COMMUNICATIONS AMONG NODES WITHHIGH RELATIVE SPEED IN WIRELESS MESH NETWORKS.
-
Creator
-
PEPPAS, NIKOLAOS, Turgut, Damla, University of Central Florida
-
Abstract / Description
-
Wireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information....
Show moreWireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information. Through simulations run on a specially built stand alone simulator, based on Java, packet overhead, delivery ratio and latency metrics were monitored with respect to varying number of nodes, node density and mobility. The results showed that the high overhead leads to high delivery ratio while latency tends to increase as the network grows larger. All the metrics revealed sensitivity in high mobility conditions.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001607, ucf:47165
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001607
-
-
Title
-
DESIGNING A DOCUMENT DELIVERY SYSTEM FOR UCF'S INTERLIBRARY LOAN DEPARTMENT.
-
Creator
-
Trivedi, Abha, Butler, Renee, University of Central Florida
-
Abstract / Description
-
Interlibrary Loan entails obtaining copies of library materials not found in the library's collection on behalf of the library's patrons (borrowing), as well as providing copies of library materials requested by other libraries (lending). The dynamic nature of today's library environment is well illustrated by the rapid changes occurring in the role of interlibrary loan. The vision statement of the University of Central Florida Library is: The library performs a central role of adding value...
Show moreInterlibrary Loan entails obtaining copies of library materials not found in the library's collection on behalf of the library's patrons (borrowing), as well as providing copies of library materials requested by other libraries (lending). The dynamic nature of today's library environment is well illustrated by the rapid changes occurring in the role of interlibrary loan. The vision statement of the University of Central Florida Library is: The library performs a central role of adding value to information for the academic community by creatively improving and providing information resources and services. The library strives to create an environment that encourages the pursuit of intellectual endeavors and the creation of new knowledge. In an endeavor to fulfill this vision, the Interlibrary Loan Department at the UCF main library wants to set up a document delivery service within the UCF main campus in order to facilitate research efforts on campus. The document delivery service will include delivery and pickup of library materials for ILL requests by faculty online (via computers). In this study, we build a Traveling Salesperson model for obtaining a routing sequence for the document delivery service. Next, we analyze this model in order to check the feasibility of the routing sequence in presence of demand (delivery and pickup) by simulating the demand over the route using computer simulation software. We conclude by validating the model under given conditions and providing route sequence recommendations in the case of extreme demands.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000637, ucf:46529
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000637
-
-
Title
-
NAVIGATION AIDS IN ROUTE TRAINING: INCREASE NAVIGATION SPEED, DECREASE ROUTE RETENTION?.
-
Creator
-
Holmquist, John, Lee, Gene, University of Central Florida
-
Abstract / Description
-
In the case of one car following another to a destination, it is very effective at getting the second vehicle to the destination quickly; however, the driver of the second car may not learn the route. Yet, for individuals, such as firefighters, law enforcement, and military personnel, it is imperative that a route be learned quickly and accurately and that an awareness of the situation is maintained while they traverse the given route. This leads to three questions, (a) will navigation aids...
Show moreIn the case of one car following another to a destination, it is very effective at getting the second vehicle to the destination quickly; however, the driver of the second car may not learn the route. Yet, for individuals, such as firefighters, law enforcement, and military personnel, it is imperative that a route be learned quickly and accurately and that an awareness of the situation is maintained while they traverse the given route. This leads to three questions, (a) will navigation aids affect initial route navigation; (b) will navigation aids affect retention; and (c) will navigation aids affect situation awareness while en route? The hypotheses of this study were that navigation aids would significantly increase the speed at which a person can initially navigate a route, but the use of the aids would significantly decrease the retention of the route navigated. The findings of this study support the hypotheses. The results suggest that participants that followed a confederate and participants that were given verbal directions were quicker and made fewer errors than participants that reviewed a map or initially figured the route out on their own (control group). The study also showed that as the participants navigated the route for a second time with no navigational assistance, the ones that reviewed a map or that were in the control group outperformed participants that initially had a confederate to follow or were given verbal directions their first time through. Finally, no real effects were found on the participants' situation awareness during the retention portion of the study.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000520, ucf:46453
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000520
-
-
Title
-
Spectrum Map and its Application in Cognitive Radio Networks.
-
Creator
-
Debroy, Saptarshi, Chatterjee, Mainak, Bassiouni, Mostafa, Zou, Changchun, Jha, Sumit, Catbas, Necati, University of Central Florida
-
Abstract / Description
-
Recent measurements on radio spectrum usage have revealed the abundance of underutilizedbands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access. Cognitive radio based secondary networks thatutilize such unused spectrum holes in the licensed band, have been proposed as a possible solution to the spectrum crisis. The idea is to detect times when a particular licensed band is unused and use it for transmission without causing...
Show moreRecent measurements on radio spectrum usage have revealed the abundance of underutilizedbands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access. Cognitive radio based secondary networks thatutilize such unused spectrum holes in the licensed band, have been proposed as a possible solution to the spectrum crisis. The idea is to detect times when a particular licensed band is unused and use it for transmission without causing interference to the licensed user. We argue that prior knowledge about occupancy of such bands and the corresponding achievable performance metrics can potentially help secondary networks to devise effective strategiesto improve utilization.In this work, we use Shepard's method of interpolation to create a spectrum mapthat provides a spatial distribution of spectrum usage over a region of interest. It is achieved by intelligently fusing the spectrum usage reports shared by the secondary nodes at various locations. The obtained spectrum map is a continuous and differentiable 2-dimension distribution function in space. With the spectrum usage distribution known, we show how different radio spectrum and network performance metrics like channel capacity, secondary network throughput, spectral efficiency, and bit error rate can be estimated. We show the applicability of the spectrum map in solving the intra-cell channel allocation problem incentralized cognitive radio networks, such as IEEE 802.22. We propose a channel allocationscheme where the base station allocates interference free channels to the consumer premise equipments (CPE) using the spectrum map that it creates by fusing the spectrum usage information shared by some CPEs. The most suitable CPEs for information sharing arechosen on a dynamic basis using an iterative clustering algorithm. Next, we present a contention based media access control (MAC) protocol for distributed cognitive radio network. The unlicensed secondary users contend among themselves over a common control channel. Winners of the contention get to access the available channels ensuring high utilization and minimum collision with primary incumbent. Last, we propose a multi-channel, multi-hop routing protocol with secondary transmission power control. The spectrum map, created and maintained by a set of sensors, acts as the basis of finding the best route for every source destination pair. The proposed routing protocol ensures primary receiver protection and maximizes achievable link capacity.Through simulation experiments we show the correctness of the prediction model and how it can be used by secondary networks for strategic positioning of secondary transmitter-receiver pairs and selecting the best candidate channels. The simulation model mimics realistic distribution of TV stations for urban and non-urban areas. Results validate the nature and accuracy of estimation, prediction of performance metrics, and efficiency of the allocation process in an IEEE 802.22 network. Results for the proposed MAC protocol show high channel utilization with primary quality of service degradation within a tolerable limit. Performance evaluation of the proposed routing scheme reveals that it ensures primary receiver protection through secondary power control and maximizes route capacity.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFE0005324, ucf:50515
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005324
-
-
Title
-
Rethinking Routing and Peering in the era of Vertical Integration of Network Functions.
-
Creator
-
Dey, Prasun, Yuksel, Murat, Wang, Jun, Ewetz, Rickard, Zhang, Wei, Hasan, Samiul, University of Central Florida
-
Abstract / Description
-
Content providers typically control the digital content consumption services and are getting the most revenue by implementing an (")all-you-can-eat(") model via subscription or hyper-targeted advertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend. As this vertical integration trend is emerging in the ISP market, it is questionable if existing...
Show moreContent providers typically control the digital content consumption services and are getting the most revenue by implementing an (")all-you-can-eat(") model via subscription or hyper-targeted advertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend. As this vertical integration trend is emerging in the ISP market, it is questionable if existing routing architecture will suffice in terms of sustainable economics, peering, and scalability. It is expected that the current routing will need careful modifications and smart innovations to ensure effective and reliable end-to-end packet delivery. This involves new feature developments for handling traffic with reduced latency to tackle routing scalability issues in a more secure way and to offer new services at cheaper costs. Considering the fact that prices of DRAM or TCAM in legacy routers are not necessarily decreasing at the desired pace, cloud computing can be a great solution to manage the increasing computation and memory complexity of routing functions in a centralized manner with optimized expenses. Focusing on the attributes associated with existing routing cost models and by exploring a hybrid approach to SDN, we also compare recent trends in cloud pricing (for both storage and service) to evaluate whether it would be economically beneficial to integrate cloud services with legacy routing for improved cost-efficiency. In terms of peering, using the US as a case study, we show the overlaps between access ISPs and content providers to explore the viability of a future in terms of peering between the new emerging content-dominated sugarcane ISPs and the healthiness of Internet economics. To this end, we introduce meta-peering, a term that encompasses automation efforts related to peering (-) from identifying a list of ISPs likely to peer, to injecting control-plane rules, to continuous monitoring and notifying any violation (-) one of the many outcroppings of vertical integration procedure which could be offered to the ISPs as a standalone service.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007797, ucf:52351
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007797
-
-
Title
-
MEASURING AND IMPROVING INTERNET VIDEO QUALITY OF EXPERIENCE.
-
Creator
-
Iyengar, Mukundan, Chatterjee, Mainak, University of Central Florida
-
Abstract / Description
-
Streaming multimedia content over the IP-network is poised to be the dominant Internet traffic for the coming decade, predicted to account for more than 91% of all consumer traffic in the coming years. Streaming multimedia content ranges from Internet television (IPTV), video on demand (VoD), peer-to-peer streaming, and 3D television over IP to name a few. Widespread acceptance, growth, and subscriber retention are contingent upon network providers assuring superior Quality of Experience (QoE...
Show moreStreaming multimedia content over the IP-network is poised to be the dominant Internet traffic for the coming decade, predicted to account for more than 91% of all consumer traffic in the coming years. Streaming multimedia content ranges from Internet television (IPTV), video on demand (VoD), peer-to-peer streaming, and 3D television over IP to name a few. Widespread acceptance, growth, and subscriber retention are contingent upon network providers assuring superior Quality of Experience (QoE) on top of todays Internet. This work presents the first empirical understanding of Internet's video-QoE capabilities, and tools and protocols to efficiently infer and improve them. To infer video-QoE at arbitrary nodes in the Internet, we design and implement MintMOS: a lightweight, real-time, no-reference framework for capturing perceptual quality. We demonstrate that MintMOS's projections closely match with subjective surveys in accessing perceptual quality. We use MintMOS to characterize Internet video-QoE both at the link level and end-to-end path level. As an input to our study, we use extensive measurements from a large number of Internet paths obtained from various measurement overlays deployed using PlanetLab. Link level degradations of intra-- and inter--ISP Internet links are studied to create an empirical understanding of their shortcomings and ways to overcome them. Our studies show that intra--ISP links are often poorly engineered compared to peering links, and that degradations are induced due to transient network load imbalance within an ISP. Initial results also indicate that overlay networks could be a promising way to avoid such ISPs in times of degradations. A large number of end-to-end Internet paths are probed and we measure delay, jitter, and loss rates. The measurement data is analyzed offline to identify ways to enable a source to select alternate paths in an overlay network to improve video-QoE, without the need for background monitoring or apriori knowledge of path characteristics. We establish that for any unstructured overlay of N nodes, it is sufficient to reroute key frames using a random subset of k nodes in the overlay, where k is bounded by O(lnN). We analyze various properties of such random subsets to derive simple, scalable, and an efficient path selection strategy that results in a k-fold increase in path options for any source-destination pair; options that consistently outperform Internet path selection. Finally, we design a prototype called source initiated frame restoration (SIFR) that employs random subsets to derive alternate paths and demonstrate its effectiveness in improving Internet video-QoE.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0004012, ucf:49168
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004012
-
-
Title
-
EMERGENCY EVACUATION ROUTE PLANNING CONSIDERING HUMAN BEHAVIOR DURING SHORT- AND NO-NOTICE EMERGENCY SITUATIONS.
-
Creator
-
Kittirattanapaiboon, Suebpong, Geiger, Christopher, University of Central Florida
-
Abstract / Description
-
Throughout United States and world history, disasters have caused not only significant loss of life, property but also enormous financial loss. The tsunami that occurred on December 26, 2004 is a telling example of the devastation that can occur unexpectedly. This unexpected natural event never happened before in this area. In addition, there was a lack of an emergency response plan for events of that magnitude. Therefore, this event resulted not only in a natural catastrophe for the people...
Show moreThroughout United States and world history, disasters have caused not only significant loss of life, property but also enormous financial loss. The tsunami that occurred on December 26, 2004 is a telling example of the devastation that can occur unexpectedly. This unexpected natural event never happened before in this area. In addition, there was a lack of an emergency response plan for events of that magnitude. Therefore, this event resulted not only in a natural catastrophe for the people of South and Southeast Asia, but it is also considered one of the greatest natural disasters in world history. After the giant wave dissipated, there were more than 230,000 people dead and more than US$10 billion in property damage and loss. Another significant event was the terrorist incident on September 11, 2001 (commonly referred to as 9/11) in United States. This event was unexpected and an unnatural, i.e., man-made event. It resulted in approximately 3,000 lives lost and about US$21 billion in property damage. These and other unexpected (or unanticipated) events give emergency management officials short- or no-notice to prevent or respond to the situation. These and other facts motivate the need for better emergency evacuation route planning (EERP) approaches in order to minimize the loss of human lives and property in short- or no-notice emergency situations. This research considers aspects of evacuation routing that have received little attention in research and, more importantly, in practice. Previous EERP models only either consider unidirectional evacuee flow from the source of a hazard to destinations of safety or unidirectional emergency first responder flow to the hazard source. However, in real-life emergency situations, these heterogeneous, incompatible flows occur simultaneously over a bi-directional capacitated lane-based travel network, especially in short- and no-notice emergencies. After presenting a review of the work related to the multiple flow EERP problem, mathematical formulations are presented for the EERP problem where the objective for each problem is to identify an evacuation routing plan (i.e., a traffic flow schedule) that maximizes evacuee and responder flow and minimizes network clearance time of both types of flow. In addition, we integrate the general human response behavior flow pattern, where the cumulative flow behavior follows different degrees of an S-shaped curve depending upon the level of the evacuation order. We extend the analysis to consider potential traffic flow conflicts between the two types of flow under these conditions. A conflict occurs when flow of different types occupy a roadway segment at the same time. Further, with different degrees of flow movement flow for both evacuee and responder flow, the identification of points of flow congestion on the roadway segments that occur within the transportation network is investigated.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002645, ucf:48229
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002645
-
-
Title
-
MAC LAYER AND ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS WITH ASYMMETRIC LINKS AND PERFORMANCE EVALUATION STUDIES.
-
Creator
-
Wang, Guoqiang, Marinescu, Dan, University of Central Florida
-
Abstract / Description
-
In a heterogeneous mobile ad hoc network (MANET), assorted devices with different computation and communication capabilities co-exist. In this thesis, we consider the case when the nodes of a MANET have various degrees of mobility and range, and the communication links are asymmetric. Many routing protocols for ad hoc networks routinely assume that all communication links are symmetric, if node A can hear node B and node B can also hear node A. Most current MAC layer protocols are unable to...
Show moreIn a heterogeneous mobile ad hoc network (MANET), assorted devices with different computation and communication capabilities co-exist. In this thesis, we consider the case when the nodes of a MANET have various degrees of mobility and range, and the communication links are asymmetric. Many routing protocols for ad hoc networks routinely assume that all communication links are symmetric, if node A can hear node B and node B can also hear node A. Most current MAC layer protocols are unable to exploit the asymmetric links present in a network, thus leading to an inefficient overall bandwidth utilization, or, in the worst case, to lack of connectivity. To exploit the asymmetric links, the protocols must deal with the asymmetry of the path from a source node to a destination node which affects either the delivery of the original packets, or the paths taken by acknowledgments, or both. Furthermore, the problem of hidden nodes requires a more careful analysis in the case of asymmetric links. MAC layer and routing protocols for ad hoc networks with asymmetric links require a rigorous performance analysis. Analytical models are usually unable to provide even approximate solutions to questions such as end-to-end delay, packet loss ratio, throughput, etc. Traditional simulation techniques for large-scale wireless networks require vast amounts of storage and computing cycles rarely available on single computing systems. In our search for an effective solution to study the performance of wireless networks we investigate the time-parallel simulation. Time-parallel simulation has received significant attention in the past. The advantages, as well as, the theoretical and practical limitations of time-parallel simulation have been extensively researched for many applications when the complexity of the models involved severely limits the applicability of analytical studies and is unfeasible with traditional simulation techniques. Our goal is to study the behavior of large systems consisting of possibly thousands of nodes over extended periods of time and obtain results efficiently, and time-parallel simulation enables us to achieve this objective. We conclude that MAC layer and routing protocols capable of using asymmetric links are more complex than traditional ones, but can improve the connectivity, and provide better performance. We are confident that approximate results for various performance metrics of wireless networks obtained using time-parallel simulation are sufficiently accurate and able to provide the necessary insight into the inner workings of the protocols.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001736, ucf:47302
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001736
-
-
Title
-
CONNECTIONLESS APPROACH A LOCALIZED SCHEME TO MOBILE AD HOC NETWORKS.
-
Creator
-
Ho, Yao, Hua, Kien, University of Central Florida
-
Abstract / Description
-
According to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for...
Show moreAccording to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for Mobile Ad hoc NETwork (MANET) applications and Wireless Mesh Network (WMN) applications. A MANET is a self-organizing multi-hop wireless network where all nodes participate in the routing and data forwarding process. Such a network can be easily deployed in situations where no base station is available, and a network must be build spontaneously. In applications such as battlefield communications, national crises, disaster recovery, and sensor deployment, a wired network is not available and ad hoc networks provide the only feasible means of communications and information access. Ad hoc networks have also become commonplace for gaming, conferencing, electronic classrooms, and particularly vehicle-to-vehicle communications. A Wireless mash network (WMN) is collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. Their rapid deployment and ease of maintenance are suitable for on-demand network such as disaster recovery, homeland security, convention centers, hard-to-wire buildings and unfriendly terrains. One important problem with MANET is the routing protocol that needs to work well not just with a small network, but also sustain efficiency and scalability as the network gets expanded and the application transmits data in greater volume. In such an environment, mobility, channel error, and congestion are the main causes for packet loss. Due to mobility of mobile hosts, addressing frequent and unpredictable topology changes is fundamental to MANET research. Two general approaches have been considered: connection-oriented approach and connectionless-oriented approach. In the former, the emphasis is on how to reconnect quickly with low overhead when a broken link occurs. Examples of this approach includes , , , , , , , , , and . In contrast, connectionless-oriented approach focuses on minimizing the occurrence of broken links. We proposed one such scheme called Connectionless Approach (CLA) and . In CLA, the network area is divided into non-overlapping grid cells, each serving as a virtual router. Any physical router (i.e., mobile host), currently inside a virtual router, can help forward the data packet to the next virtual router along the virtual link. This process is repeated until the packet reaches its final destination. Since a virtual link is based on virtual routers which do not move, it is much more robust than physical links used in the connection-oriented techniques. Simulation results in our previous works and , based on GloMoSim , indicate that CLA performs significantly better than connection-oriented techniques (i.e., AODV, DSR, LAR, GRID, TMNR, and GPSR). The contribution of this work consists of investigating and developing new Connectionless-Oriented Approach for Mobile Ad Hoc Network. Two of the greatest impacts of this research are as follows. First, the new approach is targeted towards robustly support high mobility and large scale environment which has been adapted for vehicle-to-vehicle environment in . Second, the detailed simulations which compare eight representative routing protocols, namely AODV, DSR, LAR, GRID, TMNR, GPSR, CBF, and CLA, under high-mobility environments. As many important emergent applications of the technology involved high-mobility nodes, very little is known about the existing routing methods perform relative to each other in high-mobility environments. The simulation results provide insight into ad hoc routing protocols and offer guidelines for mobile ad hoc network applications. Next, we enhanced and extend the connectionless-oriented approach. The current connectionless-oriented approach, however, may suffer from packet drops since traffic congestion is not considered in the packet forwarding policy. We address this weakness by considering the connectionless-oriented approach with a collision avoidance routing technique. After that, we investigate techniques to enforce collaboration among mobile devices in supporting the virtual router functionality. Many works have been published to combat such problem - misbehaving nodes are detected and a routing algorithm is employed to avoid and penalize misbehaving nodes. These techniques, however, cannot be applied to the connectionless-oriented approach since any node in the general direction towards the destination node can potentially help forward the data packets. To address the security and cooperation issues for connectionless-oriented approach, we introduce a cooperation enforcement technique called 3CE (3-Counter Enforcement). In addition, wireless mesh networks have become increasingly popular in recent years. Wireless mash network (WMNs) are collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. We propose a paradigm that combines virtual routers and mesh nodes to create a hybrid network call VR-Mesh Network. This hybrid network can reduce number of mesh node needed without decrease the performance of the network.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002742, ucf:48146
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002742
-
-
Title
-
MODELING, DESIGN AND EVALUATION OF NETWORKING SYSTEMS AND PROTOCOLS THROUGH SIMULATION.
-
Creator
-
Lacks, Daniel, Kocak, Taskin, University of Central Florida
-
Abstract / Description
-
Computer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework...
Show moreComputer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework that can be used to create new networking simulators on top of an HLA-based federation for distributed simulation. The goals are to model and simulate networking architectures and protocols by developing a common underlying simulation infrastructure and to reduce the time a developer has to learn the semantics of message passing and time management to free more time for experimentation and data collection and reporting. This is accomplished by evolving the simulation engine through three different applications that model three different types of network protocols. Computer networking is a good candidate for simulation because of the Internet's rapid growth that has spawned off the need for new protocols and algorithms and the desire for a common infrastructure to model these protocols and algorithms. One simulation, the 3DInterconnect simulator, simulates data transmitting through a hardware k-array n-cube network interconnect. Performance results show that k-array n-cube topologies can sustain higher traffic load than the currently used interconnects. The second simulator, Cluster Leader Logic Algorithm Simulator, simulates an ad-hoc wireless routing protocol that uses a data distribution methodology based on the GPS-QHRA routing protocol. CLL algorithm can realize a maximum of 45% power savings and maximum 25% reduced queuing delay compared to GPS-QHRA. The third simulator simulates a grid resource discovery protocol for helping Virtual Organizations to find resource on a grid network to compute or store data on. Results show that worst-case 99.43% of the discovery messages are able to find a resource provider to use for computation. The simulation engine was then built to perform basic HLA operations. Results show successful HLA functions including creating, joining, and resigning from a federation, time management, and event publication and subscription.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001887, ucf:47399
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001887
-
-
Title
-
EXAMINING ROUTE DIVERSION AND MULTIPLE RAMP METERING STRATEGIES FOR REDUCING REAL-TIME CRASH RISK ON URBAN FREEWAYS.
-
Creator
-
Gayah, Vikash, Abdel-Aty, Mohamed, University of Central Florida
-
Abstract / Description
-
Recent research at the University of Central Florida addressing crashes on Interstate-4 in Orlando, Florida has led to the creation of new statistical models capable of calculating the crash risk on the freeway (Abdel-Aty et al., 2004; 2005, Pande and Abdel-Aty, 2006). These models yield the rear-end and lane-change crash risk along the freeway in real-time by using static information at various locations along the freeway as well as real-time traffic data that is obtained from the roadway....
Show moreRecent research at the University of Central Florida addressing crashes on Interstate-4 in Orlando, Florida has led to the creation of new statistical models capable of calculating the crash risk on the freeway (Abdel-Aty et al., 2004; 2005, Pande and Abdel-Aty, 2006). These models yield the rear-end and lane-change crash risk along the freeway in real-time by using static information at various locations along the freeway as well as real-time traffic data that is obtained from the roadway. Because these models use the real-time traffic data, they are capable of calculating the respective crash risk values as the traffic flow changes along the freeway. The purpose of this study is to examine the potential of two Intelligent Transportation System strategies for reducing the crash risk along the freeway by changing the traffic flow parameters. The two ITS measures that are examined in this research are route diversion and ramp metering. Route diversion serves to change the traffic flow by keeping some vehicles from entering the freeway at one location and diverting them to another location where they may be more efficiently inserted into the freeway traffic stream. Ramp metering alters the traffic flow by delaying vehicles at the freeway on-ramps and only allowing a certain number of vehicles to enter at a time. The two strategies were tested by simulating a 36.25 mile section of the Interstate-4 network in the PARAMICS micro-simulation software. Various implementations of route diversion and ramp metering were then tested to determine not only the effects of each strategy but also how to best apply them to an urban freeway. Route diversion was found to decrease the overall rear-end and lane-change crash risk along the network at free-flow conditions to low levels of congestion. On average, the two crash risk measures were found to be reduced between the location where vehicles were diverted and the location where they were reinserted back into the network. However, a crash migration phenomenon was observed at higher levels of congestion as the crash risk would be greatly increased at the location where vehicles were reinserted back onto the network. Ramp metering in the downtown area was found to be beneficial during heavy congestion. Both coordinated and uncoordinated metering algorithms showed the potential to significantly decrease the crash risk at a network wide level. When the network is loaded with 100 percent of the vehicles the uncoordinated strategy performed the best at reducing the rear-end and lane-change crash risk values. The coordinated strategy was found to perform the best from a safety and operational perspective at moderate levels of congestion. Ramp metering also showed the potential for crash migration so care must be taken when implementing this strategy to ensure that drivers at certain locations are not put at unnecessary risk. When ramp metering is applied to the entire freeway network both the rear-end and lane-change crash risk is decreased further. ALINEA is found to be the best network-wide strategy at the 100 percent loading case while a combination of Zone and ALINEA provides the best safety results at the 90 percent loading case. It should also be noted that both route diversion and ramp metering were found to increase the overall network travel time. However, the best route diversion and ramp metering strategies were selected to ensure that the operational capabilities of the network were not sacrificed in order to increase the safety along the freeway. This was done by setting the maximum allowable travel time increase at 5% for any of the ITS strategies considered.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001437, ucf:47054
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001437
-
-
Title
-
MEDIUM ACCESS CONTROL PROTOCOLS AND ROUTING ALGORITHMS FOR WIRELESS SENSOR NETWORKS.
-
Creator
-
Bag, Anirban, Bassiouni, Mostafa, University of Central Florida
-
Abstract / Description
-
In recent years, the development of a large variety of mobile computing devices has led to wide scale deployment and use of wireless ad hoc and sensor networks. Wireless Sensor Networks consist of battery powered, tiny and cheap "motes", having sensing and wireless communication capabilities. Although wireless motes have limited battery power, communication and computation capabilities, the range of their application is vast. In the first part of the dissertation, we have addressed the...
Show moreIn recent years, the development of a large variety of mobile computing devices has led to wide scale deployment and use of wireless ad hoc and sensor networks. Wireless Sensor Networks consist of battery powered, tiny and cheap "motes", having sensing and wireless communication capabilities. Although wireless motes have limited battery power, communication and computation capabilities, the range of their application is vast. In the first part of the dissertation, we have addressed the specific application of Biomedical Sensor Networks. To solve the problem of data routing in these networks, we have proposed the Adaptive Least Temperature Routing (ALTR) algorithm that reduces the average temperature rise of the nodes in the in-vivo network while routing data efficiently. For delay sensitive biomedical applications, we proposed the Hotspot Preventing Routing (HPR) algorithm which avoids the formation of hotspots (regions having very high temperature) in the network. HPR forwards the packets using the shortest path, bypassing the regions of high temperature and thus significantly reduces the average packet delivery delay, making it suitable for real-time applications of in-vivo networks. We also proposed another routing algorithm suitable for being used in a network of id-less biomedical sensor nodes, namely Routing Algorithm for networks of homogeneous and Id-less biomedical sensor Nodes (RAIN). Finally we developed Biocomm, a cross-layer MAC and Routing protocol co-design for Biomedical Sensor Networks, which optimizes the overall performance of an in-vivo network through cross-layer interactions. We performed extensive simulations to show that the proposed Biocomm protocol performs much better than the other existing MAC and Routing protocols in terms of preventing the formation of hotspots, reducing energy consumption of nodes and preventing network congestion when used in an in-vivo network. In the second part of the dissertation, we have addressed the problems of habitat-monitoring sensor networks, broadcast algorithms for sensor networks and the congestion problem in sensor networks as well as one non-sensor network application, namely, on-chip communication networks. Specifically, we have proposed a variation of HPR algorithm, called Hotspot Preventing Adaptive Routing (HPAR) algorithm, for efficient data routing in Networks On-Chip catering to their specific hotspot prevention issues. A protocol similar to ALTR has been shown to perform well in a sensor network deployed for habitat monitoring. We developed a reliable, low overhead broadcast algorithm for sensor networks namely Topology Adaptive Gossip (TAG) algorithm. To reduce the congestion problem in Wireless Sensor Networks, we proposed a tunable cross-layer Congestion Reducing Medium Access Control (CRMAC) protocol that utilizes buffer status information from the Network layer to give prioritized medium access to congested nodes in the MAC layer and thus preventing congestion and packet drops. CRMAC can also be easily tuned to satisfy different application-specific performance requirements. With the help of extensive simulation results we have shown how CRMAC can be adapted to perform well in different applications of Sensor Network like Emergency Situation that requires a high network throughput and low packet delivery latency or Long-term Monitoring application requiring energy conservation.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001915, ucf:47480
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001915
-
-
Title
-
QOS IN COGNITIVE PACKET NETWORKS: ADAPTIVE ROUTING, FLOW AND CONGESTION CONTROL.
-
Creator
-
Su, Pu, Gelenbe, Erol, University of Central Florida
-
Abstract / Description
-
With the emergence of various applications that have different Quality of Service (QoS) requirements, the capability of a network to support QoS becomes more and more important and necessary. This dissertation explores QoS in Cognitive Packet Networks (CPN) by using adaptive routing, flow and congestion control. We present a detailed description and analysis of our proposed routing algorithms based on single and multiple QoS constraints. An online estimation of packet loss rate over a path is...
Show moreWith the emergence of various applications that have different Quality of Service (QoS) requirements, the capability of a network to support QoS becomes more and more important and necessary. This dissertation explores QoS in Cognitive Packet Networks (CPN) by using adaptive routing, flow and congestion control. We present a detailed description and analysis of our proposed routing algorithms based on single and multiple QoS constraints. An online estimation of packet loss rate over a path is introduced. We implement and evaluate the adaptive routing scheme in an experimental CPN test-bed. Our experiments support our claims that the users can achieve their desired best-effort QoS through this routing scheme. We also propose a QoS-based flow and congestion control scheme that is built in the transport layer and specially designed to work with CPN to support users' QoS while remaining friendly to TCP. Theoretical models and experimental analysis are presented. Finally we experimentally demonstrate that the proposed flow and congestion control scheme can effectively control the input flows, react to the congestion and work with our proposed adaptive routing scheme to achieve users' QoS.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000813, ucf:46685
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000813
-
-
Title
-
COLLABORATION ENFORCEMENT IN MOBILE AD HOC NETWORKS.
-
Creator
-
Jiang, Ning, Hua, Kien, University of Central Florida
-
Abstract / Description
-
Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of...
Show moreMobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001047, ucf:46820
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001047
-
-
Title
-
SARP NET: A SECURE, ANONYMOUS, REPUTATION-BASED, PEER-TO-PEER NETWORK.
-
Creator
-
Mondesire, Sean, Lee, Joohan, University of Central Florida
-
Abstract / Description
-
Since the advent of Napster, the idea of peer-to-peer (P2P) architectures being applied to file-sharing applications has become popular, spawning other P2P networks like Gnutella, Morpheus, Kazaa, and BitTorrent. This growth in P2P development has nearly eradicated the idea of the traditional client-server structure in the file-sharing model, now placing emphasizes on faster query processing, deeper levels of decentralism, and methods to protect against copyright law violation. SARP Net is a...
Show moreSince the advent of Napster, the idea of peer-to-peer (P2P) architectures being applied to file-sharing applications has become popular, spawning other P2P networks like Gnutella, Morpheus, Kazaa, and BitTorrent. This growth in P2P development has nearly eradicated the idea of the traditional client-server structure in the file-sharing model, now placing emphasizes on faster query processing, deeper levels of decentralism, and methods to protect against copyright law violation. SARP Net is a secure, anonymous, decentralized, P2P overlay network that is designed to protect the activity of its users in its own file-sharing community. It is secure in the fact that public-key encryption is used to guard eavesdroppers during messages. The protocol guarantees user anonymity by incorporating message hopping from node to node to prevent any network observer from pinpointing the origin of any file query or shared-file source. To further enhance the system's security, a reputation scheme is incorporated to police nodes from malicious activity, maintain the overlay's topology, and enforce rules to protect node identity.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001264, ucf:46900
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001264
-
-
Title
-
DESIGN AND ANALYSIS OF EFFECTIVE ROUTING AND CHANNEL SCHEDULING FOR WAVELENGTH DIVISION MULTIPLEXING OPTICAL NETWORKS.
-
Creator
-
Gao, Xingbo, Bassiouni, Mostafa, University of Central Florida
-
Abstract / Description
-
Optical networking, employing wavelength division multiplexing (WDM), is seen as the technology of the future for the Internet. This dissertation investigates several important problems affecting optical circuit switching (OCS) and optical burst switching (OBS) networks. Novel algorithms and new approaches to improve the performance of these networks through effective routing and channel scheduling are presented. Extensive simulations and analytical modeling have both been used to evaluate...
Show moreOptical networking, employing wavelength division multiplexing (WDM), is seen as the technology of the future for the Internet. This dissertation investigates several important problems affecting optical circuit switching (OCS) and optical burst switching (OBS) networks. Novel algorithms and new approaches to improve the performance of these networks through effective routing and channel scheduling are presented. Extensive simulations and analytical modeling have both been used to evaluate the effectiveness of the proposed algorithms in achieving lower blocking probability, better fairness as well as faster switching. The simulation tests were performed over a variety of optical network topologies including the ring and mesh topologies, the U.S. Long-Haul topology, the Abilene high-speed optical network used in Internet 2, the Toronto Metropolitan topology and the European Optical topology. Optical routing protocols previously published in the literature have largely ignored the noise and timing jitter accumulation caused by cascading several wavelength conversions along the lightpath of the data burst. This dissertation has identified and evaluated a new constraint, called the wavelength conversion cascading constraint. According to this constraint, the deployment of wavelength converters in future optical networks will be constrained by a bound on the number of wavelength conversions that a signal can go through when it is switched all-optically from the source to the destination. Extensive simulation results have conclusively demonstrated that the presence of this constraint causes significant performance deterioration in existing routing and wavelength assignment (RWA) algorithms. Higher blocking probability and/or worse fairness have been observed for existing RWA algorithms when the cascading constraint is not ignored. To counteract the negative side effect of the cascading constraint, two constraint-aware routing algorithms are proposed for OCS networks: the desirable greedy algorithm and the weighted adaptive algorithm. The two algorithms perform source routing using link connectivity and the global state information of each wavelength. Extensive comparative simulation results have illustrated that by limiting the negative cascading impact to the minimum extent practicable, the proposed approaches can dramatically decrease the blocking probability for a variety of optical network topologies. The dissertation has developed a suite of three fairness-improving adaptive routing algorithms in OBS networks. The adaptive routing schemes consider the transient link congestion at the moment when bursts arrive and use this information to reduce the overall burst loss probability. The proposed schemes also resolve the intrinsic unfairness defect of existing popular signaling protocols. The extensive simulation results have shown that the proposed schemes generally outperform the popular shortest path routing algorithm and the improvement could be substantial. A two-dimensional Markov chain analytical model has also been developed and used to analyze the burst loss probabilities for symmetrical ring networks. The accuracy of the model has been validated by simulation. Effective proactive routing and preemptive channel scheduling have also been proposed to address the conversion cascading constraint in OBS environments. The proactive routing adapts the fairness-improving adaptive routing mentioned earlier to the environment of cascaded wavelength conversions. On the other hand, the preemptive channel scheduling approach uses a dynamic priority for each burst based on the constraint threshold and the current number of performed wavelength conversions. Empirical results have proved that when the cascading constraint is present, both approaches would not only decrease the burst loss rates greatly, but also improve the transmission fairness among bursts with different hop counts to a large extent.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002965, ucf:47958
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002965
-
-
Title
-
A Framework for Assessing Sustainability Impacts of Truck Routing Strategies.
-
Creator
-
Laman, Haluk, Abdel-Aty, Mohamed, Tatari, Omer, Ahmed, Mohamed, University of Central Florida
-
Abstract / Description
-
The impact of freight on our transportation system is further accentuated by the fact that trucks consume greater roadway capacity and therefore cause more significant problems including traffic congestion, delay, crashes, air pollution, fuel consumption, and pavement damage. Assessing the actual effects of truck traffic is a growing need to support the ability to safely and efficiently move goods and people in areas where roadway expansion is not the best option. On one hand, trucks need to...
Show moreThe impact of freight on our transportation system is further accentuated by the fact that trucks consume greater roadway capacity and therefore cause more significant problems including traffic congestion, delay, crashes, air pollution, fuel consumption, and pavement damage. Assessing the actual effects of truck traffic is a growing need to support the ability to safely and efficiently move goods and people in areas where roadway expansion is not the best option. On one hand, trucks need to efficiently serve commerce and industry, while at the same time their activities need not contribute to a decline in the quality or public safety. In the current practice, to the best of the authors' knowledge, there is no framework methodology for real-time management of traffic, specifically on truck routes, to reduce travel duration and avoid truck travel delays due to non-recurring congestion (i.e. traffic incidents) and to estimate impacts on traffic flows, economy, and environment. The objective of this study is to develop a truck routing strategy and to quantify its' impacts on travel time, emissions and consequently assess the effects on the economy and environment. In order to estimate non-recurrent congestion based travel delay and fuel consumption by real-time truck routing simulation models, significant corridors with high truck percentages were selected. Furthermore, tailpipe emissions (on-site) due to traveled distance and idling are estimated via MOVES emissions simulator software. Economic Input Output-Life Cycle Assessment Model is utilized to gather fuel consumption related upstream (off-site) emissions. Simulation results of various scenarios indicated that potential annual value of time savings can reach up to $1.67 million per selected corridor. Consistently, fuel costs and emission values are lower, even though extra miles are traveled on the alternative route. In conclusion, our study confirms that truck routing strategies in incident conditions have high economic and environmental impacts.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007577, ucf:52570
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007577
-
-
Title
-
Pervasive Secure Content Delivery Networks Implementation.
-
Creator
-
Lugo-Cordero, Hector, Guha, Ratan, Stanley, Kenneth, Chatterjee, Mainak, Wu, Annie, Lu, Kejie, University of Central Florida
-
Abstract / Description
-
Over the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart...
Show moreOver the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart phones, smart homes, computers, etc.), which we interact daily are connected and exchanging data among themselves and users. The IoT has become a global goal for companies, researchers, and users alike due to its different implementation and functional benefits: performance efficiency, coverage, economic and health. Due to the variety of devices which connect to it, it is expected that the IoT is composed of multiple technologies interacting together, to deliver a service. This technologies interactions renders an important challenge that must be overcome: how to communicate these technologies effectively and securely? The answer to this question is vital for a successful deployment of IoT and achievement of all the potential benefits that the IoT promises.This thesis proposes a SOA approach at the Network Layer to be able to integrate all technologies involved, in a transparent manner. The proposed set of solutions is composed of primarily the secure implementation of a unifying routing algorithm and a layered messaging model to standardizecommunication of all devices. Security is targeted to address the three main security concerns (i.e., confidentiality, integrity, and availability), with pervasive schemes that can be employed for any kind of device on the client, backbone, and server side. The implementation of such schemes is achieved by standard current security mechanisms (e.g., encryption), in combination with novel context and intelligent checks that detect compromised devices. Moreover, a decentralized content processing design is presented. In such design, content processing is handled at the client side, allowing server machines to serve more content, while being more reliable and capable of processing complete security checks on data and client integrity.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006620, ucf:51268
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006620
-
-
Title
-
GIS Analysis of Obsidian Artifacts distribution at Holtun from the Preclassic through the Classic Periods.
-
Creator
-
Guzman Piedrasanta, Melvin, Kovacevich, Brigitte, Callaghan, Michael, Walker, John, University of Central Florida
-
Abstract / Description
-
The nature of social organization at an archaeological site can be interpreted from many types of material remains. Exotic goods are particularly useful for making inferences about social organization because of their scarcity, utilitarian demand, and symbolic characteristics. Obsidian artifacts are some of the most abundant exotic goods among the Lowland Maya. The acquisition of these artifacts was the result of a wide net of commerce from the highlands of Guatemala and central Mexico into...
Show moreThe nature of social organization at an archaeological site can be interpreted from many types of material remains. Exotic goods are particularly useful for making inferences about social organization because of their scarcity, utilitarian demand, and symbolic characteristics. Obsidian artifacts are some of the most abundant exotic goods among the Lowland Maya. The acquisition of these artifacts was the result of a wide net of commerce from the highlands of Guatemala and central Mexico into the Maya lowlands. The patterns of consumption and distribution of obsidian artifacts vary according the time and location. This variation is seen as the result of complex dynamics of trade and social interactions among the ancient Maya. Therefore, I argue that there is variability perceptible in the patterns of consumption and local distribution of obsidian between the elite residential groups at the site of Holtun. This study presents a descriptive and comparative analysis of the patterns of obsidian consumption observed in the samples from the excavations performed by the Holtun Archaeological Project from 2011 through 2016. The analysis contributes to the understanding of local processes in association with regional socioeconomic and political dynamics in the Maya Lowlands.Previous research has suggested that obsidian distribution in some times and places was centralized and controlled by powerful Maya polities. In addition, research performed on obsidian artifacts reveals a change in the consumption of different obsidian sources at other sites in the Yaxh(&)#225; basin, the geographic location of Holtun. The data collected by Holtun Archaeological Project provide information that correlates with the broader trends of obsidian preferences in the area. Our findings suggest that during the Preclassic period (c. 600 BC to AD 250) the frequency of obsidian artifacts from San Martin Jilotepeque was higher than other sources and the artifacts from El Chayal were restricted to households especially associated with the first ritual and monumental construction at the site. Then, during the Classic Period (AD 250 to 950), the frequency of artifacts from San Martin Jilotepeque experienced a decrease in quantity and the artifacts from El Chayal were more accessible across the site. The process of excavation and mapping, and the subsequent laboratory analyses have allowed for the documentation of this variability in accessibility and consumption preferences within different elite residential groups. To facilitate these interpretations, a map of Holtun was created using Geographic Information Systems. It allows the inclusion of layers of information obtained during this research, constituting a point of reference for the understanding of socioeconomic and political changes experienced within the site during the intriguing transition from the Preclassic to the Classic period.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006945, ucf:51669
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006945
Pages