10 research outputs found

    Performance analysis of low earth orbit (LEO) satellite link in the presence of elevation angle, fading and shadowing

    Get PDF
    This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2009.Cataloged from PDF version of thesis report.Includes bibliographical references (page 65).Tanjila FarahPrianka RoyB. Computer Science and Engineerin

    Comparison of WiMAX and ADSL Performance when Streaming Audio and Video Content

    Get PDF
    The IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) standard is widely used for fixed and mobile Internet access. WiMAX provides maximum data rate of 75 Mbps and high-speed Internet access to a wide range of devices used by clients over the last mile. Asymmetric Digital Subscriber Line (ADSL) is widely used to provide guaranteed service. In this paper, we compare performance of WiMAX and ADSL by streaming audio and video contents. File Transfer Protocol (FTP), Hyper Text Transfer Protocol (HTTP), and electronic mail have also been used for the comparison. We used OPNET Modeler versions 15.0 and 16.0 to evaluate packet loss, delay, delay jitter, and throughput with various design parameters to determine whether WiMAX exhibits performance comparable to ADSL

    Algorithms and tools for anonymization of the internet traffic

    Get PDF
    Collecting network traffic traces from deployed networks is one of the basic steps in under-standing communication networks and ensuring adequate quality of service. Traffic traces may be used for network management, traffic engineering, packet classification, and for analyzing user behavior. They may also be used for identifying and tracking network anomalies and for maintaining network security. For privacy and security reasons, monitored traffic traces should be anonymization before they may be shared. The goal of anonymization is to preserve traffic properties while enforcing the privacy policies. Various tools and techniques have been implemented for trace anonymization such as: Crypto-PAn, Anon-tool, FLAIM, ip2anonip, IP-Anonymous, and TCPdprive. These tools use a number of anonymization algorithms such as black-marker, random permutations, truncation, pseudo-anonymization, and prefix-preserving pseudo-anonymization. In this thesis, we present a survey of anonymization tools and algorithms. We propose and implement a new anonymization tool called Anonym, which allows the user to execute multi-level anonymization and to display analysis results. Finally, we evaluate the impact of the anonymization on the anonymized traffic data

    Anonym: A tool for anonymization of the Internet traffic

    No full text
    Collecting network traffic traces from deployed networks is one of the basic steps in understanding communication networks. Traffic traces are used for network management, traffic engineering, packet classification, and analyzing user behavior to ensure adequate quality of service. Monitored traffic traces should be anonymized for privacy and security reasons. The goal of anonymization is to preserve trace properties while enforcing privacy policies. Various tools and techniques have been implemented for trace anonymization. In this paper, we propose and implement an anonymization tool that executes multilevel anonymization and displays analysis results. We describe architecture and features of the tool and discuss analysis of un-anonymized and anonymized datasets
    corecore