8 research outputs found

    Olympics MPEG-II traffic library

    No full text
    Issued as final repor

    Quality of service and fairness in ATM based MPLS switches implementing packet based VC-merge

    No full text
    Ph.D.John A. Copelan

    University Methodology for Internetworking Principles and Design Projects

    Get PDF
    ©2003 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or distribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.An undergraduate engineering internetworking learning environment that presents both internetworking principles and laboratory experimentation is described. The learning environment uses the source code availability of the Linux operating system as a case study of the implementation issues and ramifications of internet networking infrastructures. Laboratory use of experimentation with internetworking equipment and software allows interaction with internetworking principles and fundamentals as well as implementation and performance issues. The objectives of this environment include providing a comprehensive mechanism whereby students are exposed to fundamentals and principles that may readily be applied to experimental-based internetwork research and internetwork product development. A follow-on capstone design environment is also briefly described

    LAYER 2 SECURITY INTER-LAYERING IN NETWORKS Approved by:

    No full text
    To my wonderful parents and my beloved family. ACKNOWLEDGEMENTS Completing this Ph.D. has been an exciting long journey, and it would not have been possible without the help and encouragement of many people. First and foremost, I would like to thank my advisor Professor Henry L. Owen for his continuous support and guidance throughout my studies. Professor Owen has been an awesome mentor-he truly enjoys advising. I admire his passion in teaching and conducting research. I really appreciate that he has given me a lot of freedom in my research. It has been my privilege and honor to be associated with Professor Owen and I will be forever grateful for his constant encouragement and wisdom. I would also like to thank the members of my committee, Professor John A. Copeland, Dr. Randal T. Abler, Professor Mustaque Ahamad, and Professor Yorai Wardi, for serving on my proposal and dissertation committees. Furthermore, I have benefited immensely from my interactions with Joachim Sokol, Hans-Peter Huth, and Joachim Grimminger at Siemens AG, in Munich. My thesis topic and several ideas contained in this thesis are the outcomes of our interac-tions with Siemens on the TATI project. I am very grateful to the Siemens AG team for supporting and funding this research as well. I will always appreciate the friendship of my past and present officemates an

    The vertically integrated projects (VIP) program : leveraging faculty research interests to transform undergraduate STEM education

    Get PDF
    The Vertically-Integrated Projects (VIP) Program is an education program that operates in a research and development context. Undergraduate students that join VIP teams earn academic credit for their participation in discovery and design efforts that assist faculty and graduate students with research and development issues in their areas of technical expertise. The teams are: multidisciplinary – drawing students from across campus; vertically integrated – maintaining a mix of sophomores through PhD students each semester; and long-term – each undergraduate student may participate in a project for up to three years. The continuity, technical depth, and disciplinary breadth of these teams enable the completion of projects of significant benefit to faculty members’ research programs. We compare the implementations and success of VIP Programs at five different institutions by a variety of criteria, including: origin and type of implementation strategy; number of disciplines involved; type of institution; implementation in the curriculum; resources and support available; growth of the program; grading/assessment strategy and tools; relationship with other discovery and design programs; software tools for program administration; number of students and faculty involved; etc. While programmatic variations and support have a marked effect on the success of VIP at each institution, its implementation in the curriculum and the ease of scheduling and timetabling teams stand out as two of the most important issues for every VIP site. The common slow pace of curricular change and the variability of curricular implementations across disciplines and institutions, lead to specific recommendations and strategies for future growth and dissemination of the VIP Program

    Intrusion Detection Testing and Benchmarking Methodologies

    Get PDF
    ©2003 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or distribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.Presented at the First IEEE International Workshop on Information Assurance (IWIAS), 2003The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a survey of the literature on the methods and techniques being used, it can be seen that a new approach that incorporates an open source testing methodology and environment would benefit the information assurance community. After summarizing the literature and presenting several example test and evaluation environments that have been used in the past, we propose a new open source evaluation environment and methodology for use by researchers and developers of new intrusion detection and denial of service detection and prevention algorithms and methodologies
    corecore