MODELING AND CONTROL OF NETWORK TRAFFIC FOR PERFORMANCE AND SECURE COMMUNICATIONS A Dissertation by
نویسندگان
چکیده
Modeling and Control of Network Traffic for Performance and Secure Communications. (December 2004) Yong Xiong, B.S., Tsinghua University (China); M.S., Chinese Academy of Space Technology (China) Chair of Advisory Committee: Dr. Jyh-Charn (Steve) Liu The objective of this research is to develop innovative techniques for modeling and control of network congestion. Most existing network controls have discontinuous actions, but such discontinuity in control actions is commonly omitted in analytical models, and instead continuous models were widely adopted in the literature. This approximation works well under certain conditions, but it does cause significant discrepancy in creating robust, responsive control solutions for congestion management. In this dissertation, I investigated three major topics. I proposed a generic discontinuous congestion control model and its design methodology to guarantee asymptotic stability and eliminate traffic oscillation, based on the sliding mode control (SMC) theory. My scheme shows that discontinuity plays a crucial role in optimization of the I-D based congestion control algorithms. When properly modeled, the simple I-D control laws can be made highly robust to parameter and model uncertainties. I discussed applicability of this model to some existing flow or congestion control schemes, e.g. XON/XOFF, rate and window based AIMD, RED, etc. It can also be effectively applied to design of detection and defense of distributed
منابع مشابه
Traffic Analysis, Modeling and Their Applications in Energy-Constrained Wireless Sensor Networks - On Network Optimization and Anomaly Detection
Wireless sensor network (WSN) has emerged as a promising technology thanks to the recent advances in electronics, networking, and information processing. A wide range of WSN applications have been proposed such as habitat monitoring, environmental observations and forecasting systems, health monitoring, etc. In these applications, many low power and inexpensive sensor nodes are deployed in a va...
متن کاملPerformance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
Role-Based Access Control: A Multi-Dimensional View p. 54 Panel: Reexamining Assurance p. 64 Plenary Panel: Secure System Composition p. 66 Secure System Composition: Five Practical Initiatives p. 67 Architectural Impact on Performance of a Multilevel Database System p. 76 Benchmarking Multilevel Secure Database Systems Using the MITRE Benchmark p. 86 Organizing MLS Databases from a Data Modeli...
متن کاملSecuring Network Services for Wireless Ad Hoc and Sensor Networks
Securing Network Services for Wireless Ad Hoc and Sensor Networks Loukas Lazos Chair of the Supervisory Committee: Professor Radha Poovendran Electrical Engineering Wireless ad hoc and sensor networks are envisioned to be self-organized, self-healing and autonomous networks, deployed when no fixed infrastructure is either feasible or costeffective. However, the sucessful commercialization of su...
متن کاملUser Behavioral Modeling of Web-based Systems for Continuous User Authentication
Title of dissertation: USER BEHAVIORAL MODELING OF WEB-BASED SYSTEMS FOR CONTINUOUS USER AUTHENTICATION Leslie C. Milton, Doctor of Philosophy, 2015 Dissertation directed by: Professor Atif M. Memon Department of Computer Science University of Maryland, College Park Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication...
متن کاملPerformance modeling of MPEG-4 video streaming over IEEE 802.11 using distribution coordination function
Scholarly Contributions [Data Provided by ] A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs) Balancing energy consumption with mobile agents in wireless sensor networks Impact of denial of service solutions on network quality of service Service level agreements (SLAs) parameter negotiation between heterogeneous 4G wireless network operators (2011) Pervasive an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004