Now showing items 1-20 of 35

    • A BGP Attack Against Traffic Engineering 

      Kim, Jintae; Ko, Steven Y.; Nicol, David M.; Dimitropoulos, Christos Xenofontas A.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2004-12)
      As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configurations of the border gateway protocol (BGP). ...
    • Bluetooth Simulations for Wireless Sensor Networks Using GTNetS 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2004-10)
      We introduce a simulation environment for wireless sensor networks using the Bluetooth wireless protocol in our Georgia Tech Network Simulator (GTNetS). Our goal is to explore the applicability of the Bluetooth protocol ...
    • Creating Realistic BGP Models 

      Dimitropoulos, Christos Xenofontas A.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2003-10)
      Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lead to demanding requirements for the simulation ...
    • Distributed Network Simulations Using the Dynamic Simulation Backplane 

      Riley, George F.; Ammar, Mostafa H. (Mostafa Hamed); Fujimoto, Richard M.; Xu, Donghua; Perumalla, Kalyan S. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2001-04)
      Presents an approach for creating distributed, component-based simulations of communication networks by interconnecting models of sub-networks drawn from different network simulation packages. This approach supports the ...
    • Dynamic NIx-Vector Routing for Mobile Ad Hoc Networks 

      Lee, Young J.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-03)
      We present a new protocol for multi–hop routing in mobile ad hoc networks called Dynamic NIx–Vector Routing (DNVR). Our scheme is based on the NIx–Vector concept for efficient routing originally designed for wired ...
    • Efficient Routing Using NIx-Vectors 

      Riley, George F.; Ammar, Mostafa H. (Mostafa Hamed); Zegura, Ellen W. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2001)
      We introduce the concept of Neighbor-Index Vector (NIx-Vector) routing which gives efficient and consistent routing of packets in Internet routers. A NIx-Vector is a compact representation of a routing path, which is small ...
    • Efficient Simulation of Wireless Networks using Lazy MAC State Update 

      Lee, Young J.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-06)
      Scalable and efficient network simulation methods are the method of choice for evaluating and verifying wireless network protocols on a moderate to large scale. This need becomes obvious when simulating very large-scale ...
    • Empirical Models of TCP and UDP End–User Network Traffic from NETI@home Data Analysis 

      Simpson, Charles Robert, Jr.; Reddy, Dheeraj; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2006-05)
      The simulation of computer networks requires accurate models of user behavior. To this end, we present empirical models of end–user network traffic derived from the analysis of NETI@home data. There are two forms of ...
    • Enabling Large-Scale Multicast Simulation by Reducing Memory Requirements 

      Xu, Donghua; Riley, George F.; Ammar, Mostafa H. (Mostafa Hamed); Fujimoto, Richard M. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2003-06)
      The simulation of large–scale multicast networks often requires a significant amount of memory that can easily exceed the capacity of current computers, both because of the inherently large amount of state necessary to ...
    • Energy-Aware On-Demand Scatternet Formation and Routing for Bluetooth-Based Wireless Sensor Networks 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-07)
      Bluetooth is a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency, both desirable for wireless sensor networks. The new Intel Mote sensor ...
    • Evaluation and Accelerating Bluetooth Device Discovery 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2006-01)
      As a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency, Bluetooth is a ubiquitous candidate for wireless sensor network. The device discovery ...
    • Evaluation of Worm Containment Algorithms and their Effect on Legitimate Traffic 

      Abdelhafez, Mohamed; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-03)
      Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several counter–measures have been ...
    • Experiences Applying Parallel and Interoperable Network Simulation Techniques in On-line Simulations of Military Networks 

      Perumalla, Kalyan S.; Fujimoto, Richard M.; McLean, Thom; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2002)
      We present a case study in which we apply parallel simulation methods and interoperability techniques to network simulations for simulation-based on-line control of military communication networks. The on-line simulations ...
    • Experiences Parallelizing a Commercial Network Simulator 

      Wu, Hao; Fujimoto, Richard M.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2001-12)
      Most current approaches of parallel simulation focus on building new parallel simulation engines that require the development of new models and software. An alternate, emerging approach is to extend sequential simulators ...
    • Exploiting the Predictability of TCP’s Steady-state Behavior to Speed Up Network Simulation 

      He, Qi; Ammar, Mostafa H. (Mostafa Hamed); Riley, George F.; Fujimoto, Richard M. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2002-10)
      In discrete-event network simulation, a significant portion of resources and computation are dedicated to the creation and processing of packet transmission events. For large-scale network simulations with a large number ...
    • Flow Based Observations from NETI@home and Honeynet Data 

      Grizzard, Julian B.; Simpson, Charles Robert, Jr.; Krasser, Sven; Owen, Henry L., III; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-06)
      We conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets ...
    • A Generic Framework for Parallelization of Network Simulations 

      Riley, George F.; Fujimoto, Richard M.; Ammar, Mostafa H. (Mostafa Hamed) (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 1999-10)
      Discrete event simulation is widely used within the networking community for purposes such as demonstrating the validity of network protocols and architectures. Depending on the level of detail modeled within the simulation, ...
    • Integrated Fluid and Packet Network Simulations 

      Riley, George F.; Jaafar, Talal Mohamed; Fujimoto, Richard M. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2002-10)
      A number of methods exist that can be used to create simulation models for measuring the performance of computer networks. The most commonly used method is packet level simulation, which models the detailed behavior of ...
    • Intrusion Detection Testing and Benchmarking Methodologies 

      Athanasiades, Nicholas; Abler, Randal Thomas; Levine, John G. (John Glenn); Owen, Henry L., III; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2003-03)
      The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algorithms and approaches. After conducting a ...
    • IPA for Loss Volume and Buffer Workload in Tandem SFM 

      Wardi, Yorai; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2002)
      This paper considers congestion-related performance metrics in tandem networks of Stochastic Fluid Models (SFMs), and derives their IPA gradient estimators with respect to buffer sizes. Specifically, the performance ...