Matching Items (983)
152849-Thumbnail Image.png
Description
New OpenFlow switches support a wide range of network applications, such as firewalls, load balancers, routers, and traffic monitoring. While ternary content addressable memory (TCAM) allows switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of forwarding

New OpenFlow switches support a wide range of network applications, such as firewalls, load balancers, routers, and traffic monitoring. While ternary content addressable memory (TCAM) allows switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of forwarding rules. To allow for finer-grained policies on this hardware, efficient ways to support the abstraction of a switch are needed with arbitrarily large rule tables. To do so, a hardware-software hybrid switch is designed that relies on rule caching to provide large rule tables at low cost. Unlike traditional caching solutions, neither individual rules are cached (to respect rule dependencies) nor compressed (to preserve the per-rule traffic counts). Instead long dependency chains are ``spliced'' to cache smaller groups of rules while preserving the semantics of the network policy. The proposed hybrid switch design satisfies three criteria: (1) responsiveness, to allow rapid changes to the cache with minimal effect on traffic throughput; (2) transparency, to faithfully support native OpenFlow semantics; (3) correctness, to cache rules while preserving the semantics of the original policy. The evaluation of the hybrid switch on large rule tables suggest that it can effectively expose the benefits of both hardware and software switches to the controller and to applications running on top of it.
ContributorsAlipourfard, Omid (Author) / Syrotiuk, Violet R. (Thesis advisor) / Richa, Andréa W. (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2014
151063-Thumbnail Image.png
Description
Interference constitutes a major challenge for communication networks operating over a shared medium where availability is imperative. This dissertation studies the problem of designing and analyzing efficient medium access protocols which are robust against strong adversarial jamming. More specifically, four medium access (MAC) protocols (i.e., JADE, ANTIJAM, COMAC, and SINRMAC)

Interference constitutes a major challenge for communication networks operating over a shared medium where availability is imperative. This dissertation studies the problem of designing and analyzing efficient medium access protocols which are robust against strong adversarial jamming. More specifically, four medium access (MAC) protocols (i.e., JADE, ANTIJAM, COMAC, and SINRMAC) which aim to achieve high throughput despite jamming activities under a variety of network and adversary models are presented. We also propose a self-stabilizing leader election protocol, SELECT, that can effectively elect a leader in the network with the existence of a strong adversary. Our protocols can not only deal with internal interference without the exact knowledge on the number of participants in the network, but they are also robust to unintentional or intentional external interference, e.g., due to co-existing networks or jammers. We model the external interference by a powerful adaptive and/or reactive adversary which can jam a (1 − ε)-portion of the time steps, where 0 < ε ≤ 1 is an arbitrary constant. We allow the adversary to be adaptive and to have complete knowledge of the entire protocol history. Moreover, in case the adversary is also reactive, it uses carrier sensing to make informed decisions to disrupt communications. Among the proposed protocols, JADE, ANTIJAM and COMAC are able to achieve Θ(1)-competitive throughput with the presence of the strong adversary; while SINRMAC is the first attempt to apply SINR model (i.e., Signal to Interference plus Noise Ratio), in robust medium access protocols design; the derived principles are also useful to build applications on top of the MAC layer, and we present SELECT, which is an exemplary study for leader election, which is one of the most fundamental tasks in distributed computing.
ContributorsZhang, Jin (Author) / Richa, Andréa W. (Thesis advisor) / Scheideler, Christian (Committee member) / Sen, Arunabha (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2012
154160-Thumbnail Image.png
Description
Exhaustive testing is generally infeasible except in the smallest of systems. Research

has shown that testing the interactions among fewer (up to 6) components is generally

sufficient while retaining the capability to detect up to 99% of defects. This leads to a

substantial decrease in the number of tests. Covering arrays are combinatorial

Exhaustive testing is generally infeasible except in the smallest of systems. Research

has shown that testing the interactions among fewer (up to 6) components is generally

sufficient while retaining the capability to detect up to 99% of defects. This leads to a

substantial decrease in the number of tests. Covering arrays are combinatorial objects

that guarantee that every interaction is tested at least once.

In the absence of direct constructions, forming small covering arrays is generally

an expensive computational task. Algorithms to generate covering arrays have been

extensively studied yet no single algorithm provides the smallest solution. More

recently research has been directed towards a new technique called post-optimization.

These algorithms take an existing covering array and attempt to reduce its size.

This thesis presents a new idea for post-optimization by representing covering

arrays as graphs. Some properties of these graphs are established and the results are

contrasted with existing post-optimization algorithms. The idea is then generalized to

close variants of covering arrays with surprising results which in some cases reduce

the size by 30%. Applications of the method to generation and test prioritization are

studied and some interesting results are reported.
ContributorsKaria, Rushang Vinod (Author) / Colbourn, Charles J (Thesis advisor) / Syrotiuk, Violet (Committee member) / Richa, Andréa W. (Committee member) / Arizona State University (Publisher)
Created2015
156648-Thumbnail Image.png
Description
Many applications require efficient data routing and dissemination in Delay Tolerant Networks (DTNs) in order to maximize the throughput of data in the network, such as providing healthcare to remote communities, and spreading related information in Mobile Social Networks (MSNs). In this thesis, the feasibility of using boats in the

Many applications require efficient data routing and dissemination in Delay Tolerant Networks (DTNs) in order to maximize the throughput of data in the network, such as providing healthcare to remote communities, and spreading related information in Mobile Social Networks (MSNs). In this thesis, the feasibility of using boats in the Amazon Delta Riverine region as data mule nodes is investigated and a robust data routing algorithm based on a fountain code approach is designed to ensure fast and timely data delivery considering unpredictable boat delays, break-downs, and high transmission failures. Then, the scenario of providing healthcare in Amazon Delta Region is extended to a general All-or-Nothing (Splittable) Multicommodity Flow (ANF) problem and a polynomial time constant approximation algorithm is designed for the maximum throughput routing problem based on a randomized rounding scheme with applications to DTNs. In an MSN, message content is closely related to users’ preferences, and can be used to significantly impact the performance of data dissemination. An interest- and content-based algorithm is developed where the contents of the messages, along with the network structural information are taken into consideration when making message relay decisions in order to maximize data throughput in an MSN. Extensive experiments show the effectiveness of the above proposed data dissemination algorithm by comparing it with state-of-the-art techniques.
ContributorsLiu, Mengxue (Author) / Richa, Andréa W. (Thesis advisor) / Johnson, Thienne (Committee member) / Syrotiuk, Violet R. (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2018
133588-Thumbnail Image.png
Description
With the new independence of adulthood, college students are a group susceptible to adopting unsupported, if not harmful, health practices. A survey of Arizona State University undergraduate students (N=200) was conducted to evaluate supplement use, trust in information sources, and beliefs about supplement regulation. Of those who reported using supplements,

With the new independence of adulthood, college students are a group susceptible to adopting unsupported, if not harmful, health practices. A survey of Arizona State University undergraduate students (N=200) was conducted to evaluate supplement use, trust in information sources, and beliefs about supplement regulation. Of those who reported using supplements, college students most frequently received information from friends and family. STEM majors in fields unrelated to health who were taking a supplement were found to be less likely to receive information about the supplement from a medical practitioner than those in health fields or those in non-STEM majors (-26.9%, p=0.018). STEM majors in health-related fields were 15.0% more likely to treat colds and/or cold symptoms with research-supported methods identified from reliable sources, while non-health STEM and non-STEM majors were more likely to take unsupported cold treatments (p=0.010). Surveyed students, regardless of major, also stated they would trust a medical practitioner for supplement advice above other sources (88.0%), and the majority expressed a belief that dietary supplements are approved/regulated by the government (59.8%).
ContributorsPerez, Jacob Tanner (Author) / Hendrickson, Kirstin (Thesis director) / Lefler, Scott (Committee member) / College of Liberal Arts and Sciences (Contributor) / School of Molecular Sciences (Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
137433-Thumbnail Image.png
ContributorsChandler, N. Kayla (Author) / Neisewander, Janet (Thesis director) / Sanabria, Federico (Committee member) / Olive, M. Foster (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137434-Thumbnail Image.png
Description
I propose that norms regulate behaviors that negatively impact an individual's survival and reproduction. But because monitoring and enforcing of norms can be costly, individuals should be selective about which norms they police and under what circumstances they should do so. Two studies tested this idea by experimentally activating fitness-relevant

I propose that norms regulate behaviors that negatively impact an individual's survival and reproduction. But because monitoring and enforcing of norms can be costly, individuals should be selective about which norms they police and under what circumstances they should do so. Two studies tested this idea by experimentally activating fitness-relevant motives and having participants answer questions about the policing of norms. The first study examined a norm prescribing respect for status and another proscribing sexual coercion. Results from Study 1 failed to support the hypotheses; activating a status-seeking motive did not have the predicted effects on policing of the respect-status norm nor did activating a mating motive have the predicted effects on policing of the respect-status norm or anti-coercion norm. Study 2 examined two new norms, one prescribing that people stay home when sick and the other proscribing people from having sex with another person's partners. Study 2 also manipulated whether self or others were the target of the policing. Study 2 failed to provide support; a disease avoidance motive failed to have effects on policing of the stay home when sick norm. Individuals in a relationship under a mating motive wanted less policing of others for violation of the mate poaching norm than those in a baseline condition, opposite of the predicted effects.
ContributorsSmith, M. Kristopher (Author) / Neuberg, L. Steven (Thesis director) / Presson, Clark (Committee member) / Hruschka, J. Daniel (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137565-Thumbnail Image.png
Description
Literature in public administration emphasizes a growing dissatisfaction with government on the part of residents. Where there tends to be a lack in the literature is in terms of solutions to this problem. We would like to argue that the engagement process itself has the power to foster a profound

Literature in public administration emphasizes a growing dissatisfaction with government on the part of residents. Where there tends to be a lack in the literature is in terms of solutions to this problem. We would like to argue that the engagement process itself has the power to foster a profound attitudinal shift on the part of both residents and government. This paper explores the structural and cultural barriers to satisfactory public engagement both from literature and a combination of policy analysis, semi-structured interviews and participatory observation within the City of Tempe. We then provide recommendations to the City of Tempe on how to overcome these barriers and effect authentic public engagement practices. With these new suggested practices and mindsets, we provide a way that people can have the power to create their own community.
ContributorsRiffle, Morgan (Co-author) / Tchida, Celina (Co-author) / Ingram-Waters, Mary (Thesis director) / Grzanka, Patrick (Committee member) / King, Cheryl (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137451-Thumbnail Image.png
Description
This thesis examines the relationship between unofficial, official, and parallel Islam in Uzbekistan following the end of the Soviet Union. Key touchstone moments in Uzbekistan during the twentieth-century show the history between unofficial and official Islam and the resulting precedents set for Muslims gathering against the government. This historical analysis

This thesis examines the relationship between unofficial, official, and parallel Islam in Uzbekistan following the end of the Soviet Union. Key touchstone moments in Uzbekistan during the twentieth-century show the history between unofficial and official Islam and the resulting precedents set for Muslims gathering against the government. This historical analysis shows how President Karimov and the Uzbek government view and approach Islam in the country following independence.
ContributorsTieslink, Evan (Author) / Batalden, Stephen (Thesis director) / Kefeli, Agnes (Committee member) / Saikia, Yasmin (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor) / School of Politics and Global Studies (Contributor) / School of Historical, Philosophical and Religious Studies (Contributor)
Created2013-05
137145-Thumbnail Image.png
Description
Through this creative project, I executed a Distracted Driving Awareness Campaign at Arizona State University to raise awareness about the dangers of distracted driving, specifically texting while driving. As an Undergraduate Student Government Senator, my priority is the safety and success of students, both in and out of the classroom.

Through this creative project, I executed a Distracted Driving Awareness Campaign at Arizona State University to raise awareness about the dangers of distracted driving, specifically texting while driving. As an Undergraduate Student Government Senator, my priority is the safety and success of students, both in and out of the classroom. By partnering with State Farm and AT&T, we were able to raise awareness about the dangers of distracted driving and collected over 200 pledges from students to never text and drive.
ContributorsHibbs, Jordan Ashley (Author) / Miller, Clark (Thesis director) / Parmentier, Mary Jane (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor) / School of Politics and Global Studies (Contributor) / Department of Psychology (Contributor) / Graduate College (Contributor)
Created2014-05