Browsing by Supervisor "Luckie, Matthew John"

Now showing items 1-6 of 6

  • An algorithmic approach to OpenFlow ruleset transformation

    Sanger, Richard (The University of Waikato, 2020)
    In an ideal development cycle for an OpenFlow application, a developer designs a pipeline to suit their application's needs and installs rules to that pipeline. Their application will run on any OpenFlow switch, whether ...
  • Efficient Internet Topology Discovery Techniques

    King, Alistair John (The University of Waikato, 2010)
    Current macroscopic Internet topology discovery projects use large numbers of vantage points to conduct traceroute surveys of Internet paths. These projects send billions of unsolicited packets to millions of routers within ...
  • Failure resilience and traffic engineering for multi-controller software defined networking

    Zaicu, Nicu Florin (The University of Waikato, 2022)
    This thesis explores and proposes solutions to address the challenges faced by Multi-Controller SDN (MCSDN) systems when deploying TE optimisation on WANs. Despite the interest from the research community, existing MCSDN ...
  • Hidden Terminal Detection in Wide-Area 802.11 Wireless Networks

    Raynel, Scott McKenzie (University of Waikato, 2012)
    The hidden terminal problem is an important issue in wireless networks based on the CSMA medium access control scheme. Hidden terminals pose a complex challenge to network operators trying to identify the underlying cause ...
  • Measuring TCP Congestion Control Behaviour in the Internet

    Eichler, Stephen John (University of Waikato, 2011)
    The Internet is constantly changing and evolving. In this thesis the behaviour of various aspects of the implementation of TCP underlying the Internet are measured. These include measures of Initial Congestion Window (ICW), ...
  • Measuring the effectiveness of routing defenses through the lens of DROP

    Oliver-Dowling, Leo (The University of Waikato, 2022)
    This work analyzes the properties of 712 prefixes that appeared in Spamhaus’ “Don’t Route Or Peer” (DROP) list over a nearly three-year period from June 2019 to March 2022. The 712 known abused prefixes are used as a lens ...