Now showing items 1-11 of 11

  • A Scalable and Fault Tolerant OpenFlow Controller

    Sharma, Karthik Neelakanta (University of Waikato, 2015)
    OpenFlow provides a protocol for updating flow tables in switches. Most current OpenFlow deployments rely on a single controller to control all switches. However, as the number and size of production networks deploying ...
  • Hidden Terminal Detection in Wide-Area 802.11 Wireless Networks

    Raynel, Scott McKenzie (University of Waikato, 2012)
    The hidden terminal problem is an important issue in wireless networks based on the CSMA medium access control scheme. Hidden terminals pose a complex challenge to network operators trying to identify the underlying cause ...
  • Implementing Internet topology analysis with emphasis on load balancers and using large numbers of vantage points

    Eichler, Stephen John (University of Waikato, 2016)
    This thesis describes a study of load balancing and topology discovery in the Internet. Topology data was collected using variants of Traceroute including Traceroute MDA which provides topology information about load ...
  • Improving the Evaluation of Network Anomaly Detection Using a Data Fusion Approach

    Löf, Andreas (University of Waikato, 2013)
    Currently, the evaluation of network anomaly detection methods is often not repeatable. It is difficult to ascertain if different implementations of the same methods have the same performance or the relative performance ...
  • Improving the Quality of Real Time Media Applications through Sending the Best Packet Next

    McDonald, Ian (University of Waikato, 2013)
    Real time media applications such as video conferencing are increasing in usage. These bandwidth intensive applications put high demands on a network and often the quality experienced by the user is sub-optimal. In a ...
  • Modelling and Evaluation of 60 GHz IEEE 802.11 Wireless Local Area Networks in ns-3

    May, Michael (University of Waikato, 2014)
    In this thesis we present modifications made to the popular network simulation environment ns-3 to provide accurate simulation of IEEE 802.11ad Wireless Local Area Networks (WLANs) in the 60 GHz band. There is a need for ...
  • Privacy-preserving encoding for cloud computing

    Will, Mark Antony (The University of Waikato, 2019)
    Information in the cloud is under constant attack from cyber criminals as profitability increases; user privacy is also at risk with data being mined for monetary value – the new gold. A single leak could have devastating ...
  • Rating the Significance of Detected Network Events

    Mungro, Meenakshee (University of Waikato, 2014)
    Existing anomaly detection systems do not reliably produce accurate severity ratings for detected network events, which results in network operators wasting a large amount of time and effort in investigating false alarms. ...
  • RheaFlow: An Improved Software Defined Network Router

    Fayomi, Oladimeji Onaopepo (University of Waikato, 2016)
    An Software Defined Networking (SDN) router translates routing information from a standard routing control plane into forwarding decisions on an SDN-enabled device. This thesis presents the design of RheaFlow an SDN router ...
  • Security Analysis of the Evolved Packet Core for LTE Networks

    Wadsworth, Simon Oliver (University of Waikato, 2013)
    Originally cellular networks handled calls and short messages only. Today, this has been extended to handle packet data services. However now the world is moving towards an entirely IP based mobile service based on LTE and ...
  • Techniques for Failure Recovery in a Software-Defined Network

    Lorier, Christopher (University of Waikato, 2014)
    As our lives become ever more dependent on network connectivity, it becomes increasingly more important for networks to be able to overcome the failure of individual components and continue to function. This thesis examines ...