Modelling the factors that motivate home users to protect their home networking devices
- Authors: Tekeni, Luzuko
- Date: 2023-04
- Subjects: Homeowners , Wireless communication systems
- Language: English
- Type: Doctoral's theses , Thesis
- Identifier: http://hdl.handle.net/10948/64962 , vital:73998
- Description: Most home users do not have access to the typical managed security measures employed in organizations, which leaves them alone in managing the security of their computing devices and home networks. This research focuses on the securing of home networking devices, which with faster, always-on networking technologies, are increasingly vulnerable to attack. To develop interventions that aim to assist home users with securing their home networking devices, it is imperative to understand why they protect or do not protect their home networking devices. Therefore, this research study models the factors that motivate home users to protect their home networking devices. The study limits data collection to South African fibre users, a fast-growing segment of the South African population. Following a comprehensive literature review, the study adopted the Protection Motivation Theory (PMT) as the primary framework for the conceptual research model. Factors from the Theory of Reasoned Action (TRA) and the Theory of Planned Behaviour (TPB) were included to enrich the theoretical model. A measurement instrument consisting of 53 questionnaire items measuring thirteen (13) constructs was developed. After that, a structural model that hypothesized fifteen (15) relationships between constructs was created. The conceptual research model was evaluated through structural equation modeling (SEM) using empirical data gathered from a sample of 392 South African home fibre users. Interestingly, trust in the service provider did not significantly impact perceived vulnerability or severity. This implies that initiatives from the service provider will not necessarily have the desired impact on home user behavior. Additionally, trust in technology did not impact perceived severity and only partially impacted perceived vulnerability. This suggests that home users did not think that the security features of their home networking devices helped much. Of course, these results are in the context of this study and may not necessarily be generalizable to other populations or contexts. Further work to understand the role of service and technology providers may be helpful. The negative relationship between technology anxiety and both perceived task anxiety and self-efficacy supports the call for more or better security awareness interventions. The positive relationship between social influence and perceived vulnerability and severity suggests that these awareness interventions may be best delivered through community involvement. This study contributes to understanding the factors that influence home users’ intentions to protect their home networking devices. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2023
- Full Text:
- Date Issued: 2023-04
- Authors: Tekeni, Luzuko
- Date: 2023-04
- Subjects: Homeowners , Wireless communication systems
- Language: English
- Type: Doctoral's theses , Thesis
- Identifier: http://hdl.handle.net/10948/64962 , vital:73998
- Description: Most home users do not have access to the typical managed security measures employed in organizations, which leaves them alone in managing the security of their computing devices and home networks. This research focuses on the securing of home networking devices, which with faster, always-on networking technologies, are increasingly vulnerable to attack. To develop interventions that aim to assist home users with securing their home networking devices, it is imperative to understand why they protect or do not protect their home networking devices. Therefore, this research study models the factors that motivate home users to protect their home networking devices. The study limits data collection to South African fibre users, a fast-growing segment of the South African population. Following a comprehensive literature review, the study adopted the Protection Motivation Theory (PMT) as the primary framework for the conceptual research model. Factors from the Theory of Reasoned Action (TRA) and the Theory of Planned Behaviour (TPB) were included to enrich the theoretical model. A measurement instrument consisting of 53 questionnaire items measuring thirteen (13) constructs was developed. After that, a structural model that hypothesized fifteen (15) relationships between constructs was created. The conceptual research model was evaluated through structural equation modeling (SEM) using empirical data gathered from a sample of 392 South African home fibre users. Interestingly, trust in the service provider did not significantly impact perceived vulnerability or severity. This implies that initiatives from the service provider will not necessarily have the desired impact on home user behavior. Additionally, trust in technology did not impact perceived severity and only partially impacted perceived vulnerability. This suggests that home users did not think that the security features of their home networking devices helped much. Of course, these results are in the context of this study and may not necessarily be generalizable to other populations or contexts. Further work to understand the role of service and technology providers may be helpful. The negative relationship between technology anxiety and both perceived task anxiety and self-efficacy supports the call for more or better security awareness interventions. The positive relationship between social influence and perceived vulnerability and severity suggests that these awareness interventions may be best delivered through community involvement. This study contributes to understanding the factors that influence home users’ intentions to protect their home networking devices. , Thesis (PhD) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2023
- Full Text:
- Date Issued: 2023-04
Towards a wireless local area network security control framework for small, medium and micro enterprises in South Africa
- Authors: Van de Haar, Paul
- Date: 2015
- Subjects: Wireless LANs , Local area networks (Computer networks) , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/4001 , vital:20499
- Description: There is little literature available that is specific to the use of wireless local area network [WLAN) security among small, medium and micro enterprises (SMMEs) in South Africa. This research study developed a framework which may be used by SMMEs for the purposes of securing their WLANs. In view of the fact that the aim of the study was to develop a system for improving information technology security, the study followed a design science approach. A literature review was conducted on security control framework standards and WLAN technologies. The needs of SMMEs regarding WLANs were also established. The result of this process was an artefact in the form of a WLAN Security Control Framework for securing WLANs for SMMEs in South Africa. The suitability of the framework was validated by means of a focus group.
- Full Text:
- Date Issued: 2015
- Authors: Van de Haar, Paul
- Date: 2015
- Subjects: Wireless LANs , Local area networks (Computer networks) , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/4001 , vital:20499
- Description: There is little literature available that is specific to the use of wireless local area network [WLAN) security among small, medium and micro enterprises (SMMEs) in South Africa. This research study developed a framework which may be used by SMMEs for the purposes of securing their WLANs. In view of the fact that the aim of the study was to develop a system for improving information technology security, the study followed a design science approach. A literature review was conducted on security control framework standards and WLAN technologies. The needs of SMMEs regarding WLANs were also established. The result of this process was an artefact in the form of a WLAN Security Control Framework for securing WLANs for SMMEs in South Africa. The suitability of the framework was validated by means of a focus group.
- Full Text:
- Date Issued: 2015
An Android and Visual C-based controller for a Delta Parallel Robot for use as a classroom training tool
- Authors: Bezuidenhout, Sarel
- Date: 2013
- Subjects: Robotics -- Human factors , Human-robot interaction , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9656 , http://hdl.handle.net/10948/d1020284
- Description: This report will show the development of a Delta Parallel robot, to aid in teaching the basics of robotic motion programming. The platform developed will be created at a fraction of the cost of conventional commercial training systems. This report will therefore show the development procedure as well as the development of some of the example training material. The system will use wireless serial data communication in the form of a Bluetooth connection. This connection will allow an Android tablet, functioning as the human-machine interface (HMI) for the system, to communicate with the motion controller. The motion controller is based in the C environment. This will allow future development of the machine, and allow the system to be used on an integral level, should the trainers require an in depth approach. The motion control software will be implemented on a RoBoard, a development board specifically designed for low- to mid-range robotics. The conclusion of this report will show an example task being completed on the training platform. This will demonstrate some of the basic robotic motion programming aspects which include point to point, linear, and circular motion types but will also include setting and resetting outputs. Performance parameters such as repeatability and reproducibility are important, as it will indirectly show the level of ease with which the system can be manipulated from the software. Finally, the results will be briefly discussed and some recommendations for improvements on the training system and suggestions for future development will be given.
- Full Text:
- Date Issued: 2013
- Authors: Bezuidenhout, Sarel
- Date: 2013
- Subjects: Robotics -- Human factors , Human-robot interaction , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MEngineering (Mechatronics)
- Identifier: vital:9656 , http://hdl.handle.net/10948/d1020284
- Description: This report will show the development of a Delta Parallel robot, to aid in teaching the basics of robotic motion programming. The platform developed will be created at a fraction of the cost of conventional commercial training systems. This report will therefore show the development procedure as well as the development of some of the example training material. The system will use wireless serial data communication in the form of a Bluetooth connection. This connection will allow an Android tablet, functioning as the human-machine interface (HMI) for the system, to communicate with the motion controller. The motion controller is based in the C environment. This will allow future development of the machine, and allow the system to be used on an integral level, should the trainers require an in depth approach. The motion control software will be implemented on a RoBoard, a development board specifically designed for low- to mid-range robotics. The conclusion of this report will show an example task being completed on the training platform. This will demonstrate some of the basic robotic motion programming aspects which include point to point, linear, and circular motion types but will also include setting and resetting outputs. Performance parameters such as repeatability and reproducibility are important, as it will indirectly show the level of ease with which the system can be manipulated from the software. Finally, the results will be briefly discussed and some recommendations for improvements on the training system and suggestions for future development will be given.
- Full Text:
- Date Issued: 2013
A structural and functional specification of a SCIM for service interaction management and personalisation in the IMS
- Authors: Tsietsi, Mosiuoa Jeremia
- Date: 2012
- Subjects: Internet Protocol multimedia subsystem , Internet Protocol multimedia subsystem -- Specifications , Long-Term Evolution (Telecommunications) , European Telecommunications Standards Institute , Wireless communication systems , Multimedia communications
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4606 , http://hdl.handle.net/10962/d1004864 , Internet Protocol multimedia subsystem , Internet Protocol multimedia subsystem -- Specifications , Long-Term Evolution (Telecommunications) , European Telecommunications Standards Institute , Wireless communication systems , Multimedia communications
- Description: The Internet Protocol Multimedia Subsystem (IMS) is a component of the 3G mobile network that has been specified by standards development organisations such as the 3GPP (3rd Generation Partnership Project) and ETSI (European Telecommunication Standards Institute). IMS seeks to guarantee that the telecommunication network of the future provides subscribers with seamless access to services across disparate networks. In order to achieve this, it defines a service architecture that hosts application servers that provide subscribers with value added services. Typically, an application server bundles all the functionality it needs to execute the services it delivers, however this view is currently being challenged. It is now thought that services should be synthesised from simple building blocks called service capabilities. This decomposition would facilitate the re-use of service capabilities across multiple services and would support the creation of new services that could not have originally been conceived. The shift from monolithic services to those built from service capabilities poses a challenge to the current service model in IMS. To accommodate this, the 3GPP has defined an entity known as a service capability interaction manager (SCIM) that would be responsible for managing the interactions between service capabilities in order to realise complex services. Some of these interactions could potentially lead to undesirable results, which the SCIM must work to avoid. As an added requirement, it is believed that the network should allow policies to be applied to network services which the SCIM should be responsible for enforcing. At the time of writing, the functional and structural architecture of the SCIM has not yet been standardised. This thesis explores the current serv ice architecture of the IMS in detail. Proposals that address the structure and functions of the SCIM are carefully compared and contrasted. This investigation leads to the presentation of key aspects of the SCIM, and provides solutions that explain how it should interact with service capabilities, manage undesirable interactions and factor user and network operator policies into its execution model. A modified design of the IMS service layer that embeds the SCIM is subsequently presented and described. The design uses existing IMS protocols and requires no change in the behaviour of the standard IMS entities. In order to develop a testbed for experimental verification of the design, the identification of suitable software platforms was required. This thesis presents some of the most popular platforms currently used by developers such as the Open IMS Core and OpenSER, as well as an open source, Java-based, multimedia communication platform called Mobicents. As a precursor to the development of the SCIM, a converged multimedia service is presented that describes how a video streaming application that is leveraged by a web portal was implemented for an IMS testbed using Mobicents components. The Mobicents SIP Servlets container was subsequently used to model an initial prototype of the SCIM, using a mUlti-component telephony service to illustrate the proposed service execution model. The design focuses on SIP-based services only, but should also work for other types of IMS application servers as well.
- Full Text:
- Date Issued: 2012
- Authors: Tsietsi, Mosiuoa Jeremia
- Date: 2012
- Subjects: Internet Protocol multimedia subsystem , Internet Protocol multimedia subsystem -- Specifications , Long-Term Evolution (Telecommunications) , European Telecommunications Standards Institute , Wireless communication systems , Multimedia communications
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:4606 , http://hdl.handle.net/10962/d1004864 , Internet Protocol multimedia subsystem , Internet Protocol multimedia subsystem -- Specifications , Long-Term Evolution (Telecommunications) , European Telecommunications Standards Institute , Wireless communication systems , Multimedia communications
- Description: The Internet Protocol Multimedia Subsystem (IMS) is a component of the 3G mobile network that has been specified by standards development organisations such as the 3GPP (3rd Generation Partnership Project) and ETSI (European Telecommunication Standards Institute). IMS seeks to guarantee that the telecommunication network of the future provides subscribers with seamless access to services across disparate networks. In order to achieve this, it defines a service architecture that hosts application servers that provide subscribers with value added services. Typically, an application server bundles all the functionality it needs to execute the services it delivers, however this view is currently being challenged. It is now thought that services should be synthesised from simple building blocks called service capabilities. This decomposition would facilitate the re-use of service capabilities across multiple services and would support the creation of new services that could not have originally been conceived. The shift from monolithic services to those built from service capabilities poses a challenge to the current service model in IMS. To accommodate this, the 3GPP has defined an entity known as a service capability interaction manager (SCIM) that would be responsible for managing the interactions between service capabilities in order to realise complex services. Some of these interactions could potentially lead to undesirable results, which the SCIM must work to avoid. As an added requirement, it is believed that the network should allow policies to be applied to network services which the SCIM should be responsible for enforcing. At the time of writing, the functional and structural architecture of the SCIM has not yet been standardised. This thesis explores the current serv ice architecture of the IMS in detail. Proposals that address the structure and functions of the SCIM are carefully compared and contrasted. This investigation leads to the presentation of key aspects of the SCIM, and provides solutions that explain how it should interact with service capabilities, manage undesirable interactions and factor user and network operator policies into its execution model. A modified design of the IMS service layer that embeds the SCIM is subsequently presented and described. The design uses existing IMS protocols and requires no change in the behaviour of the standard IMS entities. In order to develop a testbed for experimental verification of the design, the identification of suitable software platforms was required. This thesis presents some of the most popular platforms currently used by developers such as the Open IMS Core and OpenSER, as well as an open source, Java-based, multimedia communication platform called Mobicents. As a precursor to the development of the SCIM, a converged multimedia service is presented that describes how a video streaming application that is leveraged by a web portal was implemented for an IMS testbed using Mobicents components. The Mobicents SIP Servlets container was subsequently used to model an initial prototype of the SCIM, using a mUlti-component telephony service to illustrate the proposed service execution model. The design focuses on SIP-based services only, but should also work for other types of IMS application servers as well.
- Full Text:
- Date Issued: 2012
Bluetooth audio and video streaming on the J2ME platform
- Authors: Sahd, Curtis Lee
- Date: 2011 , 2010-09-09
- Subjects: Bluetooth technology , Mobile communication systems , Communication -- Technological innovations , Communication -- Network analysis , Wireless communication systems , L2TP (Computer network protocol) , Computer network protocols , Streaming audio , Streaming video
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4633 , http://hdl.handle.net/10962/d1006521 , Bluetooth technology , Mobile communication systems , Communication -- Technological innovations , Communication -- Network analysis , Wireless communication systems , L2TP (Computer network protocol) , Computer network protocols , Streaming audio , Streaming video
- Description: With the increase in bandwidth, more widespread distribution of media, and increased capability of mobile devices, multimedia streaming has not only become feasible, but more economical in terms of space occupied by the media file and the costs involved in attaining it. Although much attention has been paid to peer to peer media streaming over the Internet using HTTP and RTSP, little research has focussed on the use of the Bluetooth protocol for streaming audio and video between mobile devices. This project investigates the feasibility of Bluetooth as a protocol for audio and video streaming between mobile phones using the J2ME platform, through the analysis of Bluetooth protocols, media formats, optimum packet sizes, and the effects of distance on transfer speed. A comparison was made between RFCOMM and L2CAP to determine which protocol could support the fastest transfer speed between two mobile devices. The L2CAP protocol proved to be the most suitable, providing average transfer rates of 136.17 KBps. Using this protocol a second experiment was undertaken to determine the most suitable media format for streaming in terms of: file size, bandwidth usage, quality, and ease of implementation. Out of the eight media formats investigated, the MP3 format provided the smallest file size, smallest bandwidth usage, best quality and highest ease of implementation. Another experiment was conducted to determine the optimum packet size for transfer between devices. A tradeoff was found between packet size and the quality of the sound file, with highest transfer rates being recorded with the MTU size of 668 bytes (136.58 KBps). The class of Bluetooth transmitter typically used in mobile devices (class 2) is considered a weak signal and is adversely affected by distance. As such, the final investigation that was undertaken was aimed at determining the effects of distance on audio streaming and playback. As can be expected, when devices were situated close to each other, the transfer speeds obtained were higher than when devices were far apart. Readings were taken at varying distances (1-15 metres), with erratic transfer speeds observed from 7 metres onwards. This research showed that audio streaming on the J2ME platform is feasible, however using the currently available class of Bluetooth transmitter, video streaming is not feasible. Video files were only playable once the entire media file had been transferred.
- Full Text:
- Date Issued: 2011
- Authors: Sahd, Curtis Lee
- Date: 2011 , 2010-09-09
- Subjects: Bluetooth technology , Mobile communication systems , Communication -- Technological innovations , Communication -- Network analysis , Wireless communication systems , L2TP (Computer network protocol) , Computer network protocols , Streaming audio , Streaming video
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4633 , http://hdl.handle.net/10962/d1006521 , Bluetooth technology , Mobile communication systems , Communication -- Technological innovations , Communication -- Network analysis , Wireless communication systems , L2TP (Computer network protocol) , Computer network protocols , Streaming audio , Streaming video
- Description: With the increase in bandwidth, more widespread distribution of media, and increased capability of mobile devices, multimedia streaming has not only become feasible, but more economical in terms of space occupied by the media file and the costs involved in attaining it. Although much attention has been paid to peer to peer media streaming over the Internet using HTTP and RTSP, little research has focussed on the use of the Bluetooth protocol for streaming audio and video between mobile devices. This project investigates the feasibility of Bluetooth as a protocol for audio and video streaming between mobile phones using the J2ME platform, through the analysis of Bluetooth protocols, media formats, optimum packet sizes, and the effects of distance on transfer speed. A comparison was made between RFCOMM and L2CAP to determine which protocol could support the fastest transfer speed between two mobile devices. The L2CAP protocol proved to be the most suitable, providing average transfer rates of 136.17 KBps. Using this protocol a second experiment was undertaken to determine the most suitable media format for streaming in terms of: file size, bandwidth usage, quality, and ease of implementation. Out of the eight media formats investigated, the MP3 format provided the smallest file size, smallest bandwidth usage, best quality and highest ease of implementation. Another experiment was conducted to determine the optimum packet size for transfer between devices. A tradeoff was found between packet size and the quality of the sound file, with highest transfer rates being recorded with the MTU size of 668 bytes (136.58 KBps). The class of Bluetooth transmitter typically used in mobile devices (class 2) is considered a weak signal and is adversely affected by distance. As such, the final investigation that was undertaken was aimed at determining the effects of distance on audio streaming and playback. As can be expected, when devices were situated close to each other, the transfer speeds obtained were higher than when devices were far apart. Readings were taken at varying distances (1-15 metres), with erratic transfer speeds observed from 7 metres onwards. This research showed that audio streaming on the J2ME platform is feasible, however using the currently available class of Bluetooth transmitter, video streaming is not feasible. Video files were only playable once the entire media file had been transferred.
- Full Text:
- Date Issued: 2011
Dynamic adaptive cost model for wireless Internet connectivity in African rural communities
- Authors: Sibanda, Khulumani
- Date: 2010
- Subjects: Internet , Community development -- South Africa -- Eastern Cape , Cost effectiveness , Wireless communication systems , Rural development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Doctoral , PhD (Computer Science)
- Identifier: vital:11389 , http://hdl.handle.net/10353/380 , Internet , Community development -- South Africa -- Eastern Cape , Cost effectiveness , Wireless communication systems , Rural development -- South Africa -- Eastern Cape
- Description: In today’s dynamic technological landscape, wireless communication networks have become an important part of economic development. The emergence of wireless technologies raises hopes to extend communication to remote areas that have not seen any tangible deployment to date. As developing nations pin their hopes to wireless technologies, cost models for wireless communication networks are becoming vital to support the emerging technologies. However, varying cost changes raise critical challenges to the estimation of both capital expenditure and operational expenditure. The network deployment process has numerous events that may cause adjustments to initially estimated project costs. These adjustments are necessary for a cost management plan and this plan includes monitoring cost performance and ensuring that only appropriate changes are made to the network project. The incidents that may cause cost changes can not be entirely predicted as their distribution tend to change dynamically from time to time. Estimating network deployment costs in such a dynamic environment necessitates cost models that can adapt to random occurrence of cost changes. Widely used cost models are usually performed by experienced personnel whose engineering experience is derived from deploying similar networks. In this approach experienced personnel add a certain percentage to the cost estimate to cater for contingency costs. Certainly such an approach depends on individual opinion, making it subjective and void of mathematical estimating relationships which are of paramount importance in ensuring that estimated deployment costs are sufficient to deal with cost uncertainties. We observe that existing approaches can only explore a limited solution space and hence can lead to cost overruns if implemented in dynamically cost changing environments. This thesis presents a wireless communication network deployment cost model that incorporates uncertainties into the final cost estimate. The model is adaptive to unpredictable cost changes since it allows adjustments of confidence levels when calculating contingency costs. This allows dynamically updating the cost changes without the cost model being reconstructed from scratch. We make use of the Poisson process in modeling the occurrence of incidents that are responsible for causing cost changes during network deployment. We also show that the occurrence of the incidents causing cost change are random and tend to follow the Poisson distribution. Using different levels of confidence we model various cost contingencies and make sensitivity analyses to identify the probability of cost overrun when given different contingencies. The dynamic adaptive cost model can be used either at the strategic level to understand the cost of a particular technique or at the operational level, as a way to show how Poisson process in network deployment can compare with engineering experience and other estimating techniques. We believe that the model is useful for remote areas where deployment costs are volatile and the distribution of incidents causing cost change to original cost estimates are diverse and dynamically changing. Further we expect that our research improves the knowledge base of information about the costs for rural communities to connect to the Internet, consequently providing useful input to future policy debates. This work is further poised to be a utility function to help those planning internet infrastructure deployments in least developed regions.
- Full Text:
- Date Issued: 2010
- Authors: Sibanda, Khulumani
- Date: 2010
- Subjects: Internet , Community development -- South Africa -- Eastern Cape , Cost effectiveness , Wireless communication systems , Rural development -- South Africa -- Eastern Cape
- Language: English
- Type: Thesis , Doctoral , PhD (Computer Science)
- Identifier: vital:11389 , http://hdl.handle.net/10353/380 , Internet , Community development -- South Africa -- Eastern Cape , Cost effectiveness , Wireless communication systems , Rural development -- South Africa -- Eastern Cape
- Description: In today’s dynamic technological landscape, wireless communication networks have become an important part of economic development. The emergence of wireless technologies raises hopes to extend communication to remote areas that have not seen any tangible deployment to date. As developing nations pin their hopes to wireless technologies, cost models for wireless communication networks are becoming vital to support the emerging technologies. However, varying cost changes raise critical challenges to the estimation of both capital expenditure and operational expenditure. The network deployment process has numerous events that may cause adjustments to initially estimated project costs. These adjustments are necessary for a cost management plan and this plan includes monitoring cost performance and ensuring that only appropriate changes are made to the network project. The incidents that may cause cost changes can not be entirely predicted as their distribution tend to change dynamically from time to time. Estimating network deployment costs in such a dynamic environment necessitates cost models that can adapt to random occurrence of cost changes. Widely used cost models are usually performed by experienced personnel whose engineering experience is derived from deploying similar networks. In this approach experienced personnel add a certain percentage to the cost estimate to cater for contingency costs. Certainly such an approach depends on individual opinion, making it subjective and void of mathematical estimating relationships which are of paramount importance in ensuring that estimated deployment costs are sufficient to deal with cost uncertainties. We observe that existing approaches can only explore a limited solution space and hence can lead to cost overruns if implemented in dynamically cost changing environments. This thesis presents a wireless communication network deployment cost model that incorporates uncertainties into the final cost estimate. The model is adaptive to unpredictable cost changes since it allows adjustments of confidence levels when calculating contingency costs. This allows dynamically updating the cost changes without the cost model being reconstructed from scratch. We make use of the Poisson process in modeling the occurrence of incidents that are responsible for causing cost changes during network deployment. We also show that the occurrence of the incidents causing cost change are random and tend to follow the Poisson distribution. Using different levels of confidence we model various cost contingencies and make sensitivity analyses to identify the probability of cost overrun when given different contingencies. The dynamic adaptive cost model can be used either at the strategic level to understand the cost of a particular technique or at the operational level, as a way to show how Poisson process in network deployment can compare with engineering experience and other estimating techniques. We believe that the model is useful for remote areas where deployment costs are volatile and the distribution of incidents causing cost change to original cost estimates are diverse and dynamically changing. Further we expect that our research improves the knowledge base of information about the costs for rural communities to connect to the Internet, consequently providing useful input to future policy debates. This work is further poised to be a utility function to help those planning internet infrastructure deployments in least developed regions.
- Full Text:
- Date Issued: 2010
Development of a web-based interface for a wireless sensor network monitoring system
- Authors: Gumbo, Sibukele
- Date: 2007
- Subjects: Wireless LAN , Sensor networks , Wireless communication systems , Web sites -- Design , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MSc (Computer Science)
- Identifier: vital:11372 , http://hdl.handle.net/10353/68 , Wireless LAN , Sensor networks , Wireless communication systems , Web sites -- Design , User interfaces (Computer systems)
- Description: In the recent past, wireless sensor technology has undergone advancements in its autonomous data collecting aspects, and has become an area worth investigating in relation to structural monitoring applications. The system described in this thesis aims at acquiring, storing and displaying overhead transmission line related data collected from a wireless sensor network. Open source tools were used in its development and implementation. The inherent linearly aligned topology of transmission line monitoring devices is not without shortcomings; hence analysis of linear node placement, hardware and software components was carried out to determine the feasibility of the system. Their limited data processing capabilities has motivated the development of a post processing wireless sensor application in order to present any collected structural data in an understandable format.
- Full Text:
- Date Issued: 2007
- Authors: Gumbo, Sibukele
- Date: 2007
- Subjects: Wireless LAN , Sensor networks , Wireless communication systems , Web sites -- Design , User interfaces (Computer systems)
- Language: English
- Type: Thesis , Masters , MSc (Computer Science)
- Identifier: vital:11372 , http://hdl.handle.net/10353/68 , Wireless LAN , Sensor networks , Wireless communication systems , Web sites -- Design , User interfaces (Computer systems)
- Description: In the recent past, wireless sensor technology has undergone advancements in its autonomous data collecting aspects, and has become an area worth investigating in relation to structural monitoring applications. The system described in this thesis aims at acquiring, storing and displaying overhead transmission line related data collected from a wireless sensor network. Open source tools were used in its development and implementation. The inherent linearly aligned topology of transmission line monitoring devices is not without shortcomings; hence analysis of linear node placement, hardware and software components was carried out to determine the feasibility of the system. Their limited data processing capabilities has motivated the development of a post processing wireless sensor application in order to present any collected structural data in an understandable format.
- Full Text:
- Date Issued: 2007
Extending the reach of personal area networks by transporting Bluetooth communications over IP networks
- Authors: Mackie, David Sean
- Date: 2007 , 2007-03-29
- Subjects: Bluetooth technology , Communication -- Technological innovations , Communication -- Network analysis , TCP/IP (Computer network protocol) , Computer networks , Computer network protocols , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4637 , http://hdl.handle.net/10962/d1006551 , Bluetooth technology , Communication -- Technological innovations , Communication -- Network analysis , TCP/IP (Computer network protocol) , Computer networks , Computer network protocols , Wireless communication systems
- Description: This thesis presents an investigation of how to extend the reach of a Bluetooth personal area network by introducing the concept of Bluetooth Hotspots. Currently two Bluetooth devices cannot communicate with each other unless they are within radio range, since Bluetooth is designed as a cable-replacement technology for wireless communications over short ranges. An investigation was done into the feasibility of creating Bluetooth hotspots that allow distant Bluetooth devices to communicate with each other by transporting their communications between these hotspots via an alternative network infrastructure such as an IP network. Two approaches were investigated, masquerading of remote devices by the local hotspot to allow seamless communications and proxying services on remote devices by providing them on a local hotspot using a distributed service discovery database. The latter approach was used to develop applications capable of transporting Bluetooth’s RFCOMM and L2CAP protocols. Quantitative tests were performed to establish the throughput performance and latency of these transport applications. Furthermore, a number of selected Bluetooth services were tested which lead us to conclude that most data-based protocols can be transported by the system.
- Full Text:
- Date Issued: 2007
- Authors: Mackie, David Sean
- Date: 2007 , 2007-03-29
- Subjects: Bluetooth technology , Communication -- Technological innovations , Communication -- Network analysis , TCP/IP (Computer network protocol) , Computer networks , Computer network protocols , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4637 , http://hdl.handle.net/10962/d1006551 , Bluetooth technology , Communication -- Technological innovations , Communication -- Network analysis , TCP/IP (Computer network protocol) , Computer networks , Computer network protocols , Wireless communication systems
- Description: This thesis presents an investigation of how to extend the reach of a Bluetooth personal area network by introducing the concept of Bluetooth Hotspots. Currently two Bluetooth devices cannot communicate with each other unless they are within radio range, since Bluetooth is designed as a cable-replacement technology for wireless communications over short ranges. An investigation was done into the feasibility of creating Bluetooth hotspots that allow distant Bluetooth devices to communicate with each other by transporting their communications between these hotspots via an alternative network infrastructure such as an IP network. Two approaches were investigated, masquerading of remote devices by the local hotspot to allow seamless communications and proxying services on remote devices by providing them on a local hotspot using a distributed service discovery database. The latter approach was used to develop applications capable of transporting Bluetooth’s RFCOMM and L2CAP protocols. Quantitative tests were performed to establish the throughput performance and latency of these transport applications. Furthermore, a number of selected Bluetooth services were tested which lead us to conclude that most data-based protocols can be transported by the system.
- Full Text:
- Date Issued: 2007
A framework for responsive content adaptation in electronic display networks
- Authors: West, Philip
- Date: 2006
- Subjects: Computer networks , Cell phone systems , Wireless communication systems , Mobile communication systems , HTML (Document markup language) , XML (Document markup language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4589 , http://hdl.handle.net/10962/d1004824 , Computer networks , Cell phone systems , Wireless communication systems , Mobile communication systems , HTML (Document markup language) , XML (Document markup language)
- Description: Recent trends show an increase in the availability and functionality of handheld devices, wireless network technology, and electronic display networks. We propose the novel integration of these technologies to provide wireless access to content delivered to large-screen display systems. Content adaptation is used as a method of reformatting web pages to display more appropriately on handheld devices, and to remove unwanted content. A framework is presented that facilitates content adaptation, implemented as an adaptation layer, which is extended to provide personalization of adaptation settings and response to network conditions. The framework is implemented as a proxy server for a wireless network, and handles HTML and XML documents. Once a document has been requested by a user, the HTML/XML is retrieved and parsed, creating a Document Object Model tree representation. It is then altered according to the user’s personal settings or predefined settings, based on current network usage and the network resources available. Three adaptation techniques were implemented; spatial representation, which generates an image map of the document, text summarization, which creates a tree view representation of a document, and tag extraction, which replaces specific tags with links. Three proof-of-concept systems were developed in order to test the robustness of the framework. A system for use with digital slide shows, a digital signage system, and a generalized system for use with the internet were implemented. Testing was performed by accessing sample web pages through the content adaptation proxy server. Tag extraction works correctly for all HTML and XML document structures, whereas spatial representation and text summarization are limited to a controlled subset. Results indicate that the adaptive system has the ability to reduce average bandwidth usage, by decreasing the amount of data on the network, thereby allowing a greater number of users access to content. This suggests that responsive content adaptation has a positive influence on network performance metrics.
- Full Text:
- Date Issued: 2006
- Authors: West, Philip
- Date: 2006
- Subjects: Computer networks , Cell phone systems , Wireless communication systems , Mobile communication systems , HTML (Document markup language) , XML (Document markup language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4589 , http://hdl.handle.net/10962/d1004824 , Computer networks , Cell phone systems , Wireless communication systems , Mobile communication systems , HTML (Document markup language) , XML (Document markup language)
- Description: Recent trends show an increase in the availability and functionality of handheld devices, wireless network technology, and electronic display networks. We propose the novel integration of these technologies to provide wireless access to content delivered to large-screen display systems. Content adaptation is used as a method of reformatting web pages to display more appropriately on handheld devices, and to remove unwanted content. A framework is presented that facilitates content adaptation, implemented as an adaptation layer, which is extended to provide personalization of adaptation settings and response to network conditions. The framework is implemented as a proxy server for a wireless network, and handles HTML and XML documents. Once a document has been requested by a user, the HTML/XML is retrieved and parsed, creating a Document Object Model tree representation. It is then altered according to the user’s personal settings or predefined settings, based on current network usage and the network resources available. Three adaptation techniques were implemented; spatial representation, which generates an image map of the document, text summarization, which creates a tree view representation of a document, and tag extraction, which replaces specific tags with links. Three proof-of-concept systems were developed in order to test the robustness of the framework. A system for use with digital slide shows, a digital signage system, and a generalized system for use with the internet were implemented. Testing was performed by accessing sample web pages through the content adaptation proxy server. Tag extraction works correctly for all HTML and XML document structures, whereas spatial representation and text summarization are limited to a controlled subset. Results indicate that the adaptive system has the ability to reduce average bandwidth usage, by decreasing the amount of data on the network, thereby allowing a greater number of users access to content. This suggests that responsive content adaptation has a positive influence on network performance metrics.
- Full Text:
- Date Issued: 2006
A framework for secure mobility in wireless overlay networks
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
- Authors: Chen, Hejun
- Date: 2006
- Subjects: Wireless communication systems , Computer networks
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9778 , http://hdl.handle.net/10948/819 , Wireless communication systems , Computer networks
- Description: Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wireless network technology simultaneously satisfies these require- ments. Wireless Overlay Networks, a hierarchical structure of wireless personal area, local area, and wide area data networks, is considered as an efficient and scalable way to solve this problem. Due to the wide deployment of UMTS and 802.11 WLAN, this study attempts to combine them to implement the concept of Wireless Overlay Net- works. Furthermore, the information transmitted over this Wireless Overlay Networks is protected in terms of authentication, integrity and confidentiality. To achieve this goal, this study aims to combine GPRS, Mobile IP and IPSec to propose a framework for secure mobility in Wireless Overlay Networks. The framework is developed in three steps: Firstly, this study addresses the problem of combining GPRS and Mo- bile IP, so that GPRS users are provided with Mobile IP service. This results in presenting a uniform Mobile IP interface to peers regardless of whether mobile users use UMTS or 802.11 WLAN. Secondly, this study discovers the existing problem when combining Mobile IP and IPSec, and proposes a Dual Home Agent Architecture to achieve secure mobility. Finally, based on the output of the previous two steps, a complete framework is proposed, which achieves secure mobility in Wireless Overlay Networks, specifically, in UMTS and 802.11 WLAN. The framework also implements seamless handover when mobile users switch between UMTS and 802.11. This results in UMTS and 802.11 WLAN looking like a single network when participating in this framework, and presents seamless and secure mobility.
- Full Text:
- Date Issued: 2006
Investigating the viability of a framework for small scale, easily deployable and extensible hotspot management systems
- Authors: Thinyane, Mamello P
- Date: 2006
- Subjects: Local area networks (Computer networks) , Computer networks -- Management , Computer network architectures , Computer network protocols , Wireless communication systems , XML (Document markup language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4638 , http://hdl.handle.net/10962/d1006553
- Description: The proliferation of PALs (Public Access Locations) is fuelling the development of new standards, protocols, services, and applications for WLANs (Wireless Local Area Networks). PALs are set up at public locations to meet continually changing, multiservice, multi-protocol user requirements. This research investigates the essential infrastructural requirements that will enable further proliferation of PALs, and consequently facilitate ubiquitous computing. Based on these requirements, an extensible architectural framework for PAL management systems that inherently facilitates the provisioning of multiple services and multiple protocols on PALs is derived. The ensuing framework, which is called Xobogel, is based on the microkernel architectural pattern, and the IPDR (Internet Protocol Data Record) specification. Xobogel takes into consideration and supports the implementation of diverse business models for PALs, in respect of distinct environmental factors. It also facilitates next-generation network service usage accounting through a simple, flexible, and extensible XML based usage record. The framework is subsequently validated for service element extensibility and simplicity through the design, implementation, and experimental deployment of SEHS (Small Extensible Hotspot System), a system based on the framework. The robustness and scalability of the framework is observed to be sufficient for SMME deployment, withstanding the stress testing experiments performed on SEHS. The range of service element and charging modules implemented confirm an acceptable level of flexibility and extensibility within the framework.
- Full Text:
- Date Issued: 2006
- Authors: Thinyane, Mamello P
- Date: 2006
- Subjects: Local area networks (Computer networks) , Computer networks -- Management , Computer network architectures , Computer network protocols , Wireless communication systems , XML (Document markup language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4638 , http://hdl.handle.net/10962/d1006553
- Description: The proliferation of PALs (Public Access Locations) is fuelling the development of new standards, protocols, services, and applications for WLANs (Wireless Local Area Networks). PALs are set up at public locations to meet continually changing, multiservice, multi-protocol user requirements. This research investigates the essential infrastructural requirements that will enable further proliferation of PALs, and consequently facilitate ubiquitous computing. Based on these requirements, an extensible architectural framework for PAL management systems that inherently facilitates the provisioning of multiple services and multiple protocols on PALs is derived. The ensuing framework, which is called Xobogel, is based on the microkernel architectural pattern, and the IPDR (Internet Protocol Data Record) specification. Xobogel takes into consideration and supports the implementation of diverse business models for PALs, in respect of distinct environmental factors. It also facilitates next-generation network service usage accounting through a simple, flexible, and extensible XML based usage record. The framework is subsequently validated for service element extensibility and simplicity through the design, implementation, and experimental deployment of SEHS (Small Extensible Hotspot System), a system based on the framework. The robustness and scalability of the framework is observed to be sufficient for SMME deployment, withstanding the stress testing experiments performed on SEHS. The range of service element and charging modules implemented confirm an acceptable level of flexibility and extensibility within the framework.
- Full Text:
- Date Issued: 2006
A comparative analysis of Java and .NET mobile development environments for supporting mobile services
- Authors: Zhao, Xiaogeng
- Date: 2003 , 2013-05-23
- Subjects: Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4578 , http://hdl.handle.net/10962/d1003064 , Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Description: With the rapid development of wireless technologies, traditional mobile devices, such as pagers and cellular phones, have evolved from a purely communications and messaging-oriented medium to one that supports mobile data communication in general and acts as an application platform. As shown in a recent survey conducted by MDA, easy access to the present-day wireless Internet has resulted in mobile devices gaining more and more attention and popularity. The growth of and demand for mobile Web applications is expected to increase rapidly in the near future, as a range of software companies and mobile device manufacturers release increasingly accessible tools for creating mobile Web application and services. From a variety of possible development environments of this kind, the author has selected and examined two leading contenders, the J2ME and the Microsoft .NET mobile Web application development environments. This document reports the product life cycle of pilot mobile web applications, designed and implemented in each host environment in tum. A feature-by-feature investigation and comparison of the J2ME and .NET environments was carried out, covering the range of issues necessary for a complete mobile Web application development life cycle. The resulting analysis addresses features and efficiencies of the application development environment and the target deployment environment, the degree to which the resultant services are compatible on a variety of platforms, and the ease with which applications can be designed to be extensible. The thesis offers an objective evaluation of the J2ME and the .NET mobile development environments, which highlights their strengths and weaknesses, and suggests guidelines for designing, creating, and deploying high quality mobile Web applications. The research uncovers no clear winner across all categories assessed. J2ME currently favours situations in which bandwidth is limited and client side processing power is relatively sufficient, it exerts the processing power of mobile devices over distributed network environments. .NET requires a less constrained network throughput, but performs adequately on clients with more limited processing power, supports a more diverse target platform range, and offers a more efficient, in terms of development time, development environment. Both technologies are likely to receive significant user support for some time. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Date Issued: 2003
- Authors: Zhao, Xiaogeng
- Date: 2003 , 2013-05-23
- Subjects: Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4578 , http://hdl.handle.net/10962/d1003064 , Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Description: With the rapid development of wireless technologies, traditional mobile devices, such as pagers and cellular phones, have evolved from a purely communications and messaging-oriented medium to one that supports mobile data communication in general and acts as an application platform. As shown in a recent survey conducted by MDA, easy access to the present-day wireless Internet has resulted in mobile devices gaining more and more attention and popularity. The growth of and demand for mobile Web applications is expected to increase rapidly in the near future, as a range of software companies and mobile device manufacturers release increasingly accessible tools for creating mobile Web application and services. From a variety of possible development environments of this kind, the author has selected and examined two leading contenders, the J2ME and the Microsoft .NET mobile Web application development environments. This document reports the product life cycle of pilot mobile web applications, designed and implemented in each host environment in tum. A feature-by-feature investigation and comparison of the J2ME and .NET environments was carried out, covering the range of issues necessary for a complete mobile Web application development life cycle. The resulting analysis addresses features and efficiencies of the application development environment and the target deployment environment, the degree to which the resultant services are compatible on a variety of platforms, and the ease with which applications can be designed to be extensible. The thesis offers an objective evaluation of the J2ME and the .NET mobile development environments, which highlights their strengths and weaknesses, and suggests guidelines for designing, creating, and deploying high quality mobile Web applications. The research uncovers no clear winner across all categories assessed. J2ME currently favours situations in which bandwidth is limited and client side processing power is relatively sufficient, it exerts the processing power of mobile devices over distributed network environments. .NET requires a less constrained network throughput, but performs adequately on clients with more limited processing power, supports a more diverse target platform range, and offers a more efficient, in terms of development time, development environment. Both technologies are likely to receive significant user support for some time. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Date Issued: 2003
- «
- ‹
- 1
- ›
- »