Bandwidth Management in Resource Constrained Networks
Hastily Formed Networks (HFNs) are typically deployed in resource constrained environments. Clients operating within HFNs have inadvertently utilized excessive bandwidth without user interaction. Our research focuses on managing bandwidth usage in resource constrained networks through the use of DNS...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/6866 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-6866 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-68662015-08-06T16:02:48Z Bandwidth Management in Resource Constrained Networks Schrock, Christopher T. Welch, William J. MacKinnon, Douglas J. Information Technology Management Hastily Formed Networks (HFNs) are typically deployed in resource constrained environments. Clients operating within HFNs have inadvertently utilized excessive bandwidth without user interaction. Our research focuses on managing bandwidth usage in resource constrained networks through the use of DNS Tampering, a method of content filtering. We evaluate two operating systems, Windows XP and Windows 7, and analyze how it may be possible to limit operating system updates utilizing DNS Tampering. We then explore how it may be possible to implement this technique utilizing equipment available for an HFN. Through our efforts, we develop and set forth specific methodologies that can provide the opportunity to limit bandwidth usage for specific applications in resource constrained networks. 2012-05-14T18:56:05Z 2012-05-14T18:56:05Z 2012-03 Thesis http://hdl.handle.net/10945/6866 Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Hastily Formed Networks (HFNs) are typically deployed in resource constrained environments. Clients operating within HFNs have inadvertently utilized excessive bandwidth without user interaction. Our research focuses on managing bandwidth usage in resource constrained networks through the use of DNS Tampering, a method of content filtering. We evaluate two operating systems, Windows XP and Windows 7, and analyze how it may be possible to limit operating system updates utilizing DNS Tampering. We then explore how it may be possible to implement this technique utilizing equipment available for an HFN. Through our efforts, we develop and set forth specific methodologies that can provide the opportunity to limit bandwidth usage for specific applications in resource constrained networks. |
author2 |
Welch, William J. |
author_facet |
Welch, William J. Schrock, Christopher T. |
author |
Schrock, Christopher T. |
spellingShingle |
Schrock, Christopher T. Bandwidth Management in Resource Constrained Networks |
author_sort |
Schrock, Christopher T. |
title |
Bandwidth Management in Resource Constrained Networks |
title_short |
Bandwidth Management in Resource Constrained Networks |
title_full |
Bandwidth Management in Resource Constrained Networks |
title_fullStr |
Bandwidth Management in Resource Constrained Networks |
title_full_unstemmed |
Bandwidth Management in Resource Constrained Networks |
title_sort |
bandwidth management in resource constrained networks |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/6866 |
work_keys_str_mv |
AT schrockchristophert bandwidthmanagementinresourceconstrainednetworks |
_version_ |
1716816509379018752 |