Bandwidth Management in Resource Constrained Networks

Hastily Formed Networks (HFNs) are typically deployed in resource constrained environments. Clients operating within HFNs have inadvertently utilized excessive bandwidth without user interaction. Our research focuses on managing bandwidth usage in resource constrained networks through the use of DNS...

Full description

Bibliographic Details
Main Author: Schrock, Christopher T.
Other Authors: Welch, William J.
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/6866
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-6866
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-68662015-08-06T16:02:48Z Bandwidth Management in Resource Constrained Networks Schrock, Christopher T. Welch, William J. MacKinnon, Douglas J. Information Technology Management Hastily Formed Networks (HFNs) are typically deployed in resource constrained environments. Clients operating within HFNs have inadvertently utilized excessive bandwidth without user interaction. Our research focuses on managing bandwidth usage in resource constrained networks through the use of DNS Tampering, a method of content filtering. We evaluate two operating systems, Windows XP and Windows 7, and analyze how it may be possible to limit operating system updates utilizing DNS Tampering. We then explore how it may be possible to implement this technique utilizing equipment available for an HFN. Through our efforts, we develop and set forth specific methodologies that can provide the opportunity to limit bandwidth usage for specific applications in resource constrained networks. 2012-05-14T18:56:05Z 2012-05-14T18:56:05Z 2012-03 Thesis http://hdl.handle.net/10945/6866 Monterey, California. Naval Postgraduate School
collection NDLTD
sources NDLTD
description Hastily Formed Networks (HFNs) are typically deployed in resource constrained environments. Clients operating within HFNs have inadvertently utilized excessive bandwidth without user interaction. Our research focuses on managing bandwidth usage in resource constrained networks through the use of DNS Tampering, a method of content filtering. We evaluate two operating systems, Windows XP and Windows 7, and analyze how it may be possible to limit operating system updates utilizing DNS Tampering. We then explore how it may be possible to implement this technique utilizing equipment available for an HFN. Through our efforts, we develop and set forth specific methodologies that can provide the opportunity to limit bandwidth usage for specific applications in resource constrained networks.
author2 Welch, William J.
author_facet Welch, William J.
Schrock, Christopher T.
author Schrock, Christopher T.
spellingShingle Schrock, Christopher T.
Bandwidth Management in Resource Constrained Networks
author_sort Schrock, Christopher T.
title Bandwidth Management in Resource Constrained Networks
title_short Bandwidth Management in Resource Constrained Networks
title_full Bandwidth Management in Resource Constrained Networks
title_fullStr Bandwidth Management in Resource Constrained Networks
title_full_unstemmed Bandwidth Management in Resource Constrained Networks
title_sort bandwidth management in resource constrained networks
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/6866
work_keys_str_mv AT schrockchristophert bandwidthmanagementinresourceconstrainednetworks
_version_ 1716816509379018752