The cBox system is a decentralized peer-to-peer system that allows devices to share resources like internet connectivity in a heterogeneous network environment. It uses technologies like ZeroConf and mDNS to discover services between compatible devices. The cBox architecture includes layers for network abstraction, routing, ZeroConf service discovery, and applications. The routing layer maintains the peer-to-peer network and routes messages using IPv6-like addressing. ZeroConf provides hostname uniqueness and service sharing between devices on the network. The system is designed to work across different device types from Android to PCs.
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWAREIJNSA Journal
This document proposes using deep learning to classify firmware as malicious or benign by converting firmware binaries into small grayscale images and training convolutional neural networks (CNNs) on these images. Testing of a MobileNetV2 CNN achieved over 90% accuracy on the image classifications. Decision trees and random forests were also applied and achieved similar or higher accuracy than the CNN. The document concludes that machine learning methods show promise for detecting malicious firmware updates through analyzing the patterns in converted firmware image files.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Flexible Technologies for Smart CampusKamal Spring
The article considers an example of the
advertisement network based on the BLE 4.0, and its facilities for
creating the infrastructure for a Smart Campus, where dynamic
information is provided for the target audience. The authors
provide an analysis of the characteristics and experimental
implementation of this system. Moreover, the practical usage of a
popular vendor and the needed back-end to provide dynamic
usages of the network, both in appearance and content is
described. In the paper different wireless technologies are
compared in regards to their main feature and field of
application. In general the characteristics of a Blue Tooth Low
Energy, BLE, are highlighted. This is elaborated upon in the
Smart Campus example. The Smart Campus is an indoor
wireless network to deliver location and user based dynamic
information to the different visitors, teacher or students of a
university campus, both for day-to-day use as for specific events.
To keep the system interesting and to augment ease-of-use for all
kind of users and content providers, a dedicated content
management system is developed within the Smart Campus case.
The complete system consists of a set of beacons, an application
on a smartphone, a database with the related CMS. All is
developed in an international cooperation between different
universities.
This document provides a summary of key concepts in computer networks:
1. It defines a computer network and describes the basic components - PCs, interconnections like network cards and cables, switches, and routers.
2. It discusses common network applications like email, web browsers, instant messaging, and collaboration tools.
3. It describes the seven-layer OSI model and compares it to the TCP/IP model, explaining the functions of the physical, data link, network, and transport layers.
4. It discusses networking software, network performance metrics like bandwidth and latency, and link layer services like acknowledged and unacknowledged connection-oriented services.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
A practical architecture for mobile edge computingTejas subramanya
Recently, mobile broadband networks are focused
on bringing additional capabilities to the network edge. For
instance, Mobile Edge Computing (MEC) brings storage and
processing capabilities closer to the mobile user i.e., at the radio
access network, in order to deploy services with minimum delay.
In this paper, we propose a resource constrained cloud-enabled
small cell that includes a MEC server for deploying mobile
edge computing functionalities. We present the architecture with
special focus on realizing the proper forwarding of data packets
between the mobile data path and the MEC applications, based
on the principles of SDN, without requiring any changes to
the functionality of existing mobile network nodes both in the
access and the core network segments. The significant benefits
of adopting the proposed architecture are analyzed based on a
proof-of-concept demonstration for content caching application
use case.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DETECTION METHOD FOR CLASSIFYING MALICIOUS FIRMWAREIJNSA Journal
This document proposes using deep learning to classify firmware as malicious or benign by converting firmware binaries into small grayscale images and training convolutional neural networks (CNNs) on these images. Testing of a MobileNetV2 CNN achieved over 90% accuracy on the image classifications. Decision trees and random forests were also applied and achieved similar or higher accuracy than the CNN. The document concludes that machine learning methods show promise for detecting malicious firmware updates through analyzing the patterns in converted firmware image files.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Flexible Technologies for Smart CampusKamal Spring
The article considers an example of the
advertisement network based on the BLE 4.0, and its facilities for
creating the infrastructure for a Smart Campus, where dynamic
information is provided for the target audience. The authors
provide an analysis of the characteristics and experimental
implementation of this system. Moreover, the practical usage of a
popular vendor and the needed back-end to provide dynamic
usages of the network, both in appearance and content is
described. In the paper different wireless technologies are
compared in regards to their main feature and field of
application. In general the characteristics of a Blue Tooth Low
Energy, BLE, are highlighted. This is elaborated upon in the
Smart Campus example. The Smart Campus is an indoor
wireless network to deliver location and user based dynamic
information to the different visitors, teacher or students of a
university campus, both for day-to-day use as for specific events.
To keep the system interesting and to augment ease-of-use for all
kind of users and content providers, a dedicated content
management system is developed within the Smart Campus case.
The complete system consists of a set of beacons, an application
on a smartphone, a database with the related CMS. All is
developed in an international cooperation between different
universities.
This document provides a summary of key concepts in computer networks:
1. It defines a computer network and describes the basic components - PCs, interconnections like network cards and cables, switches, and routers.
2. It discusses common network applications like email, web browsers, instant messaging, and collaboration tools.
3. It describes the seven-layer OSI model and compares it to the TCP/IP model, explaining the functions of the physical, data link, network, and transport layers.
4. It discusses networking software, network performance metrics like bandwidth and latency, and link layer services like acknowledged and unacknowledged connection-oriented services.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
A practical architecture for mobile edge computingTejas subramanya
Recently, mobile broadband networks are focused
on bringing additional capabilities to the network edge. For
instance, Mobile Edge Computing (MEC) brings storage and
processing capabilities closer to the mobile user i.e., at the radio
access network, in order to deploy services with minimum delay.
In this paper, we propose a resource constrained cloud-enabled
small cell that includes a MEC server for deploying mobile
edge computing functionalities. We present the architecture with
special focus on realizing the proper forwarding of data packets
between the mobile data path and the MEC applications, based
on the principles of SDN, without requiring any changes to
the functionality of existing mobile network nodes both in the
access and the core network segments. The significant benefits
of adopting the proposed architecture are analyzed based on a
proof-of-concept demonstration for content caching application
use case.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
QEBU: AN ADVANCED GRAPHICAL EDITOR FOR THE EBUCORE METADATA SET | Paolo PASIN...FIAT/IFTA
Creation and management of metadata documents can be quite a difficult task to accomplish manually. To address this issue in the context of the EBUCore v1.3 metadata set, we propose a GUI-based metadata editor, QEbu, developed during the Multimedia Archival Techniques course, held at the Polytechnic University of Turin in collaboration with RAI.
The aim is to provide a user-friendly graphical editor to create and manage XML documents, relieving the user from the burden of worrying about the structure of the data and letting him focus on the actual content.
QEbu has been developed in C++ using the cross-platform and open source library Qt 4.8; this framework was chosen in order to exploit its natural features for developing interface-centered applications.
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Internet is the networking infrastructure which helps in connecting many users through interconnected networks through which users can communicate to each other. The World Wide Web is built on top of the internet to share information. The grid is again a service that is built on top of internet but is able to share computational power, databases, disk storage and software applications. The paper mainly focuses on significance Grid computing, its architecture, the grid middleware Globus toolkit and wireless grid computing.
An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...IJECEIAES
The increase usage of mobile users with internet and interoperability among the cloud services intensifies the role of distributed environemtnt in today’s real world application. Modern technologies are important for building rich, scalable and interoperable applications. To meet the requirements of client,the cloud service provider should offer adequate infrastructure especially under heavy multi-client load.To provide solution for large scale requirements and to statisfy the mobile client from the critical situation like lacking with bandwidth,connectivity issues,service completion ratio, we present adhoc virtual cloud model for different scenarios that include single and multiple client configurations with various file sizes of various file formats for retrieving files in the mobile cloud environement.We evaluate the strategies with the socket and RMI implemented using java and identify the best model for real world applications. Performance evaluation is done with the results obtained and recommends that when sockets and RMI can be appropriately used in peer-to-peer environment when the mobile user cannot connect directly to the cloud services.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
A computer network connects independent computers allowing people to share files, peripherals, and communicate. The basic components of a network include at least two computers or devices connected via a networking interface card and cable or wireless connection. Common network types are LANs for local connections and WANs for long-distance connections. Protocols like TCP/IP are standards that allow networked devices to communicate by defining addressing and data transmission.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
This document provides an introduction to computer networking. It defines a network as two or more connected computers that can share resources. It discusses network topologies including bus, star, ring, and mesh. It also covers network hardware and software components like network interface cards, hubs, switches, and routers. The document provides an overview of networking fundamentals.
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. P2P systems offer access to distributed resources but lack centralized control, which makes it difficult to ensure reliability, performance, and security.
3. Autonomic and cognitive approaches may help address issues with P2P by enabling self-configuration, healing, optimization and protection of distributed resources.
4. Future networking approaches like DirecNet envision high-speed mobile mesh networks that could further enable wide-scale distributed computing architectures.
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. It notes challenges with P2P such as lack of centralized control and potential for freeloading, but also advantages like harnessing unused resources.
3. Emerging technologies like autonomic and cognitive networking aim to address P2P challenges by enabling self-configuration and optimization of distributed resources.
This document provides information on different types of computer networks and networking concepts. It discusses local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), intranets, and extranets. It also covers topics like server-based networks, client/server networks, peer-to-peer networks, topologies (such as star, mesh, bus, ring, and tree), protocols (TCP/IP, IPX/SPX, NetBEUI), network media (twisted pair wire, coaxial cable, fiber optic cable, wireless), and network devices (hubs, switches, bridges, routers,
This document summarizes a research paper that proposes integrating mobile devices with grid computing using an efficient scheduling algorithm. The paper presents a layered architecture with four layers - mobile devices, a mobile device interface, an interface to grid services, and grid services. It focuses on the local resource scheduling problem in the second layer. The paper describes implementing the architecture using Java-enabled mobile devices and Globus Toolkit-based grid services. It also proposes using an Artificial Bee Colony (ABC) algorithm for local resource scheduling to address issues like unreliable connectivity and battery power in mobile environments. The paper evaluates the performance of the traditional and new ABC scheduling algorithms.
The Data Link Layer (DLL) is the second layer of the OSI model that establishes links between networked devices and ensures reliable data transmission. It performs framing to encapsulate data for transmission, uses addressing to label source and destination nodes, and implements error detection methods like CRC to verify accurate data delivery. The DLL is critical for enabling communication across a network.
The document provides an introduction to data communications, covering topics such as definitions of data communication and telecommunication, the history of telecommunications and data communication technologies, frameworks for data communication including the OSI model and TCP/IP protocol suite, network applications, and careers in data communications.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
The document discusses how advanced computing can enable new opportunities in data-intensive humanities research by providing computational capabilities beyond what is ordinarily available. It outlines the types of advanced computing including clusters, grids, and middleware. It also describes application execution models, interfaces to advanced computing resources, and how this can help humanities researchers answer old questions and discover new ones through computational analysis of large datasets.
The document recommends that entrepreneurs build their own network of referral partners to generate business. It states that referral partners are important for entrepreneurs. It endorses TR as an effective teacher of techniques for developing a network of referral partners.
1. The document advertises the opportunity for engineers and subject matter experts to contribute articles and case studies or serve as peer reviewers for a new online technical reference collection called Engineering & Technology Reference (ETR).
2. ETR aims to provide practical solutions to common engineering challenges through real-world articles and case studies written by practicing engineers, with the goal of helping readers better understand and solve technical problems.
3. Contributors and peer reviewers will gain professional recognition and can showcase their work and organizations, while supporting the development of other engineers.
This document summarizes the qualifications and experience of Tammy Davis. She has over 15 years of experience working in education, including as a special education aide and administrative professional. Her experience also includes working as a 911 dispatcher, recreational soccer coach, and camp instructor. She has an Associate's degree in General Studies and Christian Education.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
QEBU: AN ADVANCED GRAPHICAL EDITOR FOR THE EBUCORE METADATA SET | Paolo PASIN...FIAT/IFTA
Creation and management of metadata documents can be quite a difficult task to accomplish manually. To address this issue in the context of the EBUCore v1.3 metadata set, we propose a GUI-based metadata editor, QEbu, developed during the Multimedia Archival Techniques course, held at the Polytechnic University of Turin in collaboration with RAI.
The aim is to provide a user-friendly graphical editor to create and manage XML documents, relieving the user from the burden of worrying about the structure of the data and letting him focus on the actual content.
QEbu has been developed in C++ using the cross-platform and open source library Qt 4.8; this framework was chosen in order to exploit its natural features for developing interface-centered applications.
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Internet is the networking infrastructure which helps in connecting many users through interconnected networks through which users can communicate to each other. The World Wide Web is built on top of the internet to share information. The grid is again a service that is built on top of internet but is able to share computational power, databases, disk storage and software applications. The paper mainly focuses on significance Grid computing, its architecture, the grid middleware Globus toolkit and wireless grid computing.
An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...IJECEIAES
The increase usage of mobile users with internet and interoperability among the cloud services intensifies the role of distributed environemtnt in today’s real world application. Modern technologies are important for building rich, scalable and interoperable applications. To meet the requirements of client,the cloud service provider should offer adequate infrastructure especially under heavy multi-client load.To provide solution for large scale requirements and to statisfy the mobile client from the critical situation like lacking with bandwidth,connectivity issues,service completion ratio, we present adhoc virtual cloud model for different scenarios that include single and multiple client configurations with various file sizes of various file formats for retrieving files in the mobile cloud environement.We evaluate the strategies with the socket and RMI implemented using java and identify the best model for real world applications. Performance evaluation is done with the results obtained and recommends that when sockets and RMI can be appropriately used in peer-to-peer environment when the mobile user cannot connect directly to the cloud services.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
A computer network connects independent computers allowing people to share files, peripherals, and communicate. The basic components of a network include at least two computers or devices connected via a networking interface card and cable or wireless connection. Common network types are LANs for local connections and WANs for long-distance connections. Protocols like TCP/IP are standards that allow networked devices to communicate by defining addressing and data transmission.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
This document provides an introduction to computer networking. It defines a network as two or more connected computers that can share resources. It discusses network topologies including bus, star, ring, and mesh. It also covers network hardware and software components like network interface cards, hubs, switches, and routers. The document provides an overview of networking fundamentals.
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. P2P systems offer access to distributed resources but lack centralized control, which makes it difficult to ensure reliability, performance, and security.
3. Autonomic and cognitive approaches may help address issues with P2P by enabling self-configuration, healing, optimization and protection of distributed resources.
4. Future networking approaches like DirecNet envision high-speed mobile mesh networks that could further enable wide-scale distributed computing architectures.
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. It notes challenges with P2P such as lack of centralized control and potential for freeloading, but also advantages like harnessing unused resources.
3. Emerging technologies like autonomic and cognitive networking aim to address P2P challenges by enabling self-configuration and optimization of distributed resources.
This document provides information on different types of computer networks and networking concepts. It discusses local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), intranets, and extranets. It also covers topics like server-based networks, client/server networks, peer-to-peer networks, topologies (such as star, mesh, bus, ring, and tree), protocols (TCP/IP, IPX/SPX, NetBEUI), network media (twisted pair wire, coaxial cable, fiber optic cable, wireless), and network devices (hubs, switches, bridges, routers,
This document summarizes a research paper that proposes integrating mobile devices with grid computing using an efficient scheduling algorithm. The paper presents a layered architecture with four layers - mobile devices, a mobile device interface, an interface to grid services, and grid services. It focuses on the local resource scheduling problem in the second layer. The paper describes implementing the architecture using Java-enabled mobile devices and Globus Toolkit-based grid services. It also proposes using an Artificial Bee Colony (ABC) algorithm for local resource scheduling to address issues like unreliable connectivity and battery power in mobile environments. The paper evaluates the performance of the traditional and new ABC scheduling algorithms.
The Data Link Layer (DLL) is the second layer of the OSI model that establishes links between networked devices and ensures reliable data transmission. It performs framing to encapsulate data for transmission, uses addressing to label source and destination nodes, and implements error detection methods like CRC to verify accurate data delivery. The DLL is critical for enabling communication across a network.
The document provides an introduction to data communications, covering topics such as definitions of data communication and telecommunication, the history of telecommunications and data communication technologies, frameworks for data communication including the OSI model and TCP/IP protocol suite, network applications, and careers in data communications.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
The document discusses how advanced computing can enable new opportunities in data-intensive humanities research by providing computational capabilities beyond what is ordinarily available. It outlines the types of advanced computing including clusters, grids, and middleware. It also describes application execution models, interfaces to advanced computing resources, and how this can help humanities researchers answer old questions and discover new ones through computational analysis of large datasets.
The document recommends that entrepreneurs build their own network of referral partners to generate business. It states that referral partners are important for entrepreneurs. It endorses TR as an effective teacher of techniques for developing a network of referral partners.
1. The document advertises the opportunity for engineers and subject matter experts to contribute articles and case studies or serve as peer reviewers for a new online technical reference collection called Engineering & Technology Reference (ETR).
2. ETR aims to provide practical solutions to common engineering challenges through real-world articles and case studies written by practicing engineers, with the goal of helping readers better understand and solve technical problems.
3. Contributors and peer reviewers will gain professional recognition and can showcase their work and organizations, while supporting the development of other engineers.
This document summarizes the qualifications and experience of Tammy Davis. She has over 15 years of experience working in education, including as a special education aide and administrative professional. Her experience also includes working as a 911 dispatcher, recreational soccer coach, and camp instructor. She has an Associate's degree in General Studies and Christian Education.
This document promotes watching a welcome video that explains how to ethically exploit opportunities provided by the Affordable Care Act, also known as Obamacare, through a featured program. The document emphasizes watching the video by repeating instructions to watch and including an arrow pointing to start the video.
This document summarizes four business data sources that can be used for benchmarking and providing background information on entrepreneurship and SMEs at the local level. It describes the Global Entrepreneurship Monitor (GEM) survey, UK Innovation Survey (UKIS), Longitudinal Small Business Survey (LSBS), and the Inter-Departmental Business Register (IDBR) and Business Structure Database (BSD). For each source, it provides information on the background, coverage, and contacts for further information. It also includes a few maps as examples of analyses that can be done using the different data sources at the local enterprise partnership (LEP) level.
This short document encourages the reader to watch a personal welcome video. It provides a simple call to action to watch the video without providing any additional context or details. The document is brief, focusing only on prompting the reader to view the video.
The document summarizes research on the relationship between team size, ambition, and business performance. It includes:
1. A meta-analysis of 47 previous studies linking team size and diversity to performance, finding mostly positive relationships between various types of diversity and outcomes like sales, profits, innovation, and internationalization.
2. An analysis of UK business data from 2002-2015 examining the effect of ambition on team size and the effect of team size on outcomes like employment, exporting, and innovation. The results show ambition is positively associated with larger teams and team size positively impacts various performance measures, with effects varying for early-stage and established businesses.
3. Business complexity and owner education are found to positively moderate the
This visual presentation involves painting different materials like sandpaper and leaves with watercolors, then cutting and pasting them onto paper to create a collage. Key steps include mixing colors on a can lid, painting sandpaper and leaves, drying the materials, cutting shapes from the sandpaper, and pasting everything onto paper to form a design. The presentation uses common art supplies and natural materials.
This document contains charts showing planned, earned, forecast, early cumulative, planned cumulative, late cumulative, and earned cumulative percentages over time for a construction project. The charts also show cumulative and incremental progress curves. This appears to be a sample report tracking progress across multiple metrics for a construction project over time.
Asian landscape paintings are traditionally displayed and viewed during ceremonial tea parties, hung on walls to immerse guests in natural scenery. Afterward, the paintings are rolled up and stored in rosewood cabinets. Printmaking originated in China over 2,000 years ago and was later adopted in Japan and other Western countries. Woodblock printing involves carving images into wood blocks, inking the surfaces, and pressing them onto paper. This technique grew popular in 16th century Japan, and artists like Hokusai produced famous works, including The Great Wave of Kanagawa, which was widely appreciated in Europe for its freshness and simple style.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
Maharashtra state board IT science Chap 4.pdfAAFREEN SHAIKH
This document contains solutions to textbook questions on emerging technologies. It discusses internet of things (IOT), cloud computing, artificial intelligence (AI), and 5G networks. IOT applications mentioned include smart thermostats, lighting, locks, and traffic signals. Cloud computing models covered are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). AI fields discussed are machine learning, neural networks, deep learning, and natural language processing. The 5G section provides details on 5G being the next generation cellular technology and its ability to transmit large amounts of data at short distances using higher frequency spectrum.
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
This document discusses digital security and the need for security measures when connecting corporate computer networks to the internet. It notes that internet-based technologies like VPNs, powerline communications, satellite communications, and wireless networks increasingly connect networks globally. However, more malicious actors are finding ways to infiltrate systems through technology. While the internet is essential, there are cybersecurity risks to consider. Digital security aims to protect digital identities and assets by implementing tools, policies, and procedures to secure technology and data in online and mobile environments.
A new approach of scalable traffic capture model with Pi cluster IJECEIAES
The development of the internet of things (IoT), which functions as servers, device monitors, and controllers of several peripherals inside the smart home, eased workload in many sectors. Most devices are accessible through the internet because they communicate with wired or wireless interfaces. However, this feature makes them prone to the risk of being exposed to the public. The exposed devices are an easy target for the third party to launch a flooding attack through the network. This attack overloads the system due to the low processing capability, thereby interrupting any running process and harming the device. Therefore, this study proposed a scalable network capturing model that utilized multiple Raspberry Pi boards in parallel to monitor the network traffics simultaneously. An isolated experiment was used for evaluation by running simultaneous flooding attacks on each device. The result showed that the model consumed 30.44% more memory with 14.66% lower central processing unit (CPU) usage and 3.63% faster execution time. This means that this model is better in terms of performance and effectiveness than the single capture model.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
WSN_Data Link Layer _latest development_by_AbhinavAshish.pptxAbhinavAshish21
The document discusses wireless sensor networks and data link layer applications. It provides information on seven layers of networking that are applicable to wireless sensor networks, including the physical, data link, network, transport, session, presentation, and application layers. It also summarizes Samsung's SmartThings smart home network and various technologies used for smart home IoT devices like hazard sensors and their wireless connectivity.
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLdbpublications
The goal of this project is to implement the (AES) encryption system using Verilog. To do this, several separate sections of the algorithm will be coded to work together towards the end goal of performing the correct encryption routines. A telecommand is a command sent to control a remote system or systems i.e not directly connected (e.g. via wires) to the place from which the telecommand is sent. The telecommand word is derived from tele = remote (Greek), and command = to entrust/order (Latin). Systems that need remote measurement and reporting of information of interest to the system designer or operator, require the counterpart of telecommand, telemetry. For a telecommand (TC) to be effective, it must be compiled into a pre-arranged format (which may follow a standard structure), modulated onto a carrier wave which is then transmitted with adequate power to the remote system. The remote system will then demodulates the digital signal from the carrier, decode the telecommand, and execute it.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
This document discusses an open IoT testbed and architectural framework. It describes IoT systems as consisting of interconnected devices that can communicate and exchange data. A core component is embedded systems/devices that include sensors to measure the environment and actuators to perform physical actions. Microcontrollers interface with these devices and communicate via various protocols. The document proposes an open IoT testbed with a control plane that can discover resources/services, orchestrate based on user demands, and resolve conflicts through a lock release model. It provides a functional and detailed architecture for the proposed framework.
This document summarizes a research paper on developing a mobile application called MeghaOS that allows users to access and run desktop applications hosted on cloud infrastructure directly from their smartphones. The application was created to bridge the gap between limited smartphone capabilities and more powerful desktop applications. It implements an interface to Amazon Web Services that allows users to launch virtual machine instances, install and run web applications, and access them through their smartphone. The paper outlines the components of the MeghaOS application, proposed methodology, implementation details and screenshots. It also compares MeghaOS to other mobile cloud applications and file sync services.
This document describes the design and implementation of an online interactive data acquisition and control system using a Beagle Board. Key points:
- The system uses a Beagle Board running the Real-Time Linux operating system to function as both an embedded web server and data acquisition/control unit. This allows remote monitoring and control via a web browser.
- Hardware includes sensors like an ultrasonic sensor and camera connected to the Beagle Board via interfaces like I2C. Software is designed using languages like HTML, JSP.
- The Beagle Board boots Linux and runs the Apache Tomcat web server. This allows clients to access sensor data, video feed, and control machinery from a web page on their browser.
The document discusses the introduction to Internet of Things (IoT). It defines IoT and describes its characteristics, physical and logical design, enabling technologies, and deployment levels. The physical design covers IoT devices, protocols, and communication layers. The logical design includes functional blocks, communication models, and APIs. Enabling technologies include wireless sensor networks, cloud computing, big data analysis, communication protocols, and embedded systems. IoT deployment levels range from single node local systems to multi-node systems with local coordination and cloud-based storage, analysis and applications.
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Here are the key steps I would take to design a computer network:
1. Define the goals and needs of the network. What needs to be connected? How many users? What applications and services will be used?
2. Map out the physical layout. Where are devices located? How will they connect - wired or wireless? Design a logical topology to organize devices.
3. Select network hardware. Choose switches, routers, access points suitable for the size and needs. Consider wired/wireless infrastructure requirements.
4. Design the IP addressing scheme. Plan subnetting and IP ranges for efficient use of available addresses.
5. Configure network segmentation. Use VLANs or separate subnets to logically separate traffic as needed for
A computer network connects two or more computers allowing people to share files, printers, and other resources. The basic components of a network include computers, network interface cards, connection medium like wires or cables, and network operating system software. There are different types of networks including local area networks (LANs) within a building, wide area networks (WANs) connecting multiple LANs over long distances, and metropolitan area networks (MANs) within a city. The Open Systems Interconnection (OSI) model describes how network components work together in layers to enable communication. Ethernet is a common physical layer technology used to set up LANs.
1. cBox: A decentralized system for resources sharing that
enables peer communication in an heterogeneous environment
Konstantinos Akasoglou, Alexandros Baltas, Emannouil Gkatziouras, Nikolaos
Kapetanos, Dimitrios Karavias, Konstantinos Moustakakis, Georgios Oikonomou,
Nikolaos Palaghias, Georgia Papaneofytou, Nikolaos Triantafyllis , Filippos Vasilakis,
Orestis Akribopoulos, Christos Koninis, Marios Logaras
and Ioannis Chatzigiannakis
1
Research Academic Computer Technology Institute (RACTI), Patras, Greece
2
Computer Engineering and Informatics Department (CEID), University of Patras, Patras, Greece
Email:{akasoglo, ampaltas, gkatzioura, kapetanos, karavias, moustakaki,
oikonomou, palaggias, papaneofyt, triantafyl,
vasilakis}@ceid.upatras.gr
{akribopo, koninis, logaras, ichatz}@cti.gr
Abstract
The cBox system is a collection of services, libraries and applications that can be used to share resources,
such as Internet connectivity, with other members of an ad-hoc network, in a transparent and safe way.
The system features include delay tolerant networking, caching of the web requests and fully decentralized
operation. The system design exploits well established technologies such as ZeroConf, mDNS to allow the
devices to discover compatible services. Also it utilizes a wide variety of existing technologies and devices
to facilitate communication. Furthermore, we provide a set of applications and a use case scenario showing
the usage of the cBox system.
Keywords: Wireless Sensor Networks, Android, Delay Tolerant Networking
1. Introduction
In the last decade it has become obvious that we have entered the knowledge soci-
ety and everyone must have access to participate. That is why Internet access in some
countries(e.g. Finland) has been ruled a base human right and in other countries is
considered part of their basic infrastructure like roads and water. However there are
occasions, where Internet connectivity is lost or unavailable due to technical reasons
or as a consequence of natural disasters. In other cases the access may be partially or
fully blocked due to different ISP policies. In addition many users are becoming in-
creasingly concerned about their privacy and recognize the need to ensure the security
of their confidential data. In some situations exchanging data through direct channels is
not preferred by the user because the main infrastructure has been compromised result-
ing in privacy inadequacy and security leaks. In such cases, alternative routes need to be
2. found or even created, exploiting various communication channels (i.e. wired, wireless,
broadband, mobile).
In a representative scenario where alternative and multiple communication paths
need to be found, consider a user that tries to send a small message from his laptop(i.e.
tweet or mail). His broadband Internet connection is not operational. However, another
user within range of his wifi is online via his smartphone with a 3G connection and he
is willing to share his connection. In this case, we need a way to facilitate the commu-
nication between the two devices, in order to connect the offline user to the Internet.
The cBox software system is designed and developed to address those issues in a
reliable, secure and efficient way. Based upon building and maintaining a peer network
among trusted nodes willing to participate, the cBox software can be executed in a large
variety of devices with no special hardware requirements, i.e. Android based devices,
Personal Computers or small, low power devices such as Beagleboard [Beagleboard,
2011], Dreamplug [GlobalScale, 2011]. Resilient routing techniques ensure cBox’s high
reliability inside a network where nodes can be added or removed and act as Internet
gateways.
cBox employs different adapters to facilitate the communication depending on the
hardware that it runs. When executed on a device carrying a Bluetooth adapter, cBox
software carries out any communication tasks using the Bluetooth interface –if that
is possible. If cBox is executed on a more powerful device with Wifi, Ethernet and
Bluetooth interface, then the software utilizes all three of them accordingly. The services
and connections provided by the participating nodes depend on users preference and are
fully customizable.
2. cBox System Architecture
In Figure 1 we present the high level architecture of our system, broken down in multiple
layers. At the lowest is the Network Abstraction Layer (NAL) which conceals the differ-
ences of the underlying communication interfaces (i.e Bluetooth, Ethernet), providing
functions for sending and receiving data in an standard way. NAL includes as well, the
Android Connectivity module, which is the implementation of NAL for Android-based
devices. The layer also includes a database for the accessing discovered services, that
are needed by the upper layers. The next layer, (i.e. Protocols) includes Routing and
ZeroConf. Routing layer maintains routes to every node participating in the network
and delivers the packets to their appropriate destinations. ZeroConf is responsible for
assigning unique hostnames to the nodes and discovering neighboring nodes running
compatible services. Proxy is the following layer providing anonymity and caching.
The higher layer is the Application, that provides multiple ways to interface the cBox
system with popular and useful applications and interact with the end users.
3. Fig. 1. The Layers of the cBox
Wiselib library
The Wiselib [Baumgartner et al., 2010] is an algorithm library initially designed for
sensor networks but expanded to more general wireless networks. We decided to im-
plement our algorithm using Wiselib: a code library, that allows implementations to
be OS-independent. It is implemented based on C++ and templates, but without virtual
inheritance and exceptions. Algorithm implementations can be recompiled for several
platforms and firmwares, without the need to change the code. Wiselib can interface
with systems implemented using C (Contiki), C++ (iSense), and nesC (TinyOS). Also
currently it is ported to support SmartPhones operating systems like Android and iOS.
2.1 Adding support for Android OS to Wiselib
Android’s mobile operating system is based on a modified version of the Linux kernel.
The Android open-source software stack consists of Java applications running on top
of Java core libraries executed on a Dalvik virtual machine featuring JIT compilation.
Although most applications are written in Java code, libraries written in C, C++ and
other languages can be compiled to native code and installed with the Android Native
Development Kit, using a rather mature framework, the JNI [ORACLE, 2011]. This
enables Java code running in a JVM to call and to be called by native applications and
libraries written in other languages, such as C, C++ and assembly. Native classes can be
called from Java code running under the Dalvik VM using the System.loadLibrary call,
which is part of the standard Android Java classes.
As with other C++ template libraries like the Boost [Boost, 2011] or CGAL [Cgal,
2011], the fundamental design parts in Wiselib are concepts and models. A concept is
an interface description, only existing in documentation. It describes exactly both the
4. types that are defined in a class, and the provided methods with expected parameters.
A model in turn is the implementation of one (or more) concepts - each type and each
method that is described in the concept must be provided by the model.
As a first step in order to be able to compile existing or new algorithms for this plat-
form, we developed the models for android platform. During the development of cBox,
most concepts were implemented for Android. Specifically, Debug, Clock, Timer and
Radio models, as being the most important, were fully implemented. The Debug model
just prints a string given in native C++ code to an alert message inside the application
using the Java alert box. Clock model is a boost-like clock for android platform, pro-
viding the applications with time related information. Timer model, is used to schedule
the events to be executed in the future. The timer has been implemented using setitimer
system call which sets an interval timer and when expired a Unix signal(SIGALRM)
is sent to the process. Finally, the radio model implements the radio interface. When
the application starts, the radio is enabled. Upon receiving a new message, Android’s
Java code calls through JNI a native function that notifies any registered callback that a
message was received. To send a message, native functions store in an XML-like string
the message properties and sent it to the Java code through JNI. Java code restores all
the necessary info(IP,header,data etc) and sends the packet.
2.2 Network Abstraction Layer
Network abstraction layer (NAL) is located at the lowest system layers, along with
Android Connectivity Component. The main goal of this layer is to provide a highly ab-
stract network interface to upper levels. Network interfaces on a computer system may
use different network technologies (i.e. Bluetooth, Ethernet, Wifi, GSM) and interfacing
them requires the use of different techniques. Network Abstraction Layer abstracts all
the details and differences and provides a simple, unified way to access every available
network interface.
The NAL API provided is quite minimalistic, consisting of few simple functions
that are used to access every available Network Interface. NAL is implemented using
the Wiselib in which a new Wiselib Radio concept was conceived and developed for
every supported Network Interface (Bluetooth, Ethernet, Wifi).
Sending data is a straight forward procedure: a new thread is created with a buffer
holding the data to be send. The thread opens a socket connection and sends the data
to the destination. On the other hand, Data Reception is asynchronous. In order for an
application to receive data, a callback function must be registered with NAL, which
will be called when new data is available. Based on Wiselib’s requirements, delegates
mechanism is used to facilitate the callback mechanism.
The implementation of NAL is in C++ using Wiselib extensions. For the Ethernet
and Wifi Interface, standard socket API is used, which is provided by every Linux distri-
5. bution. For the Bluetooth Interface, library Bluez [Bluez, 2011] is used which provides
UNIX-like sockets for Bluetooth adapters.
In the following example an upper layer using the NAL API to broadcast a message
to every neighbor:
Ethernet e; //Instance of Ethernet NAL implementation
e.enable(); //Enable and initializes interface
//Register data receiver handler
e.register_receiver<Layer,&Layer::handler_function>(this);
e.send(‘‘CBox!‘‘,BROADCAST); //Send a (roadcast message
//When communication is no more needed, disable is called
e.disable();
Android Connectivity
The main purpose of Android Connectivity is to provide to the higher layers an abstract
and simple way to send and receive data using an Android phone.
Considering the connectivity through Wifi we had two ways to achieve our goal ei-
ther through UDP or TCP. The decision was to use UDP in occasions where the size
of the data to be transferred was less than 512 bytes. This transfer is achieved through
a client server model between Android phones and cBox devices using the Datagram-
Socket, DatagramPacket classes from the Java.net library. In an android phone the client
is achieved with a “send” function sending a UDP message to a UDP server of another
cBox device. For the Android phones we use Android services and threads for the UDP
server. By this way the user is able to run the cBox UDP server on the background, thus
being able to use his mobile phone as usual.
Considering the connectivity through Bluetooth the only way provided from an An-
droid phone was the rfcomm layer. cBox follows the client server concept from the
Wifi connectivity using the Android Bluetooth API. However in order to transfer data
using the Android Bluetooth API, it is mandatory to first pair the devices, establishing
a connection between them before data transfer is allowed. The connectivity through
Bluetooth is fully multi-threaded, using classes from the Android Bluetooth API.
Another issue is how the Android Connectivity deals with the data storage. The
data can be either necessary information for the higher levels or files of various formats,
probably used by applications integrating with cBox. For the first situation cBox takes
advantage of an Android phone’s sqlite database and content providers. The informa-
tion needed by the upper levels is stored and retrieved through SQL queries. Information
needed by other applications integrating with cBox are available through a public con-
tent provider. Also the files to be received or to be sent are stored on the sdcard directory
which is public.
6. 2.3 Routing
Routing is the layer responsible for creating and maintaining the network, while for-
warding every message to its designated destination. In particular, the following four
tasks are executed: a) Create the network and allow peers to join at any time, b) Assign
each node with a unique address, c) Design a self-repairing mechanism, that preserves
the network consistency when peers leave or crash and d) Route data messages.
Network Construction: Our routing algorithm uses a tree structure as the backbone of
the network, with each node representing a peer. One node initializes the tree by making
itself the root node, awaiting for nodes wishing to enter the tree. Let Ni be a node that
is part of the tree network and Nj a node that wishes to join the network. The join
algorithm operates as following: Nj broadcasts a join request message and Ni replies.
Then Nj sends back a reply to let Ni know that Nj is its child and updates its status.
Unique Address Assignment: This protocol uses IPv6 [Deering and Hinden, 1998]-like
addresses to identify each node by assigning a different address to each peer participat-
ing in the tree structure. Each node utilizes two hexadecimal digits, while inheriting its
parent address as a prefix (see Figure 2). Non valid digits are ignored. Root utilizes only
2 digits, nodes with height 1 utilize 4 digits etc. For example, if a node has the address
0x0003af then node 0x0003 is its parent. Each node can have up to 256 children
and height up to 15. For this property to be possible, the join algorithm implements the
following mechanism. When Nj sends the join request, Ni replies with a message indi-
cating that Nj can be its child with a specific address computed by Ni. Then Nj has to
inform Ni that it obtained the address and is now taken.
Fig. 2. IP assignment at a cBox network that consists of computers and Android devices.
Self-Repairing Mechanism: The network is highly dynamic; nodes can leave the net-
work or can crash at any time. The protocol does not implement any leave algorithm
7. so leaving and crashing nodes will be treated equally. In order to detect the possible
absence of its parent, each node periodically pings its parent and waits for response. If
no response is received during a predefined time, the node broadcasts a re-join message
using an algorithm similar to the join one. The node, then, forces the update of all chil-
dren addresses. When a node address is updated by its parent, it recursively updates its
children with consistency to the protocol explained above.
Message Routing: The way addresses are assigned gives the peers the ability to route
every message with the optimal way, by only knowing their own IP address and the
destination IP address. When a node S, creates a message, it compares its IP, IPS, with
the destination peer IP, let IPD. If IPD is shorter than the IPS, S forwards the message
to its father. Otherwise, if the IPS is a prefix of IPD and the peer with IPD is a member
of a subtree with S as a father, so it forwards the message to its children. If IPS is not a
prefix to IPD, S forwards the message to its father. When node A receives a message, it
compares its own IPA with the IPD. If IPA is equal to IPD, node A is the destination
and handles the message. If the two addresses are of the same size, A drops the message.
If the two addresses are not of the same size, A executes a routing algorithm similar to
the one described above.
A node has also the ability to send a message to all other peers. The message gets
forwarded by an algorithm similar to breadth first search, as each node forwards the
message once to every neighbor.
2.4 ZeroConf
ZeroConf [Aboba et al., 2002] is a module incorporated in the Routing layer. It is a
variation of the common ZeroConf protocol and it is implemented in Wiselib. The two
main tasks of the protocol are: a) the uniqueness of the nodes’ hostnames and b) the
implementation of the sharing of the services.
Hostname uniqueness: Each node is characterized by a unique IP (routing is responsible
for its validity) and a hostname. When a device finds an existing network and a suitable
IP is assigned to it, the device “asks” the network if its name already exists. If no node
has that specific name, the device joins to the network and the hostname is equal to its
name. If another node has the specific name, it sends a “conflict” message to the node-
candidate which now has to change its name to a different one. The search procedure
for a unique hostname is the same for the new name, too.
Service Discovery: When a node joins the network, it advertises its services with broad-
cast messages. The services which are provided from a node are listed to a folder that
the node reads. When a node receives a record of a service that exists in the network,
8. it stores it temporarily in its database where all of the available services are stored. The
record includes some information for the service, i.e, IP address, the node’s hostname,
the port that uses. Moreover, the record has a TTL (time-to-live) value, which is used for
validity of the service. So, a service can be used only if its TTL is a positive value (fresh
service). If a service is about to expire, the node can ask the provider of the service if
it is still available. The provider will respond with a new TTL if the service exists. The
database of each node deletes the record of a service if its TTL is not suitable (stale
service).
There is also the ability of a node to ask other nodes if they have a specific type of
service. Every node receiving that message, looks locally for this type of service and in
case that the specific service exists, a response message is broadcasted.
A node which wants to use some services from the network, needs only to select
a given service from its database. Then it sends its specialized query to the destination
that the record includes.
2.5 Proxy and Application Layer
One of the most important services that the cBox system can offer to the end-user is
transparently caching web content and utilizing multiple nodes caches in order to reduce
the generated Internet traffic and increase the response time. In the most typical scenario
the cBox system is running in a client with Ubuntu Linux distribution. Due to this major
advantage and based on software reuse, we decided that Squid [Squid-Cache, 2011]
Proxy Server was the most suitable choice. Squid is an open source, high performance
proxy caching server for the Web, supporting HTTP, HTTPS, FTP and more. It provides
many capabilities such as: Anonymity, and Caching. User is able to perform transactions
with the Web, without his personal information being published. The Proxy server is
caching and reusing frequently requested web pages and has also the ability to configure
hierarchical caches.
The Application Layer is the highest layer in our project and includes the imple-
mentation of two clients: one for Twitter and one for Flickr that use the cBox system.
Each one of those clients consists of two parts: Android Mobile Application and cBox
Caching Proxy Application. The functionality of each client is similar, on the way they
interact with the Web. The Android Application part of the Twitter Client allows the
user to sign in to Twitter from various accounts using OAuth [E. Hammer-Lahav, 2010]
(open protocol allowing secure authorization in a simple method). Users are able to
send their own update status to Twitter, with ensured arrival guarantee, regardless the
availability of Internet connectivity. A push notification mechanism is used for deliv-
ering notifications to the mobile phone. Moreover the Twitter Client provides all the
functionality of the Twitter website, i.e, Direct Messages, Timeline view, Friends view
etc.
9. The cBox Caching Proxy Application part of the Twitter Client provides the ability
to cache Twitter status updates on Internet connectivity loss. The Twitter status update
may originate either from the above application or during the use of a web browser. The
implementation for the Flickr follows the same techniques and strategies as the Twitter
client we described above.
3. Use Case
Fig. 3. Simple Use Case Scenario
Suppose a user of an Android SmartPhone is in proximity of a cBox device which
has Bluetooth and wifi interfaces. The mobile device does not have Internet access and
the user opens the cBox twitter app and tries to send a status update. The request is
cached in a database of the local device until it reestablishes Internet connection. In the
meantime, it sends the status update to the neighboring cBox device. If neither the cBox
device has Internet connectivity, it caches the status update and it also forwards the sta-
tus update to an other cBox device, see Fig 3. The moment, one of those devices regains
Internet connectivity, it sends the status update. If all of the devices regain Internet con-
nectivity, the status update is sent three times but Twitter is able to handle the specific
issue, so that the message is not displayed more than one time. When the status update
is delivered, Twitter’s application server sends to the mobile device a push notification,
via “Google’s Cloud to Device Messaging Framework”, in order to inform the user that
the status update was successfully delivered.
4. Conclusion and Future Work
cBox is an open source reliable and decentralized system that can be used to facili-
tate communication anytime, anyhow, anyplace. It provides the choice to connect and
share resources independently. As we saw in the use case, such networking is functional
10. and a transition in a large scale scenario is meaningful. Further work can be made on
expanding the variety of services that can be offered. More application clients can be
implemented i.e. email and ftp clients. Improvements can be also made on the security,
such as adding cryptographic functions for the message delivery. Our goal is the wide
usage and acceptance of our software from the open source community as is publicly
available3.
References
Aboba, B., Thaler, D. and Guttman, E. [2002], ‘Zeroconf multicast address allocation
protocol (zmaap)’.
URL: https://tools.ietf.org/html/draft-ietf-zeroconf-zmaap-02
Baumgartner, T., Chatzigiannakis, I., Fekete, S. P., Koninis, C., Kr¨oller, A. and Pyrgelis,
A. [2010], Wiselib: A generic algorithm library for heterogeneous sensor networks,
in ‘Proceedings of the Seventh European Conference on Wireless Sensor Networks
(EWSN 2010)’, Springer-Verlag LNCS 5970, Coimbra, Portugal, pp. 162–177.
Beagleboard [2011], ‘Low cost, high performance, low power omap3 based platform’.
URL: http://beagleboard.org/
Bluez [2011], ‘Library for the core bluetooth layers and protocols’.
URL: http://www.bluez.org
Boost [2011], ‘peer-reviewed portable c++ source libraries’.
URL: http://www.boost.org
Cgal [2011], ‘Computational geometry algorithms library’.
URL: http://www.cgal.org
Deering, S. and Hinden, D. [1998], RFC 2460 Internet Protocol, Version 6 (IPv6) Spec-
ification.
URL: http://tools.ietf.org/html/rfc2460
E. Hammer-Lahav, E. [2010], ‘The oauth 1.0 protocol’.
URL: http://tools.ietf.org/html/draft-hammer-oauth-10
GlobalScale [2011], ‘Developer kit for the marvell pxa510 highly integrated soc’.
URL: http://globalscaletechnologies.com
ORACLE [2011], ‘Java native interface specification contents’.
URL: download.oracle.com/javase/6/docs/technotes/guides/jni/spec/jniTOC.html
Squid-Cache [2011], ‘Squid internet object cache’.
URL: http://www.squid-cache.org
3
The source code of all the developed components is publicly available in the github repository: https:
//github.com/CEID-DS/cbox