Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridization and adaptation of IE mechanisms.
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...ijgca
A new class of Data Grid infrastructure is needed to support management, transport, distributed access, and analysis of terabyte and peta byte of data collections by thousands of users. Even though some of the existing data management systems (DMS) of Grid computing infrastructures provides methodologies to handle bulk data transfer. These technologies are not usable in addressing some kind of simultaneous data
access requirements. Often, in most of the scientific computing environments, a common data will be needed to access from different locations. Further, most of such computing entities will wait for a common scientific data (such as a data belonging to an astronomical phenomenon) which will be published only
when it is available. These kinds of data access needs were not yet addressed in the design of data component Grid Access to Secondary Storage (GASS) or GridFTP. In this paper, we address an application layer content based data transfer scheme for grid computing environments. By using the
proposed scheme in a grid computing environment, we can simultaneously move bulk data in an efficient way using simple subscribe and publish mechanism.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
The recent standard for broadband wireless
access networks, IEEE 802.16, which resulted in the
development of metropolitan area wireless networks,
includes two network organization modes: Point to Multi
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
technique for channel access modulation. According to
IEEE 802.16 MAC protocol, there are two scheduling
algorithms for assigning TDMA slots to each network node:
centralized and distributed. In distributed scheduling
algorithm, network nodes have to transmit scheduling
message in order to inform other nodes about their transfer
schedule. In this paper a new approach is proposed to
improve distributed scheduling efficiency in IEEE 802.16
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
algorithm efficiency, several extensive simulations are
performed in various network configurations and the most
important system parameters which affect the network
performance are analyzed.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridization and adaptation of IE mechanisms.
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...ijgca
A new class of Data Grid infrastructure is needed to support management, transport, distributed access, and analysis of terabyte and peta byte of data collections by thousands of users. Even though some of the existing data management systems (DMS) of Grid computing infrastructures provides methodologies to handle bulk data transfer. These technologies are not usable in addressing some kind of simultaneous data
access requirements. Often, in most of the scientific computing environments, a common data will be needed to access from different locations. Further, most of such computing entities will wait for a common scientific data (such as a data belonging to an astronomical phenomenon) which will be published only
when it is available. These kinds of data access needs were not yet addressed in the design of data component Grid Access to Secondary Storage (GASS) or GridFTP. In this paper, we address an application layer content based data transfer scheme for grid computing environments. By using the
proposed scheme in a grid computing environment, we can simultaneously move bulk data in an efficient way using simple subscribe and publish mechanism.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
The recent standard for broadband wireless
access networks, IEEE 802.16, which resulted in the
development of metropolitan area wireless networks,
includes two network organization modes: Point to Multi
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
technique for channel access modulation. According to
IEEE 802.16 MAC protocol, there are two scheduling
algorithms for assigning TDMA slots to each network node:
centralized and distributed. In distributed scheduling
algorithm, network nodes have to transmit scheduling
message in order to inform other nodes about their transfer
schedule. In this paper a new approach is proposed to
improve distributed scheduling efficiency in IEEE 802.16
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
algorithm efficiency, several extensive simulations are
performed in various network configurations and the most
important system parameters which affect the network
performance are analyzed.
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...IJCNCJournal
Cloud computing is an environment which provides services for user demand such as software, platform, infrastructure. Applications which are deployed on cloud computing have become more varied and complex to adapt to increase end-user quantity and fluctuating workload. One popular characteristic of
cloud computing is the heterogeneity of network, hosts and virtual machines (VM). There were many studies on cloud computing modeling based on queuing theory, but most studies have focused on homogeneity characteristic. In this study, we propose a cloud computing model based on open Jackson
network for multi-tier application systems which are deployed on heterogeneous VMs of IaaS cloud computing. The important metrics are analyzed in our experiments such as mean waiting time; mean request quantity, the throughput of the system. Besides that, metrics in model is used to modify number VMs
allocated for applications. Result of experiments shows that open queue network provides high efficiency.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A wireless network consists of a set of wireless nodes forming the network. The bandwidth allocation scheme used in wireless networks should automatically adapt to the network’s environments, where issues such as mobility are highly variable. This paper proposes a method to distribute the bandwidth for wireless network nodes depending on dynamic methodology;this methodology uses intelligent clustering techniques that depend on the student’s distribution at the university campus, rather than the classical allocation methods. We propose a clustering-based approach to solve the dynamic bandwidth allocation problem in wireless networks, enabling wireless nodes to adapt their bandwidth allocation according to the changing number of expected users over time. The proposed solution allows the optimal online bandwidth allocation based on the data extracted from the lectures timetable, and fed to the wireless network control nodes, allowing them to adapt to their environment. The environment data is processed and clustered using the KMeans clustering algorithm to identify potential peak times for every wireless node. The proposed solution feasibility is tested by applying the approach to a case study, at the Arab American University campus wireless network.
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...Tal Lavian Ph.D.
An architecture is proposed for data-intensive services enabled by next generation dynamic optical networks. The architecture supports new data communication services that allow for coordinating extremely large sets of distributed data. The architecture allows for novel features including algorithms for optimizing and scheduling data transfers,methods for allocating and scheduling network resources, and an intelligent middleware platform that is capable of interfacing application level services to the underlying optical technologies. The significance of the architecture is twofold: 1) it encapsulates “optical network resources” into a service framework to support dynamically provisioned and advance scheduled data-intensive transport services, and 2) it establishes a generalized enabling framework for intelligent services and applications over next generation networks, not necessarily optical end-to-end. DWDM-RAM1 is an implementation version of the architecture, which is conceptual as well as experimental. This architecture has been implemented in prototype on OMNInet, which is an advanced experimental metro area optical testbed that is based on novel architecture, protocols, control plane services (Optical Dynamic Intelligent Network-ODIN2), and advanced photonic components. This paper presents the concepts behind the DWDM-RAM architecture and its design. The paper also describes an application scenario using the architecture’s data transfer service and network resource services over the agile OMNInet testbed.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load
balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that
when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...IJCNCJournal
Cloud computing is an environment which provides services for user demand such as software, platform, infrastructure. Applications which are deployed on cloud computing have become more varied and complex to adapt to increase end-user quantity and fluctuating workload. One popular characteristic of
cloud computing is the heterogeneity of network, hosts and virtual machines (VM). There were many studies on cloud computing modeling based on queuing theory, but most studies have focused on homogeneity characteristic. In this study, we propose a cloud computing model based on open Jackson
network for multi-tier application systems which are deployed on heterogeneous VMs of IaaS cloud computing. The important metrics are analyzed in our experiments such as mean waiting time; mean request quantity, the throughput of the system. Besides that, metrics in model is used to modify number VMs
allocated for applications. Result of experiments shows that open queue network provides high efficiency.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A wireless network consists of a set of wireless nodes forming the network. The bandwidth allocation scheme used in wireless networks should automatically adapt to the network’s environments, where issues such as mobility are highly variable. This paper proposes a method to distribute the bandwidth for wireless network nodes depending on dynamic methodology;this methodology uses intelligent clustering techniques that depend on the student’s distribution at the university campus, rather than the classical allocation methods. We propose a clustering-based approach to solve the dynamic bandwidth allocation problem in wireless networks, enabling wireless nodes to adapt their bandwidth allocation according to the changing number of expected users over time. The proposed solution allows the optimal online bandwidth allocation based on the data extracted from the lectures timetable, and fed to the wireless network control nodes, allowing them to adapt to their environment. The environment data is processed and clustered using the KMeans clustering algorithm to identify potential peak times for every wireless node. The proposed solution feasibility is tested by applying the approach to a case study, at the Arab American University campus wireless network.
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...Tal Lavian Ph.D.
An architecture is proposed for data-intensive services enabled by next generation dynamic optical networks. The architecture supports new data communication services that allow for coordinating extremely large sets of distributed data. The architecture allows for novel features including algorithms for optimizing and scheduling data transfers,methods for allocating and scheduling network resources, and an intelligent middleware platform that is capable of interfacing application level services to the underlying optical technologies. The significance of the architecture is twofold: 1) it encapsulates “optical network resources” into a service framework to support dynamically provisioned and advance scheduled data-intensive transport services, and 2) it establishes a generalized enabling framework for intelligent services and applications over next generation networks, not necessarily optical end-to-end. DWDM-RAM1 is an implementation version of the architecture, which is conceptual as well as experimental. This architecture has been implemented in prototype on OMNInet, which is an advanced experimental metro area optical testbed that is based on novel architecture, protocols, control plane services (Optical Dynamic Intelligent Network-ODIN2), and advanced photonic components. This paper presents the concepts behind the DWDM-RAM architecture and its design. The paper also describes an application scenario using the architecture’s data transfer service and network resource services over the agile OMNInet testbed.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load
balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that
when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to provide IT-enabled services and applications. The great majority end devices are equipped with multiple network interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous network management algorithm based on machine learning methods which includes roaming and sharing functions. The roaming function provides the multiple network resources in physical and media access control layers. The sharing function supports multiple network resources allocation and the service handover process based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular environments to realize ubiquitous social sharing networks.
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
Similar to Heterogeneous Networks of Remote Monitoring with High Availability and Resilience Application to Wireless Sensor Networks (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Leading Change strategies and insights for effective change management pdf 1.pdf
Heterogeneous Networks of Remote Monitoring with High Availability and Resilience Application to Wireless Sensor Networks
1. Heterogeneous Networks of Remote Monitoring
with High Availability and Resilience
Application to Wireless Sensor Networks
Ayoub Marzak 1*
, Mohamed Hamraoui 2*
, Hicham Belhadaoui3*
* RITM Laboratory, CED Engineering Sciences
Ecole Supérieure de Technologie
Hassan II University of Casablanca, Morocco
1
ay.marzak@gmail.com, 2
hamraoui@hotmail.com, 3
belhadaoui_hicham@yahoo.fr
Abstract- Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to
get universal platforms in various types of monitoring and information collecting applications. The work presented in this
paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience
WSN. The modeling approach intends to describe the main operation of polling and dispatching between the
communications channels with the purpose of ensuring the information availability and reducing the resilience time. To
achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid
communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee
Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
Keywords- Wireless Sensors Networks, hybrid architecture, communication technology, remote monitoring, resilience,
availability, security.
I. INTRODUCTION
Recently, the technological developments in various fields related to computing and microelectronics have given
rise to a new type of sensor network called WSN [1].
These networks, with no fixed infrastructure, can be deployed widely in critical areas, hostile and difficult to
access by humans. They can detect, calculate and communicate with other devices in order to collect local
information. This information will be used to make decisions regarding the various parameters characterizing the
monitored environment. The structure of a sensor node model and its dynamic aspect were approached in [2]. More
generally, in [3] the authors are interested in the WSN model in its entirety.
Increasingly, the WSN promise a new range of services and a better understanding of the world around us. For
instance, improving the quality of the monitoring service, which can retrieve and continuously transmit the
measurements to a secure data processing server accessible by authorized users. Several works have been devoted to
the problematic of hybrid networks; among others, [4], [5], [13], [14], [15], [16], in which different networks were
merged and federated to get heterogeneous platforms, using various protocols. In this context, a style of architecture
dedicated to distributed hypermedia systems (REST: Representational State Transfer), was created by Roy Fielding
[17]. REST is a hybrid model founded on multiple models and network concepts, combined with additional
constraints. In the same context, [18] presents a monitoring architecture model with WSN based on a Web service
that allows users to access data remotely via an Internet connection. In [19] the authors present a methodology for
designing a hybrid remote monitoring architecture.
In this work, we have modeled and designed a robust prototype with hybrid architecture based on a WSN and
various communication technologies.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, August 2017
304 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. II. MODEL OF THE PROPOSED HYBRID REMOTE MONITORING ARCHITECTURE
The objective of this work is to propose a model of implementing a hybrid architecture that aims to improve the
robustness of certain existing architectures. In fact, the proposed architecture model is meant to ensure a local or
remote connection of multiple users to a sensor network through different communication technologies. The
developed architecture should respond to an acceptable level of requirements in terms of availability, reliability and
safety according the case study in question.
A. Proposed platform
We are interested in the Zigbee technology [6], [7], also known as IEEE 802.15.4 [8], [9], which allows to obtain
wireless links with a low energy consumption.
Let's review the main elements of our Platform:
Zigbee [6], [7]: it is a wireless network protocol, just as Wi-Fi or Bluetooth, which is suitable for the control
and command devices networks, and other applications requiring low debit but high reliability.
MQTT [10]: (Message Queuing Telemetry Transport) it is a publish-subscribe messaging service based on the
simple and extremely light TCP / IP protocol. It works on the client / server principle. The server, named
broker, collects the information transmitted by the publishers (Communicating objects).
HTTPS [11]: (Hypertext Transfer Protocol Secure) it is an Internet communication protocol that protects the
integrity and confidentiality of data while transferring information between the client and the server.
Sockets [12]: it is a model for inter-process communication (IPC) in order to allow various processes to
communicate on the same machine through a TCP / IP network. These sockets will allow managing incoming
and outgoing flows to ensure communication between the client and the server.
Our architecture (figure 1) is composed mainly of a WSN, a processing server and users (clients). The processing
server is composed of two parts. The first part, reserved for the configuration (web services), allows to receive
physical and protocol configuration of each client connected to it to generate a polling program. The second part
deals with polling, monitoring the environment in real time and access to database in order to visualize the collected
data archive. This last part is made between the different protocols (MQTT [10], Sockets [11], HTTP / HTTPS [12]),
and the channels of communication (Wi-Fi [20], Ethernet [21], Internet [22], GSM / GPRS [23]).
In order to carry out our modeling, we opted for the choice of UML modeling language [24]. In this context, we
have established the following diagrams: Use Case Diagram, Class Diagram, Sequence Diagram and Deployment
Diagram. Moreover, we have established a flowchart to better expose the proposed solution.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
305 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. B. Use case of the platform
The use case diagram (figure 2) shows the possible uses related to our system. We have implemented a "client"
interface that allows, on the one hand, to receive live issued data from the WSN, taking into consideration our
strategy of tolerance to technical failures and, on the other hand, to consult the database (processing server). In
addition, the "client" interface allows users to authenticate and select the desired configuration (protocols,
communication channels). Therefore, the processing server generates a polling program (flowchart polling figure 3)
specific to the client's request and then the data are displayed in the specific interfaces to the protocols (figure 9).
This polling program allows the routing of data (packets) from the WSN to the clients.
Figure 1. Hybrid Architecture of the proposed remote monitoring
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
306 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. C. Structural and dynamic aspects of the platform
We approached several issues related to the design of this architecture. First of all, we can list the adaptation and
identification of data from the sensor network before storing them in a database. Fault tolerance due to random error
is processed. In case of emergency (critical values, abnormal overflow, fault ...), the information routing is done on a
priority approach (passing by the emergency channel) to the concerned users. Given the confidentiality of the data,
we proposed, for our architecture, a secure authentication solution.
The "Polling" flowchart (figure 3), is established in order to better project our method for the tolerance to the
technical failures.
Figure 2. Use case diagram of the hybrid architecture of remote monitoring
Figure 3. Flowchart treating the polling
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
307 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. WSN allows the collection of environmental, physical parameters (temperature, humidity ...) from the sensor
nodes to the base station (sensor gateway). These data (packets) are routed to connected clients taking into account
the algorithm. At the collect of a new packet, the system automatically triggers its issuance. This packet is usually
treated with a treatment interval of urgent packets (priority) that we set according to the application. If, for example,
the detected temperature, for agricultural greenhouses, exceeds the maximum set temperature, the system
automatically performs the sending to the concerned users via the emergency channel (SMS messaging). In the
opposite case, it initializes and resumes the normal cycle of transmission via the last channel used. This one is
systematically exploited as long as the data arrive successfully to destination. In the case of a failure, the channels
testing procedure is triggered to select a new functional channel. If after five test attempts, no channel is detected, the
system calls upon the emergency channel, which is responsible for both the sending of the data and the report on the
breakdowns occurring. All packets are transmitted with acknowledgment of receipt.
Figure 4 shows the class diagram of our architecture:
SensorGateway: it can acquire data from different sensor nodes.
OnNewValue: it represents the event of receiving new data.
Figure 4. Class diagram of the hybrid architecture of a remote monitoring
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
308 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. PollingPool: this is an interface that allows in one hand to manage connected clients and in the other hand the
recording and the outbreak of the diffusions measures.
PollingPoolImpl: it is an implementation of the PollingPool.
WebServiceConfig: it is the web service that allows the identification of customers and receipt of their
configuration. This configuration is assigned to PollingPool to generate the adapted polling program.
SensorValueDao: it saves data in a database implemented in the processing server.
Polling: it allows publishing the values from the WSN to different clients using the polling.
SensorValue: it contains the physical measurements from the WSN.
Channel: an interface that represents a sending channel.
SocketChannel: a channel for the implementation of Sockets protocol.
MQTTChannel: a channel for the implementation of the MQTT protocol.
HTTPSChannel: a channel for the implementation of the HTTPS protocol.
SMSChannel: a channel for SMS implementation.
After describing the structure of our architecture, we describe the dynamic aspect of our approach using the
sequence diagram (figure 5).
Figure 5. Sequence diagram of the hybrid architecture of a remote monitoring
The events of this diagram are described as follows:
- The sensor nodes send the measured physical measurements to the sensor gateway.
- The sensor gateway collects and routes the data from the WSN to the polling server.
- The polling server allows, the delivering, of data to connected customers and their storing in the database.
- This server is in place for client requests (Reading data in real-time by polling or access to the database).
- A client attempts to connect and authenticates with a username and a password.
- The server configuration allows him to connect and send its configuration via a Web Service (web interface).
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
309 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. - The client configuration is received by the polling server. This generates a polling program adapted to the
client's request (this program is unique to each client connected to the architecture).
- The customer receives real-time data from the WSN.
- Access to the database is described in another sequence diagram (figure 6).
Figure 6 represents, in the case of need, the events related to the history access mode:
- First of all, the WSN collects the data by the sensor gateway.
- Thereafter the data are automatically stored in the database.
- The users, who want to access the stored values, must authenticate with a username and password and select the
period of desired values.
- After authentication, the configuration server receives the client request (History according to the period).
- The configuration server starts the playback and diffusion of the historical requested by the client.
D. Components of the platform
The proposed architecture consists mainly of modules illustrated in the deployment diagram in figure 7. The main
component of our system is named PollingPool. It manages all configurations received from the users. These
configurations are secured by an authentication system with login and password, and received by the Controller Web
component. The Sensor Reader component allows the collection of data from the WSN. The polling component
contains a polling program dedicated to each client. Finally, the four redundant and diverse channels represent the
implementation of the communication between the server and the users.
Figure 6. Sequence diagram represents the access to database
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
310 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. Number equations consecutively with equation numbers in parentheses flush with the right margin, as in (1). To make your
III. IMPLEMENTATION OF THE PROPOSED HYBRID ARCHITECTURE, EXPERIMENTAL TESTS AND RESULTS
To validate its feasibility, our hybrid architecture of remote monitoring, based on WSN and interconnection
techniques, has been realized in JAVA.
A. Implementation and experimental tests
We have implemented a platform of ZigBee WSN (Crossbow MicaZ) [25] consisted of 40 nodes of sensors based
on the "MPR2400" microcontroller based on "Atmel ATmega128L" of ZigBee-Alliances [6]. The Sensor nodes
("MDA 100" and "MTS 420") are connected to the gateway in Mesh topology.
Firstly, we collect physical measurements such as temperature, humidity, the geo-position of the node in relation
to the gateway and the energy consumed by each node. These physical measurements are stored in a database.
Secondly, we perform various tests by a computer and a smartphone with interfaces designed under JAVA (figures 8,
9, 10). SMS sending is handled by a GSM / GPRS modem [23].
The implemented "client" interfaces allow to receive data from the WSN in real time and consult the database
(figure 10). On the other hand, the "client" interface (figure 8) allows for authenticating and selecting the desired
configuration (Protocols, Communication Channels). Thus, the server generates a polling program specific to the
client's request. Therefore, the data are displayed in interfaces specific to the protocols. In this sense, Figure 9
represents the client interface specific to the MQTT protocol.
Figure 7. Deployment diagram of the hybrid architecture of a remote monitoring
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
311 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
9. Figure 8. A client interface of authentication and configuration choices
Figure 9. A client interface specific to protocol MQTT Figure 10. Database access interface
B. Results and Discussion
The database is powered by sensor data records and their archiving. This allowed us to draw up an evaluation and
validation graph (figure 11) of our polling algorithm. The abscissa axis contains the data Id, while the ordinate axis
includes the sending time of the data by each protocol. In this case, the packets are routed to the client by the sockets
protocol. At ID 138, we notice an increase in the sending time of about 1300 ms which corresponds to the detection
of the failure of the used channel and the switching to the MQTT protocol. The latter takes over the sending cycle
from the non-transmitted data. The same phenomenon occurs at ID 160 between the MQTT protocol and the HTTP /
HTTPS protocol. Another failure occurs at ID 171, the system resumes the test of the communication channels until
the resumption of the transmission by the sockets.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
312 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
10. Figure 11. The evolution of the polling between channels as a function of time
Figure 12 illustrates the variation of the time transmission to another channel by the polling processing due to the
failure of the used channel. The evolution of this transmission time depends on the transmitted data. We note that,
this time is around 1300 ms as described above.
Figure 12. Data transmission time in case of polling to another channel
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
313 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
11. IV. CONCLUSION
In this paper, we have proposed a hybrid remote monitoring architecture model based on WSN at high availability
and resilience. This architecture allows users to access to data locally or remotely using multiple communication
technologies. We presented the structural and dynamic aspects and the components of our proposed platform for the
main operations: acquisition, storage and distribution of data by polling.
To validate the feasibility of the proposed architecture, we have built a prototype using a ZigBee WSN type and
implemented a platform developed under JAVA.
REFERENCES
[1] J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey”, Comput. Netw., vol. 52, no 12, p. 2292‑ 2330, août 2008.
[2] A. Sahu, E. B. Fernandez, M. Cardei, M. Vanhilst, « A Pattern for a Sensor Node », in Proceedings of the 17th Conference on Pattern
Languages of Programs, New York, NY, USA, 2010, p. 7:1–7:7.
[3] M. Cardei, E. B. Fernandez, A. Sahu, I. Cardei, « A Pattern for Sensor Network Architectures », in Proceedings of the 2Nd Asian
Conference on Pattern Languages of Programs, New York, NY, USA, 2011, p. 10:1–10:8.
[4] S. Nadir, A. Marzak, K. Lahma, H. Belhadaoui, M. Hamraoui, « Communication protocolaire hybride des données massives distribuées
traitant en parallèle la crédibilité de l’information: Application au WSN », in The 2nd World Congress on Multimedia and Computer Science
2014 (WCMCS), Tunisie, p. 1‑ 6.
[5] A. Marzak, M. Hamraoui, H. Belhadaoui, « Conception et réalisation d’une architecture hybride intégrant des réseaux de capteurs sans fil et
technologies d’information et de communication », Mediterranean Telecommunications Journal (MTJ), Vol. 6, N° 2, June 2016.
[6] « The ZigBee Alliance | Control your World », http://www.zigbee.org/.
[7] F. Shariff, N. A. Rahim, W. P. Hew, « Zigbee-based data acquisition system for online monitoring of grid-connected photovoltaic system »,
Expert Syst. Appl., vol. 42, no 3, p. 1730‑ 1742, févr. 2015.
[8] « IEEE-SA - The IEEE Standards Association », http://standards.ieee.org/.
[9] C. Suh, Z. H. Mir, Y.-B. Ko, « Design and implementation of enhanced IEEE 802.15.4 for supporting multimedia service in Wireless Sensor
Networks », Comput. Netw., vol. 52, no 13, p. 2568‑ 2581, sept. 2008.
[10] « IEEE Xplore Abstract - MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks ».
[11] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, « Hypertext transfer protocol--HTTP/1.1. RFC 2616 »,
June, 1999.
[12] K. L. Calvert, M. J. Donahoo, « TCP/IP sockets in Java: practical guide for programmers », Morgan Kaufmann, 2011.
[13] M. Cardei, A. Marcus, I. Cardei, T. Tavtilov, « Web-based heterogeneous WSN integration using pervasive communication », in
Performance Computing and Communications Conference (IPCCC), 2011 IEEE 30th International, 2011, p. 1‑ 6.
[14] D. Barata, G. Louzada, A. Carreiro, A. Damasceno, « System of Acquisition, Transmission, Storage and Visualization of Pulse Oximeter
and ECG Data Using Android and MQTT », Procedia Technol., vol. 9, p. 1265‑ 1272, 2013.
[15] H. Huang, S. Xiao, X. Meng, Y. Xiong, « A Remote Home Security System Based on Wireless Sensor Network and GSM Technology », in
2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010, vol. 1, p.
535‑ 538.
[16] S. Nadir, A. Marzak, K. Lahma, H. Belhadaoui, M. Hamraoui, « Design and complexity analysis of algorithm treating the credibility of the
information: Application to WSN », NNGT Int J Netw. Comput., vol. 2, févr. 2015.
[17] R. T. Fielding, « Architectural Styles and the Design of Network-based Software Architectures », University of California, Irvine, 2000.
[18] A. Marcus, M. Cardei, I. Cardei, E. Fernandez, F. Frati, E. Damiani, « A Pattern for Web-based WSN Monitoring », J. Commun., vol. 6, no
5, août 2011.
[19] A. Marzak, H. Belhadaoui, M. Hamraoui, A. Mektoubi, « Modeling a surveillance architecture giving a high-availability and resilience
based on wireless sensor networks », The 5th International Conference on Multimedia Computing and Systems 2016 (ICMCS), Septembre
29-30, Marrakech, Morocco.
[20] P. Mühlethaler, O. Salvatori, « 802.11 et les réseaux sans fil », Eyrolles, 2002.
[21] R. M. Metcalfe, D. R. Boggs, « Ethernet: distributed packet switching for local computer networks », Commun. ACM, vol. 19, no 7, p.
395‑ 404, 1976.
[22] J. Postel, « Internet protocol », 1981.
[23] T. Halonen, J. Romero, J. Melero, « GSM, GPRS and EDGE performance: evolution towards 3G/UMTS », John Wiley & Sons, 2004.
[24] J. Rumbaugh, I. Jacobson, G. Booch, « Unified Modeling Language Reference Manual », The 2Nd Edition. Pearson Higher Education,
2004.
[25] « Crossbow, W. S. N. Professional Kit », http://www. xbow. com. Products/productdetails. aspx.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
314 https://sites.google.com/site/ijcsis/
ISSN 1947-5500