Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets. Consumers send interest packets to request data, routers send them based on the data prefix name,
and manufacturers respond with data packets exactly how interest is received. During this process, routers
maintain information about the status of suspended interests. As regards NDN is still in its early stage,
none of these strong efficiency features have done systematically designed, measured, or tracked in data
retrieval and multi-path detection. This paper tries to improve transport performance by combining label
switching with adaptive transport methods. For this purpose, in addition to RTT, another timer called T is
used, an RTT factor for interface rating. And uses the BDP to choose the best interface to respond to
interest. During this process, response time, throughput, and data recovery time are improved by 12%,
10%, and 5%, respectively.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will play a key role as visualization, interaction, and information delivery platforms. The recent hardware and software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment, corporate and industrial use. This trend creates next-generation usage models which rise serious technical challenges within all networking and software architecture levels to support the immersive digital transformation.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will play a key role as visualization, interaction, and information delivery platforms. The recent hardware and software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment, corporate and industrial use. This trend creates next-generation usage models which rise serious technical challenges within all networking and software architecture levels to support the immersive digital transformation.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
Digital watermarking is a method of identifying the rightful owner of digital data by embedding a known message in the data. These methods can be applied to a wide range of digital material, including still images, videos, and music. To safeguard the copyright of digital media, digital watermarking techniques have been created. This study seeks to provide a comprehensive overview and background on the definition, idea, and major accomplishments in the subject of watermarking. It starts with a broad review of digital watermarking, then moves on to assaults, applications, and eventually a detailed examination of existing and new watermarking systems. We classify the techniques according various categories such as host signal, perceptivity, and robustness, and watermark type, necessary data for extraction, processing domain, and applications. Preeti Sondhi | Soufia Gull "Survey on Digital Video Watermarking Techniques, Attacks and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43776.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/43776/survey-on-digital-video-watermarking-techniques-attacks-and-applications/preeti-sondhi
SMART GRID: MISCELLANEOUS INFORMATION TECHNOLOGIES AND THE CHALLENGES OF THEI...Jéssica Gessoli
The Smart Grid has been a great challenge of change in Brazil. For the choice of technologies to be applied it is necessary to take into account the particularities of each available technology and the power and telecommunications grids in the country.
As we compare the WiMAX to other technologies, can be added to the Smart Grid data to travel efficiently over long distances in economic terms and not suffering from the impact caused by the structural failure of the Brazilian grid.
Among the advantages mentioned by the research on WiMAX, the following stand out: the ease of communication with other public service providers, the greater robustness of its operations and technology domain, plus the ability to make electric utilities quite independently of the high costs imposed by operators. Due to all the options available, this also presents problems of its own that will be discussed throughout this article.
The results show that there is real interest in shares of energy utilities in developing WiMAX networks associated with other forms of data transmission, including PLC. Thus, the centralization of service delivery and charging can be made a reality in little time and a lot more efficiently.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
Today’s fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative idea’s that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic -˜MOBILE COMPUTING’ fits in. “MOBILE COMPUTING- and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. Mobile Computing evolved during the last few years as a result of shrinking portables and growing wireless networks. It enlarges the usability of computers, but raises demanding challenges. The paper describes about the methodology, problems in wireless industry, and how J2SE is used in this technology .The paper concludes with the pros and cons of this mobile computing and its future. Akhilesh Bholanath Patel "Wireless and Mobile Computing: Build Secure and Maintain Wireless Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43757.pdf Paper URL: https://www.ijtsrd.com/management/other/43757/wireless-and-mobile-computing-build-secure-and-maintain-wireless-solutions/akhilesh-bholanath-patel
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
In supporting its large scale, multidisciplinary scientific research efforts across all the university campuses and by the research personnel spread over literally every corner of the state, the state of Nevada needs to build and leverage its own Cyber infrastructure. Following the well-established as-a-service model, this state-wide Cyber infrastructure that consists of data acquisition, data storage, advanced instruments, visualization, computing and information processing systems, and people, all seamlessly linked together through a high-speed network, is designed and operated to deliver the benefits of Cyber infrastructure-as-aService (CaaS).There are three major service groups in this CaaS, namely (i) supporting infrastructural
services that comprise sensors, computing/storage/networking hardware, operating system, management tools, virtualization and message passing interface (MPI); (ii) data transmission and storage services that provide connectivity to various big data sources, as well as cached and stored datasets in a distributed
storage backend; and (iii) processing and visualization services that provide user access to rich processing and visualization tools and packages essential to various scientific research workflows. Built on commodity hardware and open source software packages, the Southern Nevada Research Cloud(SNRC)and a data repository in a separate location constitute a low cost solution to deliver all these services around CaaS. The service-oriented architecture and implementation of the SNRC are geared to encapsulate as much detail of big data processing and cloud computing as possible away from end users; rather scientists only need to learn and access an interactive web-based interface to conduct their collaborative, multidisciplinary, dataintensive research. The capability and easy-to-use features of the SNRC are demonstrated through a use case that attempts to derive a solar radiation model from a large data set by regression analysis.
Big Data and Next Generation Network Challenges - PhdassistancePhD Assistance
Big Data is defined as data whose dynamics, such as volume, velocity, truthfulness, and diversity, are substantially expanded and impossible to be handled by typical data management systems. Modern data analytics techniques are utilised to manage such large amounts of data. With the introduction of next-generation networks, the number of wireless devices is fast expanding. According to a CISCO index released in 2014, the number of wireless devices now outnumbers the world’s population [1]. The proliferation of data generated by such a varied spectrum of linked devices is unsurprising.
Learn More:https://bit.ly/3yNpy7Y
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Deep Learning Approaches for Information Centric Network and Internet of Thingsijtsrd
Technologies are rapidly increasing with additions to them every single day. Cloud Computing and the Internet of Things IoT have become two very closely associated with future internet technologies. One provides a platform to the other for success, the benefits of which could be from computing to processing and analyzing the information to reduce latency for real time applications. However, there are a few IoT devices that do not support on device processing. An alternate solution of this is Edge Computing, where the consumers can witness a close call with the computation and services. In this work, we will be to studying and discussing the application of combining Deep Learning with IoT and Information Centric Networking. A Convolutional Neural Network CNN model, a Deep Learning model, can make the most reliable data available from the complex IoT environment. Additionally, some Deep Learning models such as Recurrent Neural Network RNN and Reinforcement Learning have also integrated with IoT, which can also collect the information from real time applications. Aashay Pawar "Deep Learning Approaches for Information - Centric Network and Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33346.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/33346/deep-learning-approaches-for-information--centric-network-and-internet-of-things/aashay-pawar
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
Digital watermarking is a method of identifying the rightful owner of digital data by embedding a known message in the data. These methods can be applied to a wide range of digital material, including still images, videos, and music. To safeguard the copyright of digital media, digital watermarking techniques have been created. This study seeks to provide a comprehensive overview and background on the definition, idea, and major accomplishments in the subject of watermarking. It starts with a broad review of digital watermarking, then moves on to assaults, applications, and eventually a detailed examination of existing and new watermarking systems. We classify the techniques according various categories such as host signal, perceptivity, and robustness, and watermark type, necessary data for extraction, processing domain, and applications. Preeti Sondhi | Soufia Gull "Survey on Digital Video Watermarking Techniques, Attacks and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43776.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/43776/survey-on-digital-video-watermarking-techniques-attacks-and-applications/preeti-sondhi
SMART GRID: MISCELLANEOUS INFORMATION TECHNOLOGIES AND THE CHALLENGES OF THEI...Jéssica Gessoli
The Smart Grid has been a great challenge of change in Brazil. For the choice of technologies to be applied it is necessary to take into account the particularities of each available technology and the power and telecommunications grids in the country.
As we compare the WiMAX to other technologies, can be added to the Smart Grid data to travel efficiently over long distances in economic terms and not suffering from the impact caused by the structural failure of the Brazilian grid.
Among the advantages mentioned by the research on WiMAX, the following stand out: the ease of communication with other public service providers, the greater robustness of its operations and technology domain, plus the ability to make electric utilities quite independently of the high costs imposed by operators. Due to all the options available, this also presents problems of its own that will be discussed throughout this article.
The results show that there is real interest in shares of energy utilities in developing WiMAX networks associated with other forms of data transmission, including PLC. Thus, the centralization of service delivery and charging can be made a reality in little time and a lot more efficiently.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
Today’s fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative idea’s that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic -˜MOBILE COMPUTING’ fits in. “MOBILE COMPUTING- and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. Mobile Computing evolved during the last few years as a result of shrinking portables and growing wireless networks. It enlarges the usability of computers, but raises demanding challenges. The paper describes about the methodology, problems in wireless industry, and how J2SE is used in this technology .The paper concludes with the pros and cons of this mobile computing and its future. Akhilesh Bholanath Patel "Wireless and Mobile Computing: Build Secure and Maintain Wireless Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43757.pdf Paper URL: https://www.ijtsrd.com/management/other/43757/wireless-and-mobile-computing-build-secure-and-maintain-wireless-solutions/akhilesh-bholanath-patel
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
In supporting its large scale, multidisciplinary scientific research efforts across all the university campuses and by the research personnel spread over literally every corner of the state, the state of Nevada needs to build and leverage its own Cyber infrastructure. Following the well-established as-a-service model, this state-wide Cyber infrastructure that consists of data acquisition, data storage, advanced instruments, visualization, computing and information processing systems, and people, all seamlessly linked together through a high-speed network, is designed and operated to deliver the benefits of Cyber infrastructure-as-aService (CaaS).There are three major service groups in this CaaS, namely (i) supporting infrastructural
services that comprise sensors, computing/storage/networking hardware, operating system, management tools, virtualization and message passing interface (MPI); (ii) data transmission and storage services that provide connectivity to various big data sources, as well as cached and stored datasets in a distributed
storage backend; and (iii) processing and visualization services that provide user access to rich processing and visualization tools and packages essential to various scientific research workflows. Built on commodity hardware and open source software packages, the Southern Nevada Research Cloud(SNRC)and a data repository in a separate location constitute a low cost solution to deliver all these services around CaaS. The service-oriented architecture and implementation of the SNRC are geared to encapsulate as much detail of big data processing and cloud computing as possible away from end users; rather scientists only need to learn and access an interactive web-based interface to conduct their collaborative, multidisciplinary, dataintensive research. The capability and easy-to-use features of the SNRC are demonstrated through a use case that attempts to derive a solar radiation model from a large data set by regression analysis.
Big Data and Next Generation Network Challenges - PhdassistancePhD Assistance
Big Data is defined as data whose dynamics, such as volume, velocity, truthfulness, and diversity, are substantially expanded and impossible to be handled by typical data management systems. Modern data analytics techniques are utilised to manage such large amounts of data. With the introduction of next-generation networks, the number of wireless devices is fast expanding. According to a CISCO index released in 2014, the number of wireless devices now outnumbers the world’s population [1]. The proliferation of data generated by such a varied spectrum of linked devices is unsurprising.
Learn More:https://bit.ly/3yNpy7Y
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Deep Learning Approaches for Information Centric Network and Internet of Thingsijtsrd
Technologies are rapidly increasing with additions to them every single day. Cloud Computing and the Internet of Things IoT have become two very closely associated with future internet technologies. One provides a platform to the other for success, the benefits of which could be from computing to processing and analyzing the information to reduce latency for real time applications. However, there are a few IoT devices that do not support on device processing. An alternate solution of this is Edge Computing, where the consumers can witness a close call with the computation and services. In this work, we will be to studying and discussing the application of combining Deep Learning with IoT and Information Centric Networking. A Convolutional Neural Network CNN model, a Deep Learning model, can make the most reliable data available from the complex IoT environment. Additionally, some Deep Learning models such as Recurrent Neural Network RNN and Reinforcement Learning have also integrated with IoT, which can also collect the information from real time applications. Aashay Pawar "Deep Learning Approaches for Information - Centric Network and Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33346.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/33346/deep-learning-approaches-for-information--centric-network-and-internet-of-things/aashay-pawar
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
International Journal of Wireless & Mobile Networks (IJWMN) ijwmn
The world of Internet of Things (IoT) and ubiquitous computing lead the computing systems integrate sensors and handheld devices into a common platform to offer new services. Participatory Sensor Network (PSN) is one of such a network which is formed in an ad-hoc basis. The success of such network always depends on the quality of data shared by the participants. Privacy concern is one of the main reasons why an individual may not prefer to share their sensitive data. Not many research works have been performed to preserve the privacy of individual data in a PSN. On the other hand, Named Data Network (NDN), an instance of Information-Centric Network (ICN), is an alternative of TCP/IP that inherently considers the concern of security as opposed to TCP/IP. By default, NDN ensures the privacy of the data consumer but it fails to ensure the same for data provider. In this paper, we propose a ring signature based NDN to ensure the privacy of the data provider. Our proposed solution seems to be effective based on the performance and security analysis.
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Performance evaluation of route optimization management of producer mobility...IJECEIAES
Named data networking (NDN) is a network service evolving the Internet's host-based packet delivery model. The idea of NDN is to use named data for routing, which specifies what they are looking for, instead of using location addresses that determine where they expect it to be provided. This architecture is expected to solve many issues that are currently faced by transmission control protocol/internet protocol (TCP/IP) architecture, such as scalability, robustness, mobility, security, and etcetera. One of the problems is about handling producer mobility. Considering the explosion growth rate of Internet connection in public transport vehicles, this is a challenge that needs to be overcome. Therefore, we have proposed a new scheme called route optimization management of producer mobility (ROM-P) with new features such as distributing anchor points and caching by using the same data name and com-paring our previous scheme, efficient producer mobility support (EPMS). This paper shows the analysis result between the ROM-P and EPMS by using simulation. All simulations were conducted using ndnSIM 2.4 NS-3 based. Throughout the simulation ROM-P shows a promising development in better performing compares to EPMS.
This Presentation covers:
Basics of data communications
Network Elements
Introduction to Protocols
Bridges, Routers, HUB, switch, gateway
Packet Switching Concepts
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...IJCNCJournal
Vehicular Named Data Networks (VNDN) face challenges in efficiently disseminating content due to high mobility and intermittent connectivity. To address these challenges, a Hop Count based Interest Selection and Content Forwarding (HISCF) scheme for VNDNs is proposed. The scheme focuses on mitigating interest flooding, reducing data packet duplication, and alleviating network congestion. HISCF consists of two components: interest selection and content forwarding. The selection process chooses a vehicle based on hop count and Interest Satisfaction Ratio (ISR) to forward the interest packet. Content forwarding is performed considering a hop count limit and pending interests, ensuring efficient content delivery. The HISCF scheme is evaluated using extensive simulations in ns-3 with ndnSIM. Performance metrics such as Data Packet Replication Count (DPRC), total number of interest packets forwarded, Interest Response Time (IRT) and routing overhead are analysed. Results show that HISCF outperforms naïve VNDN, reducing DPRC, minimizing interest packets forwarded, and decreasing average IRT. The findings demonstrate that HISCF effectively mitigates interest broadcast storms, reduces data packet duplication, and improves content delivery efficiency in VNDNs. This study contributes to VNDN research advancement and provides insights for designing effective content forwarding mechanisms in vehicular networks.
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...IJCNCJournal
Vehicular Named Data Networks (VNDN) face challenges in efficiently disseminating content due to high mobility and intermittent connectivity. To address these challenges, a Hop Count based Interest Selection and Content Forwarding (HISCF) scheme for VNDNs is proposed. The scheme focuses on mitigating interest flooding, reducing data packet duplication, and alleviating network congestion. HISCF consists of two components: interest selection and content forwarding. The selection process chooses a vehicle based on hop count and Interest Satisfaction Ratio (ISR) to forward the interest packet. Content forwarding is performed considering a hop count limit and pending interests, ensuring efficient content delivery. The HISCF scheme is evaluated using extensive simulations in ns-3 with ndnSIM. Performance metrics such as Data Packet Replication Count (DPRC), total number of interest packets forwarded, Interest Response Time (IRT) and routing overhead are analysed. Results show that HISCF outperforms naïve VNDN, reducing DPRC, minimizing interest packets forwarded, and decreasing average IRT. The findings demonstrate that HISCF effectively mitigates interest broadcast storms, reduces data packet duplication, and improves content delivery efficiency in VNDNs. This study contributes to VNDN research advancement and provides insights for designing effective content forwarding mechanisms in vehicular networks.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Networkijwmn
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and organizes these identifiers together. Backbone nodes can be selected automatically or predefined to direct their associated normal nodes in a local area. The normal nodes are guided by the backbone nodes to full fill the searching and routing processe
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPROVE THE SPEED OF PACKET FORWARDING IN NDN NETWORKS
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
DOI: 10.5121/ijcsit.2021.13602 19
PROVIDES AN APPROACH BASED ON ADAPTIVE
FORWARDING AND LABEL SWITCHING TO
IMPROVE THE SPEED OF PACKET FORWARDING IN
NDN NETWORKS
Hadis Rezaei, Sahar Sadeghi and Leila Badeli
Department of Computer Engineering,
Science and Research Tehran Branch, Tehran, Iran
ABSTRACT
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets. Consumers send interest packets to request data, routers send them based on the data prefix name,
and manufacturers respond with data packets exactly how interest is received. During this process, routers
maintain information about the status of suspended interests. As regards NDN is still in its early stage,
none of these strong efficiency features have done systematically designed, measured, or tracked in data
retrieval and multi-path detection. This paper tries to improve transport performance by combining label
switching with adaptive transport methods. For this purpose, in addition to RTT, another timer called T is
used, an RTT factor for interface rating. And uses the BDP to choose the best interface to respond to
interest. During this process, response time, throughput, and data recovery time are improved by 12%,
10%, and 5%, respectively.
KEYWORDS
NDN, BDP, RTT, CCN, Ranking interfaces, Name label Switching.
1. INTRODUCTION
Since the 1970s, the network architecture relying on TCP/IP protocols has faced many
increasingly earnest challenges, such as network security, reliability, flexibility, mobility,
congestion control, and resource allocation [1]]. According to recent prophecy, global IP traffic
will provide a peaking approach in the coming years. Most of the traffic is due to various types of
video, Internet that will account for almost 90% of global consumer traffic by 2015[2].
Communication by distributed content proves the ineffectiveness of the existing architecture,
which led to the development of data-centric networks or the Information-Centric Networking
(ICN) [3,4,5,6, 7]. Communication with distributed content reflects the lack of existing implicit
architecture, which led to the development of data-centric networks or the ICN. Therefore, many
variants of the ICN are worked out to affect the need of the future network. There are various
types of content-centric networking [8]. The last architecture defined for content-centric networks
is named data networking (NDN) [9, 10].
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
20
Named Data Networking (NDN) [11, 12] is the noted design of newly proposed ICN
architectures. It displaces the hourglass figure of the IP architecture but changes the end-to-end
data rendition model at the slim middle by a receiver-driven data retrieval sample. Consequently,
NDN alteration the network service semantics via “deliver packets to given addresses” to
“retrieving data of given names.” NDN packets convey data names rather than source and goal
addresses [13, 14]. Every connection in NDN is performed using two different types of packets:
Interest and Data. Both packets transport a name that uniquely recognizes a part of data that can
be taken away in one packet. The name of the data is structured in the NDN hierarchy; similar to
IP packet transfer, an NDN network accomplishes the best attempt for data retrieval. An Interest
or Data packet can be missing. It is the ending consumer's accountability to retransmit the interest
if it does not accept the favorite Data then attend round trip time (RTT), and it still needs the data
[15].
NDN forwarding process is divided into a two-step interest packet sent by consumers and
returned along the same path in reverse. The NDN router forwarding packet by PIT table leads
consumers. The process forwarding enables the NDN router; it will replace other paths when the
link failure occurs. This feature is called Adaptive forwarding in NDN [16] Due to datagram
NDN attendant cost associated. Moreover, using the RTT to rank the interface in the FIB is a
long time.
Moreover, when the network grows, the FIB size increases and the FIB entry stored in the FIB
entry will be ineffective in searching for the name. So scalable structure at the FIB table
facilitates the search for the title and short forwarding packets. The exchange of packets in the
NDN is based on FIB information. Unlike the routing table in IP-based networks that have fixed
address lengths, The FIB table in the NDN has a name prefix with variable length. In addition, a
plurality of references will be faced with excessive growth PIT table, NDN is the first network
architecture to prepare an adaptive forwarding plane. With adaptive forwarding, NDN routers can
indicate and retrieve from network problems quickly without waiting for universal routing
looking for. For example, NDN routers can approximate the round-trip time (RTT) for each name
prefix per confiscation within Interests and attentive Data packets coming back. Network
problems can be detected by setting up a timer relaying on the RTT estimation. If data is not
coming before the timer expires, there may be possible forwarding problems in the network.
Once issues are discovered, NDN routers can start tracking other paths directly using local state
information. Since Interest forwarding is loop-free, routers can efficiently operate in several ways
to improve from the problems. The plan to achieve the goals uses the scheduler RTT, Interest
NACK, Interface ranking [15].
2. OVERVIEW OF NDNS NETWORK FORWARDING
NDN architecture is like to IP but only in the hourglass thin waist, the section that fundamental
changes have happened in this architecture via replacing interest name with IP address. Entire
communication in NDN is taken by two types of packets that are called interest and data packets.
Similar to IP packet transition, NDN network forwarding has the best effort in data detection but
during this process might an Interest or Data packet can be lost. if the consumer does not receive
the desirable Data after awaiting round trip time (RTT) and still wants the data regarding the
NDN datagram consumer can send the Nack interest to the downstream routers that stop their
transmission. However, inverse IP architecture uses the destination address to forward requests,
NDN structure uses the name of data to satisfy consumer requests. This primary difference in a
plan leads to two profound differences in data delivery operations that are in the CS and security
[12].
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
21
Every NDN router contains three basic data structures: A Content Store (CS) for storing received
data packets temporarily, a Pending Interest Table (PIT), and a forwarding table (FIB) (see Fig.
1). Via its name, each PIT entry storage and Interest packet has been consigned, looking for the
Data packet to relapse. The entry storage of the name, the incoming and outgoing interface of the
interest, has been forwarded to. An NDN router's FIB is carelessly like the FIB in an IP router
barring then it contains name prefixes instead of IP address prefixes, and it can display many
interfaces for a given name prefix. Every NDN router has a strategic measure that makes
forwarding decisions for every Interest packet. When a router takes an Interest packet, it first
checks if there is an according to data in its CS [16]. If a match is found therefore the data is
returned to the incoming interface of the Interest packet. Whether not, the Interest name is
perused to the entries in the PIT. If the name was in the PIT formerly, it can be either a repetitive
Interest that should be released or interest retransferred by the consumer. Can necessity be
forwarded using a several, outgoing interface, or an Interest from other consumers requesting
similar data that needs the incoming interface of this interest to existing added to the available
PIT entry? If the name does not stand in the PIT, interest is increased and forwarded to the
interface selected by the strategy module. When a Data packet is accepted, its name is used to
regard the PIT. If an according PIT entry is found, the router sends the data packet into the
interface at the interest received, stores the data in the Content Store, and pickups the PIT entry.
Differently, the Data packet is rejected. Each interest also has an affiliated life history; the PIT
entry is deleted when the life history expires [15].
Figure 1. Interest and Data processing in NDN [15]
The NLS forwarding process uses the MPLS mechanism and uses the benefits of labeling
packages to reduce the total time faster than name lookup in NDN. According to the destination
node labels of incoming packets, the MPLS network is assigned a label edge router (LER) has
been called. Then the package forwarding is closed without the need for self-testing, only in the
contents of this label. To assign labels, Forwarding Equivalence Classes (FECs) are divided into
which are mapped to different Label Switched Paths (LSPs) in the MPLS core. The advantages of
the label switching mechanism of MPLS can be explored in forwarding NDN. The NLS domain
connects to the NDN network and begins the forwarding process.
3. METHODOLOGY
The proposed method in this study is combined with three steps, 1) Interface coloring 2),
Interfaces ranking, 3) Selecting the best interface and forwarding interest packet. In the following
paragraph, each step will describe in detail.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
22
3.1. Colouring Interface in FIB
The first section of the method in this paper as illustrated in Fig (2) is including determining the
color for each interface using the two parameters T and T1 that consequences, T1 is equivalent to
RTT and T is a factor of RTT. When a new entry in FIB is created or a new entry is added to the
FIB entry. The state for all interfaces is yellow. Regarding this point, the state of each interface
and their ranking is determined by the RTT scheduler, when the interface is dark green means the
response time is smaller than the T1 there for data retrieval is done in the sort time with the high
speed. The interface with the light green means in contrast ot the erofeb state the rate of data flow
is slow because the response time is smaller than the T scheduler. A green interface convert to
yellow when the interest doesn’t satisfy in a certain time or the data flow stops for a certain
period. In this respect, when there is no data stream, the interface is red. The dork-green interface
is always preferred to the light green interface.
On the other hand, when there is no green interface, yellow is the priority and the red interface is
never used for data transfer. Entrance FIB contains the estimate of the RTT in each interface for
retrieving stored data which is taken at any time in the received interface of a packet [15]. In
order to indicate the status of each interface is used a four-color.
Light - Green: The interface can retrieve data in a short time.
Dork -Green: The interface can retrieve the data but the time of retrieval is slower
than the light green
yellow: it is unknown whether the interface can retrieve data or not
Red: The interface cannot data retrieve
Figure 2. Interface Colour Transition
3.2. Interfaces ranking in the FIB
In this section of the proposed method, the interfaces in the FIB incoming ranked in order to
select the best interface in forwarding strategy. When a router receives a new prefix name, for
this prefix allocated a proper interface based on routing priority. There is a wide spectrum of
forwarding policies in the NDN architecture due to the FIB table, e,g, if a policy is FIFO, an
interface with a smaller PTT will be selected.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
23
This paper considered ranking policy is using a parameter called BDP and is the result of the
RTT * Bandwidth. Using that we can select the best interface to forward of interest. In this
approach among all interfaces that are available, the interface will have opted that has small BDP
and with using the bandwidth ranked the yellow interfaces
Figure 3. Interfaces ranking in the FIB table
3.3. Forwarding strategy in the proposed method
Forwarding strategy in the proposed method as is shown in the Fig (4) has three steps, in this
respect, the name that is sent by the consumer will be labeled and would be sent by interest
packet. The first step of forwarding is the coloring of the interface which colors for all interfaces
are yellow and based on two response times T and T1 would be changed to the different colors,
e.g. dark green, light green, and red. if the label name requested by the consumer is in the CS,
therefore, it transmits to the consumer, otherwise, the PIT table will be reviewed, if this label is
not duplicated, the new entry will be created in the PIT entrance and the labeled interest is
forwarded to the FIB table. In this, step ranking interface will be done for each desired label, and
according to the BDP policy, the interface can be selected that has two properties, firstly be in top
priority and has not been used with other requests. Afterward, the PTT scheduler will be started
in PIT outcoming, if in T period of the time, the interest has not responded then the other active
interface will be selected, if there was no active interface, Nack interest sent as response and the
process of forwarding will be terminated
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
24
Figure 4. Forwarding strategy in the proposed method
4. EVALUATION
This paper simulator is used to simulate ndnSIM 0.2 (NDN-based simulator). In this example,
ns3 modules are implemented in an NDN communication model. NdnSIM is a common
simulation framework designed to examine system features. In this section, the simulation results
are used using performance criteria and response time and data retrieval time.
4.1. Throughput
Throughput means the amount of total useful processing performed by a computer system over a
specified period of time. Or the amount of data that can be exchanged on the network over a
period of time. Throughput is usually measured in bits per second and sometimes data packets
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
25
per second or data packets at intervals. The X= C/T equation calculates how to obtain network
throughput the that where X denoted the throughput and C denoted the number of requests
completed by the system. T indicates the total time at which the system was checked.
Figure (5) shows that the network efficiency in the proposed method has increased compared to
other methods due to the relevant mechanisms such as ranking the interfaces and selecting the
best port for sending data, as well as the simulation time. The rate of useful data traffic has also
increased. The AF method, which is the basic method in this paper, has also had a useful
performance due to the use of adaptive forwarding. The NLSR [17] method, which in addition to
using the similar labeling method of MPLS networks also uses strategies in NDN thus, has shown
relatively good performance; But the IP network, which is the main difference between these
three models in the presence of CS, is certainly less efficient than these three methods.
Figure 5. Comparison of throughput
4.2. Response Time
The time between sending a request and receiving a response between the source and destination
nodes is called the response time, which is measured in milliseconds. The simulation results show
that the proposed algorithm performs better at different times. According to Fig (6), the response
time usually increases with the number of routers. Due to the applications of adaptive forwarding
in data transmission, as well as the labeling of interest packages and looking for data in the
shortest part of the prefix name (T safix), the response time of the proposed algorithm was less
than other methods, but at the beginning of the simulation because there is no knowledge of the
state of routers, the interfaces are considered yellow and the sending strategy used will be
flooded. Thus, at the moment of starting the desired package, all the interfaces in FIB are sent
and it waits from which interface the answer will reach us sooner until using the same gateway
for subsequent similar requests. Each node controls the performance of its interface, and if it
drops below a certain level, it re-enters the search phase and finds the appropriate interface. This
strategy does not use interface ranking and coloring. Therefore, at the beginning of the
simulation, the response time was higher than the number of routers, and on average, the
response time improved compared to the adaptive forwarding method and other methods. In the
case of the NLSR method, which uses the RTT timer and hierarchical naming to send interest, the
response time is improved and roughly equal to the base article(AF). But the IP method, whose
sending and delivery policies are different from the NDN method, so the response time is much
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
26
longer than the methods mentioned; And as the simulation time increases in proportion to the
number of routers, the response time will be higher.
Figure 6. Comparison of response time
4.3. Processing Time (Delay)
A packet transmitted a set of routers on its way between the source and the destination system. In
exchange for moving a packet between two nodes in the network (host or router), different types
of latency are imposed on the transit packet, which affects the total time elapsed between the
source and destination of the packet. Bandwidth is just one of the factors that affect the speed of a
network. Delay, which indicates the amount of data processing delay in the network, is another
important element in evaluating the performance and speed of a network that is closely related to
bandwidth. In theory, the bandwidth ceiling is fixed, the actual bandwidth is variable and can
cause a delay in a network. Excessive delays in data processing in the network and in a short
period of time can cause a crisis in the network and the consequence is to prevent data movement
on the transmission medium and reduce bandwidth. According to the results seen in Fig (7), the
processing time is better than the other two methods due to the appropriate sending strategy in the
proposed method and the basic method (AF), but the proposed method due to the use of two
timers and longer calculation time for selecting the appropriate interface in each router to send
data has caused latency in the network. In this scenario, the bandwidth is variable and the number
of requests and the number of nodes is variable compared to the initial simulation time to
investigate the network behavior with increasing routing length. Also, the destination node is not
specified in the scenario and is considered a variable at different times. Due to the network
conditions, the processing time on the routers due to the use of four colors can cause more delay
in the network due to the fact that the destination node is changed each time. But the NLSR
method, which completely uses the NDN datagram, has been able to perform well due to its
capabilities and fragmentation of this framework. And IP is delayed due to not using the
appropriate strategy in sending data, especially with increasing time and number of network
nodes, and as shown in the simulation diagram, the processing time for IP will be higher.
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
27
Figure 7. Comparison of Delay
4.4. Link failure
Link failure is very common in computer networks. In an ideal circuit-switched network, each
packet is delivered to the destination with a percentage of the probability of failure, etc., until the
destination is available. The current Internet architecture in an IP-based routing scheme is not
responsible for link failure. So that package delivery after failure is not guaranteed, and routing
protocols also need convergence time. In the adaptive forwarding scheme, the NDN router is able
to manage link failure without routing convergence. In this regard, when link failure is detected
by routing protocols, the router will mark the unusable interface; And then it will send the interest
to the next interface that has a higher rank. Packets previously sent to the defeated link may still
be lost, in which case consumers may be redirected by the router. A router may not have any resu
interface to convey interest due to link failure. In such cases, the submission of interests is
reduced and consumers will need to resubmit requests after a period of time in order to resume
package delivery, which will certainly be a slow and inefficient process. Nack's interest approach
has been used to address this issue in comparative guidance. That way, if a router has no way to
satisfy an interest, Nack will send a message to the downstream router to find alternative routes if
possible, without waiting for it to be sent again.
What has been considered in this experiment is the percentage of data recovery after link failure
and the average time of data recovery in AF, NLSR, and proposed methods and alternative route
selection. In the designed scenario, after the failure, the selected path is longer than the original
path, and it is obvious that the data recovery time increases significantly compared to the non-
failure state. In this designed scenario, the probability of link failure is considered 10%; And
using the cumulative distribution function (CDF) in 1000 scenarios link failure has occurred. And
the recovery time includes a request that was sent on the network and did not receive a response,
and this request was resent by the consumer. What has considered in this experiment is the
percentage of data recovery after link failure and the average time of data recovery in AF, NLSR,
and proposed methods and alternative route selection. In the designed scenario, after the failure,
the selected path is longer than the original path, and it is obvious that the data recovery time
increases significantly compared to the non-failure state. In this designed scenario, the probability
of link failure is considered 10%; And using the cumulative distribution function (CDF) in 1000
scenarios link failure has occurred. And the recovery time includes a request that was sent on the
network and did not receive a response, and this request was resent by the consumer. In this
scenario, packages are considered for which the link failure has occurred.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
28
According to Figure (8), the results deniatbo erew from the simulation output. In most cases of
the proposed method, this time was close to the adaptive guidance method and acted almost
similarly. What seems to be important in link breakage is the existence of a Nack in the adaptive
forwarding method, which sends this message to downstream routers to control the sending of
interest, and downstream routers notice link failure and non-response of the router and another
route will choose. However, considering that the proposed method uses two timers, T and T1, and
the interfaces are ranked with theirs. The T parameter is to indicate the state of congestion in the
network, which means that in case of high traffic and congestion, a response may be received, but
later. Assuming that T1 is smaller than T, T1 is for low-traffic communication and route, and the
corresponding interface is dark green, and T is for the high-traffic route, and the corresponding
interface light green. When the interface is dark green, it means that there is no congestion in the
network. But if the opposite is true, it indicates that there is a possibility of congestion on the
network, and this congestion is the prelude to link failure, and given the application of this
strategy and the fact that the BDP parameter is used in the ranking, which is bandwidth and It
also takes into account latency, so the smaller the interface with dark green, the greater the
likelihood of congestion on the network, and routers will realize this sooner and reduce
congestion by controlling packets sent and sending restrictions on packets.
And for this reason, the strategy used will reduce the recovery time to some extent. Meanwhile,
NLSR networks that do not use adaptive forwarding fields and only use packet tagging, cannot
have a useful function against link failure and packet loss, as shown in Figure (7) The percentage
of data recovery in the scenario of this method will be much higher than the other two methods
that have been compared. Rather, it is to indicate the state of the network that is congested. If the
network is not congested, an answer will be received sooner.
Figure 8. Comparison of link failure
5. CONCLUSIONS
The current failure of the Internet in the face of various conditions, the main motive and reason
for the introduction of data-driven networks that these networks have features such as storage and
its signature is an acceptable solution for users and network administrators.
The proposed algorithm is driven to an acceptable level to improve the strategy, using the
benefits of adaptive transport and packet labeling.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
29
By introducing the BDP rating policy and letter labeling, response time and efficiency have
improved with comparative transfer and NLS. At the same time, data recovery with the help of a
T-timer is improved by comparative adaptive transport.
Since an essential thing in NDN is content and is accessible by name, naming is one of the
influential parameters to affect the communication of routers, table size, network time
complexity, and many other issues.
Using the naming component encryption method to efficiently encrypt memory for name
components and using an array to match the longest prefix name and a comparison guide that
uses ranking rankings to send can be an effective way. To speed up the data recovery process. In
NDN
REFERENCES
[1] Moors, T. A critical review of" end-to-end arguments in system design." In Communications, 2002.
ICC 2002. IEEE International Conference on. 2002. IEEE.
[2] Dannewitz, C., et al., Network of Information (NetInf)–An information-centric networking
architecture. Computer Communications, 2013. 36(7): p. 721-735.
[3] Fotiou, N., D. Trossen, and G.C. Polyzos, illustrating a publish-subscribe internet architecture.
Telecommunication Systems, 2012. 51(4): p. 233-245.
[4] Wu, F., Yang, W., Ren, J., Lyu, F., Yang, P., Zhang, Y., & Shen, X. (2020). NDN-MMRA: Multi-
stage multicast rate adaptation in named data networking WLAN. IEEE Transactions on Multimedia
[5] Abane, A., Muhlethaler, P., & Bouzefrane, S. (2021). Modeling and improving named data
networking over IEEE 802.15. 4. Annals of Telecommunications, 1-12
[6] Lee, Heejin, and Huhnkuk Lim. "Issues on Infotainment Application in Vehicular NDN." Journal of
the Korea Institute of Information and Communication Engineering 25, no. 7 (2021): 993-999
[7] Ariefianto, W. T., & Syambas, N. R. (2017, October). Routing in NDN network: A survey and future
perspectives. In 2017 11th International Conference on Telecommunication Systems Services and
Applications (TSSA) (pp. 1-6). IEEE.
[8] Jacobson, V., et al. Networking named content. In Proceedings of the 5th international conference on
Emerging networking experiments and technologies. 2009. ACM.
[9] Koponen, T., et al. A data-oriented (and beyond) network architecture. in ACM SIGCOMM
Computer Communication Review. 2007. ACM.
[10] Zhang, L. et al., Named data networking. ACM SIGCOMM Computer Communication Review,
2014. 44(3): p. 66-73.
[11] Zhang, L., et al., Named data networking (ndn) project. Relatório Técnico NDN-0001, Xerox Palo
Alto Research Center-PARC, 2010.
[12] Rezaei, H., & Vakili, A. (2017). Named data networking: Investigate new infrastructure for ehtfuture
of ehtInternet. International Journal of Computer Network and Information Security, 9(1), 40.
[13] Yi, C., et al., Adaptive forwarding in named data networking. ACM SIGCOMM computer
communication review, 2012. 42(3): p. 62-67.
[14] Luo, J., et al., Name Label Switching Paradigm for Named Data Networking. Communications
Letters, IEEE, 2015. 19(3): p. 335-338.
[15] Yi, C., "ADAPTIVE FORWARDING IN NAMED DATA NETWORKING," 2014. Doctor of
Philosophy in the Graduate College the University of Arizona
[16] Yi, C., et al., A case for stateful forwarding plane. Computer Communications, 2013. 36(7): p. 779-
791.
[17] Wang, L., Lehman, V., Hoque, A. M., Zhang, B., Yu, Y., & Zhang, L. (2018). A secure link state
routing protocol for NDN. IEEE Access, 6, 10470-10482
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
30
AUTHORS
Hadis Rezaei. She received her bachelor's degree in software engineering from the Islamic
Azad University of Saveh, Department of Electrical and Computer, IRAN, in 2012. Later
on, she came to Tehran Research Science Branch for Ms. Degree in software engineering
in 2013 on Named Data Networking and Content-Centric Networking. She graduated in
2016 with a master's degree.
Sahar Sadeghi. She received her B.SC degree in software engineering from the Islamic
Azad University of Saveh department of electrical and computer. Iran, in 2012, she
commenced her M.Sc degree in software engineering at the Science and Research Branch
University of Tehran, 2013. Her thesis has been on an appropriate filter to detect prostate
cancer with increased speed on ultrasound images. She graduated in 2016 with a master's
degree.
Lila Badeli. She received her bachelor's degree in IT engineering from Payam nour of
Saveh department of Electrical and computer, Iran, in 2011. She graduated from the
Science and Research Branch University of Tehran Ms degree in software engineering in
2017 on named Image processing.