Reducing the number of processed data, when the information flow is high, is essential in processes that require short response times, such as the detection of anomalies in data networks. This work applied the wavelet transform in the reduction of the size of the monitoring register of a software defined network. Its main contribution lies in obtaining a record that, although reduced, retains detailed information required by the detectors of anomalies.
REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKSijcsit
Characterization of data network monitoring registers allows for reductions in the number of data, which
is essential when the information flow is high, and implementation of processes with short response times,
such as interchange of control information between devices and anomaly detection is required. The present
investigation applied wavelet transforms, so as to characterize the statistic monitoring register of a
software-defined network. Its main contribution lies in the obtention of a record that, although reduced,
retains detailed, essential information for the correct application of anomaly detectors.
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell
Marvell network telemetry - which enables accurate measurement of the network’s performance in real-time. In this white paper we will discuss how network telemetry is evolving in modern data center networks. Details will then be given of how the generic approach to network telemetry that has been taken by Marvell is providing greater visibility into network performance, plus flexible support of existing telemetry protocols, as well as the future ones emerging.
To know more visit @ https://www.marvell.com/switching/
Parameter space and comparative analyses of energy aware sensor communication...csandit
Energy conservation is one of the important issues in communication protocol development for
Wireless Sensor Networks (WSNs). WSNs are a shared medium system, consequently a Medium
Access Control (MAC) protocol is required to resolve contention. The feature of the MAC
together with the application behavior determines the communication states which have
different power requirements. The power level used for a transmission, will affect both the
effective range of the transmission and the energy used. The Power & Reliability Aware
Protocol (PoRAP) has been developed to provide efficient communication by means of energy
conservation without sacrificing reliability. It is compared to Carrier Sense Multiple Access
(CSMA), Sensor-MAC (S-MAC) and Berkeley-MAC (B-MAC) in terms of energy consumption.
The analysis begins with a parameter space study to discover which attributes affect the energy
conservation performance. Parameter settings in the Great Duck Island are used for
comparative study. According to the results, PoRAP consumes the least amount of
communication energy and it is applicable when the percentage of slot usage is high.
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKSijcsit
Characterization of data network monitoring registers allows for reductions in the number of data, which
is essential when the information flow is high, and implementation of processes with short response times,
such as interchange of control information between devices and anomaly detection is required. The present
investigation applied wavelet transforms, so as to characterize the statistic monitoring register of a
software-defined network. Its main contribution lies in the obtention of a record that, although reduced,
retains detailed, essential information for the correct application of anomaly detectors.
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell
Marvell network telemetry - which enables accurate measurement of the network’s performance in real-time. In this white paper we will discuss how network telemetry is evolving in modern data center networks. Details will then be given of how the generic approach to network telemetry that has been taken by Marvell is providing greater visibility into network performance, plus flexible support of existing telemetry protocols, as well as the future ones emerging.
To know more visit @ https://www.marvell.com/switching/
Parameter space and comparative analyses of energy aware sensor communication...csandit
Energy conservation is one of the important issues in communication protocol development for
Wireless Sensor Networks (WSNs). WSNs are a shared medium system, consequently a Medium
Access Control (MAC) protocol is required to resolve contention. The feature of the MAC
together with the application behavior determines the communication states which have
different power requirements. The power level used for a transmission, will affect both the
effective range of the transmission and the energy used. The Power & Reliability Aware
Protocol (PoRAP) has been developed to provide efficient communication by means of energy
conservation without sacrificing reliability. It is compared to Carrier Sense Multiple Access
(CSMA), Sensor-MAC (S-MAC) and Berkeley-MAC (B-MAC) in terms of energy consumption.
The analysis begins with a parameter space study to discover which attributes affect the energy
conservation performance. Parameter settings in the Great Duck Island are used for
comparative study. According to the results, PoRAP consumes the least amount of
communication energy and it is applicable when the percentage of slot usage is high.
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
Along with handling and poor storage capacity, each sensor in wireless sensor network (WSN) is equipped
with a limited power source and very difficult to be replaced in most application environments. Improving
the energy savings in applications for wireless sensor networks is necessary. In this paper, we mainly focus
on energy consumption savings in applications for wireless sensor networks time critical requirements. Our
Paper accompanying analysis of advanced technologies for energy saving techniques for the optimization
of energy efficiency together with the data transmission is optimal. Moreover, we propose improvements to
increase energy savings in applications for wireless sensor networks require time critical (LEACH
improvements). Simulation results show that our proposed protocol significantly better than LEACH about
the formation of clusters in each round, the average power, the number of nodes alive and average total
received data in base stations.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Clock synchronization estimation of non deterministic delays in wireless mess...IJCNCJournal
Clock synchronization is significantly essential as they require universal time on WSN nodes for time measurement, event ordering and coordinated actions, and power management. This paper gives an insight of solving the problem of the non-deterministic delays that exist in the wireless message delivery. Sensor nodes consisting of Arduino Mega and 2.4 GHz nRF24L01+ radio modules are used, and based on the estimation of non-deterministic delays a clock synchronization protocol for WSN is proposed. The results obtained are quiet promising compared to the existing synchronization protocols for WSNs.
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s
lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...Tal Lavian Ph.D.
Dynamic High-Performance Networks :
Support data-intensive Grid applications
Gives adequate and uncontested bandwidth to an application’s burst
Employs circuit-switching of large flows of data to avoid overheads in breaking flows into small packets and delays routing
Is capable of automatic end-to-end path provisioning
Is capable of automatic wavelength switching
Provides a set of protocols for managing dynamically provisioned wavelengths
DWDM-RAM :
Encapsulates “optical network resources” into a service framework to support dynamically provisioned and advanced data-intensive transport services
Offers network resources as Grid services for Grid computing
Allows cooperation of distributed resources
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Yields good overall utilization of network resources
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Models and approaches for Differential Power AnalysisAndrej Šimko
There are many side-channel attacks, which employ power analysis for discovering secret keys. This paper describes various methods (Hamming weight, Hamming distance, Switching distance and Signed distance) and approaches, like Simple Power Analysis (SPA); different kinds of Differential Power Analysis (DPA) - first order, Single-Exponent Multiple-Data Attack (SEMD), Multiple-Exponent Single-Data Attack (MESD), Zero-Exponent Multiple-Data Attack (ZEMD), High-Order, automated template; Correlation Power Analysis (CPA); Mutual Information Analysis (MIA). At the end, there is a chapter on countermeasures against the side channel attacks.
Characterization of data network monitoring registers allows for reductions in the number of data, which is essential when the information flow is high, and implementation of processes with short response times, such as interchange of control information between devices and anomaly detection is required. The present investigation applied wavelet transforms, so as to characterize the statistic monitoring register of a software-defined network. Its main contribution lies in the obtention of a record that, although reduced, retains detailed, essential information for the correct application of anomaly detectors.
An approach to Measure Transition Density of Binary Sequences for X-filling b...IJECEIAES
Switching activity and Transition density computation is an essential stage for dynamic power estimation and testing time reduction. The study of switching activity, transition densities and weighted switching activities of pseudo random binary sequences generated by Linear Feedback shift registers and Feed Forward shift registers plays a crucial role in design approaches of Built-In Self Test, cryptosystems, secure scan designs and other applications. This paper proposed an approach to find transition densities, which plays an important role in choosing of test pattern generator We have analyze conventional and proposed designs using our approache, This work also describes the testing time of benchmark circuits. The outcome of this paper is presented in the form of algorithm, theorems with proofs and analyses table which strongly support the same. The proposed algorithm reduces switching activity and testing time up to 51.56% and 84.61% respectively.
An evaluation of manet protocols in terms of tcp variants based on thier perf...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
Along with handling and poor storage capacity, each sensor in wireless sensor network (WSN) is equipped
with a limited power source and very difficult to be replaced in most application environments. Improving
the energy savings in applications for wireless sensor networks is necessary. In this paper, we mainly focus
on energy consumption savings in applications for wireless sensor networks time critical requirements. Our
Paper accompanying analysis of advanced technologies for energy saving techniques for the optimization
of energy efficiency together with the data transmission is optimal. Moreover, we propose improvements to
increase energy savings in applications for wireless sensor networks require time critical (LEACH
improvements). Simulation results show that our proposed protocol significantly better than LEACH about
the formation of clusters in each round, the average power, the number of nodes alive and average total
received data in base stations.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Clock synchronization estimation of non deterministic delays in wireless mess...IJCNCJournal
Clock synchronization is significantly essential as they require universal time on WSN nodes for time measurement, event ordering and coordinated actions, and power management. This paper gives an insight of solving the problem of the non-deterministic delays that exist in the wireless message delivery. Sensor nodes consisting of Arduino Mega and 2.4 GHz nRF24L01+ radio modules are used, and based on the estimation of non-deterministic delays a clock synchronization protocol for WSN is proposed. The results obtained are quiet promising compared to the existing synchronization protocols for WSNs.
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s
lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...Tal Lavian Ph.D.
Dynamic High-Performance Networks :
Support data-intensive Grid applications
Gives adequate and uncontested bandwidth to an application’s burst
Employs circuit-switching of large flows of data to avoid overheads in breaking flows into small packets and delays routing
Is capable of automatic end-to-end path provisioning
Is capable of automatic wavelength switching
Provides a set of protocols for managing dynamically provisioned wavelengths
DWDM-RAM :
Encapsulates “optical network resources” into a service framework to support dynamically provisioned and advanced data-intensive transport services
Offers network resources as Grid services for Grid computing
Allows cooperation of distributed resources
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Yields good overall utilization of network resources
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Models and approaches for Differential Power AnalysisAndrej Šimko
There are many side-channel attacks, which employ power analysis for discovering secret keys. This paper describes various methods (Hamming weight, Hamming distance, Switching distance and Signed distance) and approaches, like Simple Power Analysis (SPA); different kinds of Differential Power Analysis (DPA) - first order, Single-Exponent Multiple-Data Attack (SEMD), Multiple-Exponent Single-Data Attack (MESD), Zero-Exponent Multiple-Data Attack (ZEMD), High-Order, automated template; Correlation Power Analysis (CPA); Mutual Information Analysis (MIA). At the end, there is a chapter on countermeasures against the side channel attacks.
Characterization of data network monitoring registers allows for reductions in the number of data, which is essential when the information flow is high, and implementation of processes with short response times, such as interchange of control information between devices and anomaly detection is required. The present investigation applied wavelet transforms, so as to characterize the statistic monitoring register of a software-defined network. Its main contribution lies in the obtention of a record that, although reduced, retains detailed, essential information for the correct application of anomaly detectors.
An approach to Measure Transition Density of Binary Sequences for X-filling b...IJECEIAES
Switching activity and Transition density computation is an essential stage for dynamic power estimation and testing time reduction. The study of switching activity, transition densities and weighted switching activities of pseudo random binary sequences generated by Linear Feedback shift registers and Feed Forward shift registers plays a crucial role in design approaches of Built-In Self Test, cryptosystems, secure scan designs and other applications. This paper proposed an approach to find transition densities, which plays an important role in choosing of test pattern generator We have analyze conventional and proposed designs using our approache, This work also describes the testing time of benchmark circuits. The outcome of this paper is presented in the form of algorithm, theorems with proofs and analyses table which strongly support the same. The proposed algorithm reduces switching activity and testing time up to 51.56% and 84.61% respectively.
An evaluation of manet protocols in terms of tcp variants based on thier perf...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
ANALYSIS OF SIGNAL TRANSITION ACTIVITY IN FIR FILTERS IMPLEMENTED BY PARALLEL...cscpconf
The MAC architecture is used in real time digital signal processing and multimedia information
processing which requires high throughput. A novel method to estimate the transition activity at
the nodes of a multiplier accumulator architecture based on modified booth algorithm
implementing finite impulse response filter is proposed in this paper. The input signals are
described by a stationary Gaussian process and the transition activity per bit of a signal word is
modeled according to the dual bit type (DBT) model. This estimation is based on the
mathematical formulation by multiplexing mechanism on the breakpoints of the DBT model.
The MAC architecture is used in real time digital signal processing and multimedia information
processing which requires high throughput. A novel method to estimate the transition activity at
the nodes of a multiplier accumulator architecture based on modified booth algorithm
implementing finite impulse response filter is proposed in this paper. The input signals are
described by a stationary Gaussian process and the transition activity per bit of a signal word is
modeled according to the dual bit type (DBT) model. This estimation is based on the
mathematical formulation by multiplexing mechanism on the breakpoints of the DBT model.
Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White...IJECEIAES
Zigbee technology has been developed for short range wireless sensor networks and it follows IEEE 802.15.4 standard. For such sensors, several considerations should be taken including; low data rate and less design complexity in order to achieve efficient performance considering to the transceiver systems. This research focuses on implementing a digital transceiver system for Zigbee sensor based on IEEE 802.15.4. The system is implemented using offset quadrature phase shift keying (OQPSK) modulation technique with half sine pulse-shaping method. Direct conversion scheme has been used in the design of Zigbee receiver in order to fulfill the requirements mentioned above. System performance is analyzed considering to BER when it encountered adaptive white Gaussian noise (AWGN), besides showing the effect of using direct sequence spread spectrum (DSSS) technique.
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...ijdpsjournal
Our planet is abundant with raw data and to monitor the available data properly, processing of the enormous raw data is very vital. One of the key things in development of mankind and the nature is to acquire as much data as possible and to react appropriately in accordance with the studied data. It’s nothing but diagnosis of the physical world by studying the data acquired from them in order to take proper measures that can help in treating them better. Large volume of data incurs high energy consumption for its transmission and thus results in decrease of overall network lifetime.
Wireless Sensor Network (WSN) is a collection of multiple sensor nodes that all together forms a network for transmitting data acquired by each sensor node to sink known as Base Station (BS). In hierarchical routing acquired data are sent via relay agents like Cluster Heads (CH). The Cluster Heads must be customised with computations and formulations, which will help in aggregating the gathered data, in order to reduce energy consumption while transmitting the data further in the network while maintaining the data integrity to withhold the significance of every single value in a data set.
DESIGN AND IMPLEMENTATION OF BIT TRANSITION COUNTERcsijjournal
In today’s VLSI system design, power consumption is gaining more attention as compared to performance and area. This is due to battery life in portable devices and operating frequency of the design. Power consumption
mainly consists of static power, dynamic power, leakage power and short circuit power. Dynamic power is dominant among all which depends on many factors viz. power supply, load capacitance and frequency. Switching
activity also affects dynamic power consumption of bus which is determined by calculating the number of bit transitions on bus. The purpose of this paper is to design a bit transition counter which can be used to calculate the
switching activity of the circuit nodes. The novel feature is that it can be inserted at any node of the circuit, thus helpful for calculating power consumption of bus.
Powerful business model for fixed wireless data using outdoor antennas - PaperAndre Fourie
Paper presented at the 2nd Africa Radio Comms Conference in Johannesburg - Nov 2015
By Andre Fourie
The revenue that can be generated by an LTE base station is influenced by the quality of the signal received by the customer premise equipment (CPE). Most CPE come with omni-directional indoor antennas, but have provision for the connection to external antennas.
Substituting the indoor antennas for directional outdoor antennas has a marked effect on the data transfer speeds of the network. There are two reasons for this. Firstly, outdoor antennas are physically larger than their indoor counterparts and thus have a higher gain. The increase in antenna gain translates directly to an increase in received signal strength. The second advantage is that the outdoor antenna sits in an environment that has much better propagating properties than the indoor antenna. Tests have shown that data speeds 3-5 times faster are possible using external antennas compared to indoor antennas.
It is shown, using a primitive financial model that fairly large financial gains can be made by equipping CPE devices with external antennas.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsIJERA Editor
This paper proposes two novel dynamic bandwidth allocation (DBA) algorithms „TD- WIN AND WIN ALGORITHM‟ and DBA_GATE ALGORITHM for improving the network performance. The algorithms are implemented by emulating an access network with the use of two 1G Network Interface Cards for 1G EPON. The algorithm is tested for Triple Play services that include simulated voice, video and data packets. The algorithms are compared to maintain a better tradeoff between throughput and delay in the EPON network.
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...IJECEIAES
In the most of the real world scenarios, wireless sensor networks are used. Some of the major tasks of these types of networks is to sense some information and sending it to monitoring system or tracking some activity etc. In such applications, the sensor nodes are deployed in large area and in considerably large numbers [1]-[3]. Each of these node will be having constrained resources whether it might be energy, memory or processing capability. Energy is the major resource constraint in these types of networks. Hence enough care to be taken in all aspects such that energy can be used very efficiently. Different Activities which will be taking place in a sensor node are sensing, radio operations and receiving and computing. Among all these operations, radio consumes maximum power. Hence there is a need of reducing the power consumption in such radio operations. In the proposed work a software module is developed which will reduce the number of transmissions done to the base station. The work compares the consecutively sensed data and if these data are same then the old data then the old data will be retained. In other case the newly sensed data will be sent to the sink node. This technique reduces the number of data transmissions in a significant way. With the reduced number of transmissions, the energy saved in each node will be more, which will increase the lifetime of the entire network.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Effective Router Assisted Congestion Control for SDN IJECEIAES
Router Assisted Congestion Control (RACC) was designed to improve endto-end congestion control performance by using prior knowledge on network condition. However, the traditional Internet does not provide such information, which makes this approach is not feasible to deliver. Our paper addresses this network information deficiency issue by proposing a new congestion control method that works on the Software Defined Network (SDN) framework. We call this proposed method as PACEC (Path Associativity Centralized Congestion Control). In SDN, global view of the network information contains the network topology including link properties (i.e., type, capacity, power consumption, etc.). PACEC uses this information to determine the feedback signal, in order for the source to start sending data at a high rate and to quickly reach fair-share rate. The simulation shows that the efficiency and fairness of PACEC are better than Transmission Control Protocol (TCP) and Rate Control Protocol (RCP).
Similar to REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE DEFINED NETWORKS (20)
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. 2 Computer Science & Information Technology (CS & IT)
consider as many statistics as the network can provide, which can be achieved by considering all
the statistical information that the switches of the software defined network can send to controller.
Our interest was considering the wavelet transform as a method that could reduce the statistics
data number generated in the network, retaining the level of detail that a detector needs for the
evaluation of anomalous behaviours.
The results were evaluated by considering the percentage of data reduction and contrasting the
reliability of the anomalies detector with original and reduced data.
This article begins by illustrating the structure of software defined networks and the statistics
obtained by network switches. It continues with the explanation of the transform wavelet and
concludes with the experimental results.
2. SOFTWARE DEFINED NETWORK
2.1. Structure
Figure 1. Software Defined Network
A Software-defined network (SDN) consists of at least two parts: controllers and interconnection
devices, such as switches and routers, fig 1. The switches basically forward data according to the
forwarding policies considered by the controller. A controller is a centralized software that tells
the switch what to do with incoming data flows: It determines which port will forward the data
and if it is necessary to duplicate or drop the data. This decision is made with each data flow that
arrives to switch. The communication between switches and controllers is established by using
the protocol "openflow" [4]. An Openflow switch has a flow table, each entry consists of header
fields, which identify the incoming flow, an action on the flow and statistics information (right
table in fig 1).
When a packet enters the switch, its fields are compared with the table header. If they match, the
corresponding actions are realized.
Unlike traditional networks, the software-defined network allows: [3][9]
1. The controller to update the switch’s flow table with rules on execution time
2. The controller to request the traffic statistics from switches.
3. The data path of flows to change at runtime
3. Computer Science & Information Technology (CS & IT) 3
These characteristics make the data network more flexible, facilitating the implementation of
strategies that make it safer and more dynamic.
2.2. Statistics Information.
Openflow switches send statistical information to the controller when required: Per interface,
flow, queue and table.
We choose the interface statistics to illustrate the effectivity of the wavelet transform. The
information that the openflow switch sends to the controller includes received packets,
transmitted packets, received bytes, transmitted bytes, receive drops, transmitted drops, received
errors, and transmitted errors.
The exchange of information between the openflow switch and controller is made with two
messages: Statistics Request is used by the controller to request statistical information to the
switch and Statistics Reply is sent by the switch to the controller in response to a request.
The algorithms implemented to obtain the statistics begin with a temporizer with an interval of 20
s. The controller sends a request message to all the connected switches each time the temporizer
changes. After the controller receives the answer from the switches, it chooses the ports
associated with the servers and it sends that information to the anomalies detector.
3. REDUCTION OF REGISTER
Based on the hypothesis that the performance register of a node on a data network under normal
conditions presents little variation (low frequencies), and that a relatively abrupt or atypical
change in the behavior of the node would result in the appearance of high frequencies, we chose
to implement the wavelet transform that provides information about spatiality and frequency and
that is proportional to the changes of the wavelet in the transform (The factor k in equation 1).
Depending of this factor the wavelet ( )( tψ ) shrinks or dilates [7]. When the analyzed register
has low frequencies, a dilated wavelet will allow to obtained coefficients of high value, indicating
the presence of low frequencies; when the register has high frequencies, a contracted wavelet
would allow to obtain coefficients of high value, indicating the presence of high frequencies. The
more similar the wavelet to the form of the network activity register, the wavelet coefficients will
be higher in a given time [1]
dt
k
dt
k
txkdW )(
1
)(),(
−
= ∫−
ψ
α
α
(1)
Equation 1. Wavelet transform.
At the discrete level the transform is implemented using a bank of filters, the low pass filters
perform the process similar to that performed in the continuous transformation when having a
high scaling factor (low frequency extraction) and filters high pass have the same effect of
calculating the transform with a small scale factor (high frequency extraction). Dado que nos
interesa reducir el número de valores que conforman el registro se utilizó el método “wavelet
packed”, ilustrado en la fig. 2.
The implementation consists in the application of a bank of filters one step low (LP) and another
step high (HP), whose coefficients are determined by the base wavelet. In this case, the Register
(i) is filtered by performing the convolution operation obtaining register (i + 1) with a larger
4. 4 Computer Science & Information Technology (CS & IT)
number of samples with respect to the signal of the upper level of the transformation tree, which
makes it necessary to apply a subsampling reduces the number of samples in half, for each time
the filters are applied. Thus in the third level of the tree we would have a signal of 256 samples,
when the original signal initiated the process with 1024 samples. The decision to continue
applying the discrete transform is determined by the energy level of the filtered signal. If we take
the fig. 3 the tree expands by the LP branch, which implies that the energy of the LP register (i +
1) signal is greater than the HP (i + 1).
Figure 2. Descompositon tree. Discrete wavelet transform.
4. EXPERIMENTAL RESULTS
Since the basic objective of this work was to determine the reliability of the application of the
wavelet transform in order to reduce the size of the statistical records obtained by the controller in
a software-defined network, we considered the statistics of the associated interfaces with servers
in a mininet simulation environment to reduce the sequence of transmitted bytes. (see fig 3).
Figure 3. Reduction of register with wavelet transform
The upper graph represents the original register and shows 256 values of transmitted bytes. The
lower graph represents the reduced register with 128 values, showing a good approximation to the
waveform and a reduction of 50% of the original register.
5. Computer Science & Information Technology (CS & IT) 5
We carried out the synthesis process to determine the effectiveness of the application of the
wavelet transform for this type of data. We applied the inverse wavelet transform to the output of
the filter banks. Fig. 4 shows the similarity between the two registers.
0 50 100 150 200 250
8
10
12
14
16
overlapping. Original Register (blue) .vs. Sythesized register (red)
TransmitedBytes(MB)
i
0 50 100 150 200 250
-5
0
5
10
15
Original Register .vs. Sythesized register
TransmitedBytes(MB)
i
Figure 4. Comparison between the original register (blue) and the wavelet synthesized register (red).
We applied a Gaussian anomalies detector to the original and synthesized register to determine
the effectiveness of the wavelet transform in the conservation of atypical data. See fig. 5. The
atypical values are marked with red circles.
Figure 5. Result of anomaly detector. Left, Original data. Right synthetized register.
We concluded by observing how atypical behavior was conserved in fig. 6.
6. 6 Computer Science & Information Technology (CS & IT)
Figure 6. Relation of atypical points in the reduced register.
With this last result, we were able to verify that the detection of anomalies can be done with a
shorter register than the original. This will generate less costs for computing processes and the
storage of data.
5. CONCLUSIONS
The algorithm of reduction has a compression factor of at least a 50%. It retains the atypical
behaviour of statistics data generated by the Openflow switch, which reduces the execution time
of an anomaly detector.
The results of this work leave a door open for the analysis of the effectiveness of other wavelet
bases in the reduction of the length of the statistical parameters in Software Defined Networks.
Since this work only used the "daubechies" wavelet, evaluating other base wavelets could lead to
a better reduction rate.
REFERENCES
[1] Ibidunmoye, Olumuyiwa, Hernandez R Francisco, Elmroth Erick .(2015) “Performance Anomaly
Detection and Bottleneck Identification”. ACM Computing Surveys, Vol. 48, No. 1, Article 4.
[2] M, Jammal, T. Singh, A. Shami, R.l Asal, Y. Li, (2014) "Software defined networking: State of the
art and research challenges", Computer Networks.
[3] Dabbagh, B.Hamdaoui, M. Guizani, and A. Rayes,(2015) "Software-Defined Networking Security:
Pros and Cons", IEEE Communications Magazine.
[4] N, S. Bailey, Deepak Bansal, Linda Dunbar, Dave Hood, Zoltán Lajos Kis, (2012) "SDN
Architecture Overview”. Open Network Foundation.
(https://www.opennetworking.org/images/stories/downloads/sdnresources/technical-reports/SDN-
architecture-overview-1.0.pdf)
[5] K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris, (2014) "Combining
OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on
SDN environments”, Computer pag. 122–136
[6] L. Jose, M. Yu, and J. Rexford, (2011) “Online measurement of large traffic aggregates on
commodity switches”, in Proc. of the USENIX workshop.
[7] Stéphane. Mallat, (2008) “A wavelet tour of signal processing”. Academic Press, USA.
7. Computer Science & Information Technology (CS & IT) 7
[8] L. Kalinichemko, I. Shanin, I. Taraban,(2014) "Methods for Anormaly Detection: a Survey",
Advanced Methodos and Technologies, digital collections. Pag. 20-25.
[9] M. Dabagh, B. Handaoul, M. Guizani, A. Rayes, (2015) "Software-Defined Networking Security: Pro
and Cons”, IEEE Communications Magazine. pags. 73-79.
[10] L. Seunghyeon, K. Jinwoo, S. Seungwon, P. Porras, (2017). “Athena: A framework for scalable
Anormaly Detection in Software Defined Networks”,47th Annual IEEE/IFIP International
Conference on Dependable Systems and Networks. Pags 249-260.
AUTHORS
Luz A. Aristizábal Q. is a professor in the Department of Computing in the Faculty
of Management at the National University of Colombia. She received her MEng in
Physical Instrumentation from the Technological University of Pereira in 2009, her
degree in Data Networks Specialization from Valle University in 1991, and her
degree in Engineering Systems from Autónoma University in 1989. Her research
focuses on aspects of computer and data networks, including the network simulators,
signal processing and network paradigms.
Nicolás Toro G. is a professor in the Department of Electrics, Electronics and
Computing. He received his PhD in Engineering-Automation and SB in Electrical
Engineering from the National University of Colombia in 2013 and 1983
respectively, and his MEng degrees in Automated production systems from the
Technological University of Pereira in 1992. His research focuses on many aspects of
industrial automation, including the design, measurement, and analysis of networks.