The Presentation Slides of the Third OpenDaylight Lisboa Meetup held at FCUL, Lisboa, Portugal. This gives some basic outlines to SDN and OpenDaylight project.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
New generations of applications call for new demands
that are totally different from previous uses of the Internet (e.g.,
cross-layer and network function virtualization), and the existing
networks are not optimized for these new demands due to being
overwhelmed by enormous numbers of external network
protocols. Overlay network technologies aim to respond to such
future network demands. Systems on overlay networks mitigate
this protocol overload by exploiting the unlimited
programmability of the overlay nodes comprising the system.
This paper proposes an overlay node that works as a transparent
proxy server and router for encrypted communication over
overlay networks. This overlay node acts as a virtual switch over
multiple layers of the OSI reference model (the datalink, network, transport, and session layers) using general-purpose components (a personal computer, physical network interface card, and
virtual network interface card, developed using the C language).
The ideas behind this proposal derive from the effectiveness of
software-defined networks and network function virtualization.
Finally, we examine the performance of the overlay node
experimentally and suggest possible designs for future overlay
networks.
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...ieeepondy
Fair network bandwidth allocation in iaa s datacenters via a cooperative game approach
+91-9994232214,7806844441, ieeeprojectchennai@gmail.com,
www.projectsieee.com, www.ieee-projects-chennai.com
IEEE PROJECTS 2016-2017
-----------------------------------
Contact:+91-9994232214,+91-7806844441
Email: ieeeprojectchennai@gmail.com
The Presentation Slides of the Third OpenDaylight Lisboa Meetup held at FCUL, Lisboa, Portugal. This gives some basic outlines to SDN and OpenDaylight project.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
New generations of applications call for new demands
that are totally different from previous uses of the Internet (e.g.,
cross-layer and network function virtualization), and the existing
networks are not optimized for these new demands due to being
overwhelmed by enormous numbers of external network
protocols. Overlay network technologies aim to respond to such
future network demands. Systems on overlay networks mitigate
this protocol overload by exploiting the unlimited
programmability of the overlay nodes comprising the system.
This paper proposes an overlay node that works as a transparent
proxy server and router for encrypted communication over
overlay networks. This overlay node acts as a virtual switch over
multiple layers of the OSI reference model (the datalink, network, transport, and session layers) using general-purpose components (a personal computer, physical network interface card, and
virtual network interface card, developed using the C language).
The ideas behind this proposal derive from the effectiveness of
software-defined networks and network function virtualization.
Finally, we examine the performance of the overlay node
experimentally and suggest possible designs for future overlay
networks.
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...ieeepondy
Fair network bandwidth allocation in iaa s datacenters via a cooperative game approach
+91-9994232214,7806844441, ieeeprojectchennai@gmail.com,
www.projectsieee.com, www.ieee-projects-chennai.com
IEEE PROJECTS 2016-2017
-----------------------------------
Contact:+91-9994232214,+91-7806844441
Email: ieeeprojectchennai@gmail.com
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
What is P2P networks, history, architecture, advantages and weaknesses, Legal issues, Security and Privacy issues, Economic issues, Applications of use and Future developments (April, 2010).
Meego Italian Day 2011 – Prof. Paolo Bellavista - Mobile & Context-aware Computing: Panoramica, Scenari Applicativi e Sfide Tecnologiche
L’intervento cercherà di fare intuire, con esempi pratici e concreti, perchè le infrastrutture di supporto a servizi mobili e le applicazioni mobili stesse non possono più prescindere da forme avanzate di gestione del contesto a livello middleware. La gestione del contesto sta emergendo come cruciale non solo per la personalizzazione adattiva dei servizi mobili ma anche per vincere le sfide tecnologiche correlate alla necessità di scalabilità in scenari di deployment di ampie dimensioni. Saranno mostrate rapidamente esemplificazioni in ambito monitoraggio urbano tramite reti veicolari di sensori e condivisione opportunistica di risorse sotto-utilizzate.
Prof. Paolo Bellavista è professore associato di sistemi distribuiti e mobili presso la Facoltà di Ingegneria dell’Università di Bologna. I suoi principali ambiti di ricerca sono il supporto middleware a sistemi e servizi mobili, i servizi context-aware, lo streaming multimediale verso smart phone su reti wired-wireless eterogenee, le reti wireless di sensori anche veicolari, l’integrazione dinamica di sistemi mobili con infrastrutture, anche cloud. E’ inoltre membro dell’Editorial Board di IEEE Communications, IEEE Transactions on Computers, IEEE Transactions on Network and Service Management., IEEE Transactions on Services Computing, Elsevier Pervasive and Mobile Computing Journal, and Springer Journal of Network and Systems Management.
http://www.meegoit.com/2011
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
Fog Computing extends the Cloud Computing paradigm to
the edge of the network, thus enabling a new breed of applications
and services. Dening characteristics of the Fog
are: a) Low latency and location awareness; b) Wide-spread
geographical distribution; c) Mobility; d) Very large number
of nodes, e) Predominant role of wireless access, f) Strong
presence of streaming and real time applications, g) Heterogeneity.
In this paper we argue that the above characteristics
make the Fog the appropriate platform for a number
of critical Internet of Things (IoT) services and applications,
namely, Connected Vehicle, Smart Grid , Smart
Cities, and, in general, Wireless Sensors and Actuators Networks
(WSANs).
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
Fog computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Dening characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Het-erogeneity. In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid , Smart Cities, and, in general, Wireless Sensors and Actuators Net-works (WSANs).
Towards a 5G Operating Platform Infrastructure-agnostic OrchestrationITU
This presentation and demo will show an overarching orchestration software architecture that is based on a continuous advertisement of capabilities and resources from underlying infrastructure-layer domains, which allows the orchestration to adapt its service logic to exploit the most up-to-date capabilities. The feasibility will be shown to setup a complex NFV service across multiple domains, such as two OpenStack instances connected by an SDN network, where all the service functions (e.g. NAT, firewall, etc.) are launched in the datacenter and the intermediate SDN network is used only to connect all the different components together. However, when the SDN network advertises also the capability to host a given set of network applications (e.g. a NAT), the orchestrator will adapt its service logic and it will instantiate part of the service in the datacenter (e.g. as virtual machines), part in the SDN domain (e.g. as ONOS applications), hence enabling more aggressive optimization strategies in the overarching orchestrator.
Author : Antonio Manzalini, TIM
Fulvio Risso, Politecnico di Torino
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
Recently, Mobile Crowd Sensing (MCS) has been used in many smart city monitoring applications, leveraging the latest smartphone features of sensing and networking. However, most of these applications use a direct internet connection for sending the collected data to the server through a 3G or 4G (LTE) network.This type of communication leads to higher bandwidth, battery consumption, and higher data plan cost. In this paper, we presenta new ad-hoc tree-based routing protocol named MCS-RPL based on theIoT RPL protocol for the smart city context. The proposed protocol aims to utilize smartphone and Mobile CrowdSensing (MCS) opportunistically to support static Wireless Sensor Network (WSN) and to cover more sensing areas with less routing overhead and power consumption. MCS-RPL usesa grid-based cluster head to address mobility issues and reduce control packets. The conducted performance evaluation reveals that the proposed protocol outperforms RPL in terms of packet delivery ratio and power consumption due to control packet overhead reduction, which reached more than 75% in the tested scenarios.
Towards Deep Programmable Slicing. IEEE Netsoft'19 Distinguished Expert Panel Theme: Barriers and Frontiers of Softwarization for the Network of 2030, Paris, 2019. https://netsoft2019.ieee-netsoft.org/program/distinguished-expert-panel/
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
What is P2P networks, history, architecture, advantages and weaknesses, Legal issues, Security and Privacy issues, Economic issues, Applications of use and Future developments (April, 2010).
Meego Italian Day 2011 – Prof. Paolo Bellavista - Mobile & Context-aware Computing: Panoramica, Scenari Applicativi e Sfide Tecnologiche
L’intervento cercherà di fare intuire, con esempi pratici e concreti, perchè le infrastrutture di supporto a servizi mobili e le applicazioni mobili stesse non possono più prescindere da forme avanzate di gestione del contesto a livello middleware. La gestione del contesto sta emergendo come cruciale non solo per la personalizzazione adattiva dei servizi mobili ma anche per vincere le sfide tecnologiche correlate alla necessità di scalabilità in scenari di deployment di ampie dimensioni. Saranno mostrate rapidamente esemplificazioni in ambito monitoraggio urbano tramite reti veicolari di sensori e condivisione opportunistica di risorse sotto-utilizzate.
Prof. Paolo Bellavista è professore associato di sistemi distribuiti e mobili presso la Facoltà di Ingegneria dell’Università di Bologna. I suoi principali ambiti di ricerca sono il supporto middleware a sistemi e servizi mobili, i servizi context-aware, lo streaming multimediale verso smart phone su reti wired-wireless eterogenee, le reti wireless di sensori anche veicolari, l’integrazione dinamica di sistemi mobili con infrastrutture, anche cloud. E’ inoltre membro dell’Editorial Board di IEEE Communications, IEEE Transactions on Computers, IEEE Transactions on Network and Service Management., IEEE Transactions on Services Computing, Elsevier Pervasive and Mobile Computing Journal, and Springer Journal of Network and Systems Management.
http://www.meegoit.com/2011
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
Fog Computing extends the Cloud Computing paradigm to
the edge of the network, thus enabling a new breed of applications
and services. Dening characteristics of the Fog
are: a) Low latency and location awareness; b) Wide-spread
geographical distribution; c) Mobility; d) Very large number
of nodes, e) Predominant role of wireless access, f) Strong
presence of streaming and real time applications, g) Heterogeneity.
In this paper we argue that the above characteristics
make the Fog the appropriate platform for a number
of critical Internet of Things (IoT) services and applications,
namely, Connected Vehicle, Smart Grid , Smart
Cities, and, in general, Wireless Sensors and Actuators Networks
(WSANs).
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
Fog computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Dening characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Het-erogeneity. In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid , Smart Cities, and, in general, Wireless Sensors and Actuators Net-works (WSANs).
Towards a 5G Operating Platform Infrastructure-agnostic OrchestrationITU
This presentation and demo will show an overarching orchestration software architecture that is based on a continuous advertisement of capabilities and resources from underlying infrastructure-layer domains, which allows the orchestration to adapt its service logic to exploit the most up-to-date capabilities. The feasibility will be shown to setup a complex NFV service across multiple domains, such as two OpenStack instances connected by an SDN network, where all the service functions (e.g. NAT, firewall, etc.) are launched in the datacenter and the intermediate SDN network is used only to connect all the different components together. However, when the SDN network advertises also the capability to host a given set of network applications (e.g. a NAT), the orchestrator will adapt its service logic and it will instantiate part of the service in the datacenter (e.g. as virtual machines), part in the SDN domain (e.g. as ONOS applications), hence enabling more aggressive optimization strategies in the overarching orchestrator.
Author : Antonio Manzalini, TIM
Fulvio Risso, Politecnico di Torino
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
Recently, Mobile Crowd Sensing (MCS) has been used in many smart city monitoring applications, leveraging the latest smartphone features of sensing and networking. However, most of these applications use a direct internet connection for sending the collected data to the server through a 3G or 4G (LTE) network.This type of communication leads to higher bandwidth, battery consumption, and higher data plan cost. In this paper, we presenta new ad-hoc tree-based routing protocol named MCS-RPL based on theIoT RPL protocol for the smart city context. The proposed protocol aims to utilize smartphone and Mobile CrowdSensing (MCS) opportunistically to support static Wireless Sensor Network (WSN) and to cover more sensing areas with less routing overhead and power consumption. MCS-RPL usesa grid-based cluster head to address mobility issues and reduce control packets. The conducted performance evaluation reveals that the proposed protocol outperforms RPL in terms of packet delivery ratio and power consumption due to control packet overhead reduction, which reached more than 75% in the tested scenarios.
Towards Deep Programmable Slicing. IEEE Netsoft'19 Distinguished Expert Panel Theme: Barriers and Frontiers of Softwarization for the Network of 2030, Paris, 2019. https://netsoft2019.ieee-netsoft.org/program/distinguished-expert-panel/
Providing Funding to Enhance the use of Open Data in the Public SectorGiuseppe Sollazzo
My keynote talk at the "Improving Public Service Delivery through Open Data" conference.
Audio at: http://puntofisso.net/19.3.mp3
http://insidegovernment.co.uk/event-details/open-data-innovation/458
A presentation I gave at Senate House Library about what IT Systems can do for libraries of similar size and quality.
I added some pretty innovative applications of IT Systems to Libraries.
Slides from my mobile development workshop at the National Audit Office.
The workshop covered:
- the history of mobile development
- concepts of mobile development in iOS, Windows 8.1 Mobile, Android
- practical exercises and examples
1. Time-aware publish/subscribe for
delay-tolerant networks
Giuseppe Sollazzo
with Cecilia Mascolo and Mirco Musolesi
March-October 2006
Department of Computer Science
University College London
2. Outline
Delay-tolerant networking
Content dissemination in DTN
Publish/subscribe
Time and DTN
Our approach: TACO-DTN
Future work
2/18
3. Delay-tolerant networks
Networking in extreme environments
IRTF Research Group
Academic researchers
Industrial entities
Intel Research, Berkeley
Spin-off of Interplanetary Internet project
Bundle protocol
Protocol and architecture specification
RFC5050 (experimental, not Internet Standard)
3/18
4. Why DTN?
Provide interoperable connections in per-
formance-challenged networks
Interspace communication
Underwater communication
Natural disasters, terrorism
Developing world
4/18
5. What does a DTN look like?
Heterogeneous devices and
links
Fixed hosts
Mobile hosts
“Random” mobility
Known mobility pattern
Intermittent connections
5/18
6. Bundle protocol
Main specification of DTN architecture
Bundle nodes “register” at an endpoint
Characteristics of the architecture
Bundle = (fragments of) application data
Behaviour of delivery
No guarantee of end-to-end path
Store-and-forward (Custody transfer)
Decision made at application layer
Convengence layer adapts it to network
But what about routing?
6/18
7. Content dissemination in DTNs
Routing is not specified in the Bundle Protocol
Each node may have its own routing procedure(s)
Different approaches
Forwarding-based vs. Replication-based
Epidemic
Spray-and-wait
Probabilistic
7/18
8. Publish/subscribe
Subscriptions match publications based on
the concept of “interests”
Topic-based
Content-based
Type-based
Space-decoupling
Time-decoupling
8/18
9. Publish/subscribe and DTN
Time decoupling
Send a message, wait for someone to store and
forward it
Hosts registration
Similar to subscriptions mechanisms
9/18
10. What about Time?
“Delay” suggests time
Scheduled encounters
Mobility patterns
Defining a new paradigm
10/18
11. Time-aware publish/subscribe
New model for DTN
Goals
Buffer management
Event routing
Target scenarios
Just-in-time advertising
Remote area connection
Traffic news
11/18
12. TACO-Dtn
Our prototype of the model
Content dissemination
Topic-based publish/subscribe
Temporal description of topics
Discrete temporal functions
12/18
13. TACO-Dtn
Time-based event matching
Temporal topic profiles: aggregate subscriptions data
(stored at servers)
Temporal utility as selection metric
13/18
15. Simulations
Preliminary evaluations
Mixed network topology
Mobile hosts, fixed infostations, carriers
Infostations as publishers
Mobile nodes as subscribers
Node mobility
Group-based mobility
We assume similar nodes will visit similar paths as in
probabilistic routing
Other parameters
Size: 1000m X 1000m
Communication range: 100m (~802.11b)
15/18
17. Future work
Case-study
Realistic simulations
Use of mobility traces instead of patterns
Applications needed!
needed to validate the approach
Java ME implementation
portable
Folksonomy-based publish/subscribe?
Divergence metrics may help
Space+time
Using GIS
17/18
18. References
Giuseppe Sollazzo, Mirco Musolesi and Cecilia Mascolo.
TACO-DTN: A Time-aware Content-based Dissemination System for Delay-
Tolerant Networks
In Proceedings of the 1st ACM SIGMOBILE International Workshop on Mobile
Opportunistic Networking (MobiOpp 2007). Colocated with Mobisys'07.
Puerto Rico, USA, June 2007. ACM Press.
http://www.dtnrg.org for further information about DTN
18/18