100 research outputs found
A keyword-based ICN-IoT platform
Information-Centric Networking (ICN) has been proposed as a promising solution for the Internet of Things (IoT), due to its focus on naming data, rather than endpoints, which can greatly simplify applications. The hierarchical naming of the Named-Data Networking (NDN) architecture can be used to name groups of data values, for example, all temperature sensors in a building. However, the use of a single naming hierarchy for all kinds of different applications is inflexible. Moreover, IoT data are typically retrieved from multiple sources at the same time, allowing applications to aggregate similar information items, something not natively supported by NDN. To this end, in this paper we propose (a) locating IoT data using (unordered) keywords combined with NDN names and (b) processing multiple such items at the edge of the network with arbitrary functions. We describe and evaluate three different strategies for retrieving data and placing the calculations in the edge IoT network, thus combining connectivity, storage and computing
Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks
Quality of Service (QoS) in the IP world mainly manages forwarding resources,
i.e., link capacities and buffer spaces. In addition, Information Centric
Networking (ICN) offers resource dimensions such as in-network caches and
forwarding state. In constrained wireless networks, these resources are scarce
with a potentially high impact due to lossy radio transmission. In this paper,
we explore the two basic service qualities (i) prompt and (ii) reliable traffic
forwarding for the case of NDN. The resources we take into account are
forwarding and queuing priorities, as well as the utilization of caches and of
forwarding state space. We treat QoS resources not only in isolation, but
correlate their use on local nodes and between network members. Network-wide
coordination is based on simple, predefined QoS code points. Our findings
indicate that coordinated QoS management in ICN is more than the sum of its
parts and exceeds the impact QoS can have in the IP world
NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT
This paper takes a comprehensive view on the protocol stacks that are under
debate for a future Internet of Things (IoT). It addresses the holistic
question of which solution is beneficial for common IoT use cases. We deploy
NDN and the two popular IP-based application protocols, CoAP and MQTT, in its
different variants on a large-scale IoT testbed in single- and multi-hop
scenarios. We analyze the use cases of scheduled periodic and unscheduled
traffic under varying loads. Our findings indicate that (a) NDN admits the most
resource-friendly deployment on nodes, and (b) shows superior robustness and
resilience in multi-hop scenarios, while (c) the IP protocols operate at less
overhead and higher speed in single-hop deployments. Most strikingly we find
that NDN-based protocols are in significantly better flow balance than the
UDP-based IP protocols and require less corrective actions
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Mobile military networks are uniquely challenging to build and maintain, because of their wireless nature and the unfriendliness of the environment, resulting in unreliable and capacity limited performance. Currently, most tactical networks implement TCP/IP, which was designed for fairly stable, infrastructure-based environments, and requires sophisticated and often application-specific extensions to address the challenges of the communication scenario. Information Centric Networking (ICN) is a clean slate networking approach that does not depend on stable connections to retrieve information and naturally provides support for node mobility and delay/disruption tolerant communications - as a result it is particularly interesting for tactical applications. However, despite ICN seems to offer some structural benefits for tactical environments over TCP/IP, a number of challenges including naming, security, performance tuning, etc., still need to be addressed for practical adoption. This document, prepared within NATO IST-161 RTG, evaluates the effectiveness of Named Data Networking (NDN), the de facto standard implementation of ICN, in the context of tactical edge networks and its potential for adoption
Edge Data Repositories - The design of a store-process-send system at the Edge
The Edge of the Internet is currently accommodating large numbers
of devices and these numbers will dramatically increase with the advancement of technology. Edge devices and their associated service
bandwidth requirements are predicted to become a major problem
in the near future. As a result, the popularity of data management,
analysis and processing at the edges is also increasing. This paper
proposes Edge Data Repositories and their performance analysis.
In this context, provide a service quality and resource allocation
feedback algorithm for the processing and storage capabilities of
Edge Data Repositories. A suitable simulation environment was
created for this system, with the help of the ONE Simulator. The
simulations were further used to evaluate the Edge Data Repository
cluster within different scenarios, providing a range of service models. From there, with the help and adaptation of a few basic networks
management concepts, the feedback algorithm was developed. As
an initial step, we assess and provide measurable performance feedback for the most essential parts of our envisioned system: network
metrics and service and resource status, through this algorithm
IoT TECHNOLOGY BASED ON AI PLATFORM FOR BLOCKCHAIN E-EDUCATION
The priority elements of the e-government system with Blockchain technologies in the most important socially oriented areas are the electronic health system, electronic education and science system, electronic environment, etc., the introduction of which is designed to make public information open to the public, in particular on the state of the environment, directions and volumes of use of public funds, Land Management, the state of development and use of mineral resources, etc.; automate some processes of management of the relevant areas (personnel, monitoring, finance, reporting); improve the Electronic Document Management System in educational and scientific institutions, healthcare and the environment; ensure that users of the system can receive services in the relevant areas through online services, including checking the validity of documents, registering in electronic queues, and so on. It should be noted that educational institutions provide applicants with "information", which in the learning process should turn into "knowledge". We note that the main difference between knowledge and information is the degree of organization and consciousness of Primary Data. In our opinion, the main difference lies not only in the degree of organization and consciousness of primary data but also in the orientation. So, information is the" raw material " for the formation of knowledge, the main resource, service, and product. Knowledge, in our opinion, is systematic, structured information that an individual has. That is, knowledge is a quality of the individual. A modern successful person needs to learn throughout his life. At the same time, the ability to make decisions independently, the ability to think, and the ability to solve complex interdisciplinary problems in non-standard situations become essential. This makes it necessary for a modern person to have the skills to search, analyze and process information in accordance with the methodology of scientific knowledge using digital technologies. The foundation for obtaining knowledge by a person is education, in the process of which educational institutions provide the applicant with "information" that he must turn into "knowledge". The process of converting information into knowledge in the modern environment is possible only if the information and research competencies are formed
Mobile Data Repositories at the Edge.
In a future IoT-dominated environment the majority of
data will be produced at the edge, which may be moved
to the network core. We argue that this reverses today’s
“core-to-edge” data flow to an “edge-to-core” model
and puts severe stress on edge access/cellular links. In
this paper, we propose a data-centric communication approach
which treats storage and wire the same as far as
their ability to supply the requested data is concerned.
Given that storage is cheaper to provide and scales better
than wires, we argue for enhancing network connectivity
with local storage services (e.g., in WiFi Access Points,
or similar) at the edge of the network. Such local storage
services can be used to buffer IoT and user-generated
data at the edge, prior to data-cloud synchronization
Fog Computing in IoT Smart Environments via Named Data Networking: A Study on Service Orchestration Mechanisms
[EN] By offering low-latency and context-aware services, fog computing will have a peculiar role in the deployment of Internet of Things (IoT) applications for smart environments. Unlike the conventional remote cloud, for which consolidated architectures and deployment options exist, many design and implementation aspects remain open when considering the latest fog computing paradigm. In this paper, we focus on the problems of dynamically discovering the processing and storage resources distributed among fog nodes and, accordingly, orchestrating them for the provisioning of IoT services for smart environments. In particular, we show how these functionalities can be effectively supported by the revolutionary Named Data Networking (NDN) paradigm. Originally conceived to support named content delivery, NDN can be extended to request and provide named computation services, with NDN nodes acting as both content routers and in-network service executors. To substantiate our analysis, we present an NDN fog computing framework with focus on a smart campus scenario, where the execution of IoT services is dynamically orchestrated and performed by NDN nodes in a distributed fashion. A simulation campaign in ndnSIM, the reference network simulator of the NDN research community, is also presented to assess the performance of our proposal against state-of-the-art solutions. Results confirm the superiority of the proposal in terms of service provisioning time, paid at the expenses of a slightly higher amount of traffic exchanged among fog nodes.This research was partially funded by the Italian Government under grant PON ARS01_00836 for the COGITO (A COGnItive dynamic sysTem to allOw buildings to learn and adapt) PON Project.Amadeo, M.; Ruggeri, G.; Campolo, C.; Molinaro, A.; Loscri, V.; Tavares De Araujo Cesariny Calafate, CM. (2019). Fog Computing in IoT Smart Environments via Named Data Networking: A Study on Service Orchestration Mechanisms. Future Internet. 11(11):1-21. https://doi.org/10.3390/fi11110222S1211111Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440. doi:10.1016/j.bushor.2015.03.008Cicirelli, F., Guerrieri, A., Spezzano, G., Vinci, A., Briante, O., Iera, A., & Ruggeri, G. (2018). Edge Computing and Social Internet of Things for Large-Scale Smart Environments Development. IEEE Internet of Things Journal, 5(4), 2557-2571. doi:10.1109/jiot.2017.2775739Chiang, M., & Zhang, T. (2016). Fog and IoT: An Overview of Research Opportunities. IEEE Internet of Things Journal, 3(6), 854-864. doi:10.1109/jiot.2016.2584538Openfog Consortiumhttp://www.openfogconsortium.org/Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., claffy, kc, Crowley, P., … Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73. doi:10.1145/2656877.2656887Amadeo, M., Ruggeri, G., Campolo, C., & Molinaro, A. (2019). IoT Services Allocation at the Edge via Named Data Networking: From Optimal Bounds to Practical Design. IEEE Transactions on Network and Service Management, 16(2), 661-674. doi:10.1109/tnsm.2019.2900274ndnSIM 2.0: A New Version of the NDN Simulator for NS-3https://www.researchgate.net/profile/Spyridon_Mastorakis/publication/281652451_ndnSIM_20_A_new_version_of_the_NDN_simulator_for_NS-3/links/5b196020a6fdcca67b63660d/ndnSIM-20-A-new-version-of-the-NDN-simulator-for-NS-3.pdfAhlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., & Ohlman, B. (2012). A survey of information-centric networking. IEEE Communications Magazine, 50(7), 26-36. doi:10.1109/mcom.2012.6231276NFD Developer’s Guidehttps://named-data.net/wp-content/uploads/2016/03/ndn-0021-diff-5..6-nfd-developer-guide.pdfPiro, G., Amadeo, M., Boggia, G., Campolo, C., Grieco, L. A., Molinaro, A., & Ruggeri, G. (2019). Gazing into the Crystal Ball: When the Future Internet Meets the Mobile Clouds. IEEE Transactions on Cloud Computing, 7(1), 210-223. doi:10.1109/tcc.2016.2573307Zhang, G., Li, Y., & Lin, T. (2013). Caching in information centric networking: A survey. Computer Networks, 57(16), 3128-3141. doi:10.1016/j.comnet.2013.07.007Yi, C., Afanasyev, A., Moiseenko, I., Wang, L., Zhang, B., & Zhang, L. (2013). A case for stateful forwarding plane. Computer Communications, 36(7), 779-791. doi:10.1016/j.comcom.2013.01.005Amadeo, M., Briante, O., Campolo, C., Molinaro, A., & Ruggeri, G. (2016). Information-centric networking for M2M communications: Design and deployment. Computer Communications, 89-90, 105-116. doi:10.1016/j.comcom.2016.03.009Tourani, R., Misra, S., Mick, T., & Panwar, G. (2018). Security, Privacy, and Access Control in Information-Centric Networking: A Survey. IEEE Communications Surveys & Tutorials, 20(1), 566-600. doi:10.1109/comst.2017.2749508Ndn-ace: Access Control for Constrained Environments over Named Data Networkinghttp://new.named-data.net/wp-content/uploads/2015/12/ndn-0036-1-ndn-ace.pdfZhang, Z., Yu, Y., Zhang, H., Newberry, E., Mastorakis, S., Li, Y., … Zhang, L. (2018). An Overview of Security Support in Named Data Networking. IEEE Communications Magazine, 56(11), 62-68. doi:10.1109/mcom.2018.1701147Cisco White Paperhttps://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdfAazam, M., Zeadally, S., & Harras, K. A. (2018). Deploying Fog Computing in Industrial Internet of Things and Industry 4.0. IEEE Transactions on Industrial Informatics, 14(10), 4674-4682. doi:10.1109/tii.2018.2855198Hou, X., Li, Y., Chen, M., Wu, D., Jin, D., & Chen, S. (2016). Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures. IEEE Transactions on Vehicular Technology, 65(6), 3860-3873. doi:10.1109/tvt.2016.2532863Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., … Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture, 98, 289-330. doi:10.1016/j.sysarc.2019.02.009Baktir, A. C., Ozgovde, A., & Ersoy, C. (2017). How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions. IEEE Communications Surveys & Tutorials, 19(4), 2359-2391. doi:10.1109/comst.2017.2717482Duan, Q., Yan, Y., & Vasilakos, A. V. (2012). A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing. IEEE Transactions on Network and Service Management, 9(4), 373-392. doi:10.1109/tnsm.2012.113012.120310Amadeo, M., Campolo, C., & Molinaro, A. (2016). NDNe: Enhancing Named Data Networking to Support Cloudification at the Edge. IEEE Communications Letters, 20(11), 2264-2267. doi:10.1109/lcomm.2016.2597850Krol, M., Marxer, C., Grewe, D., Psaras, I., & Tschudin, C. (2018). Open Security Issues for Edge Named Function Environments. IEEE Communications Magazine, 56(11), 69-75. doi:10.1109/mcom.2018.170111711801-2:2017 Information Technology—Generic Cabling for Customer Premiseshttps://www.iso.org/standard/66183.htm
From Traditional Adaptive Data Caching to Adaptive Context Caching: A Survey
Context data is in demand more than ever with the rapid increase in the
development of many context-aware Internet of Things applications. Research in
context and context-awareness is being conducted to broaden its applicability
in light of many practical and technical challenges. One of the challenges is
improving performance when responding to large number of context queries.
Context Management Platforms that infer and deliver context to applications
measure this problem using Quality of Service (QoS) parameters. Although
caching is a proven way to improve QoS, transiency of context and features such
as variability, heterogeneity of context queries pose an additional real-time
cost management problem. This paper presents a critical survey of
state-of-the-art in adaptive data caching with the objective of developing a
body of knowledge in cost- and performance-efficient adaptive caching
strategies. We comprehensively survey a large number of research publications
and evaluate, compare, and contrast different techniques, policies, approaches,
and schemes in adaptive caching. Our critical analysis is motivated by the
focus on adaptively caching context as a core research problem. A formal
definition for adaptive context caching is then proposed, followed by
identified features and requirements of a well-designed, objective optimal
adaptive context caching strategy.Comment: This paper is currently under review with ACM Computing Surveys
Journal at this time of publishing in arxiv.or
Evolutionary mutation testing for IoT with recorded and generated events
Mutation testing is a testing technique that has been applied successfully to several programming languages. Despite its benefits for software testing, the high computational cost of mutation testing has kept it from being widely used. Several refinements have been proposed to reduce its cost by reducing the number of generated mutants; one of those is evolutionary mutation testing (EMT). Evolutionary mutation testing aims at generating a reduced set of mutants with an evolutionary algorithm, which searches for potentially equivalent and difficult to kill mutants that help improve the test suite. Evolutionary mutation testing has been evaluated in two contexts so far, ie, web service compositions and object‐oriented C++ programmes. This study explores its performance when applied to event processing language queries of various domains. This study also considers the impact of the test data, since a lack of events or the need to have specific values in them can hinder testing. The effectiveness of evolutionary mutation testing with the original test data generators and the new internet of things test event generator tool is compared in multiple case studies
- …