389 research outputs found

    Hypriot Cluster Lab: An ARM-Powered Cloud Solution Utilizing Docker

    Get PDF
    Following the establishment of virtualization approaches, cloud services within data center environments have become easily manageable. Modern infrastructures use virtual machines as a platform for service delivery, requiring powerful servers. Conjointly, the uprising of the Internet of Things implies new challenges to provide applications that can successfully manage data and communicate with a large number of connected devices. The standards of entry have resulted in extreme difficulties for small enterprises and educational institutions trying to provide their own virtualized services. The Hypriot Cluster Lab (HCL) - made publicly available on Github1 - offers cloud functionality while running on ARM processors, thereby minimizing costs. Due to the fact that such processors offer less computational power, services are packaged into lightweight containers built using the Docker framework, which avoid the overhead associated with virtual machine

    The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism

    Get PDF
    Internet Protocol version 6 (IPv6) is the most recent IP version that aims to accommodate hundreds of thousands of unique IP addresses for devices in the network. In IPv6 network, Dynamic Host Configuration Protocol version IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients. However, the DHCPv6 protocol was developed without a proper security mechanism making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well-known issues of DHCPv6 are lack of verification mechanism that allows attackers to inject fake network configuration parameters into the network undetected; and privacy concerns due to lack of protection of client information in transit. In order to address these issues, several mechanisms were proposed by researchers to provide authentication and privacy protection for DHCPv6. However, most mechanisms lack the method to distribute the server authentication credentials; and ignore the client's privacy issue. This thesis intends to address the above mentioned issues by proposing DHCPv6Sec mechanism. DHCPv6Sec was evaluated and compared to Secure-DHCPv6 mechanism in terms of rogue DHCPv6 server prevention capability, privacy protection, processing time, traffic overhead, communication time, and message size limitation. The experiment results showed that DHCPv6Sec is superior in all aspects measured. DHCPv6Sec reduced processing time by 57%, and 136% during obtain IPv6 address and processing of Reconfigure message, respectively, compared to Secure-DHCPv6 mechanism. More, DHCPv6Sec reduced configuration time by 27% compared to Secure-DHCPv6 mechanism

    On the establishment of an access VPN in broadband access networks

    Full text link

    Practical Evaluation of a Network Mobility Solution

    Get PDF
    IFIP International Workshop on Networked Applications, Colmenarejo, Madrid/Spain, 6–8 July, 2005As the demand of ubiquitous Internet access and the current trend of all-IP communications keep growing, the necessity of a protocol that provides mobility management increases. The IETF has specified protocols to provide mobility support to individual nodes and networks. The Network Mobility (NEMO) Basic Support protocol is designed for providing mobility at IP level to complete networks, allowing a Mobile Network to change its point of attachment to the Internet, while maintaining ongoing sessions of the nodes of the network. All the mobility management is done by the mobile router whilst the nodes of the network are not even aware of the mobility. The main aim of this article is evaluating the performance of the NEMO Basic Support protocol by using our implementation. We also discuss the design of an implementation of the NEMO Basic Support protocol.Publicad

    Renumbering Still Needs Work

    Full text link

    Toward Broad-Spectrum Autonomic Management

    Get PDF

    Using Buildroot for building Embedded Linux Systems (BeagleBone Black)

    Get PDF
    This document describes the basic steps to develop and embedded Linux-based system using the BeagleBone Black (BBB). The document has been specifically written to use a BBB development system based on the AM335x Texas Instruments Sitara processor. All the software elements used to build the Linux distribution have a GPL licens

    IP address multiplexing for VEEs

    Full text link

    Structural health monitoring network system with wireless communications inside closed aerospace structures

    Full text link
    Structural Health Monitoring (SHM) requires integrated "all in one" electronic devices capable of performing analysis of structural integrity and on-board damage detection in aircraft?s structures. PAMELA III (Phased Array Monitoring for Enhanced Life Assessment, version III) SHM embedded system is an example of this device type. This equipment is capable of generating excitation signals to be applied to an array of integrated piezoelectric Phased Array (PhA) transducers stuck to aircraft structure, acquiring the response signals, and carrying out the advanced signal processing to obtain SHM maps. PAMELA III is connected with a host computer in order to receive the configuration parameters and sending the obtained SHM maps, alarms and so on. This host can communicate with PAMELA III through an Ethernet interface. To avoid the use of wires where necessary, it is possible to add Wi-Fi capabilities to PAMELA III, connecting a Wi-Fi node working as a bridge, and to establish a wireless communication between PAMELA III and the host. However, in a real aircraft scenario, several PAMELA III devices must work together inside closed structures. In this situation, it is not possible for all PAMELA III devices to establish a wireless communication directly with the host, due to the signal attenuation caused by the different obstacles of the aircraft structure. To provide communication among all PAMELA III devices and the host, a wireless mesh network (WMN) system has been implemented inside a closed aluminum wingbox. In a WMN, as long as a node is connected to at least one other node, it will have full connectivity to the entire network because each mesh node forwards packets to other nodes in the network as required. Mesh protocols automatically determine the best route through the network and can dynamically reconfigure the network if a link drops out. The advantages and disadvantages on the use of a wireless mesh network system inside closed aerospace structures are discussed
    corecore