89 research outputs found

    Automatic configuration of OpenFlow in wireless mobile ad hoc networks

    Get PDF
    A Mobile wireless Ad hoc NETwork (MANET) is a decentralized wireless network in which mobile wireless nodes either directly communicate with each other or communicate via other wireless nodes in the network. In addition, OpenFlow has disruptive potential in designing a flexible programmable network which can foster innovation, reduce complexity and deliver right economics. In recent years, there are significant interests from research communities to deploy OpenFlow in MANETs. This paper proposes a configuration method with which OpenFlow can be deployed automatically in a MANET without any manual configuration. The proposed configuration method is tested in an emulated MANET created on the Fed4FIRE testbed using Mininet-WiFi (an emulator for wireless software-defined wireless networks). Experimentation includes automatic configuration of OpenFlow in linear, sparse, and dense mobile ad hoc networks. Results show the effectiveness of the method in configuring OpenFlow in wireless mobile ad hoc networks

    Towards Emulation of Intelligent IoT Networks on EU-US Testbeds

    Get PDF
    This paper introduces our project on experimental validation of intelligent Internet of Things (IoT) networks. The project is a part of the NGIAtlantic H2020 third open call to perform experiments on EU and US wireless testbeds. The project proposes five different experiments to be performed on EU/US testbeds: (1) automatic configuration/discovery of Software Defined Networking (SDN) in wireless IoT sensor networks, (2) Machine Learning (ML) assisted control and data traffic path discovery experiments, (3) GPU and Hadoop cluster assisted experiments for ML algorithms, (4) Inter-testbed experiments, and (5) Failure recovery intercity experiments. Further, initial experimentation on EU/US testbeds is explored and presented. The results show the feasibility of performing the above experiments on the proposed testbeds

    The Future of the Internet III

    Get PDF
    Presents survey results on technology experts' predictions on the Internet's social, political, and economic impact as of 2020, including its effects on integrity and tolerance, intellectual property law, and the division between personal and work lives

    Phase Separation of Methane and C01 using Pressure and Temperature Manipulation

    Get PDF
    This report constitutes of, as the title for this project suggests, separation of carbon dioxide and methane by manipulating temperature and pressure. The objectives of this project are mainly; to simulate both mixture in a separator and observe its vapor and soild compositions after separated, secondly; to study the possibilities of forming gas hydrate for methane and carbon dioxide to establish equilibrium conditions third; study the effect of temperature and pressure governing the formation of gas and hydrate and finally to compared and discuss the results obtained and recommend any improvement. The methods of separation in the industry are mainly adsorption, membrane and temperature and pressure method. The scope of study in this project is to separate carbon dioxide and methane by just manipulating temperature and pressure. Focus of the project will be on different types of fluid packages and phase equilibrium. The outcome expected from this project is to see the ability of temperature and pressure work to separate carbon dioxide into solid form and methane into vapor form

    Detecting IoT Attacks Using an Ensemble Machine Learning Model

    Get PDF
    Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amount of time, as the distance between IoT devices and fog devices is smaller than the distance between IoT devices and the cloud. Machine learning is frequently used for the detection of attacks due to the huge amount of data available from IoT devices. However, the problem is that fog devices may not have enough resources, such as processing power and memory, to detect attacks in a timely manner. This paper proposes an approach to offload the machine learning model selection task to the cloud and the real-time prediction task to the fog nodes. Using the proposed method, based on historical data, an ensemble machine learning model is built in the cloud, followed by the real-time detection of attacks on fog nodes. The proposed approach is tested using the NSL-KDD dataset. The results show the effectiveness of the proposed approach in terms of several performance measures, such as execution time, precision, recall, accuracy, and ROC (receiver operating characteristic) curve

    Towards a mining metaverse

    Get PDF

    Evaluating Mobility Predictors in Wireless Networks for Improving Handoff and Opportunistic Routing

    Get PDF
    We evaluate mobility predictors in wireless networks. Handoff prediction in wireless networks has long been considered as a mechanism to improve the quality of service provided to mobile wireless users. Most prior studies, however, were based on theoretical analysis, simulation with synthetic mobility models, or small wireless network traces. We study the effect of mobility prediction for a large realistic wireless situation. We tackle the problem by using traces collected from a large production wireless network to evaluate several major families of handoff-location prediction techniques, a set of handoff-time predictors, and a predictor that jointly predicts handoff location and time. We also propose a fallback mechanism, which uses a lower-order predictor whenever a higher-order predictor fails to predict. We found that low-order Markov predictors, with our proposed fallback mechanisms, performed as well or better than the more complex and more space-consuming compression-based handoff-location predictors. Although our handoff-time predictor had modest prediction accuracy, in the context of mobile voice applications we found that bandwidth reservation strategies can benefit from the combined location and time handoff predictor, significantly reducing the call-drop rate without significantly increasing the call-block rate. We also developed a prediction-based routing protocol for mobile opportunistic networks. We evaluated and compared our protocol\u27s performance to five existing routing protocols, using simulations driven by real mobility traces. We found that the basic routing protocols are not practical for large-scale opportunistic networks. Prediction-based routing protocols trade off the message delivery ratio against resource usage and performed well and comparable to each other

    The BG News May 23, 2001

    Get PDF
    The BGSU campus student newspaper May 23, 2001. Volume 87 - Issue 1https://scholarworks.bgsu.edu/bg-news/7813/thumbnail.jp

    Future Wireless Networking Experiments Escaping Simulations

    Get PDF
    In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in the US, there are POWDER and COSMOS testbeds. Several other countries, including Japan, Brazil, India, and China, have also developed next-generation testbeds. Compared to simulations, these testbeds offer a more realistic way to test protocols and prototypes. In this paper, we examine some available wireless testbeds from the EU and the US, which are part of an open-call EU project under the NGIAtlantic H2020 initiative to conduct Software-Defined Networking (SDN) experiments on intelligent Internet of Things (IoT) networks. Furthermore, the paper presents benchmarking results and failure recovery results from each of the considered testbeds using a variety of wireless network topologies. The paper compares the testbeds based on throughput, latency, jitter, resources available, and failure recovery time, by sending different types of traffic. The results demonstrate the feasibility of performing wireless experiments on different testbeds in the US and the EU. Further, issues faced during experimentation on EU and US testbeds are also reported

    Internet und Armutsbekämpfung

    Get PDF
    Diese Arbeit beschäftigt sich mit den Möglichkeiten, die das Internet für soziale Entwicklung und Armutsbekämpfung bietet. Dazu werden bestehende Online-Hilfsplattformen, die Kredite, Spenden und andere Leistungen vermitteln, vorgestellt und miteinander verglichen. Das besondere Interesse gilt jenen Plattformen, die offen zugänglich sind für die Eigenaktivitäten engagierter Individuen und somit eine wertvolle Grundlage für Hilfe zur Selbsthilfe bieten. Im theoretischen Teil wird erklärt, wie aufgrund sozialer und technischer Entwicklungen neue potenzielle Ansätze in der Hilfs- und Entwicklungszusammenarbeit möglich geworden sind. Zuerst wird das Internet beschrieben und dessen neue offenere Form des Web 2.0 erklärt. Verschiedene Aspekte der Hilfsplattformen, wie das Corporate Social Responsibility-Konzept, Mikrokredite, der Digital Divide und Lösungsansätze, sowie die Umweltbelastungen durch Kommunikationstechnologien sollen eine umfassende Betrachtung der Thematik bieten. Es werden weiters gängige Methoden und die aktuellen Forderungen der Entwicklungszusammenarbeit vorgestellt. Im praktischen Teil werden die Eigenschaften der verschiedenen Spenden- und Kreditplattformen präsentiert und die bekannteren Initiativen betterplace, GiveMeaning, GlobalGiving und Kiva genauer betrachtet. Es wird untersucht, welche Art von Hilfe sie anbieten und wie sich der Zugang für Hilfsansuchen von Privatpersonen und Organisationen gestaltet. Beleuchtet wird auch, was Menschen zu sozialem Spenden und Leihen bewegt. In der Diskussion wird aufgezeigt, welche Vor- und Nachteile diese verschiedenen neuen Instrumente haben, wo die Potenziale und Risiken liegen und wie die Zukunft mit diesen Hilfsplattformen aussehen könnte. Abschließend wird noch die Idee eines visuellen Aufklärungsprogramms im Internet präsentiert. Die Ergebnisse zeigen, dass die offen zugänglichen Hilfsplattformen das Potenzial haben für ein Vorantreiben der Entwicklungshilfe hin zu weitgehender Eigenaktivität der Benachteiligten. Sie ermöglichen ein Abkehren von großen vermittelnden Institutionen, ein Umgehen von Hierarchien und Korruption sowie eine Hilfsvermittlung auf neuen Ebenen. Dadurch leisten sie einen Beitrag zur Umsetzung der gängigen Forderungen der Entwicklungszusammenarbeit nach Partizipation, Empowerment und selbst bestimmter Entwicklung. Von den betrachteten Modellen eignet sich die offen zugängliche Spendenplattform betterplace am Besten für die Selbsthilfe Benachteiligter. Sie ermöglicht eine selbst bestimmte Entwicklung durch den neuartigen Zugang zu Spendengeldern für lokal organisierte Projekte, sowie die Vermittlung konkret benötigter Hilfsmaterialien und freiwilliger Mitarbeit. Durch die Qualifikation als internationales Fundraising-Instrument wird auch internationales Zusammenzahlen für global wirksame Projekte in Größenordnungen jenseits einzelstaatlicher Finanzierbarkeit denkbar. Die Methoden für diese Arbeit sind kritische Literaturanalyse, Untersuchung und Vergleich der verschiedenen Praxisbeispiele im Internet, sowie Selbstversuche als Spender und Hilfsansuchender bei einer offenen Spenden- und einer Kreditplattform.“The Internet and the Fight against Poverty: Online Giving Marketplaces and their Potential for Assistance and Self-Help” This paper deals with the potential of the internet for social development and the fight against poverty. Different online philanthropic platforms, which offer donations, credit or other forms of assistance, are introduced and compared. The primary focus is on platforms which are accessible for individual initiatives and offer a base for self-help. In the theoretical part of this paper, social and technical developments are explored, which enable new approaches in the area of development assistance. The paper first describes the internet and its new, more open forms of the Web 2.0. Different aspects of the platforms, like the concept of Corporate Social Responsibility, micro-credits, digital divide with approaches to solutions and environmental pollution caused by information and communication technologies shall provide a proper overview on the subject. Furthermore, common methods and the current demands of development assistance are explained. The practical part of this paper presents the features of different help- and credit-platforms and the popular initiatives betterplace, GiveMeaning, GlobalGiving and Kiva are explored in more detail. The paper investigates what kinds of assistance are offered and how they are made accessible for private persons and organizations. It also examines what makes people take part in social lending and donating. In the conclusion, the advantages and disadvantages of these different new instruments are shown; highlighting their risks and potentials and what the future might look like thanks to these help-platforms. Lastly another idea is presented: The visualization of global and local developments over time with the aid of animated maps. The findings of this paper show that the help-platforms which are open to the public, have the potential to fuel development for disadvantaged groups. These platforms provide assistance on a new level by bypassing hierarchies and corruption, enabling individuals to turn away from huge intermediary institutions. Thereby a contribution is made toward the current demands of the development corporation; participation, empowerment and self-determination. Of all the models compared, the publicly accessible donation-platform betterplace is the most suited program for people seeking self-help. It enables self-determined de-velopment by making donations accessible for local projects and by the brokerage of materials for concrete needs and voluntary assistance. Because it functions as an international fundraising-instrument for global projects, rather than at the level of a single-state, feasibility can be imagined. The methods used in this paper were the critical analysis of literature, examination and comparison of the different examples in practice, as well as self-testing a donation- and a credit-platform; as both a donor and a help-applier
    • …
    corecore