52,198 research outputs found
Computing in the RAIN: a reliable array of independent nodes
The RAIN project is a research collaboration between Caltech and NASA-JPL on distributed computing and data-storage systems for future spaceborne missions. The goal of the project is to identify and develop key building blocks for reliable distributed systems built with inexpensive off-the-shelf components. The RAIN platform consists of a heterogeneous cluster of computing and/or storage nodes connected via multiple interfaces to networks configured in fault-tolerant topologies. The RAIN software components run in conjunction with operating system services and standard network protocols. Through software-implemented fault tolerance, the system tolerates multiple node, link, and switch failures, with no single point of failure. The RAIN-technology has been transferred to Rainfinity, a start-up company focusing on creating clustered solutions for improving the performance and availability of Internet data centers. In this paper, we describe the following contributions: 1) fault-tolerant interconnect topologies and communication protocols providing consistent error reporting of link failures, 2) fault management techniques based on group membership, and 3) data storage schemes based on computationally efficient error-control codes. We present several proof-of-concept applications: a highly-available video server, a highly-available Web server, and a distributed checkpointing system. Also, we describe a commercial product, Rainwall, built with the RAIN technology
Security versus Reliability Analysis of Opportunistic Relaying
Physical-layer security is emerging as a promising paradigm of securing
wireless communications against eavesdropping between legitimate users, when
the main link spanning from source to destination has better propagation
conditions than the wiretap link from source to eavesdropper. In this paper, we
identify and analyze the tradeoffs between the security and reliability of
wireless communications in the presence of eavesdropping attacks. Typically,
the reliability of the main link can be improved by increasing the source's
transmit power (or decreasing its date rate) to reduce the outage probability,
which unfortunately increases the risk that an eavesdropper succeeds in
intercepting the source message through the wiretap link, since the outage
probability of the wiretap link also decreases when a higher transmit power (or
lower date rate) is used. We characterize the security-reliability tradeoffs
(SRT) of conventional direct transmission from source to destination in the
presence of an eavesdropper, where the security and reliability are quantified
in terms of the intercept probability by an eavesdropper and the outage
probability experienced at the destination, respectively. In order to improve
the SRT, we then propose opportunistic relay selection (ORS) and quantify the
attainable SRT improvement upon increasing the number of relays. It is shown
that given the maximum tolerable intercept probability, the outage probability
of our ORS scheme approaches zero for , where is the number
of relays. Conversely, given the maximum tolerable outage probability, the
intercept probability of our ORS scheme tends to zero for .Comment: 9 pages. IEEE Transactions on Vehicular Technology, 201
Development of a building information modelling (BIM) migration path model for construction professionals
The construction professionals have the notion that by implementing Building
Information Modelling (BIM) in construction could overcome problems such as delay,
cost overrun, clashes in project design and undesirable quality in construction.
However, they failed to take the advantages of the BIM benefit as they are still trying
to find the best way to take on board the BIM into current practices. Most of the
professionals do not know ‘when’ and ‘how’ to apply BIM throughout the construction
lifecycle. Several research models related to BIM has been developed to improve and
encourage BIM implementation. Nevertheless, the developed models have limitations
in highlighting the steps involved that could assist the construction professionals in
implementing BIM effectively in Malaysia. Therefore, this research is aimed to
develop a model that would be able to assist Malaysian construction professionals in
implementing BIM in a structured way. A semi-structured interview was carried out
with respondents that have various experienced and currently involved in BIM projects
in the Malaysian construction industry. Findings show that the construction
professionals are lacking in knowledge and experience in using BIM in various stages
of construction. Thus, they were unable to fully capitalise the benefit of 3D models.
Migration path model was proposed and evaluated as a strategic approach for BIM
implementation in the Malaysian construction industry. The identification of five (5)
activities (BIM Awareness, Develop BIM Strategy, Implement BIM, Monitor BIM
and Expand BIM Implementation) with the three (3) enablers (BIM work contract,
BIM work process and BIM technology) in the model is expected to be able to assist
construction professionals to implement BIM with the right BIM concept and later, the
benefit could be obtained for improving construction project. The proposed model
could be as a guideline for construction professionals in implementing BIM,
specifically in countries that new in BIM. The model is also expected to be able to fill
the gap in BIM implementation by supporting the initiatives by the Malaysian
government for increasing productivity in construction projects by using new
technology like BIM
Mobile object location discovery in unpredictable environments
Emerging mobile and ubiquitous computing environments present hard challenges to software engineering. The use of mobile code has been suggested as a natural fit for simplifing software development for these environments. However, the task of discovering mobile code location becomes a problem in unpredictable environments when using existing strategies, designed with fixed and relatively stable networks in mind. This paper introduces AMOS, a mobile code platform augmented with a structured overlay network. We demonstrate how the location discovery strategy of AMOS has better reliability and scalability properties than existing approaches, with minimal communication overhead. Finally, we demonstrate how AMOS can provide autonomous distribution of effort fairly throughout a network using probabilistic methods that requires no global knowledge of host capabilities
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
A novel DSM philosophy for building integrated renewable systems
This paper presents an overview of a novel concept in IT network design and power control focused on matching building integrated renewable power generation with local demands. It describes how this is achieved through combination of energy demand reduction and dynamic utilisation of embedded energy storage in a robust, efficient and cost effective manner. A brief overview of the main features of the design is given in terms of its intended benefits as an integrated system. The load components and distribution topology are described for this experimental system within the limits set by the capacity, capabilities and desired function of the network. Power supply to the network is described as including a back-up source to the photovoltaic (PV) source to add functionality and stability with no requirements for undesirable exporting of excess PV generation. The necessary configuration of the renewable array integrating with the network is also highlighted with an example compatible solar module device. A trial of the technology and demand management control in a high profile office building is described. This trial in a live working environment is providing invaluable real world data to compare against modelling and network simulation results
- …