52,198 research outputs found

    Computing in the RAIN: a reliable array of independent nodes

    Get PDF
    The RAIN project is a research collaboration between Caltech and NASA-JPL on distributed computing and data-storage systems for future spaceborne missions. The goal of the project is to identify and develop key building blocks for reliable distributed systems built with inexpensive off-the-shelf components. The RAIN platform consists of a heterogeneous cluster of computing and/or storage nodes connected via multiple interfaces to networks configured in fault-tolerant topologies. The RAIN software components run in conjunction with operating system services and standard network protocols. Through software-implemented fault tolerance, the system tolerates multiple node, link, and switch failures, with no single point of failure. The RAIN-technology has been transferred to Rainfinity, a start-up company focusing on creating clustered solutions for improving the performance and availability of Internet data centers. In this paper, we describe the following contributions: 1) fault-tolerant interconnect topologies and communication protocols providing consistent error reporting of link failures, 2) fault management techniques based on group membership, and 3) data storage schemes based on computationally efficient error-control codes. We present several proof-of-concept applications: a highly-available video server, a highly-available Web server, and a distributed checkpointing system. Also, we describe a commercial product, Rainwall, built with the RAIN technology

    Security versus Reliability Analysis of Opportunistic Relaying

    Full text link
    Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping between legitimate users, when the main link spanning from source to destination has better propagation conditions than the wiretap link from source to eavesdropper. In this paper, we identify and analyze the tradeoffs between the security and reliability of wireless communications in the presence of eavesdropping attacks. Typically, the reliability of the main link can be improved by increasing the source's transmit power (or decreasing its date rate) to reduce the outage probability, which unfortunately increases the risk that an eavesdropper succeeds in intercepting the source message through the wiretap link, since the outage probability of the wiretap link also decreases when a higher transmit power (or lower date rate) is used. We characterize the security-reliability tradeoffs (SRT) of conventional direct transmission from source to destination in the presence of an eavesdropper, where the security and reliability are quantified in terms of the intercept probability by an eavesdropper and the outage probability experienced at the destination, respectively. In order to improve the SRT, we then propose opportunistic relay selection (ORS) and quantify the attainable SRT improvement upon increasing the number of relays. It is shown that given the maximum tolerable intercept probability, the outage probability of our ORS scheme approaches zero for NN \to \infty, where NN is the number of relays. Conversely, given the maximum tolerable outage probability, the intercept probability of our ORS scheme tends to zero for NN \to \infty.Comment: 9 pages. IEEE Transactions on Vehicular Technology, 201

    Interoperability and standardisation in community telecare: a review

    Get PDF

    Development of a building information modelling (BIM) migration path model for construction professionals

    Get PDF
    The construction professionals have the notion that by implementing Building Information Modelling (BIM) in construction could overcome problems such as delay, cost overrun, clashes in project design and undesirable quality in construction. However, they failed to take the advantages of the BIM benefit as they are still trying to find the best way to take on board the BIM into current practices. Most of the professionals do not know ‘when’ and ‘how’ to apply BIM throughout the construction lifecycle. Several research models related to BIM has been developed to improve and encourage BIM implementation. Nevertheless, the developed models have limitations in highlighting the steps involved that could assist the construction professionals in implementing BIM effectively in Malaysia. Therefore, this research is aimed to develop a model that would be able to assist Malaysian construction professionals in implementing BIM in a structured way. A semi-structured interview was carried out with respondents that have various experienced and currently involved in BIM projects in the Malaysian construction industry. Findings show that the construction professionals are lacking in knowledge and experience in using BIM in various stages of construction. Thus, they were unable to fully capitalise the benefit of 3D models. Migration path model was proposed and evaluated as a strategic approach for BIM implementation in the Malaysian construction industry. The identification of five (5) activities (BIM Awareness, Develop BIM Strategy, Implement BIM, Monitor BIM and Expand BIM Implementation) with the three (3) enablers (BIM work contract, BIM work process and BIM technology) in the model is expected to be able to assist construction professionals to implement BIM with the right BIM concept and later, the benefit could be obtained for improving construction project. The proposed model could be as a guideline for construction professionals in implementing BIM, specifically in countries that new in BIM. The model is also expected to be able to fill the gap in BIM implementation by supporting the initiatives by the Malaysian government for increasing productivity in construction projects by using new technology like BIM

    Mobile object location discovery in unpredictable environments

    Get PDF
    Emerging mobile and ubiquitous computing environments present hard challenges to software engineering. The use of mobile code has been suggested as a natural fit for simplifing software development for these environments. However, the task of discovering mobile code location becomes a problem in unpredictable environments when using existing strategies, designed with fixed and relatively stable networks in mind. This paper introduces AMOS, a mobile code platform augmented with a structured overlay network. We demonstrate how the location discovery strategy of AMOS has better reliability and scalability properties than existing approaches, with minimal communication overhead. Finally, we demonstrate how AMOS can provide autonomous distribution of effort fairly throughout a network using probabilistic methods that requires no global knowledge of host capabilities

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    A novel DSM philosophy for building integrated renewable systems

    Get PDF
    This paper presents an overview of a novel concept in IT network design and power control focused on matching building integrated renewable power generation with local demands. It describes how this is achieved through combination of energy demand reduction and dynamic utilisation of embedded energy storage in a robust, efficient and cost effective manner. A brief overview of the main features of the design is given in terms of its intended benefits as an integrated system. The load components and distribution topology are described for this experimental system within the limits set by the capacity, capabilities and desired function of the network. Power supply to the network is described as including a back-up source to the photovoltaic (PV) source to add functionality and stability with no requirements for undesirable exporting of excess PV generation. The necessary configuration of the renewable array integrating with the network is also highlighted with an example compatible solar module device. A trial of the technology and demand management control in a high profile office building is described. This trial in a live working environment is providing invaluable real world data to compare against modelling and network simulation results
    corecore