246 research outputs found

    Architectures for Future Media Internet

    Get PDF
    Among the major reasons for the success of the Internet have been the simple networking architecture and the IP interoperation layer. However, the traffic model has recently changed. More and more applications (e.g. peerto-peer, content delivery networks) target on the content that they deliver rather than on the addresses of the servers who (originally) published/hosted that content. This trend has motivated a number of content-oriented networking studies. In this paper we summarize some the most important approache

    Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Get PDF
    Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN), which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks

    Proposta 3GPP de indicadores de desempenho de rede - R4 CS Core Network

    Get PDF
    Mestrado em Engenharia Electrónica e TelecomunicaçõesO mercado de telecomunicações tem vindo a tornar-se cada vez mais competitivo e agressivo devido à diminuição das margens dos operadores de telecomunicações. Este facto é igualmente relevante no mercado das redes móveis em que este trabalho se foca. A maior parte dos actuais mercados de redes móveis pauta-se por uma consolidação da sua base instalada e por uma optimização dos recursos existentes. Por uma questão de estratégia comercial e técnica (não dependência de um único fornecedor) é frequente os operadores de redes móveis terem mais do que um fornecedor de equipamentos de telecomunicações para a sua rede. Devido a este facto, os problemas das redes com multi-fabricantes agudizou-se o que levou à premente necessidade de se arranjar uma linguagem comum através da qual se consiga ter uma ideia do nível global de desempenho alcançado e dos pontos críticos em que a rede pode melhorar o seu desempenho. É nesta problemática que o presente trabalho se foca. Neste momento, o 3GPP tem definidos uma quantidade vasta de indicadores de desempenho de rede para a área Circuit Switch (CS) Core Network (CN) mas ainda não tem definidos os seus Key Performance Indicators (KPIs). Tendo como base os indicadores de desempenho 3GPP existentes, esta Dissertação propõe um conjunto de KPIs que possibilitam a análise do desempenho da rede Core Network ao nível da sua parte CS. Esta Dissertação apresenta as propostas de KPIs para a rede CS, as quais estão divididas em três partes. Numa primeira parte são apresentados os KPIs relativos ao MSC Server (MSS) ao nível da análise de acessibilidade, utilização e mobilidade. Na segunda secção são apresentados os KPIs relativos ao Media Gateway (MGW) ao nível da análise de acessibilidade, integridade e utilização. Finalmente na terceira e última secção apresentam-se os KPIs associados ao HLR.The telecommunications market has become increasingly competitive and aggressive due to the decreasing margins of telecom operators. This fact is also relevant in the mobile networks market in which this Thesis is focused. Most of today's mobile networks is guided by a consolidation of its installed base and by optimizing existing resources. As a matter of business strategy and technique (not dependent on one supplier) it is common for the mobile network operators to have more than one telecommunications equipment supplier. Due to this, the problems of multi-vendor networks has worsened leading to the urgent need to find a common language that everyone speaks and, through which, can get an idea of overall performance level achieved and critical points where the network can improve its performance. This paper is focused on this issue. Currently, 3GPP has defined a wide range of network performance indicators for the Core Network (CN) Circuit Switch (CS) area but, nothing is yet set in what Key Performance Indicators (KPIs) is concerned. The purpose of this Thesis is, based on already existent 3GPP performance indicators, recommend a set of KPIs to enable the CS CN performance analysis. This Thesis present the CS KPI proposals which are divided in three main parts. In the first part, are presented the MSC Server (MSS) KPIs at accessibility analysis, usage and mobility levels. In the second part are presented the Media Gateway (MGW) related KPIs at accessibility analysis, integrity and usage levels. Finally we have the third and last part where the HLR related KPIs are presented

    Agents and Service-Oriented Computing for Autonomic Computing: A Research Agenda

    Get PDF
    Autonomic computing is the solution proposed to cope with the complexity of today\u27s computing environments. Self-management, an important element of autonomic computing, is also characteristic of single and multiagent systems, as well as systems based on service-oriented architectures. Combining these technologies can be profitable for all - in particular, for the development of autonomic computing systems

    Security and privacy issues of physical objects in the IoT: Challenges and opportunities

    Get PDF
    In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out

    Helena

    Get PDF
    Ensemble-based systems are software-intensive systems consisting of large numbers of components which can dynamically form goal-oriented communication groups. The goal of an ensemble is usually achieved through interaction of some components, but the contributing components may simultaneously participate in several collaborations. With standard component-based techniques, such systems can only be described by a complex model specifying all ensembles and participants at the same time. Thus, ensemble-based systems lack a development methodology which particularly addresses the dynamic formation and concurrency of ensembles as well as transparency of participants. This thesis proposes the Helena development methodology. It slices an ensemble-based system in two dimensions: Each kind of ensemble is considered separately. This allows the developer to focus on the relevant parts of the system only and abstract away those parts which are non-essential to the current ensemble. Furthermore, an ensemble itself is not defined solely in terms of participating components, but in terms of roles which components adopt in that ensemble. A role is the logical entity needed to contribute to the ensemble while a component provides the technical functionalities to actually execute a role. By simultaneously adopting several roles, a component can concurrently participate in several ensembles. Helena addresses the particular challenges of ensemble-based systems in the main development phases: The domain of an ensemble-based system is described as an ensemble structure of roles built on top of a component-based platform. Based on the ensemble structure, the goals of ensembles are specified as linear temporal logic formulae. With these goals in mind, the dynamic behavior of the system is designed as a set of role behaviors. To show that the ensemble participants actually achieve the global goals of the ensemble by collaboratively executing the specified behaviors, the Helena model is verified against its goals with the model-checker Spin. For that, we provide a translation of Helena models to Promela, the input language of Spin, which is proven semantically correct for a kernel part of Helena. Finally, we provide the Java framework jHelena which realizes all Helena concepts in Java. By implementing a Helena model with this framework, Helena models can be executed according to the formal Helena semantics. To support all activities of the Helena development methodology, we provide the Helena workbench as a tool for specification and automated verification and code generation. The general applicability of Helena is backed by a case study of a larger software system, the Science Cloud Platform. Helena is able to capture, verify and implement the main characteristics of the system. Looking at Helena from a different angle shows that the Helena idea of roles is also well-suited to realize adaptive systems changing their behavioral modes based on perceptions. We extend the Helena development methodology to adaptive systems and illustrate its applicability at an adaptive robotic search-and-rescue example

    Machine Learning Algorithms in Cloud Manufacturing - A Review

    Get PDF
    Cloud computing has advanced significantly in terms of storage, QoS, online service availability, and integration with conventional business models and procedures. The traditional manufacturing firm becomes Cloud Manufacturing when Cloud Services are integrated into the present production process. The capabilities of Cloud Manufacturing are enhanced by Machine Learning. A lot of machine learning algorithms provide the user with the desired outcomes. The main objectives are to learn more about the architecture and analysis of Cloud Manufacturing frameworks and the role that machine learning algorithms play in cloud computing in general and Cloud Manufacturing specifically. Machine learning techniques like SVM, Genetic Algorithm, Ant Colony Optimisation techniques, and variants are employed in a cloud environment

    View on 5G Architecture: Version 2.0

    Get PDF
    The 5G Architecture Working Group as part of the 5GPPP Initiative is looking at capturing novel trends and key technological enablers for the realization of the 5G architecture. It also targets at presenting in a harmonized way the architectural concepts developed in various projects and initiatives (not limited to 5GPPP projects only) so as to provide a consolidated view on the technical directions for the architecture design in the 5G era. The first version of the white paper was released in July 2016, which captured novel trends and key technological enablers for the realization of the 5G architecture vision along with harmonized architectural concepts from 5GPPP Phase 1 projects and initiatives. Capitalizing on the architectural vision and framework set by the first version of the white paper, this Version 2.0 of the white paper presents the latest findings and analyses with a particular focus on the concept evaluations, and accordingly it presents the consolidated overall architecture design
    • …
    corecore