419 research outputs found

    Introduction to the special section on dependable network computing

    Get PDF
    Dependable network computing is becoming a key part of our daily economic and social life. Every day, millions of users and businesses are utilizing the Internet infrastructure for real-time electronic commerce transactions, scheduling important events, and building relationships. While network traffic and the number of users are rapidly growing, the mean-time between failures (MTTF) is surprisingly short; according to recent studies, in the majority of Internet backbone paths, the MTTF is 28 days. This leads to a strong requirement for highly dependable networks, servers, and software systems. The challenge is to build interconnected systems, based on available technology, that are inexpensive, accessible, scalable, and dependable. This special section provides insights into a number of these exciting challenges

    Abstract — Wireless Multimedia Sensor Networks

    Get PDF
    (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion of energy is consumed due to communications. Many routing protocols have been proposed for WMSN. The design of more efficient protocols in terms of energy awareness, video packet scheduling and QoS in terms of checkpoint arrangement still remains a challenge. This paper proposes the actuation of sensor on demand basis and routing protocol based on cost function which efficiently utilizes the network resources such as the intermediate nodes energy and load. Cost function is introduced to improve the route selection and control congestion. Simulation results, using the NS-2 simulator show that the proposed protocol prolongs the network lifetime, increase the reliability and decrease the network load

    Voice Quality of VoIP in High Availability Environment

    Get PDF
    The development of telecommunication technology specified the Internet Protocol (IP) based technology for the next generation network. Voice over Internet Protocol (VoIP) has been introduced to overcome future telephony demand. However, these rapid changes encountered some issues, and the most critical is how to provide the services availability and reliability equally to circuit based telephony. Virtualization is widely used not only for hardware efficiency and maintenance, but also for High Availability support. Virtualized environment provides the ability among servers to migrate or replicate into another machine, even when they are running their services, which is known as Live Migration. In this paper, the voice quality of VoIP service when running on the High Availability system in virtualized environment is studied and examined. The objective analysis by using quality of services (QoS) attributes is conducted as well as the subjective analysis using Mean Opinion Score (MOS). The work utilizes Xen® Hypervisor with modified Remus extensions to provide the High Availability environment. Remus approach using checkpoint based is deployed to copy the primary server to the backup server. A range of 40ms – 900ms has been applied as time interval of checkpoint. The results show that the mean jitter is 9,98 ms, packet loss 3,12% and MOS 3.61 for Remus 400ms checkpoint. MOS with different checkpoint time interval is also presented

    Evaluating and improving firewalls for ip-telephony environments

    Get PDF
    Firewalls are a well established security mechanism for providing access control and auditing at the borders between different administrative network domains. Their basic architecture, techniques and operation modes did not change fundamentally during the last years. On the other side new challenges emerge rapidly when new innovative application domains have to be supported. IP-Telephony applications are considered to have a huge economic potential in the near future. For their widespread acceptance and thereby their economic success they must cope with established security policies. Existing firewalls face immense problems here, if they - as it still happens quite often - try to handle the new challenges in a way they did with "traditional applications". As we will show in this paper, IP-Telephony applications differ from those in many aspects, which makes such an approach quite inadequate. After identifying and characterizing the problems we therefore describe and evaluate a more appropriate approach. The feasibility of our architecture will be shown. It forms the basis of a prototype implementation, that we are currently working on

    Mobility Schemes for future networks based on the IMS

    Get PDF

    Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication

    Get PDF
    The high pace emergence in wireless technologies have given rise to an immense demand towards Quality of Service (QoS) aware multimedia data transmission over mobile wireless multimedia sensor network (WMSN). Ensuring reliable communication over WMSN while fulfilling timely and optimal packet delivery over WMSN can be of great significance for emerging IoT ecosystem. With these motivations, in this paper a highly robust and efficient cross layered routing protocol named network condition aware mobile-WMSN routing protocol (NCAM-RP) has been developed. NCAM-RP introduces a proactive neighbour table management, congestion awareness, packet velocity estimation, dynamic link quality estimation (DLQE), and deadline sensitive service differentiation based multimedia traffic prioritization, and multi-constraints based best forwarding node selection mechanisms. These optimization measures have been applied on network layer, MAC layer and the physical layer of the protocol stack that eventually strengthen NCAM-RP to enable QoS-aware multimedia data transmission over WMSNs. The proposed NCAM-RP protocol intends to optimize real time mission critical (even driven) multimedia data (RTMD) transmission while ensuring best feasible resource allocation to the non-real time (NRT) data traffic over WMSNs. NCAM-RP has outperform RPAR based routing scheme in terms of higher data delivery, lower packet drops and deadline miss ratio. It signifies that NCAM-RP can ensure minimal retransmission that eventually can reduce energy consumption, delay and computational overheads. Being the mobility based WMSN protocol, NCAM-RP can play significant role in IoT ecosystem

    Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short Term Memory and Autoencoder

    Full text link
    Currently, the wide spreading of real-time applications such as VoIP and videos-based applications require more data rates and reduced latency to ensure better quality of service (QoS). A well-designed traffic classification mechanism plays a major role for good QoS provision and network security verification. Port-based approaches and deep packet inspections (DPI) techniques have been used to classify and analyze network traffic flows. However, none of these methods can cope with the rapid growth of network traffic due to the increasing number of Internet users and the growth of real time applications. As a result, these methods lead to network congestion, resulting in packet loss, delay and inadequate QoS delivery. Recently, a deep learning approach has been explored to address the time-consumption and impracticality gaps of the above methods and maintain existing and future traffics of real-time applications. The aim of this research is then to design a dynamic traffic classifier that can detect elephant flows to prevent network congestion. Thus, we are motivated to provide efficient bandwidth and fast transmision requirements to many Internet users using SDN capability and the potential of Deep Learning. Specifically, DNN, CNN, LSTM and Deep autoencoder are used to build elephant detection models that achieve an average accuracy of 99.12%, 98.17%, and 98.78%, respectively. Deep autoencoder is also one of the promising algorithms that does not require human class labeler. It achieves an accuracy of 97.95% with a loss of 0.13 . Since the loss value is closer to zero, the performance of the model is good. Therefore, the study has a great importance to Internet service providers, Internet subscribers, as well as for future researchers in this area.Comment: 27 page
    • …
    corecore