2 research outputs found
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
T It is quite challenging to understand the weakest single points of failure in a network because it
is the point where an entire network system can be taken down. The paths leading to a point of failure, and the
status of packets that causes network security breaches were examined by Intent-Based Networking approach
in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every
path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules,
namely, ‘‘vulnerability rules policies’’ with ‘‘rules formulation’’ from the regions of connection recognized
by Euler’s theorem were outlined. The intent is to use these sets of rules in finding the point of failure
the packet status that is leading to possible security breaches within network connections. The frequencies
of the packets that are liable to create security breaches and the paths where they originate are analyzed.
Well-formed packet originating from the least likely weak point of failure is associated the network security
breach than malformed packets. This study has contributed to revealing that network security breaches are
influenced by the paths with least likely point of failure from well-formed packets
Quality-Oriented Mobility Management for Multimedia Content Delivery to Mobile Users
The heterogeneous wireless networking environment determined by the latest developments in wireless access technologies promises a high level of communication resources for mobile
computational devices. Although the communication resources provided, especially referring to bandwidth, enable multimedia streaming to mobile users, maintaining a high user perceived quality is still a challenging task. The main factors which affect quality in multimedia streaming over wireless networks are mainly the error-prone nature of the wireless channels and the user mobility. These factors determine a high level of dynamics of wireless communication resources, namely variations in throughput and packet loss as well as network availability and delays in delivering the data packets. Under these conditions maintaining a high level of quality, as perceived by the user, requires a quality oriented mobility management scheme. Consequently we propose the Smooth Adaptive Soft-Handover Algorithm, a novel quality oriented handover management scheme which unlike other similar solutions, smoothly transfer the data traffic from one network to another using multiple simultaneous connections. To estimate the capacity of each connection the novel Quality of Multimedia Streaming (QMS) metric is proposed. The QMS metric aims at offering maximum flexibility and efficiency allowing the applications to fine tune the behavior of the handover algorithm. The current simulation-based performance evaluation clearly shows the better
performance of the proposed Smooth Adaptive Soft-Handover Algorithm as compared with other handover solutions. The evaluation was performed in various scenarios including
multiple mobile hosts performing handover simultaneously, wireless networks with variable overlapping areas, and various network congestion levels