2 research outputs found

    Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach

    Get PDF
    T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, ‘‘vulnerability rules policies’’ with ‘‘rules formulation’’ from the regions of connection recognized by Euler’s theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets

    Quality-Oriented Mobility Management for Multimedia Content Delivery to Mobile Users

    Get PDF
    The heterogeneous wireless networking environment determined by the latest developments in wireless access technologies promises a high level of communication resources for mobile computational devices. Although the communication resources provided, especially referring to bandwidth, enable multimedia streaming to mobile users, maintaining a high user perceived quality is still a challenging task. The main factors which affect quality in multimedia streaming over wireless networks are mainly the error-prone nature of the wireless channels and the user mobility. These factors determine a high level of dynamics of wireless communication resources, namely variations in throughput and packet loss as well as network availability and delays in delivering the data packets. Under these conditions maintaining a high level of quality, as perceived by the user, requires a quality oriented mobility management scheme. Consequently we propose the Smooth Adaptive Soft-Handover Algorithm, a novel quality oriented handover management scheme which unlike other similar solutions, smoothly transfer the data traffic from one network to another using multiple simultaneous connections. To estimate the capacity of each connection the novel Quality of Multimedia Streaming (QMS) metric is proposed. The QMS metric aims at offering maximum flexibility and efficiency allowing the applications to fine tune the behavior of the handover algorithm. The current simulation-based performance evaluation clearly shows the better performance of the proposed Smooth Adaptive Soft-Handover Algorithm as compared with other handover solutions. The evaluation was performed in various scenarios including multiple mobile hosts performing handover simultaneously, wireless networks with variable overlapping areas, and various network congestion levels
    corecore