7 research outputs found

    A Survey on IoT Fog Resource Monetization and Deployment Models

    Get PDF
    There has been an immense growth in the number of applications of devices using the Internet of Things (IoT). Fog nodes (FN) are used between IoT devices and cloud computing in fog computing (FC) architecture. Indeed, an IoT application can be fully serviced by local fog servers without propagating IoT data into the cloud core network. FC extends the cloud-computing paradigm to the network edge. This paper surveys fog resources monetization and the wide use of IoT devices in making FC a paramount technology necessary to achieve real-time computation of IoT devices. We looked into the monetization architectures applied by various literature. We found that the decentralization fog monetization architecture stands out since it solves some issues posed by centralized fog monetization architecture, such as QoS and additional fee costs by third parties payment gateway

    Partial periodic oscillation: an interesting phenomenon for a system of three coupled unbalanced damped Duffing oscillators with delays

    Get PDF
    In this paper, a system of two coupled damped Duffing resonators driven by a van der Pol oscillator with delays is studied. Some sufficient conditions to ensure the periodic and partial periodic oscillations for the system are established. Computer simulation is given to demonstrate our result

    The Nonconventional Network Security Measures for Intrusion Detection

    No full text
    Cyber-attacks such as Malware, data breaches, denial of service, phishing are proliferating. Network analytic tools such as wireshark and nmap which provide an intelligent about all the bits/frames/packets/data traversing network information are essentialfor Cyber Security. This paper studies the advantages the packet sniffing as well as the security scanner and the command promptfor the analysis of a network for security purposes. We demonstrate methods that can be taken to detect possible unwanted orforeign devices within the network, despite sniffing softwareā€™s not truly being designed for security measures

    VoDSL Information Management for Broadband Communication Network Access

    Get PDF
    This paper presents the information management of voice over digital subscriber line (VoDSL) network architecture with implications for broadband access technology. A baseline test for the ability to support up to eight derived lines on the integrated access device (IAD) for VoDSL by using voice quality transmission with voice compression while countinously downloading file is discussed. We also present a fixed wireline network test for the broadband access evolution using VoDSL technology, which allows service providers to offer multiple telephone lines over a single subscriber access line in addition to high-speed data transmission services. The design of an experimental VoDSL network architecture is presented. We identify the number of supported derived lines in the voice gateway and IAD based on a variety of speeds and standards for digital subscriber line (DSL). The novel results are presented in this paper
    corecore