7 research outputs found
A Survey on IoT Fog Resource Monetization and Deployment Models
There has been an immense growth in the number of applications of devices using the Internet of Things (IoT). Fog nodes (FN) are used between IoT devices and cloud computing in fog computing (FC) architecture. Indeed, an IoT application can be fully serviced by local fog servers without propagating IoT data into the cloud core network. FC extends the cloud-computing paradigm to the network edge. This paper surveys fog resources monetization and the wide use of IoT devices in making FC a paramount technology necessary to achieve real-time computation of IoT devices. We looked into the monetization architectures applied by various literature. We found that the decentralization fog monetization architecture stands out since it solves some issues posed by centralized fog monetization architecture, such as QoS and additional fee costs by third parties payment gateway
Partial periodic oscillation: an interesting phenomenon for a system of three coupled unbalanced damped Duffing oscillators with delays
In this paper, a system of two coupled damped Duffing resonators driven by a van der Pol oscillator with delays is studied. Some sufficient conditions to ensure the periodic and partial periodic oscillations for the system are established. Computer simulation is given to demonstrate our result
Recommended from our members
Utilization of Buffers for Performance Evaluation of Local Area Network Protocols
This paper discusses the performance of traffic flow over Local Area Networks (LAN) utilizing buffers to avoid any irrelevant traffic that clusters the network using sniffer pro. The study applies buffer technology to filter out unnecessary information so the system captures only required information packets. Buffers that capture the protocols are identified. These are. Address Resolution Protocols (ARP), Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). The study identified to the user/analyzer of an Ethernet technology, how to isolate a cluster network problem, monitor network performance, and offer tips on how to correctly assess and fix network problems. The study provides detailed analysis of threshold gauges, errors, broadcasts, multicasts, packets, and many other facets of dashboard graph configurations thereby ensuring a successful network analysis. The study concludes by providing solutions to poor network performance affecting one user, several users, or an entire network
The Nonconventional Network Security Measures for Intrusion Detection
Cyber-attacks such as Malware, data breaches, denial of service, phishing are proliferating. Network analytic tools such as wireshark and nmap which provide an intelligent about all the bits/frames/packets/data traversing network information are essentialfor Cyber Security. This paper studies the advantages the packet sniffing as well as the security scanner and the command promptfor the analysis of a network for security purposes. We demonstrate methods that can be taken to detect possible unwanted orforeign devices within the network, despite sniffing softwareās not truly being designed for security measures
VoDSL Information Management for Broadband Communication Network Access
This paper presents the information management of voice over digital subscriber line (VoDSL) network architecture with implications for broadband access technology. A baseline test for the ability to support up to eight derived lines on the integrated access device (IAD) for VoDSL by using voice quality transmission with voice compression while countinously downloading file is discussed. We also present a fixed wireline network test for the broadband access evolution using VoDSL technology, which allows service providers to offer multiple telephone lines over a single subscriber access line in addition to high-speed data transmission services. The design of an experimental VoDSL network architecture is presented. We identify the number of supported derived lines in the voice gateway and IAD based on a variety of speeds and standards for digital subscriber line (DSL). The novel results are presented in this paper