60 research outputs found

    Implementation of QoS onto virtual bus network

    Get PDF
    Quality of Service (QoS) is a key issue in a multimedia environment because multimedia applications are sensitive to delay. The virtual bus architecture is a hierarchical access network structure that has been proposed to simplify network signaling. The network employs an interconnection of hierarchical database to support advanced routing of the signaling and traffic load. Therefore, the requirements and management of quality of service is important in the virtual bus network particularly to support multimedia applications. QoS and traffic parameters are specified for each class type and the OMNeT model has been described

    Flooding Distributed Denial of Service Attacks-A Review

    Get PDF
    Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution

    Flooding Distributed Denial of Service Attacks-A Review

    Get PDF
    Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution

    Pendekatan Service-Learning dalam Kursus Kemahiran Insaniah: transformasi positif dalam kalangan pelajar perubatan UKM-UNPAD

    Get PDF
    Artikel ini bertujuan untuk melihat tahap keberkesanan pendekatan pembelajaran melalui kaedah Service- Learning (SL) berjaya dalam pembangunan Kemahiran insaniah (KI) pelajar secara langsung. Ia menganalisa dan menghuraikan pemupukan nilai kebertanggungjawaban di kalangan 37 orang pelajar Fakulti Perubatan UKM-UNPAD setelah selesai melengkapi keperluan Kursus KI. Dapatan dianalisis melalui pendekatan kualitatif dengan menghimpunkan perancangan, laporan aktiviti dan refleksi berstruktur yang dihasilkan oleh pelajar. Dapatan menunjukkan terdapat impak dan transformasi yang positif dalam konteks pembelajaran bermakna dan pembangunan diri para peserta melalui pendekatan SL terutama pemupukan nilai kebertanggungjawapan sosial yang merupakan salah satu atribut dan elemen penting yang ingin dicapai dalam aspek KI pelajar

    Denial of Service Attack over Secure Neighbor Discovery (SeND)

    Get PDF
    IPv6, the Internet Protocol suite version 6, uses a Neighbor Discovery Protocol (NDP). NDP mainly replaces router discovery and the Address Resolution Protocol (ARP) and thereafter redirects the functions used in IPv4 i.e. the Internet Protocol suite version 4. The NDP system is a stateless protocol since it does not need the dynamic host’s configuration protocol server to enable the various IPv6 nodes for determining the connected hosts along with the IPv6 network routers. To add layers of protection to NDP, the SeND (Secure Neighbor Discovery) extension was developed, which provides router authorization, proof of address ownership, and message protection for the protocol. SeND employs CGAs (Cryptographically Generated Addresses) and X.509 certificates. Despite its many advantages, deploying SeND is not easy, and it is still vulnerable to certain DoS (Denial-of-Service) attacks. The components of SeND and its responses to NDP threats are further elaborated in this paper. In addition, an overview of the implementation of SeND, its limitations, existing vulnerabilities, and current deployment challenges are also presented.  Furthermore, to test the performance of SeND under a DoS attack, a test bed was implemented and the results discussed.

    Simulation tool for active learning of introductory computer network subjects

    Get PDF
    Abstract— Simulation software helps a learner of networking subject to have an active learning experience. There are many simulator tools available either freely or off the shelf. Hence, simulation tools need to be carefully chosen to maximize the benefit to the learners. In order to choose simulation tools, comparison is made from a number of simulation tools that are easily available for the public. The comparison made to the tools produce a recommendation of which tool is to be chosen in different study environments. Keywords- computer networks, computer aided instruction, computer science education, electronic learning, network topology, hardware virtualization, next generation networkin

    Simulation tool for active learning of introductory computer network subjects

    Get PDF
    Simulation software helps a learner of networking subject to have an active learning experience. There are many simulator tools available either freely or off the shelf. Hence, simulation tools need to be carefully chosen to maximize the benefit to the learners. In order to choose simulation tools, comparison is made from a number of simulation tools that are easily available for the public. The comparison made to the tools produce a recommendation of which tool is to be chosen in different study environments

    A Study On Protocol Stack In 6lowpan Model

    Get PDF
    Due to recent advances of heterogeneous network and the emergence of Internet of Things (IoT), wireless personal area networks including wireless sensor networks are assumed to be part of the huge heterogeneous network. This calls for a smooth integration between the higher network layer protocols Internet Protocol version 6 (IPv6) and the lower media access control (MAC) layer protocol IEEE 802.15.4. IEEE 802.15.4 is a standard that specifies the physical layer and MAC layer for Wireless Personal Area Network (WPAN). This standard is suited for Low-Rate Wireless Personal Area Networks (LR-WPANs), a constrained network of tiny, low power, low rate, small size memory with low computation and communication capabilities. However, IPv6 is forming the backbone of the desired heterogeneous network. Direct integration between IPv6 and IEEE 802.15.4 lower network layers is not possible. Hence, latest technology development is the transmission of IPv6 packets over Low-power Wireless Personal Area Networks (6LoWPAN). This has enforced some modification to the existing protocol stack and introduced the 6LoWPAN protocol stack. The 6LoWPAN protocol stack involves 802.15.4 physical (PHY) and Medium Access Control (MAC) layer, 6LoWPAN adaptation layer, network layer, transport layer and application layer with specific 6LoWPAN application. This review paper describes all layers in 6LoWPAN protocol stack including its routing protocols, namely the Route-over and Mesh-under. These routing schemes are applied in 6LoWPAN adaptation layer and network layer

    Robust Schemes to Enhance Energy Consumption Efficiency for Millimeter Wave-Based Microcellular Network in Congested Urban Environments

    Get PDF
    Future wireless communication networks will be largely characterized by small cell deployments, typically on the order of 200 meters of radius/cell, at most. Meanwhile, recent studies show that base stations (BS) account for about 80 to 95 % of the total network power. This simply implies that more energy will be consumed in the future wireless network since small cell means massive deployment of BS. This phenomenon makes energy-efficient (EE) control a central issue of critical consideration in the design of future wireless networks. This paper proposes and investigates (the performance of) two different energy-saving approaches namely, adaptive-sleep sectorization (AS), adaptive hybrid partitioning schemes (AH) for small cellular networks using smart antenna technique. We formulated a generic base-model for the above-mentioned schemes and applied the spatial Poisson process to reduce the system complexity and to improve flexibility in the beam angle reconfiguration of the adaptive antenna, also known as a smart antenna (SA). The SA uses the scalable algorithms to track active users in different segments/sectors of the microcell, making the proposed schemes capable of targeting specific users or groups of users in periods of sparse traffic, and capable of performing optimally when the network is highly congested. The capabilities of the proposed smart/adaptive antenna approaches can be easily adapted and integrated into the massive MIMO for future deployment. Rigorous numerical analysis at different orders of sectorization shows that among the proposed schemes, the AH strategy outperforms the AS in terms of energy saving by about 52 %. Generally, the proposed schemes have demonstrated the ability to significantly increase the power consumption efficiency of micro base stations for future generation cellular systems, over the traditional design methodologies

    A Survey on Trend and Classification of Internet of Things Reviews

    Get PDF
    The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network. This vision includes the adaptation of secure mobile networks, anytime, anywhere, by anyone or anything with new intelligent applications and services. Many efforts have been made to review the literature related to the IoT for the benefit of IoT development. However, many issues need to be addressed to overtake the full potential of the IoT. Therefore, this paper aims to classify and standardize IoT research areas by considering review papers that were published between 2010 and 2019. This paper analyzes a total of 95 related reviews, which were manually selected from databases based on 6 chosen areas. This paper presents the trends and classification of IoT reviews based on 6 research areas, namely, application, architecture, communication, challenges, technology, and security. IoT communication research has been dominating the trends with 21% of total reviews and more than 100% research growth in the last 10 years. Hence, this paper can provide useful insights into specific emerging areas of IoT to assist future research
    • …
    corecore