94 research outputs found

    Modelling network memory servers with parallel processors, break-downs and repairs.

    Get PDF
    This paper presents an analytical method for the performability evaluation of a previously reported network memory server attached to a local area network. To increase the performance and availability of the proposed system, an additional server is added to the system. Such systems are prone to failures. With this in mind, a mathematical model has been developed to analyse the performability of the proposed system with break-downs and repairs. Mean queue lengths and the probability of job losses for the LAN feeding the network memory server is calculated and presented

    Exploring a new security framework for remote patient monitoring devices

    Get PDF
    Security has been an issue of contention in healthcare. The lack of familiarity and poor implementation of security in healthcare leave the patients’ data vulnerable to attackers. The main issue is assessing how we can provide security in an RPM infrastructure. The findings in literature show there is little empirical evidence on proper implementation of security. Therefore, there is an urgent need in addressing cybersecurity issues in medical devices. Through the review of relevant literature in remote patient monitoring and use of a Microsoft threat modelling tool, we identify and explore current vulnerabilities and threats in IEEE 11073 standard devices to propose a new security framework for remote patient monitoring devices. Additionally, current RPM devices have a limitation on the number of people who can share a single device, therefore, we propose the use of NFC for identification in Remote Patient Monitoring (RPM) devices for multi-user environments where we have multiple people sharing a single device to reduce errors associated with incorrect user identification. We finally show how several techniques have been used to build the proposed framewor

    Developing an implementation framework for the future internet using the Y-Comm architecture, SDN and NFV

    Get PDF
    The Future Internet will provide seamless connectivity via heterogeneous networks. The Y-Comm Architecture is a reference model that has been developed to build future mobile systems for heterogeneous environments. However, the emergence of Software Defined Networking and Network Functional Virtualization will allow the implementation of advanced mobile architectures such as Y-Comm to be prototyped and explored in more detail. This paper proposes an implementation model for the Y-Comm architecture based on these mechanisms. A key component is the design of the Core Endpoint which connects various peripheral wireless networks to the core network. This paper also proposes the development of a Network Management Control Protocol which allows the management routines running in the Cloud to control the underlying networking infrastructure. The system being proposed is flexible and modular and will allow current and future wireless technologies to be seamlessly integrated into the overall system

    Supporting communication in information centric networks using the location/ID split protocol and time released caching

    Get PDF
    The vast majority of current Internet usage is data retrieval and information exchange. As a result, the focus has been shifted from the current location-based system to an Information-Centric system, where information can be cached and accessed from anywhere within the network rather than from the end hosts only. To support this functionality, data must be uniquely identified regardless of the location. Current research efforts in the area of Information-Centric Networks presume the existence of a Convergence Layer protocol that facilitates the functionalities of forwarding, while data caching takes place on a higher-plane. Therefore, this paper proposes a convergence layer protocol, based on the Location/ID Separation Protocol which uses two numbering spaces for data. Unlike other Information Centric architectures in the literature, the proposed approach introduces new procedures to deal with in-network data caching and forwarding separately

    Exploring a new security framework for cloud storage using capabilities

    Get PDF
    We are seeing the deployment of new types of networks such as sensor networks for environmental and infrastructural monitoring, social networks such as facebook, and e-Health networks for patient monitoring. These networks are producing large amounts of data that need to be stored, processed and analysed. Cloud technology is being used to meet these challenges. However, a key issue is how to provide security for data stored in the Cloud. This paper addresses this issue in two ways. It first proposes a new security framework for Cloud security which deals with all the major system entities. Secondly, it introduces a Capability ID system based on modified IPv6 addressing which can be used to implement a security framework for Cloud storage. The paper then shows how these techniques are being used to build an e-Health system for patient monitoring

    A QoS-based flow assignment for traffic engineering in software-defined networks

    Get PDF
    In order to meet a tremendous amount of data storage requirement in next-generation wireless networks, an increasing number of cloud data centers has been deployed around the world. The underlying core networks are expected to provide the ability to store data in a dynamic and scalable computing environment. The traditional Internet Protocol (IP) has shown to be restricted due to its static architecture, which accordingly motivates the development of Software-Defined Networks (SDNs). In the SDNs, Traffic Engineering (TE) is simpler and programmable with a controller without the requirement of reconfiguration for all network devices. However, the existing TE algorithm of the SDNs rejects a number of requested flows caused by their undetermined routing paths where only flow bandwidth is considered in path determination. This paper proposes a Quality-of-Service (QoS) based Flow Assignment algorithm which enables the computation of end-to-end path for traffic flows guaranteeing the QoS requirements including bandwidth, end-to-end delay and packet loss probability. Through the Open Source Hybrid IP/SDNs platform, the proposed algorithm is validated and shown to significantly reduce flow rejection rate of up to 50% compared to the conventional approach, and therefore can be used to implement an effective DiffServ mechanism for flow allocation in the SDNs

    A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks

    Get PDF
    As one of the most reliable technologies, network intrusion detection system (NIDS) allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this paper investigates the experimental performance of Snort-based NIDS (S-NIDS) in a practical network with the latest technology in various network scenarios including high data speed and/or heavy traffic and/or large packet size. An effective testbed is designed based on Snort using different muti-core processors, e.g., i5 and i7, with different operating systems, e.g., Windows 7, Windows Server and Linux. Furthermore, considering an enterprise network consisting of multiple virtual local area networks (VLANs), a centralised parallel S-NIDS (CPS-NIDS) is proposed with the support of a centralised database server to deal with high data speed and heavy traffic. Experimental evaluation is carried out for each network configuration to evaluate the performance of the S-NIDS in different network scenarios as well as validating the effectiveness of the proposed CPS-NIDS. In particular, by analysing packet analysis efficiency, an improved performance of up to 10% is shown to be achieved with Linux over other operating systems, while up to 8% of improved performance can be achieved with i7 over i5 processors

    A smart sensor grid to enhance irrigation techniques in Jordan using a novel event-based routing protocol

    Get PDF
    Due to rapid changes in climatic conditions worldwide, environmental monitoring has become one of the greatest concerns in the last few years. With the advancement in wireless sensing technology, it is now possible to monitor and track fine-grained changes in harsh outdoor environments. Wireless sensor networks (WSN) provide very high quality and accurate analysis for monitoring of both spatial and temporal data, thus providing the opportunity to monitor harsh outdoor environments. However, to deploy and maintain a WSN in such harsh environments is a great challenge for researchers and scientists. Several routing protocols exist for data dissemination and power management but they suffer from various disadvantages. In our case study, there are very limited water resources in the Middle East, hence soil moisture measurements must be taken into account to manage irrigation and Đ°griculturĐ°l projects. In order to meet these challenges, a Smart Grid that supports a robust, reactive, event-based routing protocol is developed using Ad hoc On-Demand Multipath Distance Vector (AOMDV) as a starting point. A prototype WSN network of 5 nodes is built and a detailed simulation of 30 nodes is also developed to test the scalability of the new system
    • …
    corecore