{"title":"A Scalable Cloud Based on Commodity Hardware","authors":"Saibal K. Ghosh, D. Agrawal","doi":"10.5296/npa.v8i4.10291","DOIUrl":"https://doi.org/10.5296/npa.v8i4.10291","url":null,"abstract":"The recent explosion in the speed and connectivity of the Internet has opened up the possibility of millions and possibly billions of devices connected together. Combined with the development of small, low power devices, new paradigms in the field of computing have opened up. Traditional passive electronic devices now have rudimentary computing capabilities. The resulting Internet of Things (IoT), comprised of smart interconnected devices is improving our ability to gather ambient information and make informed decisions that directly benefit humanity. However, the ubiquity of these devices also presents an interesting scenario wherein the devices can perform limited general-purpose computations when they are not performing their primary functions. A computational task divided into a large number of smaller, micro tasks, each of which take only a few CPU cycles to complete. By distributing these tasks over a large number of devices, we can achieve a substantial amount of computation with seemingly modest devices. In this work, we explore a mechanism to enable such massively parallel computations in low powered commodity hardware devices through fine-grained task parallelism.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA","authors":"Rajan Gupta, S. K. Muttoo","doi":"10.5296/npa.v8i4.10179","DOIUrl":"https://doi.org/10.5296/npa.v8i4.10179","url":null,"abstract":"Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121257153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"T-RBAC based Multi-domain Access Control Method in Cloud","authors":"Dapeng Xiong, Liang Chen","doi":"10.5296/npa.v8i4.10411","DOIUrl":"https://doi.org/10.5296/npa.v8i4.10411","url":null,"abstract":"Access control technology protects cloud from being accessed illegal. However, traditional access control technology cannot meet the new features of the cloud environment. In order to improve the deficiency of the current multi domain access control in timeliness and flexibility. This paper put forward a dynamic access control policy on the basis of task driving idea. New method combined the advantage of RBAC and task driving model, joined with limit aging and real time strategy synthesis. Comparative trial show that new policy had an advantage in flexibility and availability of multi-domain access control model.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Tools for Underwater Sensor Networks: A Survey","authors":"Anjana P. Das, S. Thampi","doi":"10.5296/npa.v8i4.10471","DOIUrl":"https://doi.org/10.5296/npa.v8i4.10471","url":null,"abstract":"In underwater sensor network(UWSN) research, it is highly expensive to deploy a complete test bed involving complex network structure and data links to validate a network protocol or an algorithm. This practical challenge points to the need of a simulation environment which can reproduce the actual underwater scenario without the loss of generality. Since so many simulators are proposed for UWSN simulation, the selection of an appropriate tool based on the research requirement is very important in validation and interpretation of results. This paper provides an in-depth survey of different simulation tools available for UWSN simulation. We compared the features offered by each tool, pre-requirements, and provide the run time experiences of some of the open source tools. We conducted simulation of sample scenarios in some of the open source tools and compared the results. This survey helps a researcher to identify a simulation tool satisfying their specific research requirements.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumption of Energy and Routing Protocols in Wireless Sensor Network","authors":"Ridha Azizi","doi":"10.5296/npa.v8i3.10257","DOIUrl":"https://doi.org/10.5296/npa.v8i3.10257","url":null,"abstract":"Extend the life of a wireless sensor network (WSN) is a fundamental challenge, as they have a limited supply. Multiple protocols and approaches have been proposed to minimize power consumption. Routing protocols and especially the hierarchical approach is one of the techniques used to minimize energy consumption and to improve the duration of network life. In this paper we propose a new approach to transfer and select the CH (Cluster Head). ART-LEACH (Advanced Routing Transfer- Low-Energy Adaptive Clustering Hierarchy) is a self-organizing protocol based on clustering. Our approach is to use energy more evenly the selected nodes as CH. We evaluated the performance of LEACH (Low-Energy Adaptive Clustering Hierarchy) and IB-LEACH (Improved and Balanced Low Energy Adaptive Clustering Hierarchy) protocol with the proposed new approach using MATLAB as a simulation tool. The simulation results showed that our proposal provides a reduction in energy consumption and increase the duration of network life.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129896678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reliable Wireless System for Water Quality Monitoring and Level Control","authors":"Hyder Khaleeq, A. Abou-Elnour, M. Tarique","doi":"10.5296/npa.v8i3.9719","DOIUrl":"https://doi.org/10.5296/npa.v8i3.9719","url":null,"abstract":"With the ever increasing growth in population water quality monitoring has become a critical issue in the recent years. Water quality monitoring is very important for aquaculture, waste water management, drinking water treatment, water distribution system, and other environmental applications. Recently numerous researchers have been initiated to build wireless system for water quality monitoring (WSWQM). The two fold objectives of WSWQM are (a) monitoring of water quality from a remote location with minimum supervision, and (b) initiating immediate corrective actions to maintain the required water quality standard. In this paper we present a system model for WSWQM. In this system we integrate a number of sensors, transmitters, receiver, myRIO microcontroller, and IEEE 802.11 Wi-Fi technology. The sensors generate water quality data including pH, conductivity, and temperature. The real-time data are then sent wirelessly to a local control unit for analyzing, recording, and displaying. The system is also able to send alarm messages automatically to a remote management center when water quality fails to meet the required standard. In order to ensure high accuracy and reliability we use industry standard sensors and instruments to implement this system.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amine Rghioui, S. Sendra, Jaime Lloret, Abedlmajid Oumnad
{"title":"Internet of Things for Measuring Human Activities in Ambient Assisted Living and e-Health","authors":"Amine Rghioui, S. Sendra, Jaime Lloret, Abedlmajid Oumnad","doi":"10.5296/npa.v8i3.10146","DOIUrl":"https://doi.org/10.5296/npa.v8i3.10146","url":null,"abstract":"Internet of things (IoT) is a new paradigm that combines several technologies such as computers, Internet, sensor networks, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real world with digital world. Currently, a large number of smart objects and different type of devices are interconnected and more and more they are being used in Ambient Assisted Living (AAL) scenarios for improving the daily tasks of elderly and disabled people. This paper presents an IoT architecture and protocol for Ambient Assisted Living and e-health. It is designed for heterogeneous AAL and e-health scenarios where an IoT network is the most suitable option to interconnect all elements. Finally, we simulate a medium-size network with four protocols especially designed for networks with important energy constraints in order to show their performance","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"38 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of a Router Performance with IPv4 and IPv6 Traffic","authors":"N. Dobrinov, L. Parra, Laura García, Óscar Romero","doi":"10.5296/npa.v8i3.10190","DOIUrl":"https://doi.org/10.5296/npa.v8i3.10190","url":null,"abstract":"Because of the growth of the number of devices that use the internet, the number of available IPv4 addresses has run out in most parts of the world. IPv6 was created to solve this problem but the migration progress is proceeding at a slower pace that it was expected. This is mostly due to the cost of changing the equipment to one that supports IPv6 and the cost of configuring these devices. Knowing the aspects of a router configuration that are affected by the performance of IPv6 is very important in order to improve the efficiency of IPv6 end facilitate the migration process. In this paper we perform several measures to detect which aspects of the configuration of a bottom and medium range router are affected by IPv6. Two different topologies were used and different combinations of IPv4 and IPv6 traffic are sent. In different test Access Control Lists or IPv6 Routing Extension Headers are used. CPU usage and maxim traffic rate are some evaluated parameters. The router performance is clearly affected by the IPv6 traffic is used, CPU usage increases and the maximum traffic rate decreases.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rego, Laura García, Luís M. L. Oliveira, Jaime Lloret
{"title":"A New Z39.50 Protocol Client for Searching in Libraries and Research Collaboration","authors":"A. Rego, Laura García, Luís M. L. Oliveira, Jaime Lloret","doi":"10.5296/npa.v8i3.10147","DOIUrl":"https://doi.org/10.5296/npa.v8i3.10147","url":null,"abstract":"The increasing number of information available at libraries and the necessity to find a way to look for information at several libraries at the same time leaded to the creation of the Z39.50 protocol. Since it has been launched, many Z39.50 clients have been developed, but most of them only have access to a reduced number of libraries catalogues and are focused on the point of view of the library users. We present a Z39.50 client that adds new features focusing on the point of view of researchers and publishing houses. With our proposal the user can add the catalogue of any library whenever he wants in order to facilitate him the process of looking for the desired information. Our Z39.50 client shows as well the situation of the closest libraries where the results of the information searched by the user is located. Finally, we have compared our Z39.50 client with the existing ones.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115735970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Barambones, Laura García, J. M. Jiménez, Jaime Lloret
{"title":"A New Tool to Test the IP Network Performance","authors":"Carlos Barambones, Laura García, J. M. Jiménez, Jaime Lloret","doi":"10.5296/npa.v8i2.9673","DOIUrl":"https://doi.org/10.5296/npa.v8i2.9673","url":null,"abstract":"One of the main necessities in IP networks is the lack of tools to test the performance of the network when it is already implemented. Network management tools are generally used when it is required to test what happens in the network after a failure and when the administrators need to measure the amount of time it takes to recover from unexpected events. But, this solution does not allow testing the traffic that is being distributed inside of the network or to measure the exact time the network takes to recover from a failure. In this paper, we present a new tool to carry out network performance tests when it is already implemented. The displayed parameters are jitter, delay, received messages, lost messages, % of lost messages, and bandwidth. In order to test its effectiveness, we conduct a series of measurements on a real network.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}