{"title":"Designing and Implementing an Embedded Linux for Limited Resource Devices","authors":"H. Lyytinen, Keijo Haataja, Pekka J. Toivanen","doi":"10.1109/ICN.2009.27","DOIUrl":"https://doi.org/10.1109/ICN.2009.27","url":null,"abstract":"In this paper, the implementation details of an embedded Linux for limited resource devices are provided. Due to lack of an actual hardware to test the implemented embedded Linux, a simulator for development work had to be built. Thus, the implementation details of the simulator as well as an analysis of simulation results are described. Moreover, some new ideas that will be used in our future research work are proposed.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Monte Carlo Simulation in Grid Computing Systems for Reliability Estimation","authors":"Ehsan Gholami, A. Rahmani, A. Navin","doi":"10.1109/ICN.2009.60","DOIUrl":"https://doi.org/10.1109/ICN.2009.60","url":null,"abstract":"Grid Computing Systems (GCS) have been suggested as an effective technology in geographically distributed resource coupling for applications that require large space for computations and resources. Reliability has proved to be one of the most important criteria in grid systems. In such systems, dynamic access to the required resources is complex, and therefore achieving reliability tends to be very difficult. In this paper we propose an algorithm to estimating reliability of programs and grid system based on Monte Carlo simulation. Our suggested algorithm considers the transmission rate of data between nodes through links and processing time on nodes to estimate the reliability of involved nodes and links which requires less time and complexity for running and it is appropriate for GCS.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122534574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits","authors":"Abdelkader Lahmadi, Laurent Andrey, O. Festor","doi":"10.1109/ICN.2009.42","DOIUrl":"https://doi.org/10.1109/ICN.2009.42","url":null,"abstract":"It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitored systems, it is currently difficult to reason on both performance and scalability using ad hoc techniques. Thus, both simulation is required and analytical models based on well established techniques such as queueing theory have to be developed. In this paper we provide an analytical modeling of the behavior of the commonly used manager-agent monitoring frameworks within two scenarios: single manager-single agent and single manager-multiple agents. The two designed models enable the automation of the estimation of the scalability limit of the two types of management monitoring schemes regarding a performance metric like the monitoring delay. We validate our developed models through simulation based on parameters values obtained from the performance measurement of a life running JMX-based monitoring applications with the two scenarios.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133157036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud Computing Based Real Time Financial System","authors":"G. Fenu, S. Surcis","doi":"10.1109/ICN.2009.71","DOIUrl":"https://doi.org/10.1109/ICN.2009.71","url":null,"abstract":"The “Cloud Computing” is becoming an increasingly popular term. The new “XaaS” category of services introduced will slowly replace many types of computational resources currently used. In this perspective, grid computing, the basic element for the large scale supply of cloud services, will play a fundamental role in defining how those services will be provided. This paper is concerned with the study and preliminary design of a real time financial system based on cloud computing technologies that enable macroeconomic analysis and forecasts of the financial markets and their instruments. Cloud and Grid paradigms can generate different added values which are examined in detail in the paper. This work utilises the results obtained during the Cybersar Project managed by the COSMOLAB Consortium (Italy). The system analyzed and described herein will be implemented in the Cybersar Computational Grid by autumn 2009.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129168626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specifications of Secure and Safe Embedded System Networks","authors":"M. Svéda, R. Vrba","doi":"10.1109/ICN.2009.14","DOIUrl":"https://doi.org/10.1109/ICN.2009.14","url":null,"abstract":"The paper focuses on behavioral specifications of reactive and real-time activities of embedded system networks utilizing either structured or object-oriented approach depending on application design requirements. The design stemming from such requirements can eliminate not only behavioral and structural faults but also security and safety flaws caused by design errors. Reflecting current trends in system and software engineering, this contribution presents executable specifications and rapid prototyping using Asynchronous Specification Language for structured design, and object specifications and verifications using Class Specification Language for object-oriented design of embedded system network applications.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127222823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. Venkatasubramanian, C. H. Kwek, L. H. Liow
{"title":"An Automotive Security System for Anti-theft","authors":"Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. Venkatasubramanian, C. H. Kwek, L. H. Liow","doi":"10.1109/ICN.2009.28","DOIUrl":"https://doi.org/10.1109/ICN.2009.28","url":null,"abstract":"Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system to disable an automobile and its key auto systems through remote control when it is stolen. It hence deters thieves from committing the theft. It also effectively prevents stealing of key auto systems for re-selling by introducing four layers of security features written in the form of firmware and embedded on the Electronic Control Units (ECUs). The details of system design and implementation are described in the paper. The experimental results show that our system is feasible and the owner can securely control his vehicle within a few seconds.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Communication for Mobile Robotics and Industrial Embedded Devices","authors":"V. Srovnal, Z. Machacek, V. Srovnal","doi":"10.1109/ICN.2009.46","DOIUrl":"https://doi.org/10.1109/ICN.2009.46","url":null,"abstract":"The main objective of this paper is to show new possibilities of wireless communication for mobile robotic and industrial units in the real time. The means of using wireless communication networks based on parallel processing and data transfer for various network topologies are discussed here. We have been focusing our research on ultra low power communication chips based on frequency 2.4GHz. Furthermore we have shown procedures for creation of the network communication nodes with multiple inputs and multiple outputs. The nodes are designed as embedded mobile devices. With regards to data transfer communication there are modulation, security and protocols presented. The contribution shows similar problems that can possibly occur when we use multiple transfer sources at the same time on the close area, which is quite difficult to avoid when we design embedded devices.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Tests of the Dynamics of the Wireless Networks","authors":"J. Kadlec, R. Kuchta, R. Vrba","doi":"10.1109/ICN.2009.61","DOIUrl":"https://doi.org/10.1109/ICN.2009.61","url":null,"abstract":"Performance of the dynamics of the wireless networks is the key parameter for real-time applications. This paper is focused on the performance tests of the WLAN IEEE 802.11g. New testbed for measuring of network parameters with 10 ns resolution was developed. Three main parameters of network communication in the wireless networks are bandwidth, delay and jitter. Knowing values of those three parameters allows us to decide if the communication network is acceptable for using real-time applications or not. For our future applications of wireless networks in automation platform we need to know precisely all these parameters. Based on the measured dynamics we can select which real-time application is for this wireless network suitable. Another problem of WLANs is their vulnerability to security threads. WLANs can be secured by several security mechanisms but all of these mechanisms have negative impact to the communication speed and final network performance. We also measured impact of used encrypted communication tunnel on the WLAN performance because VPN tunnel with encryption functions is one of the possible security solutions for our future automation applications.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of AP Placement in WLAN-Based Indoor Positioning System","authors":"Oumaya Baala, You Zheng, A. Caminada","doi":"10.1109/ICN.2009.50","DOIUrl":"https://doi.org/10.1109/ICN.2009.50","url":null,"abstract":"In recent years, the indoor positioning systems using the existing wireless local area network and Location fingerprinting schemes are the most popular systems. The accuracy of the system is the most important indicator. In this paper we present some experimental results to explore different environment parameters that impact localization error.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Virtualization of High-Performance Network Interfaces","authors":"H. Fröning, Heiner Litz, U. Brüning","doi":"10.1109/ICN.2009.23","DOIUrl":"https://doi.org/10.1109/ICN.2009.23","url":null,"abstract":"The architecture of modern computing systems is getting more and more parallel, in order to exploit more of the offered parallelism by applications and to increase the system's overall performance. This includes multiple cores per processor module, multi-threading techniques and the resurgence of interest in virtual machines. In spite of this amount of parallelism the network interface is typically available only once. If the network interface is not able to exploit the offered parallelism, it becomes a bottleneck limiting the system's overall performance. To overcome this situation a new virtualization method for network interface is proposed, relying on a speculative mechanism to enqueue work requests. It offers unconstrained and parallel access without any involvement of software instances, allowing to exploit any available parallelism. For an unrestricted use the I/O interface is not modified. Modern parallel computing systems and Virtual Machine environments can be significantly improved with this new virtualization technique.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125017454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}