A state estimation based framework for control and management of data communication networks

Author(s):  
Ghulam Abbas ◽  
Atulya K. Nagar ◽  
Hissam Tawfik ◽  
J.Y. Goulermas
2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


2014 ◽  
Vol 513-517 ◽  
pp. 772-776
Author(s):  
Chen Wang ◽  
Hong Ai ◽  
Lie Wu ◽  
Yun Yang

The smart grid that the next-generation electric power system is studied intensively as a promising solution for energy crisis. One important feature of the smart grid is the integration of high-speed, reliable and secure data communication networks to manage the complex power systems effectively and intelligently. The goal of smart grid is to achieve the security of operation, economic efficient and environmental friendly. To achieve this goal, we proposed a fine-grained access control model for smart grid. In order to improve the security of smart grid, an access-trust-degree algorithm is proposed to evaluate the reliability of the user who want to access to the smart grid.


2020 ◽  
Vol 4 (2) ◽  
pp. 147-156
Author(s):  
Zahraa Saleh ◽  
Qahhar Qadir

Mobile traffic volumes have grown exponentially because of the increase in services and applications. Traditional networks are complex to manage because the forwarding, control, and management planes are all bundled together and, thus, administrators are supposed to deploy high-level policies, as each vendor has its own configuration methods. Software-Defined Networking (SDN) is considered the future paradigm of communication networks. It decouples control logic from its underlying hardware, thereby promoting logically centralized network control and making the network more programmable and easy to configure. Low-power wireless technologies are moving toward a multitenant and multiapplication Internet of Things (IoT), which requires an architecture with scalable, reliable, and configured solutions. However, employing an SDN-based centralized architecture in the environment of a low-power wireless IoT network introduces significant challenges, such as difficult-to-control traffic, unreliable links, network contention, and high associated overheads that can significantly affect the performance of the network. This paper is a contribution toward a performance evaluation for the use of SDN in wireless networking by evaluating the latency, packet drop ratio (PDR), data extraction rate (DER), and overheads. The results show that SDN adds a high percentage of overheads to the network, which is about 43% of the 57% user packets, and the DER drops when the number of mesh nodes are increased, in addition to the high loss that was observed for packets that traveled over more hops.


1995 ◽  
Vol 2 (5) ◽  
pp. 20-33 ◽  
Author(s):  
O. Spaniol ◽  
A. Fasbender ◽  
S. Hoff ◽  
J. Kaltwasser ◽  
J. Kassubek

2012 ◽  
pp. 1852-1867
Author(s):  
Krassie Petrova ◽  
Raymond Yiwen Huang

The mobile Internet is a fast-growing technology that provides access to the traditional stationary (fixed-line) Internet from devices connected to mobile communication networks. It is predicted that the convergence between mobile networks and the fixed-line Internet will be a core feature in the next generation network architecture, achieving fast ‘anywhere’ Internet access and global mobility management. Applying a case study approach, this paper reviews the New Zealand mobile Internet market mix, competition, and mobile service provision. The key mobile Internet deployment requirements are determined and analyzed in order to identify a set of mobile Internet critical success factors and to investigate the impact of the shift from fixed-line to mobile and wireless Internet data communication infrastructure.


Author(s):  
Sathya Rao ◽  
Eric Mannie-Corbisier ◽  
Leszek Siwik

The way of life has changed with the introduction of information and communication technologies (ICT) in every one’s day to day activities and the business. As ICT technologies are constantly evolving, many people attribute the success of enterprises to the ways they deploy and take advantage of new technologies, not only to make their operations more efficient but most importantly to refine and adopt new effective and adaptive business models. Since the advent of the Internet and the very first Internet service providers (ISP) in operation, the traditional ISP market has been in constant evolution due to the gradual globalisation and commoditisation of ISP services. Deregulation and ICT policies have fostered competition (e.g., unbundling of the local loop and so forth) as well. The Internet is as an important channel of interaction inside and/or outside enterprises. The essence of the Internet is conducting business and running of business processes over data communication networks based on nonproprietary standards (Porter, 2001). The World Wide Web as a portal represents a major electronic business (e-business) platform accessed through communication channels provisioned by network and service providers (such as ISDN, DSL, WLAN, UMTS, etc.). There are many challenging aspects of the e-Business that must be considered for a sustainable business of an ISP (Petrie et al., 2004).


Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Peik Astrom

Network security is defined as “a set of procedures, practices and technologies for protecting network servers, network users and their surrounding organizations” (Oppliger, 2000, Preface). The need for network security is caused by the introduction of distributed systems, networks, and facilities for data communication. Improved network security is required because of the rapid development of communication networks. Network security is achieved by using software based tools, that is, network security software (Pulkkis, Grahn & Åström, 2003).


Sign in / Sign up

Export Citation Format

Share Document