Multimedia Proxy Servers

Author(s):  
Philip Kwok Chung Tse

On the Internet, multimedia objects are stored in content servers. The clients behind some proxy servers are located over a wide area network (WAN) far from the content servers (Figure 1). When a client accesses multimedia objects from a content server, the content server must either allocate sufficient disk and network resources to multicast or unicast the objects to the client (Ma & Shin, 2002). Otherwise, it rejects the client. Thus, the popular content server becomes the bottleneck in delivering multimedia objects. Proxy servers have the disk cache space, network bandwidth, and availability to cache parts of the multimedia objects for clients, making them good candidates to solve the bottleneck problem. However, large multimedia objects are not cached or only partially cached in current proxy servers. When fast optical networks are widely deployed, this problem is becoming more severe. Therefore, proxy caches must be enhanced to alleviate the bottleneck in popular content servers with multimedia objects. Multimedia proxy servers perform several functions in accessing multimedia objects over the Internet. We first present the background in the next section. Next, the cache replacement policies being used in proxy servers are described. Then, the object partitioning methods are described. After that, the transcoding method that converts high-resolution objects into low-resolution objects is described. Afterward, we present the cooperative caching method that can be applied to cache objects on proxy servers. Lastly, we describe a method to distribute proxy-server load using a depot.

T-Comm ◽  
2020 ◽  
Vol 14 (9) ◽  
pp. 24-30
Author(s):  
Vitaly G. Dovbnya ◽  
◽  
Sergey N. Frolov ◽  
Konstantin P. Sulima ◽  
Alexey N. Schitov ◽  
...  

In the context of the rapid growth of various areas of the Internet of things, there is currently no unified approach to building networks based on low-power Wide-area Network (LPWAN) wireless networks, taking into account the general requirements for them as automated control systems (ACS). There are the following areas of use of the Internet of things: industry and production; transport and transportation; control of the technical condition of building structures, air quality, background noise and energy consumption; waste management; smart Parking and providing data on traffic jams; smart street lighting and use in everyday life. Networks based on LoRaWAN technology provide low-cost energy-efficient wireless communications for modern ACS in a variety of industries. It is cost-effective for designing hardware and software for telemetry and controlling, such as a system of control and monitoring engineering systems of buildings and facilities (SMES) and automated outdoor lighting control systems. The article presents a structural and functional analysis of approaches to the construction of hardware and software complex elements based on LoRаWAN, taking into account the specifics and logic of the SMES and ASUS. It also provides calculations of network bandwidth and capacity for a single LoRaWAN gateway in a different mode of operation of ACS. A parametric analysis of existing implementations was carried out to design the management server (SU), which is the main element of the LoRaWAN network. The results allowed to obtain seventeen indicators that determine the functionality of a network server (NS). Network server software development. Major structures and the mechanisms of interaction of its elements are determined during the process of designing the original implementation of NS software.


2019 ◽  
Vol 11 (3) ◽  
pp. 57 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming.


Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


Author(s):  
Sudhir K. Routray ◽  
Sarath Anand

Narrowband internet of things (NBIoT) is a leaner and thinner version of the IoT which needs much less resources than the other forms of the IoTs. Therefore, it is considered as a low power wide area network (LPWAN) technology. It can connect with a large number of devices with a very small amount of power and bandwidth. It has potential to connect almost all the considerable objects with the internet. Thus, it is a very powerful technology to establish internet of everything (IoE), a framework consisting of data, processes, sensing, and follow up actions for an intelligent environment. In this chapter, the authors present the IoE friendly architecture of NBIoT, its LPWAN features, principles, and its common applications in different sectors to show its versatility toward IoE. They show the layered architecture of a typical NBIoT and the main protocols used in the narrowband scenarios. They show the general applications of NBIoT for IoE and how it can provide services with limited bandwidth and power. With all these wonderful features, NBIoT is certainly an attractive technology for IoE which can provide the accelerated innovation opportunities.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 194
Author(s):  
R Caroline Kalaiselvi ◽  
S Mary Vennila

The Internet of Things (IoT) prompts can administered by gathering data from little sensor gadgets. As of late, stockpiling less detecting gadgets have been utilized to actualize IoT administrations.  They rely upon conveyed programming from a system server to work benefit capacities and IoT administrations are in view of gathered client data. In this way, it is critical to keep up trusted associations aid programming conveyance or information transmission. In the event that a system association is deceitful, stable information transmission can't be accomplished. Dishonest information associations cause numerous issues in IoT administrations. In this manner, this paper proposes a product refresh strategy in trusted association of IoT organizing. The technique utilizes Low Power Wide Area Network (LPWAN) as long-go IoT organizing innovation and utilizations a portable edge cloud to enhance registering effectiveness in an entrance arrange that comprises of IoT gadgets with lacking assets. In the strategy, the versatile edge cloud is coordinated into a door, and forms detecting information and remote programming updates of LPWAN. IoT gadgets can get programming capacities from the versatile edge cloud. The proposed strategy investigates measurable data about associations in a get to arrange and decides the LPWAN put stock in associations. At that point, programming updates can be performed over the confided in association. Utilizing trusted associations prompts an expanded bundle conveyance rate and decreased transmission vitality utilization. The strategy is contrasted with at present accessible frameworks through PC recreation and through computer simulation and this method’s efficiency is validated. 


Energies ◽  
2020 ◽  
Vol 13 (11) ◽  
pp. 2762 ◽  
Author(s):  
Lilia Tightiz ◽  
Hyosik Yang

Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.


2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Jaehyu Kim ◽  
JooSeok Song

With the advent of the Internet of Things (IoT) era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN) technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa) is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN) is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.


Author(s):  
Raid Al Dabbagh

This chapter outlines the important of e-business in today‘s world and how one thinks it affects decision making. In today‘s world e-business is extremely important for many reasons, some of which are due to the fact that it can speed up the whole process of ordering. This means that the lead time can be decreased because the ordering of products can be done much more quickly because the Internet is a fast running wide area network. This chapter shows how better procurement and supply chains make sales teams more effective. The ability to outsource functions such as, accounting, remote access to systems, linking management teams in different locations, being able to locate the lowest cost supplier improve customer services, improved collection of customer information for databases and more effective management of remote manufacturing sites.


Sign in / Sign up

Export Citation Format

Share Document