network availability
Recently Published Documents


TOTAL DOCUMENTS

141
(FIVE YEARS 52)

H-INDEX

8
(FIVE YEARS 2)

Processes ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 2084
Author(s):  
Kahiomba Sonia Kiangala ◽  
Zenghui Wang

The Industrial Internet of things (IIoT), the implementation of IoT in the industrial sector, requires a deterministic, real-time, and low-latency communication response for its time-critical applications. A delayed response in such applications could be life-threatening or result in significant losses for manufacturing plants. Although several measures in the likes of predictive maintenance are being put in place to prevent errors and guarantee high network availability, unforeseen failures of physical components are almost inevitable. Our research contribution is to design an efficient communication prototype, entirely based on internet protocol (IP) that combines state-of-the-art communication computing technologies principles to deliver a more stable industrial communication network. We use time-sensitive networking (TSN) and edge computing to increase the determinism of IIoT networks, and we reduce latency with zero-loss redundancy protocols that ensure the sustainability of IIoT networks with smooth recovery in case of unplanned outages. Combining these technologies altogether brings more effectiveness to communication networks than implementing standalone systems. Our study results develop two experimental IP-based industrial network communication prototypes in an intra-domain transmission scenario: the first one is based on the parallel zero-loss redundancy protocol (PRP) and the second one using the high-availability seamless zero-loss redundancy protocol (HSR). We also highlight the benefits of utilizing our communication prototypes to build robust industrial IP communication networks with high network availability and low latency as opposed to conventional communication networks running on seldom redundancy protocols such as Media Redundancy Protocol (MRP) or Rapid Spanning Tree Protocol (RSTP) with single-point of failure and delayed recovery time. While our two network communication prototypes—HSR and PRP—offer zero-loss recovery time in case of a single network failure, our PRP communication prototype goes a step further by providing an effective redundancy scheme against multiple link failures.


2021 ◽  
Vol 4 (2) ◽  
Author(s):  
Şirin Okyayuz

The following practice report is based on observational experiences of a project group running a research project on accessibility during the COVID-19 pandemic. The project aimed to provide accessibility using plain language in children’s programs on a public television channel. The project included three groups of end-users: Deaf, hard of hearing, and visually impaired children. An overview of the project is presented to provide background for the practice report. The second part of the report deals with changes encountered in the running of the project during the pandemic: compensating for the lack of interactivity, social interaction and collective experience; using video conferencing; monitoring research; at-home research spaces and technological availability; network availability and performance; dealing with home computers; communication load; workload and work-life balance. Some key concepts of actor-network theory are used to analyse new actors, networks and shifts encountered in the process of implementing the project in the “new normal” in comparison to its planned implementation pre-COVID-19. In conclusion, a summary of possible options is cited to provide food for thought in running such projects.   Lay summary The following practice report is based on the observations of a group running a research project on accessibility for Deaf, Hard of Hearing and blind children to children’s programs during the Covid-19 pandemic. We aimed to provide accessibility using plain language (easy to understand and easy to follow language in subtitles, through sign language and audiodescription) in children’s’ programs on a public television channel. Initially, an overview of the project is presented to provide background, then the changes encountered in the running of the project due to the pandemic are studied. Some of the issues discussed are: How to compensate for the lack of interactivity and social interaction since there was no face-to-face interaction; using video conferencing, monitoring research; at home research spaces and technology availability; issues about network availability and performance; dealing with home computers; communication load, and workload. Some key concepts of the actor-network theory (ANT) are used to explain changes. ANT is concerned with exploring how networks come into existence, looking into which relations exist, how those relations are sustained, how actors come together to constitute and maintain a network and how networks maintain impermanent stability. In conclusion, a summary of possible options is cited to provide food for thought in running such projects.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 733-751
Author(s):  
D.M. Sheeba

Internet of Things enables many industries to connect to end customers and provide seamless products and services delivery. Due to easy access to network, availability of devices, penetration of IoT services exponentially Growing. Meanwhile, Ensuring the Data Security and Integrity of devices connected to network is paramount. In this work, we bring the efficient way of implementing Secure Algorithm for low powered devices and enhancing the encryption and decryption process. In addition to the data security, to enhance node integrity with less power, Authenticator and intermediate network manager introduced which will acts as a firewall and manager of data flow. To demonstrate the approach, same is implemented using low cost Arduino Uno, Raspberry Pi boards. Arduino Uno used to demonstrate low powered encryption process using EDIA Algorithm and raspberry pi used as nodal manager to manage the integrity of nodes in a low-powered environment. Data Security and Integrity is ensured by the way of enhanced Algorithm and Integrity through BlockChain and results are provided and discussed. Finally result and future enhancement are explained.


Author(s):  
S. Suvitha ◽  
R. C. Karpagalakshmi ◽  
R. Umamaheswari ◽  
K. Chandramohan ◽  
M. S. Sabari

The internet is taking component in a developing feature in every non-public and professional activity. The real-time, delay sensitive and mission-essential purposes, community availability requirement is beforehand for internet carrier providers (ICPs). The loop-loose criterion (LLC) approach has been extensively deployed through numerous ICPs for handling the best network component failure state of affairs in fantastic internet through. The achievement of LLC lies in its inherent simplicity; however, this comes at the rate of letting certain failure. To reap complete failure safety with LLC without incurring significant extra, a singular link protection scheme, hybrid hyperlink protocol (HLP), to reap failure routing. In contrast with in advance schemes, HLP guarantees tall network in a greater surroundings pleasant way. HLP is carried out in stages. Initial level substances a surroundings pleasant LLC primarily based totally on (MNP-e). The complexity of the set of rules is decrease than that of Dijkstra’s set of rules and might gift similar to network availability with LCC (Loop-loose criterion). Moment level substances backup direction safety based on MNP-e, the area totally a minimum type of need to be protected, to fulfill the network requirement. We don't forget those algorithms in a massive spread of associated, real and actual, and the effects display that HLP can achieve lofty network without introducing apparent.


2021 ◽  
Vol 20 (4) ◽  
pp. 1-24
Author(s):  
Lukas Gressl ◽  
Christian Steger ◽  
Ulrich Neffe

With the advent of the Internet of Things (IoT) and Cyber-Physical Systems (CPS), embedded devices have been gaining importance in our daily lives, as well as industrial processes. Independent of their usage, be it within an IoT system or a CPS, embedded devices are always an attractive target for security attacks, mainly due to their continuous network availability and the importance of the data they handle. Thus, the design of such systems requires a thorough consideration of the various security constraints they are liable to. Introducing these security constraints, next to other requirements, such as power consumption, and performance increases the number of design choices a system designer must consider. As the various constraints are often conflicting with each other, designers face the complex task of balancing them. System designers facilitate Design Space Exploration (DSE) tools to support a system designer in this job. However, available DSE tools only offer a limited way of considering security constraints during the design process. In this article, we introduce a novel DSE framework, which allows the consideration of security constraints, in the form of attack scenarios, and attack mitigations in the form of security tasks. Based on the descriptions of the system’s functionality and architecture, possible attacks, and known mitigation techniques, the framework finds the optimal design for a secure IoT device or CPS. Our framework’s functionality and its benefits are shown based on the design of a secure sensor system.


2021 ◽  
Author(s):  
Catherine A. Middleton

What I will talk about • Digital economy strategies • Canada’s digital economy – wired broadband networks – mobile phones and broadband – extending network availability, increasing quality • Libraries as enablers of the digital economy


2021 ◽  
Author(s):  
Catherine A. Middleton

What I will talk about • Digital economy strategies • Canada’s digital economy – wired broadband networks – mobile phones and broadband – extending network availability, increasing quality • Libraries as enablers of the digital economy


2021 ◽  
Vol 5 (2) ◽  
pp. 504
Author(s):  
Michelle Claudia ◽  
Muhammad Rifqi

The use of internet connections to develop Virtual Private Network (VPN) lines in companies has been massively applied. An example is the use of Dynamic Multipoint VPN (DMVPN) technology from Cisco, which can connect Spoke or branch offices through HUB or data centers. Besides requiring a secure network, companies also need high network availability. One of them is by using the redundancy method in order to minimize downtime when device damage occurs. In this research, the spoke router will apply two redundancy methods by Cisco, which are Hot Standby Router Protocol (HSRP) and Gateway Load Balancing (GLBP). This research aims to compare the QoS performances and downtime between the two protocols in order to discover the suitable method for DMVPN networks at branch offices. The test scenario is conducted on the GNS-3 simulator using the File Trasnfer Protocol (FTP) service. The obtained test result shows that the HSRP throughput value is smaller from the GLBP with a difference of 0.20%, the increase in the average delay of the HSRP is smaller from the GLBP with a difference of 1.07%. The HSRP data transfer time is faster than GLBP with a difference of 1.49%, and HSRP downtime is 4.13% faster than GLBP. The conclusion is that a suitable redundancy solution for spoke router using the HSRP method


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 910
Author(s):  
Abdelhamied A. Ateya ◽  
Abeer D. Algarni ◽  
Monia Hamdi ◽  
Andrey Koucheryavy ◽  
Naglaa. F. Soliman

The Internet of things (IoT) is the third evolution of the traditional Internet that enables interaction and communication among machines. Many IoT platforms and networks have been developed, and recently, market sectors have started to develop specific IoT applications and services. Integrating heterogeneous IoT networks with the existing ones, mainly with the cellular networks, is a great demand. IoT represents one of the main use cases of the fifth-generation (5G) cellular system as announced by the 3rd Generation Partnership Project (3GPP) and the International Telecommunication Union (ITU). Integrating IoT networks with 5G networks face many challenges related to dense deployment and a massive number of expected connected devices. Thus, IoT network availability and scalability are the main requirements that should be achieved. To this end, this work provides a framework for integrating heterogeneous IoT networks with the 5G networks. The proposed system considers dense deployment and system scalability and availability requirements as announced by ITU and 3GPP. Our proposed structure deploys three main communication paradigms; mobile edge computing (MEC), device-to-device communications (D2D), and software-defined networking (SDN). Our proposed system is evaluated over a reliable environment for various deployment scenarios, and the results validate the proposed structure. The proposed IoT/5G reduces the percentage of blocked tasks by an average of 30% than other traditional IoT networks. This increases the overall system availability and scalability since IoT networks can have more devices and tasks than existing IoT networks. Furthermore, our proposed structure reduces the overall consumed energy by an average of 20% than existing IoT networks, which is an effective metric for IoT networks.


Sign in / Sign up

Export Citation Format

Share Document