Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements

Size: px
Start display at page:

Download "Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements"

Transcription

1 Michele Albano Antonio Brogi Razvan Popescu Manuel Díaz José A. Dianes Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements Received: June 1st, 2007 / Accepted: July 2nd, 2007 Abstract The development of next generation Embedded Peer-To-Peer Systems raises a number of challenging issues for pervasive computing. In this paper we overview the objectives of the ongoing European SMEPP (Secure Middleware for Embedded Peer-To-Peer) project. In particular we discuss different types of requirements that have been identified in SMEPP. Keywords Embedded Peer-to-Peer Systems Secure Middleware 1 Introduction P2P systems are distributed computing systems where all network elements act both as service consumers (clients) and service providers (servers). Moreover, most of the mechanisms of communication are not based on preexisting infrastructures, but rather on dynamic ad-hoc networks among peers[1]. Embedded Peer-to-Peer Systems (EP2P)[2] represent a new challenge in the development of software for distributed systems. An EP2P is a P2P system where small, low-powered, low-cost embedded systems collaborate in the processing and management of information using wireless channels. EP2P systems are flexible enough to be applied in diverse areas, such as: Environmental monitoring. Monitoring of the effects of industrial plants on the environment is a key issue in different application domains and particularly in the field of nuclear energy[3]. The use of EP2P opens up new perspectives that allow monitoring in the case This work has been partially supported by the SMEPP project (EU-FP6-IST ). M. Albano, A. Brogi, R. Popescu Department of Computer Science, University of Pisa, Italy M. Díaz, J. A. Dianes Dpt. of Languages and Computer Science, University of Málaga, Spain of small leaks during inspection or even in the case of accidents where no other equipment is available. Home systems. A smart house is usually made up of several intelligent devices that can control home appliances or feel their surroundings[4]. EP2P systems can help both in the unobtrusive management of the smart house (from anywhere, to anywhere) and in the collaboration between the embedded devices of the house (e.g., switch off the air conditioning if nobody is in the room). Mobile telephony. The features of new programmable mobile phones make them real execution platforms, supporting multitasking and real-time operating systems and ubiquitous connectivity. With specific problems such as high latency, reduced bandwidth, and dependency on batteries, mobile phones are an interesting field for developing new applications such as network games or mobile sensor applications[7]. The potential advantages of EP2P are adaptability, scalability, high availability, and ubiquity, as the model is based on the possibility of incorporating and removing resources in a dynamic and adaptive way, and users should be able to access those resources offered by the network anytime, anywhere. The main drawbacks are also due to these characteristics. EP2Ps present a high degree of heterogeneity (applications may run on different devices, from PDAs to sensor network nodes, with quite different network bandwidths and computing power) and autonomy (the elements enter the system and exit in an independent way, causing frequent reorganizations of the systems). These drawbacks raise important technological challenges such as decentralization, links with transient communications (connections and disconnections happen in an unpredictable and frequent manner), and a constantly changing topology. In addition, there is a major problem that any EP2P system must deal with: Security. Traditional P2P systems have to face attacks on the routing protocols, attacks against the identity of the nodes, and threats against

2 the confidentiality, integrity and authentication of the information that is contained into or is circulating in the network[5]. In an EP2P context, these problems are much more troublesome, because the underlying architecture is much more vulnerable than that of traditional P2P systems due to resource constraints (low battery, low processing power), lack of tamper-resistant packaging, and the nature of open and public communication channels. Besides this high degree of vulnerability, state of the art security techniques are not easily adaptable to P2P environments since there are no centralized servers with security databases that can provide typical services such as authentication and authorization. In a serverless peer environment, the peers must provide their own authentication. A structured middleware can be able to cope with the complexity of this scenario, and can provide the necessary abstractions for the definition, creation and maintenance of applications. The paper is organized as follows. Section 2 presents the general requirements that have been identified for SMEPP. Section 3 discusses detailed requirements for the architecture of SMEPP middleware. Conclusions and final remarks are presented in Section 4. 2 General SMEPP Requirements One of the key factors for the success of EP2P systems is the possibility of abstracting EP2P-related problems by means of convenient middleware. The Secure Middleware for Embedded Peer-To-Peer (SMEPP) project aims to create a novel middleware in order to reduce the level of complexity that is felt by the final architects and developers. Without middleware (including formal tools and methodologies), the definition, creation and maintenance of an application would be a nearly impossible task, having to face in every prototype the EP2P problems from scratch. A convenient middleware may hide the complexity of the underlying infrastructure while providing open interfaces to third parties for secure application development. The development of such a middleware is challenging, since besides the disappearance of the roles of client and server, which are the basis of the most extensively used generic middleware (CORBA, J2EE,.NET), other critical requirements appear, which have to be supported by these infrastructures (mobility, new security problems, identification and discovery and localization protocols, new quality of software criteria, etc). The main objective of the SMEPP project is to develop a new middleware, based on a new network centric abstract model, specially designed for EP2P scenarios, trying to overcome the main problems of existing proposals for domain specific middleware for EP2P. The middleware will have to be secure, generic and highly customizable, allowing for its adaptation to different devices (from PDAs and new generation mobile phones to embedded sensor actuator systems) and domains (from critical systems to consumer entertainment or communication). In order to achieve these general objectives, the project research efforts and specific project objectives have been organized into four main classes that are briefly discussed in the following sub-sections. 2.1 Service and Interaction Model The high degree of self-configuration and self-management required in EP2P has a significant drawback. Each peer must be programmed in such a way to be able to autonomously manage, at run time, its interactions and interconnections with its environment. From the point of view of the developer of an EP2P application, this means that she is responsible for programming the interaction among the peers. The current approach is to program these aspects exploiting protocols provided by underlying infrastructures such as JXTA[6] or the Microsoft P2P framework[8]. Programming the interaction among peers using these low-level protocols is not an easy task due to the dynamicity of the network. The aim is to provide a serviceoriented abstract model to program the interaction among peers, which hides low-level details to be treated by the support infrastructure. Two key aspects of the model involve: Groups, that are the way peers are organized into sets. Services, that are the way a peer allows other peers to interact with itself. In particular, the model dictates that security is bound to groups and that a peer can publish and invoke services in the groups it has joined. 2.2 Middleware Architecture and Infrastructure Traditional middleware architectures have focused on achieving interoperability across heterogeneous platforms and software languages. Although the platforms have evolved from their creation incorporating new specific services and profiles (real time, embedded systems, telecommunications), their architectures have remained, to a great extent, stable. The need to provide support for the new interaction models and the nature of the requirements of EP2P represent a challenge for defining new middleware architectures. These architectures must provide most of the services provided by current architectures and be open and extensible enough in order to support the quick evolution of devices and technologies in this field. The main objective of the SMEPP project in this area is the

3 definition of a new middleware architecture specific for EP2P systems. Besides keeping the goals present in other generic P2P systems, such as interoperability and heterogeneity support and the capability of information sharing, EP2P systems must take into account new aspects such as the surveillance of application behaviour, the processing infrastructure and the underlying communication networks, in order to achieve the appropriate quality of service. The complexity of these tasks and the need for adaptation to different devices and domains make it necessary to establish a component based software architecture or, in fact, a software architecture family[9]. Although there has been much work done on component based reconfigurable middleware systems, they do not deal specifically with EP2P systems and SMEPP will develop a specific Component Based Framework for this type of systems. The specific objectives in this area can be summarized as follows: Design of a quality-oriented P2P service architecture that supports self-configurable services and scalability from tiny embedded devices with wireless connections to heterogeneous P2P networked systems. Design of EP2P communication services with special focus on self-organisation, mobility, service discovery and delivery, and security. Design and implementation of a Component Based Framework to support the abstract service model previously discussed. Development of tools for quality analysis that facilitate the selection and instantiation of a concrete architecture depending on the types of devices and domain, and on the specific quality of service requirements for the application, such as reliability, performance and adaptability, Design and implementation of a set of components implementing the most important aspects of EP2P systems including, at least, security, reconfiguration and mobility. 2.3 Security EP2P security is one of the key aspects in the success of this type of systems, and it will be a central topic in the design of the SMEPP middleware. Traditional security infrastructures cannot be easily adapted to this type of systems, since most of them are based on trustable servers that provide authentication and authorization. On typical EP2P scenarios, this type of services will not be available and peers must provide their own authentication. In addition, the number of nodes in a system can range from dozens to thousands. Therefore, there is need for a scalable key infrastructure that allows information to securely flow over the entire network while maintaining a low number of keys per node. This infrastructure should also allow automatic distribution and maintenance of network keys using as little time and resources as possible. The main project goal in this area will be the design and implementation of such an infrastructure, and its integration in the SMEPP middleware. In certain scenarios, such as vehicle tracking[10] or videoconferencing, some nodes group themselves in order to cooperate to fulfill a certain task. There is the need for a key infrastructure for these dynamic groups. The key infrastructure will have to cope with the large number of nodes that can enter or exit the group in a short period of time. On the other hand, secure routing protocols for sharing the data between all the nodes must be designed. Existent protocols do not take security into account in the early stages of the design, thus they are very vulnerable in real-life scenarios. SMEPP secure routing protocols must comply with essential requirements such as connectivity, coverage, fault tolerance and scalability during the lifetime of the network. Moreover, some of the secure routing protocols should be designed to manage mobile nodes inside the network. Another aspect to take into account is the design of cryptographic protocols and security primitives to be used by embedded devices that have serious limitations (e.g., computational power, available energy). The protocols (e.g., authentication, key-exchange) and primitives (e.g., symmetric key primitives) have to be designed and specified in such a way as to achieve the security requirements while being energy efficient. The limited computational power of the nodes must also be taken into account. All these protocols and primitives will have to be properly validated using energy estimation methodologies and formal validations in the very early design stages. This will allow the selection of proper protocols and primitives, taking into account important issues such as side-channel attacks. Summing up, the main objectives in this area are: Design and implementation of a security infrastructure for EP2P systems and its integration into the SMEPP middleware. Design and implementation of secure routing protocols. Design and implementation of cryptographic protocols and security primitives for EP2P systems. 2.4 Applications The goal of this task is to validate SMEPP proposals through the development of chosen applications that represent very different scenarios. In particular, two specific applications will be implemented.

4 2.4.1 Environmental Monitoring in Industrial Plants. The first application is focused on environmental monitoring of industrial plants. Monitoring the effects of industrial plants on the environment is a key issue in different application domains and especially in the field of nuclear energy. The use of EP2P systems opens up new possibilities that will allow monitoring in the case of small leaks during inspection or even in the case of accidents where the measuring infrastructure is out of service. The application will have to be based on the joint use of sensor networks and MANETs for radiation measurement Mobile Personal Context Aware Communication Services. The second application will be carried out in the area of mobile personal context aware communication services, and it has quite different characteristics, with respect to the first one, both from the point of view of targetted terminals and of possible application characteristics and execution environments (the number of elements in the system can be very high and their mobility very superior to the first application scenario). This second application will be inspired by SeguiTel, a social and health care service platform developed by Telefónica I+D. This platform allows the provision of several telecare services (e.g., videoconference for tele-consulting, vital parameters reading, monitoring and communication, telesurveillance) following a client/server architecture. Users are registered and can subscribe to different services depending on their profile, needs and available home infrastructure. In order to better evaluate the validity of the approach, both applications will have to be as domain independent as possible, trying to make it easier to reuse parts of developed component in other applications based on the SMEPP middleware. 3 Key Requirements for the SMEPP Middleware In this Section we briefly describe the basic requirements of the SMEPP middleware that have already been identified. The requirements are divided into functional and non-functional ones. 3.1 Functional Requirements Functional requirements describe the high-level functionalities of the middleware at the level of the API and associated middleware support tools. Peer identification and associated information In EP2P systems global IP addresses or security certificates will be usually neither available nor useful. When a node interacts with other nodes the system must supply it a unique identification. Group characterization Groups will be a basic abstraction on the middleware. A group is a set of peers that share services or provide services to other peers. They are the basic abstraction for identification, security, communication broadcasting and service providing. Group Creation / Management A peer must be able to create a group by itself, establishing the security requirements for the group. A peer can also search for existing groups and join them if it is authorized to do so. Group Security Security is bound to groups. A group must be able to accept or reject a new peer based on the security services and the credentials of the peer. The security policy in the group is established by the group creator. Broadcast information to a group The middleware must support secure and ordered multicast of messages and events at the group level. Search in a group The middleware must provide mechanisms to locate services and other peers inside a group. Graphing services The middleware must have all the necessary mechanisms to control the network interconnection topology of a group of peers. The graph maintaining services must maintain efficient communications between peers and it must be simple enough to be deployed in resource limited nodes connected by low bandwidth communication mechanisms. Service Support The SMEPP middleware will be based on services. A service is always offered inside a group by one or more peers. Service discovery will be carried out at the group level. A peer must belong to a group to use the services offered by the group. Service description will have to be provided by means of a specially designed language for SMEPP service description (service contracts) that will include information to allow its discovery, adaptation, use or composition with other services. Localization The SMEPP middleware must provide localization services at the logical and physical levels. It must be

5 possible to find a peer in the groups where it offers services from its peer identification. Physical localization will be provided only if the deployment environment allows it and the applications need this information. P2P Communications Once a service is discovered and a peer is ready to offer the selected service, a direct communication among peers is established. This communication can be synchronous (results are returned just after the service invocation), asynchronous (results are returned at any moment after service invocation), or event-based (peers subscribe to a service, events are received by all the subscribers). Mobility Management The topology of the networks can change dynamically and some nodes can go out of the wireless network range. The middleware must be able to use other alternative networks to reach peers. 3.2 Non-Functional Requirements Security inside the middleware Security must be considered at all the levels of the middleware. Management of credentials must be as abstract as possible. A main issue on security is that an authority for authentication may not be reachable, so new authentication mechanisms must be supported. Interoperability with internet standards/legacy systems SMEPP middleware must support the integration of legacy software and the interconnection with other existing middleware such as CORBA should be possible, e.g., by middleware reconfiguration. Adaptation and configuration to different devices/os platforms The SMEPP middleware system architecture must be implementable on a variety of heterogeneous platforms, in terms of networking interfaces (802.11, Bluetooth, Infrared, cellular, Ethernet, etc.), of Operating Systems (TinyOS, Linux, Contiki, Windows CE, etc.), of networking protocols and underlying hardware platforms. The middleware system must provide bindings for development using different programming languages, such as Java[11], nesc[12]. Real-Time Requirements The middleware must support virtual communication channels between individual nodes. In some applications, the channels must be able to provide latency guarantees. Other QoS Requirements The middleware system should be able to monitor the quality of resources (reliability, fault-tolerance, etc) and adapt, depending on application constraints. Energy Awareness For certain types of devices (e.g., sensors) energy needs to be consumed in an economic and managed quantity. The middleware should provide schemes to aid a programmer to define energy requirements and schedules in a natural way. Scalability Scalability must be taken into account in terms of number of peers, geographical coverage, traffic load and so forth, and the interaction model must support small applications, like the ones in home domain as well as very large systems with hundreds of sensors and/or mobile devices. Requirements on the hardware SMEPP will have to be designed to run in small devices like sensor networks. All the peers must have at least a MAC address to ease the development of the identification related issues. Peers must be also able to connect, at least using one of the currently available wireless technologies. 4 Concluding Remarks To date, work on middleware for P2P systems has mainly been focused on content sharing applications. In these applications, quality of service and connection management criteria are completely different from those appearing in the systems we are dealing with[13]. Generic P2P platforms such as JXTA[6] or Microsoft Windows P2P Framework[8] are mainly concerned with networking aspects such as peer discovery, name resolution, graphing and routing. These platforms are computationally expensive and hence difficult to adapt to typical resource constrained embedded devices. Moreover, these applications are difficult to design and implement because of the absence of appropriate architectural abstractions to upper applicative layers, of the complexity of the underlying protocols, and of the ever-increasing complexity of the requirements. Code reuse and application customization are especially difficult, making the development of distributed applications in a heterogeneous environment even more difficult. There is also some preliminary work related to the development of middleware for EP2P[2], mainly focused on supporting the reconfiguration of ad-hoc networks and the aspects concerning resource management, such as memory and battery consumption. Some representative examples in the field of sensor networks and MANETS

6 are analysed in[15][13][14]. AMIGO project[4] aims to develop open, standardized, interoperable middleware for ambient intelligence. All these middleware platforms represent great progress, easing some aspects of the development of EP2P, but they do not solve a number of important problems, such as: They do not deal with the peculiar security aspects of EP2P. They do not provide an abstract model that allows the developers to focus on the application logic. They do not feature up-to-date support to provide a global quality of service of the system. They do not control the reconfiguration of the network in order to satisfy the quality of service, or to manage the consumption in a global manner (e.g., sometimes some nodes of the network are more critical than others and it is necessary to minimize the consumption of one node at the expense of increasing the consumption of another). The SMEPP project aims at addressing all those aspects in order to create a middleware that is able to satisfy the requirements of the project. The project will validate the middleware by the implementation of two different applications, one in the field of Environmental Monitoring in Industrial Plants, the other one in the field of Mobile Personal Context Aware Communication Services. 10. J. Anda, J. LeBrun, D. Ghosal, C. N. Chuah and M. Zhang, VGrid: Vehicular AdHoc Networking and Computing Grid for Intelligent Traffic Control, IEEE 61st Vehicular Technology Conference VTC 2005 Spring, 29th May - 1st June, Stockholm, Sweden 11. The Java homepage: The nesc homepage: G. Kortuem. Proem: A Middleware Platform for Mobile Peer-to-Peer Computing, ACM Mobile Computing and Communictions Review, Vol. 6, N V. Kalogeraki, F. Chen, Managing Distributed Objects in Peer-to-Peer Systems, IEEE Network, enero/febrero 2004., pp W. B. Heilzman, A. Murphy, H. S. Carvalho, and M. A. Perilo, Middleware to Support Sensor Network Applications., IEEE Network. Enero/Febrero pp References 1. S. Ratnasamy and P. Francis and M. Handley and R. Karp and S. Schenker, A scalable content-addressable network, SIGCOMM 01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pag P. Costa, G. Coulson, C. Mascolo, G. Pietro, S. and Zachariadis, The RUNES Middleware: A Reconfigurable Component-based Approach to Networked Embedded Systems 3. S. M. Brennan, A. M. Mielke, and D. C. Torney, Radiation Detection with Distributed Sensor Networks., IEEEComputer. August M. Vallée, F. Ramparany, L. Vercouter: A multi-agent system for dynamic service composition in ambient intelligence environments., Advances in Pervasive Computing, Adjunct Proceedings of the Third International Conference on Pervasive Computing (Pervasive 2005), May 8-11, 2005, Munich, Germany. (2005) 5. D. S. Wallach, A Survey of Peer-to-Peer Security Issues. Lecture Notes in Computer Science, Vol. 2609, p 42-57, January The JXTA home page 7. P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta, and Y. F. Hu, Wireless Sensor Networks: a Survey on the State of the Art and the and ZigBee Standards, Computer Communications, 30, 2007, pp PeerToPeer/default.aspx 9. M. Matinlassi, E. Niemela, L. Dobrica, Quality-driven architecture design and quality analysis method. A revolutionary initiation approach to a product line architecture. Espoo, VTT Electronics, 2002, VTT Publications 456, 128 p p. ISBN ;

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Overview of the Internet of things

Overview of the Internet of things Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things

More information

RadMote: A Mobile Framework for Radiation Monitoring in Nuclear Power Plants

RadMote: A Mobile Framework for Radiation Monitoring in Nuclear Power Plants RadMote: A Mobile Framework for Radiation Monitoring in Nuclear Power Plants Javier Barbarán, Manuel Díaz, Iñaki Esteve and Bartolomé Rubio Depart. Languages and Computer Science Málaga University 29071

More information

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Heterogeneous network establishment assisted by cellular operators

Heterogeneous network establishment assisted by cellular operators Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed

More information

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware 1 INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware Dr Antoine Bagula ISAT Laboratory, University of Cape Town, South Africa Goal of the lecture 2 The lecture intends

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

A Survey on Availability and Scalability Requirements in Middleware Service Platform

A Survey on Availability and Scalability Requirements in Middleware Service Platform International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Survey on Availability and Scalability Requirements in Middleware Service Platform

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Software design (Cont.)

Software design (Cont.) Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

QoS Management in SOAs. Service-Oriented Architectures

QoS Management in SOAs. Service-Oriented Architectures QoS Management in Service-Oriented Architectures PhD progress presentation Gaetano F. Anastasi Scuola Superiore Sant Anna, Pisa, Italy Madrid, November 2010 1 Introduction 2 SOA for Industrial Automation

More information

Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...

Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things... Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer

More information

Synapse s SNAP Network Operating System

Synapse s SNAP Network Operating System Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment

More information

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications

More information

Adaptable Mobile Applications: Exploiting Logical Mobility in Mobile Computing

Adaptable Mobile Applications: Exploiting Logical Mobility in Mobile Computing Adaptable Mobile Applications: Exploiting Logical Mobility in Mobile Computing Stefanos Zachariadis, Cecilia Mascolo and Wolfgang Emmerich Dept. of Computer Science, University College London Gower Street,

More information

Building Web-based Infrastructures for Smart Meters

Building Web-based Infrastructures for Smart Meters Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Towards an Organic Middleware for the Smart Doorplate Project

Towards an Organic Middleware for the Smart Doorplate Project Towards an Organic Middleware for the Smart Doorplate Project Wolfgang Trumler, Faruk Bagci, Jan Petzold, Theo Ungerer University of Augsburg Institute of Computer Science Eichleitnerstr. 30, 86159 Augsburg,

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication

More information

THE CONCEPTS OF AN END-USER-ENABLING ARCHITECTURE FOR UBIQUITOUS COMPUTING. Irene Mavrommati, Achilles Kameas 1

THE CONCEPTS OF AN END-USER-ENABLING ARCHITECTURE FOR UBIQUITOUS COMPUTING. Irene Mavrommati, Achilles Kameas 1 THE CONCEPTS OF AN END-USER-ENABLING ARCHITECTURE FOR UBIQUITOUS COMPUTING Irene Mavrommati, Achilles Kameas 1 Abstract This paper describes the set of concepts that underlie the Plug-Synapse model, which

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing International Journal of Information Science and Intelligent System, Vol. 2, No.4, 2013 Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing Achin Mishra 1 1 Department

More information

Communication via M2M

Communication via M2M Chapter 5: Green Wireless Communication via M2M Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Abstract 1. Abstract Based on the observation

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

SERVICE ORIENTED ARCHITECTURE

SERVICE ORIENTED ARCHITECTURE SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the

More information

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices SUMMARY The Specialized

More information

Exploiting peer group concept for adaptive and highly available services

Exploiting peer group concept for adaptive and highly available services Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,

More information

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security

More information

ITU-T Future Networks and Its Framework of Virtualization

ITU-T Future Networks and Its Framework of Virtualization ITU-T Future Networks and Its Framework of Virtualization Ziaul Ain Usmani 1, Dr. Gulabchand K. Gupta 2 1 Research Scholar, JJT University, Jhunjhunu, Rajasthan, India 2 Western College of Commerce and

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen

More information

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Internet of Things 2015/2016

Internet of Things 2015/2016 Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:

More information

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Challenges. Department of Informatics University of Oslo. Presenter. kashifd@ifi.uio.no. October 25, 2011

Challenges. Department of Informatics University of Oslo. Presenter. kashifd@ifi.uio.no. October 25, 2011 Internet t of Things: Applications and Challenges Presenter Kashif Dar kashifd@ifi.uio.no INF9910: Cyber Physical Systems Department of Informatics University of Oslo October 25, 2011 Overview Internet

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Distributed Systems Architectures

Distributed Systems Architectures Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems

More information

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING Peer Hasselmeyer Information technology Transfer Office, Darmstadt University of Technology Wilhelminenstr. 7, 64283 Darmstadt, Germany E-mail: peer@ito.tu-darmstadt.de

More information

The Autonomic Management of Ubiquitous Systems meets the Semantic Web

The Autonomic Management of Ubiquitous Systems meets the Semantic Web The Autonomic Management of Ubiquitous Systems meets the Semantic Web Steven Heeps 1, Naranker Dulay 2, Alberto Egon Schaeffer Filho 2, Emil Lupu 2, Morris Sloman 2, Stephen Strowes 1, Joe Sventek 1 1

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Distributed System: Definition

Distributed System: Definition Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that appears to its users as a single coherent system Two aspects: (1)

More information

Towards service awareness and autonomic features in a SIPenabled

Towards service awareness and autonomic features in a SIPenabled features in a SIP-enabled network 1 Towards service awareness and autonomic features in a SIPenabled network Guillaume Delaire Laurent Walter Goix Giuseppe Valetto Telecom Italia Lab Outline 2 Context

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Security Services in Multi-Dimensional Network

Security Services in Multi-Dimensional Network 48 JOURNAL OF NETWORKS, VOL. 2, NO. 1, FEBRUARY 2007 Providing Security Services in a Resource Discovery System Juan Vera del Campo, Josep Pegueroles, Miguel Soriano Department of Telematic Engineering,

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

Bridging the gap between peer-to-peer and conventional SIP networks

Bridging the gap between peer-to-peer and conventional SIP networks 1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 hezekiah@rucus.ru.ac.za

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India

More information

THE Internet is a powerful tool used in all kinds of the

THE Internet is a powerful tool used in all kinds of the Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1343 1348 DOI: 10.15439/2015F161 ACSIS, Vol. 5 Selected methods of artificial intelligence for Internet of Things

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure O. Ardaiz, F. Freitag, L. Navarro Computer Architecture Department, Polytechnic University of Catalonia,

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

Resource Utilization of Middleware Components in Embedded Systems

Resource Utilization of Middleware Components in Embedded Systems Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer

More information

Monitoring within an Autonomic Network: A. Framework

Monitoring within an Autonomic Network: A. Framework Monitoring within an Autonomic Network: A GANA based Network Monitoring i Framework Anastasios Zafeiropoulos, Athanassios Liakopoulos, Alan Davy, Ranganai Chaparadza tzafeir@grnet.gr Greek Research and

More information