As two existing networks, the telecom network and the Internet differ greatly in terms of business patterns, service quality, security and regulations, whilst technical development makes services provided by the two n...As two existing networks, the telecom network and the Internet differ greatly in terms of business patterns, service quality, security and regulations, whilst technical development makes services provided by the two networks penetrate each other. This article describes the status quo of the telecom network and the Internet as well as the problems faced by each of them, analyzes the causes of those problems, and makes suggestions on coordinated and balanced development of the telecom network and the Internet.展开更多
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti...Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.展开更多
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici...The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.展开更多
Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM) of energy systems has drawn consid...Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM) of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the lnternet of Energy Things (IoET) in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN). The primary advantage of LPWAN over general packet radio service (GPRS) and area Internet of Things (loT) is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN tech- nologies of narrow-band Internet of Things (NB-IoT) and Long Range (LORa) technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.展开更多
In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the col...In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture.展开更多
The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tr...The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tremendous transformation of the Internet external environment. The Internet is at a development crossroad; and its direction of development has attracted great attention from the world. On the other hand, the telecom industry is in a rather passive position as the result of the great impact the Internet technology has posted on it. The telecom industry has failed in defining its own developing direction and technology breakthrough; therefore, it is also at a crossroad. The development of both the Internet and the telecom networks will lead to the development of Next Generation Network (NGN) technologies. Industrial attention and research should be focused on the key NGN technologies, solutions to problems in the development of these technologies, and their commercialization in a short term.展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give...Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.展开更多
The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mai...The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial.展开更多
While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include mo...While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include modern electronic gadgets,such as mobile phones,tablets,computers,kindle books,and the like.To be digitally literate would therefore require the existence of modern technologies such as internet facilities that would make it possible to access online reading and writing.The rural environment,particularly in developing areas,is usually characterised by a seeming lack of modern amenities and even worse,digital internet networks.Yet,those who live in the rural areas of Rivers State belong to the modern digital era and deserve to be digitally literate.This paper examines the prerequisites for digital literacy and explores how these can be achieved for citizens who inhabit the rural areas of an industrially-nascent state like Rivers State.展开更多
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab...Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.展开更多
In recent years,the infrastructure of Wireless Internet of Sensor Networks(WIoSNs)has been more complicated owing to developments in the internet and devices’connectivity.To effectively prepare,control,hold and optim...In recent years,the infrastructure of Wireless Internet of Sensor Networks(WIoSNs)has been more complicated owing to developments in the internet and devices’connectivity.To effectively prepare,control,hold and optimize wireless sensor networks,a better assessment needs to be conducted.The field of artificial intelligence has made a great deal of progress with deep learning systems and these techniques have been used for data analysis.This study investigates the methodology of Real Time Sequential Deep Extreme LearningMachine(RTS-DELM)implemented to wireless Internet of Things(IoT)enabled sensor networks for the detection of any intrusion activity.Data fusion is awell-knownmethodology that can be beneficial for the improvement of data accuracy,as well as for the maximizing of wireless sensor networks lifespan.We also suggested an approach that not only makes the casting of parallel data fusion network but also render their computations more effective.By using the Real Time Sequential Deep Extreme Learning Machine(RTSDELM)methodology,an excessive degree of reliability with a minimal error rate of any intrusion activity in wireless sensor networks is accomplished.Simulation results show that wireless sensor networks are optimized effectively to monitor and detect any malicious or intrusion activity through this proposed approach.Eventually,threats and a more general outlook are explored.展开更多
This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol s...This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same.展开更多
The phenomenon of data explosion represents a severe challenge for the upcoming big data era.However,the current Internet architecture is insufficient for dealing with a huge amount of traffic owing to an increase in ...The phenomenon of data explosion represents a severe challenge for the upcoming big data era.However,the current Internet architecture is insufficient for dealing with a huge amount of traffic owing to an increase in redundant content transmission and the end-point-based communication model.Information-centric networking(ICN)is a paradigm for the future Internet that can be utilized to resolve the data explosion problem.In this paper,we focus on content-centric networking(CCN),one of the key candidate ICN architectures.CCN has been studied in various network environments with the aim of relieving network and server burden,especially in name-based forwarding and in-network caching functionalities.This paper studies the effect of several caching strategies in the CCN domain from the perspective of network and server overhead.Thus,we comprehensively analyze the in-network caching performance of CCN under several popular cache replication methods(i.e.,cache placement).We evaluate the performance with respect to wellknown Internet traffic patterns that follow certain probabilistic distributions,such as the Zipf/Mandelbrot–Zipf distributions,and flashcrowds.For the experiments,we developed an OPNET-based CCN simulator with a realistic Internet-like topology.展开更多
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt...Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded delay.However,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless environment.Therefore,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement learning.Specifically,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain system.In this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective performance.Empirical results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution.展开更多
Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 netwo...Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.展开更多
Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT...Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT)and participate in various tasks. WSNs play an important role monitoring and reporting environment information and collecting surrounding context. In this paper we consider a WSN deployed for an application such as environment monitoring, and a mobile sink which acts as the gateway between the Internet and the WSN. Data gathering is a challenging problem in WSNs and in the IoT because the information has to be available quickly and effectively without delays and redundancies. In this paper we propose several distributed algorithms for composite event detection and reporting to a mobile sink. Once data is collected by the sink, it can be shared using the IoT infrastructure. We analyze the performance of our algorithms using WSNet simulator, which is specially designed for event-based WSNs. We measure various metrics such as average residual energy, percentage of composite events processed successfully at the sink, and the average number of hops to reach the sink.展开更多
Nowadays, with the new techniques available in hardware and software, data requests generated by applications of mobile devices have grown explosively. The large amount of data requests and their responses lead to hea...Nowadays, with the new techniques available in hardware and software, data requests generated by applications of mobile devices have grown explosively. The large amount of data requests and their responses lead to heavy traffic in cellular networks. To alleviate the transmission workload, offloading techniques have been proposed, where a cellular network distributes some popular data items to other wireless networks, so that users can directly download these data items from the wireless network around them instead of the cellular network.In this paper, we design a Cost Saving Offloading System(CoSOS), where the Internet of Things(IoT) is used to undertake partial data traffic and save more bandwidth for the cellular network. Two types of algorithms are proposed to handle the popular data items distribution among users. The experimental results show that CoSOS is useful in saving bandwidth and decreasing the cost for cellular networks.展开更多
With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for pac...With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for packets or flow records have become more and more widely used in network monitoring, network troubleshooting, and user behavior and experience analysis. Among the three key technologies in ITAS, we focus on bitmap index compression algorithm and give a detailed survey in this paper. The current state-of-the-art bitmap index encoding schemes include: BBC, WAH, PLWAH, EWAH, PWAH, CONCISE, COMPAX, VLC, DF-WAH, and VAL-WAH. Based on differences in segmentation, chunking, merge compress, and Near Identical(NI) features, we provide a thorough categorization of the state-of-the-art bitmap index compression algorithms. We also propose some new bitmap index encoding algorithms, such as SECOMPAX, ICX, MASC, and PLWAH+, and present the state diagrams for their encoding algorithms. We then evaluate their CPU and GPU implementations with a real Internet trace from CAIDA. Finally, we summarize and discuss the future direction of bitmap index compression algorithms. Beyond the application in network security and network forensic, bitmap index compression with faster bitwise-logical operations and reduced search space is widely used in analysis in genome data, geographical information system, graph databases, image retrieval, Internet of things, etc. It is expected that bitmap index compression will thrive and be prosperous again in Big Data era since 1980s.展开更多
文摘As two existing networks, the telecom network and the Internet differ greatly in terms of business patterns, service quality, security and regulations, whilst technical development makes services provided by the two networks penetrate each other. This article describes the status quo of the telecom network and the Internet as well as the problems faced by each of them, analyzes the causes of those problems, and makes suggestions on coordinated and balanced development of the telecom network and the Internet.
文摘Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.60971082,60872049,60972073and60871042)the National Key Basic Research Program of China(Grant No.2009CB320400)+1 种基金the National Great Science Specific Project(Grant Nos.2009ZX03003-001,2009ZX03003-011and2010ZX03001003)Chinese Universities Scientific Fund,China
文摘The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.
基金This work was supported by the National High Technology Research and Development Program of China (2014AA051901), the International S&T Cooperation Program of China (2014DFG62670), and the National Natural Science Foundation of China (51207077, 51261130472, and 51577096). Thanks for the contributions of Dr. Yibao Jiang and Dr. Xiaoshuang Chert on this paper.
文摘Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM) of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the lnternet of Energy Things (IoET) in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN). The primary advantage of LPWAN over general packet radio service (GPRS) and area Internet of Things (loT) is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN tech- nologies of narrow-band Internet of Things (NB-IoT) and Long Range (LORa) technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.
基金supported by the national 973 project of China under Grants 2013CB329104the Natural Science Foundation of China under Grants 61372124, 61427801+1 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant No.13KJB520029)the Jiangsu Province colleges and universities graduate students scientific research and innovation program CXZZ13_0477,NUPTSF(Grant No.NY214033)
文摘In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture.
文摘The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tremendous transformation of the Internet external environment. The Internet is at a development crossroad; and its direction of development has attracted great attention from the world. On the other hand, the telecom industry is in a rather passive position as the result of the great impact the Internet technology has posted on it. The telecom industry has failed in defining its own developing direction and technology breakthrough; therefore, it is also at a crossroad. The development of both the Internet and the telecom networks will lead to the development of Next Generation Network (NGN) technologies. Industrial attention and research should be focused on the key NGN technologies, solutions to problems in the development of these technologies, and their commercialization in a short term.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
基金supported by the Research Fund for the National Committee of China under Grant No. 05XN09
文摘Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.
文摘The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial.
文摘While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include modern electronic gadgets,such as mobile phones,tablets,computers,kindle books,and the like.To be digitally literate would therefore require the existence of modern technologies such as internet facilities that would make it possible to access online reading and writing.The rural environment,particularly in developing areas,is usually characterised by a seeming lack of modern amenities and even worse,digital internet networks.Yet,those who live in the rural areas of Rivers State belong to the modern digital era and deserve to be digitally literate.This paper examines the prerequisites for digital literacy and explores how these can be achieved for citizens who inhabit the rural areas of an industrially-nascent state like Rivers State.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70273032).
文摘Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.
文摘In recent years,the infrastructure of Wireless Internet of Sensor Networks(WIoSNs)has been more complicated owing to developments in the internet and devices’connectivity.To effectively prepare,control,hold and optimize wireless sensor networks,a better assessment needs to be conducted.The field of artificial intelligence has made a great deal of progress with deep learning systems and these techniques have been used for data analysis.This study investigates the methodology of Real Time Sequential Deep Extreme LearningMachine(RTS-DELM)implemented to wireless Internet of Things(IoT)enabled sensor networks for the detection of any intrusion activity.Data fusion is awell-knownmethodology that can be beneficial for the improvement of data accuracy,as well as for the maximizing of wireless sensor networks lifespan.We also suggested an approach that not only makes the casting of parallel data fusion network but also render their computations more effective.By using the Real Time Sequential Deep Extreme Learning Machine(RTSDELM)methodology,an excessive degree of reliability with a minimal error rate of any intrusion activity in wireless sensor networks is accomplished.Simulation results show that wireless sensor networks are optimized effectively to monitor and detect any malicious or intrusion activity through this proposed approach.Eventually,threats and a more general outlook are explored.
文摘This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(2014R1A1A2057796)and(2015R1D1A1A01059049)
文摘The phenomenon of data explosion represents a severe challenge for the upcoming big data era.However,the current Internet architecture is insufficient for dealing with a huge amount of traffic owing to an increase in redundant content transmission and the end-point-based communication model.Information-centric networking(ICN)is a paradigm for the future Internet that can be utilized to resolve the data explosion problem.In this paper,we focus on content-centric networking(CCN),one of the key candidate ICN architectures.CCN has been studied in various network environments with the aim of relieving network and server burden,especially in name-based forwarding and in-network caching functionalities.This paper studies the effect of several caching strategies in the CCN domain from the perspective of network and server overhead.Thus,we comprehensively analyze the in-network caching performance of CCN under several popular cache replication methods(i.e.,cache placement).We evaluate the performance with respect to wellknown Internet traffic patterns that follow certain probabilistic distributions,such as the Zipf/Mandelbrot–Zipf distributions,and flashcrowds.For the experiments,we developed an OPNET-based CCN simulator with a realistic Internet-like topology.
基金This work was partially supported by the National Key Research and Development Program of China(No.2020YFB1005900)the National Natural Science Foundation of China(Nos.62102232,62122042,and 61971269)the Natural Science Foundation of Shandong Province(No.ZR2021QF064).
文摘Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded delay.However,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless environment.Therefore,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement learning.Specifically,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain system.In this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective performance.Empirical results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution.
基金supported by the National High-Tech Research and Development 863 Program of China under Grant Nos.2007AA01Z2A2,2008AA01A303,2009AA01Z205the National Basic Research 973 Program of China under Grant No.2003CB314806the National Science and Technology Supporting Plan of China under Grant No.2008BAH37B05
文摘Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed.
文摘Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT)and participate in various tasks. WSNs play an important role monitoring and reporting environment information and collecting surrounding context. In this paper we consider a WSN deployed for an application such as environment monitoring, and a mobile sink which acts as the gateway between the Internet and the WSN. Data gathering is a challenging problem in WSNs and in the IoT because the information has to be available quickly and effectively without delays and redundancies. In this paper we propose several distributed algorithms for composite event detection and reporting to a mobile sink. Once data is collected by the sink, it can be shared using the IoT infrastructure. We analyze the performance of our algorithms using WSNet simulator, which is specially designed for event-based WSNs. We measure various metrics such as average residual energy, percentage of composite events processed successfully at the sink, and the average number of hops to reach the sink.
基金supported by the National Natural Science Foundation of China (Nos. 61300207, 61370084, and 61502116)
文摘Nowadays, with the new techniques available in hardware and software, data requests generated by applications of mobile devices have grown explosively. The large amount of data requests and their responses lead to heavy traffic in cellular networks. To alleviate the transmission workload, offloading techniques have been proposed, where a cellular network distributes some popular data items to other wireless networks, so that users can directly download these data items from the wireless network around them instead of the cellular network.In this paper, we design a Cost Saving Offloading System(CoSOS), where the Internet of Things(IoT) is used to undertake partial data traffic and save more bandwidth for the cellular network. Two types of algorithms are proposed to handle the popular data items distribution among users. The experimental results show that CoSOS is useful in saving bandwidth and decreasing the cost for cellular networks.
基金supported by the National Key Basic Research and Development (973) Program of China (Nos. 2012CB315801 and 2013CB228206)the National Natural Science Foundation of China A3 Program (No. 61140320)+2 种基金the National Natural Science Foundation of China (Nos. 61233016 and 61472200)supported by the National Training Program of Innovation and Entrepreneurship for Undergraduates (Nos. 201410003033 and 201410003031)Hitachi (China) Research and Development Corporation
文摘With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for packets or flow records have become more and more widely used in network monitoring, network troubleshooting, and user behavior and experience analysis. Among the three key technologies in ITAS, we focus on bitmap index compression algorithm and give a detailed survey in this paper. The current state-of-the-art bitmap index encoding schemes include: BBC, WAH, PLWAH, EWAH, PWAH, CONCISE, COMPAX, VLC, DF-WAH, and VAL-WAH. Based on differences in segmentation, chunking, merge compress, and Near Identical(NI) features, we provide a thorough categorization of the state-of-the-art bitmap index compression algorithms. We also propose some new bitmap index encoding algorithms, such as SECOMPAX, ICX, MASC, and PLWAH+, and present the state diagrams for their encoding algorithms. We then evaluate their CPU and GPU implementations with a real Internet trace from CAIDA. Finally, we summarize and discuss the future direction of bitmap index compression algorithms. Beyond the application in network security and network forensic, bitmap index compression with faster bitwise-logical operations and reduced search space is widely used in analysis in genome data, geographical information system, graph databases, image retrieval, Internet of things, etc. It is expected that bitmap index compression will thrive and be prosperous again in Big Data era since 1980s.