IJCNIS Vol. 10, No. 10, Oct. 2018
Cover page and Table of Contents: PDF (size: 199KB)
This paper focuses on the design model verification processes to reduce modification cost after the software is delivered. We proposed a new design flow of web content integrity to protect web security by using colored petri nets simulation. The method covers the design process from the firewall stage to the recovery stage. In the proposed solution, the model verified the integrity of web content through detection tampering and recovery web content processes. Furthermore, the specification formally verifies the model checking technique by colored Petri nets formalism. Finally, the model is simulated by colored petri nets to insure the correct behavior of the designed web content integrity model.[...] Read more.
The work carried out in this paper first generates all edge-disjoint minimal paths between every pair of nodes of the interconnection network. Then the merging of the edge disjoint minimal paths from each source nodes to the rest of nodes occurs only if such merging of minimal paths does not result into cycle. Thus, the merging operation ensures connectivity of all nodes of interconnection network without any cycle which is equivalent to the generation of spanning trees. In this manner, a number of spanning tree rooted on each source node are generated and ranked according to their generation. The network reliability is then evaluated from these spanning trees by applying sum of disjoint product techniques on these trees. A mathematical model followed by an algorithm is proposed in this paper. The proposed method is well illustrated by taking a suitable example network. The simulated results obtained from the proposed method are validated against existing method. The validation results show a tolerable level discrepancy in estimating the network reliability of some benchmark networks while using a very less number of spanning trees in leu of all possible spanning tress. The network reliability of some important interconnection networks viz. Hypercube, crossed cube, folded hypercube, mesh and torus are evaluated and analyzed. The network reliability of fully connected network with size varying from 3 to 10 are evaluated and analysed.[...] Read more.
Recent development in mobile technology makes data traffic intensifies, due to the vast devices connectivity. Also, increases the needs for efficient and scalable distribution of data and services over the Internet. Therefore, the Information Centric Networking paradigm was proposed, with different approaches as a clean-slate redesign of current host-centric Internet architecture. It evolved to access data independent from its location, by replacing IP addresses with content named. This paper reviews the most popular Information Centric Networking approaches, review and summarizes some of its features, such as naming, routing, caching and mobility in tabular form. In addition, the modes of operations based on named resolution services and named based routing for the approaches with some network exemplary diagrams were presented. Also, mobility supports for consumer, and mobility challenges from current to feature Internet were discussed for future research.[...] Read more.
Mobile Ad-Hoc Networks (MANETs) are self-forming, self-healing new generation infrastructure less wireless networks. Principal behind these networks is multi hop radio relaying. MANETs are very useful at locations where networking infrastructure is not available. Major applications of these networks can be accessed at military and emergency rescue operations. MANETs may contain small or large set of network nodes; each and every node requires acting as host and the router. Due to random movements of the nodes, MANETs obtain dynamic network topologies. Routing protocols in MANETs are accountable for establishing efficient and error free communication paths between network nodes. Dynamic network topologies make routing challenging. In order to meet requirement of present day applications and to overcome from routing challenges, routing protocols in mobile ad hoc networks need to perform better in terms of certain QoS (Quality of Service) parameters such as; good throughput, sustained communication links and least delay in establishing a link. In this paper, we have discussed QoS in MANETs and analyzed the OLSR (Optimized Link State Routing), a well-known routing protocol in MANETs for possible improvements in its performance. Here, we have revised attributes of core parameters of the standard OLSR routing model in order to obtain a new OLSR design. Performances of the standard and revised OLSR models have been tested and compared under different network scenarios using network simulator-3 (NS-3). Different QoS and performance evaluating metrics such as; the throughput, packet delivery ratio, end to end delay, packet loss and normalized routing load have been considered for measuring performances of either OLSR routing models. Based on the analysis, it is concluded that the revised OLSR model has shown better performances as compared to standard OLSR routing model.[...] Read more.
Recent year’s development in communication technologies have been able to deploy a whole new range of ad hoc networks of moving vehicles namely Vehicular Ad hoc Network (VANET). The key component of Intelligent Transportation Systems (ITS) is VANET only. The Vehicular communication systems is one of the critical complex infrastructure system of any nation. Thus, reliability i.e. having a low failure probability of such critical systems is the main concern of the academia and the industry. This paper primarily focuses on the reliability modelling of VANET. The main objective of the research is to address the issue of quantifying the importance of components in contributing to the reliability and maintenance of a VANET. Reliability Block diagrams (RBD)s have been modelled for the architecture of VANET. Out of various Component Importance Measures (CIM)s available in literature, Birnbaum measure, Improvement measure and Criticality Importance measures have been used to prioritize the system components. The research work is successful in identifying the most critical and the least critical component of the Vehicular Ad Hoc Network and thus provides a solution for the design improvement, maintenance and failure diagnosis.[...] Read more.
The current communication requirements are moving quickly to mobile ad-hoc networks, mainly because of the decreasing cost of wireless networking technology and the increasing capacity to integrate into embedded devices technologies such as WiFi, ZigBee, Bluetooth, and WAVE. It is important to understand the limitation or the strength of each protocol and standard in order to make a better selection decision at the moment of implementing a specific scenario. This paper evaluates how routing protocols perform in mobile scenarios when the speed of nodes is relatively high. Our research shows that reactive routing protocols have a better packet delivery ratio (PDR) than proactive routing protocols. However, proactive routing protocols have a smaller end-to-end delay and hops count.[...] Read more.