Research Advances in Network Technologies

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

In current digital era, information is an important asset for our daily life as well as for small and large-scale businesses. The network technologies are the main enablers that connect the computing devices and resources together to collect, process and share vital information locally as well as globally. The network technologies provide efficient, flexible and seamless communication while maximizing productivity and resources for our day-to-day lives and business operations. For all its importance, this domain has evolved drastically, from the traditional wired networks to Bluetooth, infrared-waves, micro-waves, radio-waves and satellite networks. Nowadays, network technologies are not only restricted to computer laboratories, offices or homes; many other diverse areas have been witnessed where network technologies are being used based on the applications and needs, such as vehicular ad-hoc networks, underwater networks, and the Internet of Things. Along with the hardware-based and physical network technologies, a lot of research has been carried out by researchers from academia and industry to develop emerging software-based network technologies, such as network software architectures, middleware, and protocol stacks. The software-based network technologies become the main driving force behind the paradigm shift in this domain and have invented many new network technologies such as grid computing, cloud computing, fog computing, edge computing, software defined networks, content centric networks and so on. On the other hand, a lot of efforts have been made in cellular network technologies to improve the user experience and as a consequence, emerging cellular network technologies like LTE, VoLTE and 5G have been invented. Due to its demand and importance in present and future scenarios, numerous efforts have been done in the networking domain by the researchers, a lot of work is still ongoing, and many more possibilities have yet to be explored. Therefore, there is a need to keep track of advancements related to the network technologies and further investigate several ongoing research challenges for the ease of users. With this goal in mind, Research Advances in Network Technologies presents the most recent and notable research on network technologies.

Author(s): Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg
Publisher: CRC Press
Year: 2023

Language: English
Pages: 310
City: Boca Raton

Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Acknowledgments
Editors
Contributors
Chapter 1 Energy and Delay Balance Ensemble Scheduling Algorithm for Wireless Sensor Networks
1.1 Introduction
1.2 Scheduling Using BFS and CCDS
1.2.1 BFS Scheduling
1.2.2 Color-Connected Dominant Set (CCDS) Scheduling
1.2.3 Construction
1.3 Related Work
1.4 Energy and Delay Balance Ensemble Scheduling Algorithm
1.5 Methodology
1.6 Experiment
1.7 Results and Discussion
1.8 Conclusion
References
Chapter 2 An Improved RSSI-Based WSN Localization Algorithm for Coal Mine Underground Miners
2.1 Introduction
2.2 Wireless Communication Model and RSSI Ranging Model
2.3 Proposed Method for RSSI Improvement and Localization
2.3.1 RSSI Improvement
2.3.2 Localization Algorithm
2.4 Results and Discussion
2.5 Conclusion
References
Chapter 3 YaraCapper – YARA Rule-Based Automated System to Detect and Alert Network Attacks
3.1 Introduction
3.2 Background
3.2.1 Monitor Mode a.k.a rfmon Mode
3.2.2 Managed Mode
3.2.3 Pre-Authentication Packets
3.2.4 Post-Authentication Packets
3.2.5 Atheros AR9271
3.2.6 YARA
3.3 Literature Survey
3.4 Proposed System
3.4.1 Wi-Fi Chipset
3.4.2 STDIN – Standard Input
3.4.3 STDOUT – Standard Output
3.4.4 Packet Capture Engine
3.4.4.1 Pre-Authentication Capture
3.4.4.2 Post-Authentication Capture
3.4.5 YARA Validation Engine
3.4.5.1 Packet and Rule Cultivator
3.4.5.2 YARA Core Engine
3.4.5.3 Flag File Baker
3.4.6 Mailing Alert Engine
3.4.6.1 Mail Initiator
3.4.6.2 Attachment Adder
3.4.6.3 Mail Launch
3.5 Implementation
3.5.1 Platform and Language Used
3.5.2 Testing of YaraCapper
3.5.3 Delivering the YaraCapper
3.5.3.1 Manual Install
3.5.3.2 Debian Ready VM
3.5.4 Contribution to YaraCapper
3.6 Results and Analysis
3.6.1 Results
3.6.2 Analysis
3.7 Discussion
3.8 Conclusion
References
Chapter 4 Describing Nature-Inspired Networking and Real-Time Task Execution: A Theoretical Study
4.1 Introduction
4.2 Background and Preliminaries
4.3 Proposed Architecture
4.4 Performance Evaluation of Proposed Work
4.5 Conclusion and Future Scope
References
Chapter 5 Memory Characterization of GP-GPU Applications
5.1 Introduction
5.2 Background
5.2.1 GPU Architecture
5.2.2 GPGPUSim Simulator
5.2.3 Cache Characterization
5.2.4 Benchmarks
5.3 Related Work
5.4 Simulation Methodology
5.5 Results
5.6 Conclusion
References
Chapter 6 A Fuzzy Logic-Based Emergency Vehicle Routing Technique for Vehicular Ad-Hoc Networks
6.1 Introduction
6.2 Related Work
6.3 Proposed Fuzzy Logic-Based Congestion Detection and IoT-Based Emergency Routing
6.3.1 Fuzzy Logic-Based Inference System for Congestion Detection
6.4 Simulation Results
6.5 Conclusion
References
Chapter 7 A Fog Cluster-Based Framework for Personalized Healthcare Monitoring
7.1 Introduction
7.2 Preliminaries
7.2.1 Fog Computing
7.2.2 Fog Computing for Healthcare
7.3 Proposed Architecture
7.3.1 Cluster-Based Architecture
7.3.2 Experimental Setup
7.3.3 Application Scenario
7.4 Results and Discussions
7.5 Conclusion
Acknowledgment
References
Chapter 8 QTR: QoS-Aware Traffic Rerouting in OpenFlow-Based Software-Defined Networks
8.1 Introduction
8.2 Related Works
8.3 Methodology
8.3.1 QoS Metrics
8.3.2 End-to-End Delay
8.3.3 Bandwidth
8.3.4 Calculation of Working and Backup Paths in QTR
8.4 Experimental Setup
8.5 Results and Discussion
8.5.1 Analysis on Average End-to-End Delay
8.5.2 Analysis on Bandwidth Utilization
8.5.3 Analysis on Average Recovery Time
8.5.4 Analysis on Packet Loss Ratio
8.6 Conclusion
References
Chapter 9 Application-Based Evaluation of Neural Network Architectures for Edge Devices
9.1 Introduction
9.2 Neural Network Models and Microcontroller Systems
9.2.1 Neural Network Architectures
9.2.2 Microcontroller Systems
9.3 Deploying Neural Network Model on Microcontroller Systems
9.3.1 Quantization for Microcontroller Systems
9.3.2 Using Quantized Neural Network Model in Application
9.4 Experiments and Results
9.4.1 Vision Sensing
9.4.2 Keyword Detection
9.4.3 Gesture Recognition
9.5 Conclusions
References
Chapter 10 Effective Parallel Approach to Enhance the Performance of Cloth Simulation Model for Real-Time Applications
10.1 Introduction
10.2 Literature Review
10.3 Methodology
10.3.1 Design of the Proposed Model
10.3.2 Mass-Spring System for Cloth
10.3.3 Integration Technique
10.3.4 Constraint Enforcement Technique
10.3.5 Collision Detection and Handling
10.3.6 OpenMP Parallel Programming Model
10.3.7 Framework for Physical Simulation
10.4 Results
10.5 Discussion
10.6 Conclusion
References
Chapter 11 Pruning in Recommendation System Using Learned Bloom Filter
11.1 Introduction
11.2 Related Work
11.3 Background and Context
11.3.1 PDS
11.3.2 BF
11.4 Challenges in RS
11.5 Proposed Work
11.5.1 Initial Processing and Insertion Process in the Proposed Approach
11.5.2 Query Process in the Proposed Approach
11.6 Observation and Analysis
11.7 Results
11.8 Conclusion and Future Scope
References
Chapter 12 Performance Evaluation of ARIMA and CRNN for Weather Prediction
12.1 Introduction
12.2 Related Work
12.3 Methodology
12.3.1 Data Set and Preprocessing
12.3.1.1 Standard Scaling-Based Preprocessing
12.3.2 Forecasting Models
12.3.2.1 ARIMA
12.3.2.2 Deep Learning Model CRNN
12.4 Experimental Results and Analysis
12.4.1 Results
12.4.1.1 ARIMA
12.4.1.2 Deep Learning Model CRNN
12.4.1.3 Analysis Between ARIMA and Deep Learning Model CRNN
12.5 Conclusion and Future Work
References
Chapter 13 A Novel Approach to Sorting Algorithm
13.1 Introduction
13.2 Related Works
13.3 Proposed Algorithm
13.3.1 Pseudocode
13.3.2 Flowchart
13.3.3 Explanation of Proposed Algorithm
13.3.4 Algorithm Analysis
13.3.4.1 Best Case
13.3.4.2 Average Case
13.3.4.3 Worst Case
13.3.4.4 Sorted Case
13.3.5 Experimental Evaluation
13.3.6 Limitations
13.3.7 Future Scope
13.4 Conclusion
References
Chapter 14 A New Proposed Sorting Algorithm Using Radix Tree and Binning
14.1 Introduction
14.2 Literature Review
14.3 Proposed Algorithm
14.4 Dataset
14.4.1 Type 1 Dataset
14.4.2 Type 2 Dataset
14.5 Experimental Setup
14.6 Performance Evaluation
14.7 Limitations
14.8 Conclusion
14.9 Future Scope
References
Chapter 15 Grey Wolf Optimizer for Load Balancing in Cloud Computing
15.1 Introduction
15.2 Problem Statement
15.3 Objectives
15.4 Background Studies
15.4.1 Cloud Computing
15.4.2 Load Balancing
15.4.3 Load Balancer
15.4.4 Exercises for Balancing the Load
15.4.5 Allocation of Resources
15.4.6 Migration
15.5 Related Work
15.6 Methodology
15.6.1 Overview of Algorithm
15.6.2 Fitness Function
15.6.3 Algorithm
15.6.3.1 Encircling Prey
15.6.3.2 Hunting
15.6.3.3 Implementation of Proposed Algorithm
15.7 Result Analysis
15.8 Discussion
References
Chapter 16 A COVID-19 Vaccine Notifier Android App "CoWin Mitra"
16.1 Introduction
16.2 Literature Survey
16.3 Proposed Approach
16.3.1 SDLC Models
16.3.2 Project Requirements
16.3.3 E-R Diagram
16.3.4 Message Sequence Chart
16.4 Implementation
16.4.1 Technologies Used
16.4.1.1 Server-Side Technologies
16.4.1.2 Client-Side Technologies
16.4.2 Hardware and Software Requirements
16.4.3 Methodology
16.5 Result
16.6 Testing
16.6.1 Black Box Testing
16.6.1.1 Robo Testing
16.6.2 White Box Testing
16.7 Conclusion
Acknowledgment
References
Chapter 17 Mathematical Modeling of Glucocerebrosidase Signaling Networks Linked to Neurodegeneration
17.1 Introduction
17.2 Methods
17.3 Biochemical Pathway Modeling
17.3.1 Modeling Mutated GBA-Related Cellular Networks in AD Condition
17.3.2 Modeling of Mutated GBA Cellular Networks in PD Condition
17.3.3 Accumulation of GlcCer, Low Levels of GCase, Glucose, and Ceramide in AD Compared to Normal Condition
17.3.4 High Levels of GlcCer, ß-Amyloid, and Low GBA in Diseased State
17.4 Discussion
17.5 Conclusion
Acknowledgments
References
Chapter 18 Empirical Analysis of The Performance of Routing Protocols in Opportunistic Networks
18.1 Introduction
18.2 Routing Protocols
18.2.1 Direct Delivery Protocol
18.2.2 First Contact Protocol
18.2.3 Spray-and-Wait Routing Protocol
18.2.4 Multischeme Spray-and-Wait Protocol
18.2.5 Multischeme Adaptive Spray-and-Wait Protocol
18.3 ONE Simulator
18.4 Simulation Environment Setup
18.5 Performance Metrics
18.6 Simulation Results
18.6.1 Impact of Different Time to Live
18.6.2 Impact of Different Buffer Sizes
18.7 Conclusion
Acknowledgement
References
Chapter 19 Reduce the Privacy and Security Concerns of Current Social Media Platforms Using Blockchain Technology
19.1 Introduction
19.2 Literature Review
19.3 Existing System
19.4 System Design
19.4.1 Blockchain Design
19.4.2 Incentives/Gains for the User
19.4.3 Credit Scores
19.5 Architectural Design
19.6 Component Design
19.7 Result and Discussion
19.7.1 Scalability
19.8 Conclusion and Future Enhancement
19.8.1 Scope for Future Enhancement
References
Index