CLOUD COMPUTING CLOUD COMPUTING ARCHITECTURE and APPLICATIONS CLOUD COMPUTING ARCHITECTURE and APPLICATIONS Edited by Jaydip Sen

Total Page:16

File Type:pdf, Size:1020Kb

CLOUD COMPUTING CLOUD COMPUTING ARCHITECTURE and APPLICATIONS CLOUD COMPUTING ARCHITECTURE and APPLICATIONS Edited by Jaydip Sen Edited by by Edited CLOUD COMPUTING COMPUTING CLOUD ARCHITECTURE AND APPLICATIONS Jaydip Sen Jaydip CLOUD COMPUTING ARCHITECTURE AND APPLICATIONS Edited by Jaydip Sen Prof. Jaydip Sen has around 25 years of experience in the field of communica- tion network protocol design, network analysis, cryptography, and network Edited by Jaydip Sen security and analytics. He worked in reputed organizations like Oil and -Nat ural Gas Corporation Ltd., India; Oracle India Pvt. Ltd., India; Akamai Technology Pvt. Ltd., India; Tata Consultancy Services Ltd., India; National Institute of Science and Technology, APPLICATIONS AND ARCHITECTURE India; and Calcutta Business School, India. Currently, he is associated with Praxis Business School, Kolkata, India, as a professor in the Department of Analytics and Information Technology. Prior to this, he was a lead scientist in the Innovation Lab of Tata Consultancy Services, India, where he led the research and development activities in wireless communi- cation, embedded systems and ubiquitous applications, design, and development. He has over 16 years of research and development experience. His research areas include securi- ty in wired and wireless networks, intrusion detection systems, secure routing protocols in wireless ad hoc and sensor networks, secure multicast and broadcast communication in next-generation broadband wireless networks, trust- and reputation-based systems, quality of service in multimedia communication in wireless networks and cross-layer optimization-based resource allocation algorithms in next-generation wireless networks, sensor networks, and privacy issues in ubiquitous and pervasive communication, big data analytics, R, Python, Hadoop and MapReduce programming. He has more than 120 publi- cations in reputed international journals and referred conference proceedings and 6 book chapters in books published by internationally renowned publishing houses, e.g., Springer, CRC Press, IGI Global, etc. He has delivered expert talks and keynote lectures in various international conferences and symposia. He is a senior member of ACM and IEEE. He is also an active member of the security group of IEEE 802.16 standard body and has submitted a number of proposals for the evolving 802.16m standard and ETSI. His biography has been listed in Marquis Who’s Who in the World every year since 2008. Prof. Sen obtained Bach- elor of Engineering (BE) in Mechanical Engineering with honors from Jadavpur University, Kolkata, India, in the year 1988 and Master of Technology (MTech) in Computer Science with honors from the Indian Statistical Institute, Kolkata, in 2001. In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, it has now become mandatory to exploit the power of massively parallel architecture for fast computation. Cloud computing provides a cheap source of such com- puting framework for large volume of data for real-time applications. It is, therefore, not surprising to see that cloud computing has become a buzzword in the computing fraternity over the last decade. This book presents some critical applications in cloud frameworks along with some innovation design of algorithms and architecture for deployment in cloud environment. It is a valuable source of knowledge for researchers, engineers, practitioners, and graduate and doctoral students working in the field of cloud computing. It will also be useful for faculty members of graduate schools and universities. ISBN 978-953-51-3243-1 © iStock / Pogonici / Pogonici © iStock INTECHOPEN.COM CLOUD COMPUTING - ARCHITECTURE AND APPLICATIONS Edited by Jaydip Sen Cloud Computing - Architecture and Applications http://dx.doi.org/10.5772/62794 Edited by Jaydip Sen Contributors Shanrong Zhao, Xiaoying Wang, Guojing Zhang, Mengqin Yang, Jian Wang, Yun Long, Sergey Andreev, Roman Florea, Aleksandr Ometov, Adam Surak, Yevgeni Koucheryavy, Muhammad Ahmad Ashraf, Waleed Tariq Sethi, Abdullah Alfakhri, Saleh Alshebeili, Amr Alasaad Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia © The Editor(s) and the Author(s) 2017 The moral rights of the editor(s) and the author(s) have been asserted. All rights to the book as a whole are reserved by InTech. The book as a whole (compilation) cannot be reproduced, distributed or used for commercial or non-commercial purposes without InTech's written permission. Enquiries concerning the use of the book should be directed to InTech's rights and permissions department ([email protected]). Violations are liable to prosecution under the governing Copyright Law. Individual chapters of this publication are distributed under the terms of the Creative Commons Attribution 3.0 Unported License which permits commercial use, distribution and reproduction of the individual chapters, provided the original author(s) and source publication are appropriately acknowledged. More details and guidelines concerning content reuse and adaptation can be found at http://www.intechopen.com/copyright-policy.html. Notice Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Romina Skomersic Technical Editor SPi Global Cover InTech Design team First published June, 2017 Printed in Croatia Legal deposit, Croatia: National and University Library in Zagreb Additional hard copies can be obtained from [email protected] Cloud Computing - Architecture and Applications, Edited by Jaydip Sen p. cm. Print ISBN 978-953-51-3243-1 Online ISBN 978-953-51-3244-8 PUBLISHED BY World’s largest Science, Technology & Medicine Open Access book publisher 101,000+ 3,000+ INTERNATIONAL 99+ MILLION OPEN ACCESS BOOKS AUTHORS AND EDITORS DOWNLOADS AUTHORS AMONG BOOKS 12.2% DELIVERED TO TOP 1% AUTHORS AND EDITORS 151 COUNTRIES MOST CITED SCIENTISTS FROM TOP 500 UNIVERSITIES SON REU M TE O R H S T Selection of our books indexed in the BOOK CITATION Book Citation Index in Web of Science™ INDEX I Core Collection (BKCI) N D E X E D Interested in publishing with us? Contact [email protected] Numbers displayed above are based on data collected at the time of publication, for latest information visit www.intechopen.com Contents Preface VII Chapter 1 State-of-the-Art Antenna Technology for Cloud Radio Access Networks (C-RANs) 1 Waleed Tariq Sethi, Abdullah Alfakhri, Muhammad Ahmad Ashraf, Amr G. Alasaad and Saleh Alshebeili Chapter 2 Cloud Computing for Next-Generation Sequencing Data Analysis 29 Shanrong Zhao, Kirk Watrous, Chi Zhang and Baohong Zhang Chapter 3 Green-Aware Virtual Machine Migration Strategy in Sustainable Cloud Computing Environments 53 Xiaoying Wang, Guojing Zhang, Mengqin Yang and Lei Zhang Chapter 4 M-ary Optical Computing 71 Jian Wang and Yun Long Chapter 5 Networking Solutions for Integrated Heterogeneous Wireless Ecosystem 103 Roman Florea, Aleksandr Ometov, Adam Surak, Sergey Andreev and Yevgeni Koucheryavy Preface Cloud computing transforms the way information technology (IT) is consumed and man‐ aged, promising improved cost-efficiencies, accelerated innovation, faster time to market, and the enhanced ability to scale applications on demand. According to Gartner, while the hype grew exponentially during 2008 and continued since then, it is clear that there is a ma‐ jor shift toward the cloud computing model and the benefits may be substantial. With the advent of Internet of Things and big data, humongous amount of data is available today. This extraordinarily large volume of data needs to be analyzed for achieving valuable in‐ sights of business. Cloud computing is best suited for handling such volume of data, which is diverse in nature and needs real-time processing. In addition, the cloud services can be hired based on computing requirement without incurring any large fixed overhead cost of IT infrastructure. However, as the shape of the cloud computing is emerging and develop‐ ing rapidly both conceptually and in real-world applications, the legal/contractual, econom‐ ic, service quality, interoperability, security, and privacy issues still pose significant challenges. In other words, in spite of the several advantages that paradigm of cloud com‐ puting has brought along with it, there are several concerns and issues that need to be ad‐ dressed before further ubiquitous adoption of it happens. First, in cloud computing, the user may not have the kind of control over his/her data or performance of his/her applications that he/she may need or the ability to audit or change the processes and policies under which he/she must work. Different parts of an application might be in different places in the cloud that can have an adverse impact on the performance of the application. Complying with regulations may be difficult especially when talking about cross-border issues—it should also be noted that regulations still need to be developed to take all aspects of cloud computing into account. It is quite natural that monitoring and maintenance is not as simple a task as compared to what it is for PCs sitting in the intranet. Second, the cloud customers may risk losing data by having them locked
Recommended publications
  • Cytoscape: the Network Visualization Tool for Genomespace Workflows
    F1000Research 2014, 3:151 Last updated: 21 JUL 2021 SOFTWARE TOOL ARTICLE Cytoscape: the network visualization tool for GenomeSpace workflows [version 2; peer review: 3 approved] Barry Demchak1, Tim Hull1, Michael Reich2, Ted Liefeld2, Michael Smoot3, Trey Ideker1, Jill P. Mesirov2 1Department of Medicine, University of California, San Diego, La Jolla, CA, 92093-0688, USA 2Broad Institute of Massachusetts Institute of Technology and Harvard, Cambridge, MA , 02142, USA 3Qualcomm, Inc, San Diego, CA , 92121, USA v2 First published: 01 Jul 2014, 3:151 Open Peer Review https://doi.org/10.12688/f1000research.4492.1 Latest published: 26 Aug 2014, 3:151 https://doi.org/10.12688/f1000research.4492.2 Reviewer Status Invited Reviewers Abstract Modern genomic analysis often requires workflows incorporating 1 2 3 multiple best-of-breed tools. GenomeSpace is a web-based visual workbench that combines a selection of these tools with mechanisms version 2 that create data flows between them. One such tool is Cytoscape 3, a (revision) popular application that enables analysis and visualization of graph- 26 Aug 2014 oriented genomic networks. As Cytoscape runs on the desktop, and not in a web browser, integrating it into GenomeSpace required version 1 special care in creating a seamless user experience and enabling 01 Jul 2014 report report report appropriate data flows. In this paper, we present the design and operation of the Cytoscape GenomeSpace app, which accomplishes 1. Aris Floratos, Columbia University, New this integration, thereby providing critical analysis and visualization functionality for GenomeSpace users. It has been downloaded over York, NY, USA 850 times since the release of its first version in September, 2013.
    [Show full text]
  • Comparison of Ftp V/S Ftps
    www.ijcrt.org © 2018 IJCRT | Volume 6, Issue 1 March 2018 | ISSN: 2320-2882 COMPARISON OF FTP V/S FTPS Subhasish Das ,VIT Kusumakar Kashyap,VIT Abstract: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet.FTP is built on a clientserver architecture and uses separate control and data connections between the client and the server.FTP users may authenticate themselves using clear sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). FTPS helps to encrypt and transfer private information within the constraints of regulatory requirements. Many industries rely on the timely and effective transfer of files to provide services to consumers. For example, the healthcare industry requires exchanging sensitive information between healthcare providers, insurance providers, and eligibility services, to name a few. Regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA) provide requirements for the use and disclosure of patients'private healthcare information (PHI). FTP services exchange information between caregivers and insurance companies, but the FTP protocol lacks the level of protection needed to meet regulatory requirements for the safeguarding of PHI. However, encrypting private information over the wire using FTPS helps meet this requirement. Introduction Working of FTP FTP control connection created after TCP connection is established. Internal FTP commands are passed over this logical connection based on formatting rules established by the Telnet protocol.Each command sent by the client receives a reply from the server to indicate whether it succeeded or failed.
    [Show full text]
  • Fast and Secure Protocol Seminar Report
    Fast And Secure Protocol Seminar Report Ceriferous Webb sometimes traipsing his philopena definitely and sympathize so interestingly! Agley Denis taring some neologism and glories his laryngoscopy so demonstratively! Footworn Irvine moan some anns after abstractionist Gerold wash smooth. Learn more fun and national stakeholders should i post a seminar and how to all students Substantial data is geographically apart from real world that sensors in a spelling error correction is. Database encryption: an overview to contemporary challenges and design considerations. This seminar is used by a protocol for an algorithm, reports from fbi heads are. The implementation of such security measures between vehicles and Fog nodes will prevent primitive attacks before they reach and exploit cloud system too, and would help in improving the overall road safety. Ongoing campaigns should be visible throughout the year. Division Multiplexing, Data Compression. While smartphones and recover from addressing various fields and fast and system and training opportunities that protect their blood sugars. Genetic compatibility tests should report was then can be determined necessary industrial revolution look. PM to dislocate a flexible healthcare access control value which simply the benefits of context awareness and discretionary access. Robbery also includes crimes involving pretend weapons or those in which the weapon is not seen by the victim, but the robber claims to possess one. PDF SEMINAR REPORT Entitled NEAR FIELD. Field of concentration a comprehensive report and part oral presentation required. In order to support emerging online activities within the digital information infrastructure, such as commerce, healthcare, entertainment and scientific collaboration, it is increasingly important to verify and protect the digital identity of the individuals involved.
    [Show full text]
  • Study on Security Levels in Cloud Computing
    International Journal of Advanced Computational Engineering and Networking, ISSN(p): 2320-2106, ISSN(e): 2321-2063 Volume-6, Issue-9, Sep.-2018, http://iraj.in STUDY ON SECURITY LEVELS IN CLOUD COMPUTING 1K. SWATHI, 2BADDAM INDIRA 1Research Scholar, Dept. of Computer Science & Engineering, University college of Engineering, OU, Hyderabad 2Associate Professor, Dept. of Computer Science, Kasturba Degree & PG College, Hyderabad E-mail: [email protected], [email protected] Abstract - Organization’s adapt to cloud computing is increasing rapidly as it offers many potential benefits to small and medium scale firm such as fast deployment, pay-for-use, low costs, scalability, rapid provisioning, rapid elasticity, pervasive network access, greater flexibility, and on-demand security controls. Beside its advantages, cloud computing has its own major disadvantages which is obstructing in moving cloud to vogue. Major concern on cloud computing is data and its security. Security attacks are at various levels in cloud computing which is becoming very difficult to handle with. The levels of cloud computing security include Network level, Host Level, and Application level. This paper demonstrates various possible attacks at each level of cloud computing security. It also helps in understanding the necessary measures required to be taken in order to get rid of the attacks. Keywords - Cloud Computings; Security Levels; Phishing Attack; Malware Injection; FASP; Hypervisor; DNSSEC; Virtual Server; VMware . I. INTRODUCTION and every type of service requires different levels of security in order to protect the cloud. Current hot topic in information technology discussions is cloud computing and the core part in it The common and main goals of security requirements is its security.
    [Show full text]
  • Cytoscape: the Network Visualization Tool for Genomespace Workflows
    UC San Diego UC San Diego Previously Published Works Title Cytoscape: the network visualization tool for GenomeSpace workflows. Permalink https://escholarship.org/uc/item/1qr8t9n8 Authors Demchak, Barry Hull, Tim Reich, Michael et al. Publication Date 2014 DOI 10.12688/f1000research.4492.2 Peer reviewed eScholarship.org Powered by the California Digital Library University of California F1000Research 2014, 3:151 Last updated: 15 SEP 2014 SOFTWARE TOOL Cytoscape: the network visualization tool for GenomeSpace workflows [v2; ref status: indexed, http://f1000r.es/47f] Barry Demchak1, Tim Hull1, Michael Reich2, Ted Liefeld2, Michael Smoot3, 1 2 Trey Ideker , Jill P. Mesirov 1Department of Medicine, University of California, San Diego, La Jolla, 92093-0688, USA 2Broad Institute of Massachusetts Institute of Technology and Harvard, Cambridge, 02142, USA 3Qualcomm, Inc, San Diego, 92121, USA v2 First published: 01 Jul 2014, 3:151 (doi: 10.12688/f1000research.4492.1) Open Peer Review Latest published: 26 Aug 2014, 3:151 (doi: 10.12688/f1000research.4492.2) Invited Referee Responses Abstract Modern genomic analysis often requires workflows incorporating multiple 1 2 3 best-of-breed tools. GenomeSpace is a web-based visual workbench that combines a selection of these tools with mechanisms that create data flows version 1 between them. One such tool is Cytoscape 3, a popular application that published report report report 01 Jul 2014 enables analysis and visualization of graph-oriented genomic networks. As 1 1 1 Cytoscape runs on the desktop, and not in a web browser, integrating it into GenomeSpace required special care in creating a seamless user experience and enabling appropriate data flows.
    [Show full text]
  • Ultra High-Speed Transport Technology WHITE PAPER
    Ultra High-Speed Transport Technology A theoretical study and its engineering practice of Aspera FASP TM over 10Gbps WANs with leading storage systems WHITE PAPER WHITE PAPER Ultra High-Speed Transport Technology The Future of Wide Area Data Movement TABLE OF CONTENTS HIGHLIGHTS 1. Introduction 3 FASP TM Overview Aspera’s FASP™ transfer technology 2. Performance limitations of TCP 4 is an innovative software that 3. New rate-based data transmission technology in FASP 6 eliminates the fundamental bottlenecks of conventional file 3.1. Rate-based congestion control 7 transfer technologies such as FTP, HTTP, and Windows CIFS and 3.2. Decoupled reliability and congestion control 7 dramatically speeds transfers over public and private IP networks. 3.3. Advanced bandwidth sharing and management 8 The approach achieves perfect 3.4. Performance measurement 9 throughput efficiency, independent of the latency of the path and is 4. Beyond the WAN - the “last foot” to the storage appliance 10 robust to packet losses. In addition, users have extra-ordinary control 4.1. Disk/storage rate adaptation 10 over individual transfer rates and bandwidth sharing and full visibility 5. Mutli-Gbps WAN transfers performance testing 12 into bandwidth utilization. 5.1. Experimental setup 13 Use Cases 5.2. Experimental results 14 • Enterprise-wide file movement 5.3. Best practices learned for maximum performance 17 • High-volume content ingest 6. Conclusions 17 • High-performance content distribution Reference 19 • FTP/SFTP replacement for high performance transfers Benefits • Maximum speed and predictable delivery times for digital assets of any size, over any distance or network conditions. • Complete security is built-in, including secure end-point authentication, on-the-fly data encryption, and integrity verification.
    [Show full text]
  • Modeling Genomic Regulatory Networks with Big Data
    TIGS-1108; No. of Pages 10 Review Modeling genomic regulatory networks with big data Hamid Bolouri Division of Human Biology, Fred Hutchinson Cancer Research Center (FHCRC), 1100 Fairview Avenue North, PO Box 19024, Seattle, WA 98109, USA High-throughput sequencing, large-scale data generation throughput sequencing-based technologies and to compu- projects, and web-based cloud computing are changing tational modeling and analysis. At the same time, GRNs how computational biology is performed, who performs are both complex (i.e., can exhibit hard-to-predict/nonline- it, and what biological insights it can deliver. I review here ar behaviors) and complicated (i.e., they are composed of the latest developments in available data, methods, and large numbers of component parts and interactions). For software, focusing on the modeling and analysis of the this reason, mathematical and computational approaches gene regulatory interactions in cells. Three key findings are essential in GRN research. are: (i) although sophisticated computational resources Cellular behaviors have traditionally been character- are increasingly available to bench biologists, tailored ized as being mediated through highly distinct processes ongoing education is necessary to avoid the erroneous (e.g., DNA replication) and pathways (e.g., the canonical use of these resources. (ii) Current models of the regula- WNT signaling pathway). However, because of widespread tion of gene expression are far too simplistic and need interactions among cellular processes and pathways, the updating. (iii) Integrative computational analysis of large- use of unbiased, genome-wide technologies is essential to scale datasets is becoming a fundamental component of the discovery and characterization of GRNs.
    [Show full text]
  • Video in the Cloud Tcp Congestion Control Optimization for Cloud Computing
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2012 VIDEO IN THE CLOUD TCP CONGESTION CONTROL OPTIMIZATION FOR CLOUD COMPUTING Rafael Alvarez-Horine San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Alvarez-Horine, Rafael, "VIDEO IN THE CLOUD TCP CONGESTION CONTROL OPTIMIZATION FOR CLOUD COMPUTING" (2012). Master's Projects. 284. DOI: https://doi.org/10.31979/etd.mwak-8awt https://scholarworks.sjsu.edu/etd_projects/284 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. VIDEO IN THE CLOUD TCP CONGESTION CONTROL OPTIMIZATION FOR CLOUD COMPUTING A Writing Project Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Rafael Alvarez-Horine November 2012 © 2012 Rafael Alvarez-Horine ALL RIGHTS RESERVED ii VIDEO IN THE CLOUD TCP CONGESTION CONTROL OPTIMIZATION FOR CLOUD COMPUTING by Rafael Alvarez-Horine APPROVED FOR THE DEPARTMENT OF COMPUTER SCIENCE SAN JOSÉ STATE UNIVERSITY November 2012 Dr. Melody Moh Department of Computer Science Dr. Sami Khuri Department of Computer Science Dr. Chris Pollett Department of Computer Science iii ABSTRACT VIDEO IN THE CLOUD TCP CONGESTION CONTROL OPTIMIZATION FOR CLOUD COMPUTING by Rafael Alvarez-Horine With the popularity of video streaming, a new type of media player has been created called the adaptive video player that adjusts video quality based on available network bandwidth.
    [Show full text]
  • Integrative Genomic Analysis by Interoperation of Bioinformatics Tools in Genomespace
    Integrative genomic analysis by interoperation of bioinformatics tools in GenomeSpace The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Qu, Kun et al. “Integrative Genomic Analysis by Interoperation of Bioinformatics Tools in GenomeSpace.” Nature Methods 13.3 (2016): 245–247. As Published http://dx.doi.org/10.1038/nmeth.3732 Publisher Nature Publishing Group Version Author's final manuscript Citable link http://hdl.handle.net/1721.1/105733 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. HHS Public Access Author manuscript Author ManuscriptAuthor Manuscript Author Nat Methods Manuscript Author . Author manuscript; Manuscript Author available in PMC 2016 July 18. Published in final edited form as: Nat Methods. 2016 March ; 13(3): 245–247. doi:10.1038/nmeth.3732. Integrative genomic analysis by interoperation of bioinformatics tools in GenomeSpace Kun Qu#1, Sara Garamszegi#2, Felix Wu#2, Helga Thorvaldsdottir2, Ted Liefeld2,3, Marco Ocana2,3, Diego Borges-Rivera4, Nathalie Pochet2,5, James T. Robinson2,3, Barry Demchak3, Tim Hull3, Gil Ben-Artzi6,7, Daniel Blankenberg8, Galt P. Barber9, Brian T. Lee9, Robert M. Kuhn9, Anton Nekrutenko8, Eran Segal6, Trey Ideker3, Michael Reich2,3, Aviv Regev2,4,10, Howard Y. Chang1,11, and Jill P. Mesirov2,3 1Program in Epithelial Biology, Stanford University School of Medicine, Stanford, CA, USA 2The
    [Show full text]
  • Evaluation of Communication Protocols Between Vehicle and Server: Evaluation of Data Transmission Overhead by Communication Prot
    DEGREE PROJECT IN INFORMATION TECHNOLOGY, SECOND CYCLE STOCKHOLM, SWEDEN 2016 Evaluation of communication protocols between vehicle and server Evaluation of data transmission overhead by communication protocols TOMAS WICKMAN KTH ROYAL INSTITUTE OF TECHNOLOGY INFORMATION AND COMMUNICATION TECHNOLOGY Evaluation of communication protocols between vehicle and server Evaluation of data transmission overhead by communication protocols Tomas Wickman 2016-06-29 Master’s Thesis Examiner Gerald Q. Maguire Jr. Academic adviser Anders Västberg KTH Royal Institute of Technology School of Information and Communication Technology (ICT) Department of Communication Systems SE-100 44 Stockholm, Sweden Abstract | i Abstract This thesis project has studied a number of protocols that could be used to communicate between a vehicle and a remote server in the context of Scania’s connected services. While there are many factors that are of interest to Scania (such as response time, transmission speed, and amount of data overhead for each message), this thesis will evaluate each protocol in terms of how much data overhead is introduced and how packet loss affects this overhead. The thesis begins by giving an overview of how a number of alternative protocols work and what they offer with regards to Scania’s needs. Next these protocols are compared based on previous studies and each protocol’s specifications to determine which protocol would be the best choice for realizing Scania’s connected services. Finally, a test framework was set up using a virtual environment to simulate different networking conditions. Each of the candidate protocols were deployed in this environment and setup to send sample data. The behaviour of each protocol during these tests served as the basis for the analysis of all of these protocols.
    [Show full text]
  • FASP-Fast and Secure Protocol.Pdf
    FASP-Fast And Secure Protocol A SEMINAR REPORT Submitted by ATUL M In partial fulfillment for the award of the degree Of B-TECH DEGREE In COMPUTER SCIENCE & ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE & TECHNOLOGY KOCHI- 682022 JULY, 2010 Division of Computer Engineering School of Engineering Cochin University of Science & Technology Kochi-682022 ___________________________________________________ ______ CERTIFICATE Certified that this is a bonafide record of the seminar work titled FASP-Fast And Secure Protocol Done by Atul M of VII semester Computer Science & Engineering in the year 2010 in partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Computer Science & Engineering of Cochin University of Science & Technology Dr.David Peter S Dr. Sheena Mathew Head of the Division Seminar Guide ACKNOWLEDGEMENT I thank GOD almighty for guiding me throughout the seminar. I would like to thank all those who have contributed to the completion of the seminar and helped me with valuable suggestions for improvement. I am extremely grateful to Dr. David Peter, HOD, Division of Computer Science, for providing me with best facilities and atmosphere for the creative work guidance and encouragement. I would like to thank my coordinator, Mr. Sudheep Elayidom, Sr. Lecturer, Division of Computer Science, and my guide Dr. Sheena Mathew , Reader , Division of Computer Science , SOE for all help and support extended to me. I thank all the Staff members of my college and my friends for extending their cooperation during my seminar. Above all I would like to thank my parents without whose blessings, I would not have been able to accomplish my goal.
    [Show full text]
  • D4.1:Final Use Cases from Related Work
    ENDEAVOUR: D4.1 :Final Use Cases from related work Christoph Dietzel, M. Bleidner, Thomas King, Mitch Gusat, Philippe Owezarski To cite this version: Christoph Dietzel, M. Bleidner, Thomas King, Mitch Gusat, Philippe Owezarski. ENDEAVOUR: D4.1 :Final Use Cases from related work. DE-CIX; IBM Zürich; CNRS-LAAS. 2015. hal-01965669 HAL Id: hal-01965669 https://hal.laas.fr/hal-01965669 Submitted on 26 Dec 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. ENDEAVOUR: Towards a flexible software-defined network ecosystem Project name ENDEAVOUR Project ID H2020-ICT-2014-1 Project No. 644960 Working Package Number 4 Deliverable Number 4.1 Document title Final Use Cases from Related Work Document version 1.0 Editor in Chief Dietzel, DE-CIX Authors Dietzel, Bleidner, King, Gusat Date 06/07/2015 Reviewer UCLO Date of Review 04/12/2015 Status Public WP4 / D4.1 ENDEAVOUR Version 1.0 Revision History Date Version Description Author 18/06/15 0.1 First draft Dietzel, Bleidner 25/06/15 0.2 Integrated Sections 2.4 and 2.6.3. Gusat, Kathareios 26/06/15 0.3 Improved structure, content and Dietzel, Bleidner, wording King 19/06/15 0.4 Minor changes Uhlig, Kathareios 02/07/15 0.5 Minor changes Dietzel, Bleidner 03/07/15 0.6 Add SoA on unsupervised attack de- Owezarski tection 26/11/15 0.7 Included list of acronyms Dietzel, Bleidner 01/12/15 0.8 Added a summary Dietzel, Bleidner 04/12/15 0.9 Review minor corrections Canini, Chiesa 10/12/15 1.0 Final improved version Dietzel, Bleidner H2020-ICT-2014-1 Project No.
    [Show full text]