The tremendous growth in the field of modern communication and network systems places de- mands on the security. As the network complexity grows, the need for the automated detection and timely alert is required to detect the abnormal activities in the network. To diagnose the sys- tem against the malicious signatures, a highspeedNetwork Intrusion Detection System is re- quired against the attacks. In the network security applications, Bloom Filters are the key building block. The packets from the highspeed link can be easily processed by Bloom Filter using state- of-art hardware based systems. As Bloom Filter and its variant Counting Bloom Filter suffer from False Positive Rate, Multi Hash Counting Bloom Filter architecture is proposed. The proposed work, constitute parallel signature detection improves the False Positive Rate, but the throughput and hardware complexity suffer. To resolve this, a Multi-Level Ranking Scheme is introduced which deduces the 13% - 16% of the power and increases the throughput to 23% - 30%. This work is best suited for signature detection in highspeednetwork.
The explosive growth in Internet deployment for a con- stantly growing variety of applications has created a massive increase in demand for network performance parameters, such as throughput, latency, and packet loss rate [1-6], which are very important for providing differ- entiated network services. Accurate network performance parameters can help to improve the quality of network services, including active and passive resource manage- ment, traffic engineering, as well as providing quality of service (QoS) guarantees for end-user applications. In par- ticular, as modern network management systems shift their focus forward service-level and application-level management, the network monitoring process requires more data to be collected in a higher frequency.
The seamless handover management is a challenging issue in heterogeneous wireless networks. To provide seamless handover in heterogeneous networks, IEEE organization had approved a new standard in 2008 named IEEE802.21, Media Independent Handover (MIH) which enables handover in heterogeneous network with no perceivable interruption to an on-going voice or video conversation . MIH provides link conﬁguration, radio measurement reporting, new link discovery, and resource availability check. However, it does not include handover decision making which is the heart of the handover process [39, 40]. Handover decision is crucial for selecting the correct target and triggering handover at the right time so that the quality of the telecardiology services can be maintained at the acceptable level.
With the large-scale construction of electrified railway in our country, especially, the high-speed railway opening, reliability problem increasingly cause the attention of people . As the first level of power load, electrified railway traction power supply system needs to provide stable and reliable power system of the external power supply. Due to the highspeed rail (including passenger dedicated line) operating speed is high, so the external power supply in the event of failure, may result in trac- tion power supply system of power supply interruption, directly affect high-speed railway security, reliable and efficient operation. So on the outside of the highspeed railway power supply scheme is essential in the design of power supply reliability assessment, the quantitative cal- culation of the external power supply reliability, accurate identification of external power supply of the weak links, optimizing the design of the external power supply scheme, has important theoretical significance and ap- plication value.
Packet capture is the act of capture the data packets across a computer network. Packet captures is used by the network administrators and security engineers for the purposes of Monitor network traffic, analyzes traffic patterns, Identify and troubleshoot network problems. Problem statement: The Conventional firewall is performed the packet capture followed by allowing or disallowing the packet as per user specified policy. Approach: our approach is to implement the Deep packet capture (DPC), Deep packet Inspection (DPI) and also analyze the packet in effective manner. This approach is helpful for monitor the all activates in the public or private network. Deep packet capture (DPC) is the act of capturing, at full networkspeed, complete network packets payload, crossing a network with a high traffic rate. Deep packet inspection (DPI) to review network packet data, perform forensics analysis to uncover the root cause of network problems, identify security threats, and ensure data communications and network usage complies with outlined policy. Some DPCs can be coupled with DPI and can result as, inspect, and analyze all networks traffic in real-time.
Abstract. Cyber-Physical System (CPS) is a rising technology that utilizes computation and storage resources for sensing, processing, analysis, predicting, understanding of field-data, and then uses communication resources for interaction, intervene, and interface management, and finally provides control for systems so that they can inter-operate, evolve, and run in a stable evidence-based environment. There are two major demands when building the storage infrastructure for a CPS cluster to support above-mentioned functionalities: (1) highI/O and network throughput requirements during runtime, and (2) low latency demand for disaster recovery. To address challenges brought by these demands, in this paper, we propose a complete solution called “AutoReplica” – an automatic and scalable data replication manager in distributed computation and storage infrastructure of cyber-physical systems, using tiering storage with SSD (solid state disk) and HDD (hard disk drive). Specifically, AutoReplica uses SSD to absorb hot data and to maximize I/Os, and its intelligent replication scheme further helps to recovery from disaster. To effectively balance the trade-off between I/O performance and fault tolerance, AutoReplica utilizes the SSDs of remote CPS server nodes (which are connected by highspeed fibers) to replicate hot datasets cached in the SSD tier of the local CPS server node. AutoReplica has three approaches to build the replica cluster in order to support multiple SLAs. AutoReplica automatically balances loads among nodes, and can conduct seamlessly online migration operation (i.e., migrate-on-write scheme), instead of pausing the subsystem and copying the entire dataset from one node to the other. Lastly, AutoReplica supports parallel prefetching from both primary node and replica node(s) with a new dynamic optimizing streaming technique to improve I/O performance. We implemented AutoReplica on a real CPS infrastructure, and experimental results show that AutoReplica can significantly reduce the total recovery time with slight overhead compared to the no replication cluster and traditional replication clusters.
DOI: 10.4236/cn.2018.104013 154 Communications and Network access to services that offer information on demand at a very high data commu- nication speed because it was designed to provide 3 times faster speed than 3G. It has higher data rates of about 300 Mbps peak downlink and 75 Mbps peak up- link. LTE supports scalable carrier bandwidths from 1.4 MHz to 20 MHz and supports both Frequency Division Duplex (FDD) and Time Division Duplex (TDD); thus resulted to better performance than 3G. LTE gives QoS to agencies of all sizes and people of all races including those in remote rural areas without wireless internet coverage. LTE supporting technology includes OFDM which can achieve the targeted high data rates with simpler implementation and rela- tively low cost and power efficient hardware . It removes the limitations of previous wireless technology by deploying OFDMA for downlink and SC-FDMA technology for uplink. SC-FDMA is technically similar to OFDMA but it suits better for hand-held devices because it is less demanding in battery power. LTE uses MIMO technology to send data, thereby, minimizing noise effect, increase throughput, and spectrum utilization. The basic idea of MIMO is to use multiple smart antennas at the receiver end and use multiple transmitters when sending the data. LTE is the technological path followed to achieve 4G network speeds.
ABSTRACT: Now-a-days a number of applications require very high-speed data processing like online banking, mobile banking, live streaming etc. This proposed work shows that how the variable length and highspeed FIFO buffer provide large memory capacity for data packets. A FIFO that is small in size can’t do justice with the transfer performance. Due to the fluctuation in the speed of network (sometimes failure of link) and real-time packet processing speed at the receiver, it is necessary to receive the complete packets of a frame to increase the throughput. This paper proposed a highspeed and variable length FIFO scheme for high-speed data transfer. Also the target of this paper is over the good-put as well as throughput of the packet data.
This paper mainly introduces some related problems about special mobile communication signal based on TD-LTE and TD-SCDMA in high-speed railway, summaries the main difficulty of TD-LTE coverage in high-speed railway and analyses TD & LTE wireless network coverage characteristics and key technologies under the environment of high-speed railway. First, we make a contrast of the coverage range of TD<E uplink and downlink in ordinary and special situations. Then we consider effective cover radius, the distance and grazing angle between stations and railway in 2G/3G/4G networks, calcu- late different distance between stations. Last, we did capacity planning for TD & LTE as telephone traffic throughput required in high-speed railway. The result shows that distance between stations is limited by LTE on sharing sta- tion address. Using single RRH with two antennas, the antenna height is 30m, and the speed of the train is 250 KM/h, the RRH distance among different cells can be 1177 m, and the RRH distance among same cells can be 1311 m. In the tunnel scene, the leakage cable cover is used and the station space dis- tance of TD & LTE is 0.5 km. Tunnel station should move the switch belt to outdoors as much as possible without switching. This paper finished the link budget, protection distance measurement of cells and study of coverage me- thod in the tunnel scene. The result helps guiding in planning, designing and optimizing for high-speed railway network in reality.
Railway is the major artery of national economy, key infra- structure, and major livelihood projects, and is one of the backbones of the comprehensive transportation system and one of the main modes of transportation, which is of great importance and role in the economic and social de- velopment of our country (Xu D et al. 2016) . Since the implementation of Medium and long term railway net- work plan in 2004, China’s railway development has achieved remarkable results, which plays an important role in promoting economic and social development, en- suring and improving people’s livelihood, supporting the implementation of the national major strategy, and strengthening our country’s comprehensive strength and international influence (Zhu H., 2016) . In recent 10 years, China’s high-speed railway network has made re- markable achievements, and the scale of the road network has been expanding. By the end of 2015, the national rail- way business mileage reached 121,000 km, of which the
The results obtained in the former researches , despite being positive, present the uncertainty if they depend on a possible randomness of the data intended for training and testing. In other words, if the assignment of the available data inﬂuence on the predictions of the network. To carry out a research with conclusive results, it was established a number of trials by far superior to the previous work. The study carried out is broken out in a series of experiments, in which the number of patterns intended for training and test varies in each series. This way, the minimum number of data needed to ensure an acceptable percentage of correct answers, can be found. It has been accomplished 100 diﬀerent trials in each experiment, exchanging in each of them and in a random way the data destined to train and test the network. Moreover, in two diﬀerent trials of a same experiment the same training and test data will never coincide, therefore increasing the reliability on the results obtained. Thanks to this, the possible random data that are provided to the network, which could lead to obtain not very reliable results, are eliminated.
Abstract: This paper shows the development of new code for OCDMA system. The characteristics of code based on the unit cross correlation. The code is such that it follows the minimum cross correlation. The direct detection method is used to recover the information at the receiving end. The result and analysis shows that system has better performance compare to existing method such as MDW, RD Method. Simulation is performed at high data rates from 10Gbits/s to 20 Gbits/s.
Congestion control in highspeed networks The internet is a global infrastructure for information exchange that has revolutionized the social, economic, and political aspects of our lives. One of the most crucial building blocks of the internet is a mechanism for resource sharing and controlling congestion on the internet .Congestion can be defined as a network state in which the total demand for resources, e.g. bandwidth, among the competing users, exceeds the available capacity leading to packet or information loss and results in packet retransmissions (Papadimitriou, 2011). At the time of congestion in a computer network there will be a simultaneous increase in queuing delay, packet loss and number of packet retransmissions. In other words congestion refers to a loss of network performance when a network is heavily loaded. Keshav (2007) has defined it as “A network is said to be congested from the perspective of a user if the service quality noticed by the user decreases because of an increase in network load.”
o Draft an international synthesis of previous research and current practice that includes an assessment of knowledge gaps in operational and safety effects of geometrics during nighttime conditions. This document will assess current knowledge and serve as a catalyst to bring together researchers from around the world to review and discuss the synthesis and assessment, finalize the synthesis, and publish it as an E-Circular. o Begin development of “Future Directions of Performance-Based Analysis
Experimental test bed consists of a PC/Laptop of configuration 3rd Gen Ci5 Core Processor/ 6GB RAM/1 GB NIC/500GB HDD. Consider one system as Dom0. For setting up a Dom0 machine, it requires a Xen hypervisor to be installed first. Here the host operating system used is Ubuntu Desktop version 12.10. Any host operating system supporting Xen hypervisor can be installed. Configure Virt manager to have two or more guest operating system (DomU). Create a network bridge between DomUs by following installation guide of Xen.