Next Issue
Volume 3, December
Previous Issue
Volume 3, June
 
 

Network, Volume 3, Issue 3 (September 2023) – 5 articles

Cover Story (view full-size image): This paper deals with the localization of illegal radio waves. In conventional systems using ground-based sensors, the estimation accuracy significantly decreases especially in non-line-of-sight environments. This research proposes to introduce UAVs working as sensors to enhance the line-of-sight condition. Furthermore, using particle swarm optimization, the paper attempts to optimize the UAV sensor’s trajectory that can reduce the localization estimation error. Particularly, when evaluating at the 90th percentile of the error’s cumulative distribution function, the proposed approach can reach an error of 28.59m with a circular orbit and 12.91m with a free-path orbit, against the conventional approach whose error is 55.02m. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
18 pages, 522 KiB  
Article
Evaluation of Modern Internet Transport Protocols over GEO Satellite Links
by Aljuhara Alshagri and Abdulmohsen Mutairi
Network 2023, 3(3), 451-468; https://doi.org/10.3390/network3030019 - 18 Sep 2023
Viewed by 1229
Abstract
New versions of HTTP protocols have been developed to overcome many of the limitations of the original HTTP/1.1 protocol and its underlying transport mechanism over TCP. In this paper, we investigated the performance of modern Internet protocols such as HTTP/2 over TCP and [...] Read more.
New versions of HTTP protocols have been developed to overcome many of the limitations of the original HTTP/1.1 protocol and its underlying transport mechanism over TCP. In this paper, we investigated the performance of modern Internet protocols such as HTTP/2 over TCP and HTTP/3 over QUIC in high-latency satellite links. The goal was to uncover the interaction of the new features of HTTP such as parallel streams and optimized security handshake with modern congestion control algorithms such as CUBIC and BBR over high-latency links. An experimental satellite network emulation testbed was developed for the evaluation. The study analyzed several user-level web performance metrics such as average page load time, First Contentful Paint and Largest Contentful Paint. The results indicate an overhead problem with HTTP/3 that becomes more significant when using a loss-based congestion control algorithm such as CUBIC which is widely used on the Internet. Also, the results highlight the significance of the web page structure and how objects are distributed in it. Among the various Internet protocols evaluated, the results show that HTTP/3 over QUIC will perform better by an average of 35% than HTTP/2 over TCP in satellites links specifically with a more aggressive congestion algorithm such as BBR. This can be attributed to the non-blocking stream multiplexing feature of QUIC and the reduced TLS handshake of HTTP/3. Full article
Show Figures

Figure 1

29 pages, 2385 KiB  
Review
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions
by Milan Chauhan and Stavros Shiaeles
Network 2023, 3(3), 422-450; https://doi.org/10.3390/network3030018 - 12 Sep 2023
Cited by 7 | Viewed by 9527
Abstract
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions. This research provides greater knowledge of the various frameworks, assisting in making educated decisions about selecting and implementing [...] Read more.
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions. This research provides greater knowledge of the various frameworks, assisting in making educated decisions about selecting and implementing suitable security measures for cloud-based systems. The study begins with introducing cloud technology, its issues and frameworks to secure infrastructure, and an examination of the various cloud security frameworks available in the industry. A full comparison is performed to assess the framework’s focus, scope, approach, strength, limitations, implementation steps and tools required in the implementation process. The frameworks focused on in the paper are COBIT5, NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), CSA (Cloud Security Alliance) STAR and AWS (Amazon Web Services) well-architected framework. Later, the study digs into identifying and analyzing prevalent cloud security issues. This contains attack vectors that are inherent in cloud settings. Plus, this part includes the risk factor of top cloud security threats and their effect on cloud platforms. Also, it presents ideas and countermeasures to reduce the observed difficulties. Full article
Show Figures

Figure 1

79 pages, 2088 KiB  
Review
A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges
by Patikiri Arachchige Don Shehan Nilmantha Wijesekara and Subodha Gunawardena
Network 2023, 3(3), 343-421; https://doi.org/10.3390/network3030017 - 30 Aug 2023
Cited by 5 | Viewed by 4217
Abstract
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the generation of knowledge, typically using machine learning techniques, and the dissemination of knowledge, in order to make knowledge-driven intelligent network decisions. In one way, KDN can be recognized as knowledge-driven Software-Defined Networking [...] Read more.
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the generation of knowledge, typically using machine learning techniques, and the dissemination of knowledge, in order to make knowledge-driven intelligent network decisions. In one way, KDN can be recognized as knowledge-driven Software-Defined Networking (SDN), having additional management and knowledge planes. On the other hand, KDN encapsulates all knowledge-/intelligence-/ cognition-/machine learning-driven networks, emphasizing knowledge generation (KG) and dissemination for making intelligent network decisions, unlike SDN, which emphasizes logical decoupling of the control plane. Blockchain is a technology created for secure and trustworthy decentralized transaction storage and management using a sequence of immutable and linked transactions. The decision-making trustworthiness of a KDN system is reliant on the trustworthiness of the data, knowledge, and AI model sharing. To this point, a KDN may make use of the capabilities of the blockchain system for trustworthy data, knowledge, and machine learning model sharing, as blockchain transactions prevent repudiation and are immutable, pseudo-anonymous, optionally encrypted, reliable, access-controlled, and untampered, to protect the sensitivity, integrity, and legitimacy of sharing entities. Furthermore, blockchain has been integrated with knowledge-based networks for traffic optimization, resource sharing, network administration, access control, protecting privacy, traffic filtering, anomaly or intrusion detection, network virtualization, massive data analysis, edge and cloud computing, and data center networking. Despite the fact that many academics have employed the concept of blockchain in cognitive networks to achieve various objectives, we can also identify challenges such as high energy consumption, scalability issues, difficulty processing big data, etc. that act as barriers for integrating the two concepts together. Academicians have not yet reviewed blockchain-based network solutions in diverse application categories for diverse knowledge-defined networks in general, which consider knowledge generation and dissemination using various techniques such as machine learning, fuzzy logic, and meta-heuristics. Therefore, this article fills a void in the content of the literature by first reviewing the diverse existing blockchain-based applications in diverse knowledge-based networks, analyzing and comparing the existing works, describing the advantages and difficulties of using blockchain systems in KDN, and, finally, providing propositions based on identified challenges and then presenting prospects for the future. Full article
Show Figures

Figure 1

17 pages, 4294 KiB  
Article
Route Optimization of Unmanned Aerial Vehicle Sensors for Localization of Wireless Emitters in Outdoor Environments
by Gia Khanh Tran, Takuto Kamei and Shoma Tanaka
Network 2023, 3(3), 326-342; https://doi.org/10.3390/network3030016 - 18 Aug 2023
Cited by 1 | Viewed by 937
Abstract
Localization methods of unknown emitters are used for the monitoring of illegal radio waves. The localization methods using ground-based sensors suffer from a degradation of localization accuracy in environments where the distance between the emitter and the sensor is non-line-of-sight (NLoS). Therefore, research [...] Read more.
Localization methods of unknown emitters are used for the monitoring of illegal radio waves. The localization methods using ground-based sensors suffer from a degradation of localization accuracy in environments where the distance between the emitter and the sensor is non-line-of-sight (NLoS). Therefore, research is being conducted to improve localization accuracy by utilizing Unmanned Aerial Vehicles (UAVs) as sensors to ensure a line-of-sight (LoS) condition. However, UAVs can fly freely over the sky, making it difficult to optimize flight paths based on particle swarm optimization (PSO) for efficient and accurate localization. This paper examines the optimization of UAV flight paths to achieve highly efficient and accurate outdoor localization of unknown emitters via two approaches, a circular orbit and free-path trajectory, respectively. Our numerical results reveal the improved localization estimation error performance of our proposed approach. Particularly, when evaluating at the 90th percentile of the error’s cumulative distribution function (CDF), the proposed approach can reach an error of 28.59 m with a circular orbit and 12.91 m with a free-path orbit, as compared to the conventional fixed sensor case whose localization estimation error is 55.02 m. Full article
(This article belongs to the Special Issue Innovative Mobile Computing, Communication, and Sensing Systems)
Show Figures

Figure 1

28 pages, 921 KiB  
Article
Arithmetic Study about Efficiency in Network Topologies for Data Centers
by Pedro Juan Roig, Salvador Alcaraz, Katja Gilly, Cristina Bernad and Carlos Juiz
Network 2023, 3(3), 298-325; https://doi.org/10.3390/network3030015 - 26 Jun 2023
Cited by 1 | Viewed by 1949
Abstract
Data centers are getting more and more attention due the rapid increase of IoT deployments, which may result in the implementation of smaller facilities being closer to the end users as well as larger facilities up in the cloud. In this paper, an [...] Read more.
Data centers are getting more and more attention due the rapid increase of IoT deployments, which may result in the implementation of smaller facilities being closer to the end users as well as larger facilities up in the cloud. In this paper, an arithmetic study has been carried out in order to measure a coefficient related to both the average number of hops among nodes and the average number of links among devices for a range of typical network topologies fit for data centers. Such topologies are either tree-like or graph-like designs, where this coefficient provides a balance between performance and simplicity, resulting in lower values in the coefficient accounting for a better compromise between both factors in redundant architectures. The motivation of this contribution is to craft a coefficient that is easy to calculate by applying simple arithmetic operations. This coefficient can be seen as another tool to compare network topologies in data centers that could act as a tie-breaker so as to select a given design when other parameters offer contradictory results. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop