submit CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Software Networking

Kuinam J. Kim, Kyonggi University, South Korea

ISSN: 2445-9739 (Online Version)
Vol: 2017   Issue: 1

Published In:   January 2017

Publication Frequency: Continuous Article Publication

Search Availabe Volume and Issue for Software Networking

Automated User Interface Generation Involving Field Classification

doi: 10.13052/jsn2445-9739.2017.004
Matrtin Tomasek and Tomas Cerny

Dept. of Computer Science, FEE Czech Technical University in Prague Technicka 2 Prague, Czech Republic

Abstract: [+]    |    Download File [ 1769KB ]   |    Read Article Online

Abstract: Software applications are designed with a concrete purpose in mind, specified by business owners basing on the individual requirements. The user-system interaction is specified in the analysis phase. This phase specifies inputs, outputs, interaction, etc. These elements could be specified separately based on the target platform. The designers know that the mobile clients could have a different application flow than desktop clients. However, this is not a rule and designer rarely think about the user context or application. This implies that outputs, inputs and interactions do not change automatically during the software lifecycle. In this paper we present techniques that can determine whether the user, which is in a particular context, should be required to spend his/her time to fill in fields that are not needed for accomplishing a specific business task. Moreover, these techniques are able to determine whether the fields should display or not, as well as how the system might interact with the user. Next, we present a computational architecture capable of these types of determinations and we demonstrate this technique in case study. Finally, we show how automatically combine user interface generation with our approach.

Keywords: MDD, automatically user interface generation, context-aware, business case, field classification, cross-cutting concerns.

Authentication and Authorization Rules Sharing for Internet of Things

doi: 10.13052/jsn2445-9739.2017.003
Michal Trnka and Tomas Cerny

Dept. of Computer Science, FEE, Czech Technical University, Technick´a 2, 166 27 Praha, Czech Republic

Abstract: [+]    |    Download File [ 954KB ]   |    Read Article Online

Abstract: Significant interest in internet of things drives both research and industry production these days. A lot of important questions has been solved but some remain opened. One of the essential unresolved issue is the identity management of particular end devices.

Having possibility to share authorization and authentication rules across network between various sensors, applications and users have clear advantages. It reduces duplication of those policies, while ensuring that they are coherent across the board. There are various proposals, methods and frameworks for identity management in normal environment. However, just few of them is usable in internet of things environment and even less have been made directly for the usage in the internet of things devices.

This paper proposes solution for management of devices for internet of things. The solution is based on central identity store. Each device has an associated account in the store that any device and application in the network can verify the device’s identity against. The central element does not provide only authentication of the devices, but the devices can be associated with different roles. Those roles can be used for authorization.

Case study for the proposed framework is built on top of the current web standards as OpenID Connect, OAuth and JSON Web Token. Also, central identity store is based on well-established open source solution. The communication scheme is very simple – after the device’s account is established, it retrieves OAuth 2.0 token and uses it to certify itself in every network connection. The token does not only contain authentication information, but also roles assigned to the device. The central element thus creates trusted environment and enables rapid response for any security events.

Keywords: Internet of Things, Security, Identity Management, Authentication, Authorization.

Holistic Service Orchestration over Distributed Micro Data Center

doi: 10.13052/jsn2445-9739.2017.002
TaeYeon Kim1,2 and Hongseok Jeon1,2

1Network Computing Convergence Research Section, Smart Network Research Department, Korea
2Electronics and Telecommunications Research Institute (ETRI), Korea

Abstract: [+]    |    Download File [ 1706KB ]   |    Read Article Online

Abstract: Three technologies, i.e. Cloud, SDN, and NFV, the most frequently touted as promising terms to pave the way to the next generation networking era are keenly needed to be harmonized for vertical application service providers. This holistic approach to orchestrate application service on the edge of the network is based on requirements such as Service Profile and Service Policy with environmental condition from service providers and network providers respectively. This paper shows how to organize and manage the application service from the perspective of end user side with two requirements, profile and policy, leveraging three disruptive technologies.

Keywords: Cloud, SD, NFV, orchestration.

An Evaluative Analysis of DUAL, SPF, and Bellman-Ford

doi: 10.13052/jsn2445-9739.2017.001
Shahab Tayeb and Shahram Latifi

Department of Electrical & Computer Engineering, University of Nevada, Las Vegas, NV, United States

Abstract: [+]    |    Download File [ 2550KB ]   |    Read Article Online

Abstract: This paper aims to discuss a comprehensive list of demerits associated with the use of Diffusing Update Algorithm compared to its link-state counterpart, namely, Shortest Path First algorithm which is a variant of Dijkstra’s algorithm. Such a comparison was neglected for the past two decades due to the proprietary nature of the former protocol. This has led to the prevalence of the latter which is why many computer network professionals adamantly recommend implementing link-state protocols in campus implementations. However, this is of importance today pursuant to the release of several IETF Internet drafts in an attempt to standardize the Enhanced Interior Gateway Routing Protocol. Additionally, the results are compared with Bellman-Ford as a simple but widespread routing solution.

Dynamic routing protocols rely on algorithms computing the shortest paths using weighted digraphs and tree traversals. In this paper, not only are the algorithms discussed but also an in-depth analysis of the various features of the aforementioned protocols is conducted. Abandoning the periodicity of update massages and operating in an event-driven fashion with automatic failover capability are some of the features that will be analysed. Part of the novelty of this paper lies in the mathematical representation of decisionmaking processes and metric computation. One of the notable findings of this paper is an evaluative analysis of convergence times achieved in a typical university campus routing implementation. Moreover, using wide metric vectors contributes to energy-aware routing and improved performance for jitter-sensitive services.

Keywords: Convergence, Diffusing Update Algorithm, Routing Protocols, Shortest Path First Algorithm,Wide Metrics.

River Publishers: Software Networking