Editor's Picks


Bio-Inspired Approaches for Enhancing Scalability, Adaptability, and Resilience in Modern Networking Systems
Khalid Khan
AbstractIn recent years, computer networks have evolved from static, hierarchical structures to highly distributed, autonomous systems. This shift necessitates self-adaptive and self-organizing capabilities in networking nodes. Challenges such as scalability, mobility, resource constraints, and the need for infrastructure-less operation are addressed through biologically inspired approaches. Techniques like Ant Colony Optimization, Artificial Immune Systems, and epidemic spreading offer promising solutions for efficient and robust network control. This paper explores various bio-inspired models and their applications in modern networking paradigms, highlighting their potential to enhance the performance and resilience of large-scale, dynamic, and heterogeneous networks.
Read More on GDL
A Critical Evaluation of the Current Networking Technologies, their Security Vulnerabilities, and Countermeasures
Dan Lee-Jones
AbstractThe rapid evolution of networking technologies has revolutionized data communication, enabling unprecedented levels of connectivity and driving the development of advanced applications. This paper comprehensively reviews current and emerging networking technologies, focusing on their capabilities, vulnerabilities, and implications. It begins with examining the progression of broadband technologies, covering fixed-line options such as DSL, ADSL, fiber optics, powerline communications, and wireless advancements, including WiMAX, 3G, 4G, and 5G. Each technology's strengths, limitations, and specific use cases are analyzed, along with comparative insights into performance, scalability, and accessibility. The paper also explores the transformative role of Software-Defined Networking (SDN) in enabling agile, efficient, and scalable network management, discussing its architecture, operational advantages, and associated security challenges. Short-range communication technologies such as Bluetooth, NFC, infrared, RFID, ANT, and Z-Wave are also examined in detail. Security challenges arising from the widespread adoption of these technologies are critically assessed, and tailored countermeasures are proposed to mitigate associated risks. This holistic analysis offers a valuable framework for understanding the impact of networking advancements on communication infrastructures. It provides actionable insights for researchers, practitioners, and policymakers navigating the complexities of a hyper-connected world.
Read More on GDL
Advancing IoT with Edge Computing: A Comparative Analysis of Cloud, Fog, and Edge Paradigms
Mohammad A Shahzad
AbstractRecent advancements in Internet technology have significantly transformed the interaction between humans and electronic devices, leading to the rise of the Internet of Things (IoT). This paper explores the evolution and impact of edge computing, a technology that processes data near its source rather than relying solely on cloud computing. By comparing cloud, fog, and edge computing, we highlight the advantages of edge computing in reducing latency, enhancing security, and improving efficiency. The paper also addresses the challenges and opportunities in edge computing, emphasizing its potential applications in smart homes, cities, and collaborative environments. Edge computing represents a pivotal shift towards more responsive and efficient data processing, crucial for the future of IoT.
Read More on GDL
Study of Network Design Considerations for Small Businesses
Michael James Wood
AbstractThis paper investigates the logical and physical network design considerations for a small business. Moreover, the paper investigates how a business facing data consistency issues may address the issue by implementing a network design solution and how networks can be monitored and protected from security threats.
Part one of this paper investigates the networking solution and networking topologies. Part two discusses networking infrastructure such as the purchasing of necessary networking devices to centralize the businesses data communications and background and foreground services. Part three of this paper discusses various aspects of network and data communication monitoring using a networking tool provided by SolarWinds. The last section, part four investigates a security proposal for the businesses network and discusses data recovery, malware and authentication.

Technical Evaluation of the Functionality of Popular Mobile Payment Protocols
Munir Hussain, Syed Usman Jamil
AbstractToday, mobile commerce flexibility has totally changed businesses in the world due to easy mobile-based online bookings and payments. Its implementation is not limited to any single area but it can be utilized in all sorts of situations and organizations in various ways. It can be utilized in banking, electronic publication distribution, online sales, online payments for different utility bills and online booking of airlines etc. These kinds of online booking, buying and selling, and their payment services are available to anyone 24/7 in the world. When using these types of facilities, one needs to understand and study different types of characteristics of this new technology i.e., it is important to understand different modes of payments, various technologies using mobile payment system, and different M-commerce payment protocols. As we know, energy consumption is a critical issue in M-commerce, so it is important to reduce battery power consumption as much as possible. In this paper, we will explore some of the most popular mobile payment protocols step-by-step to fully understand their working environment.
Read More on GDL
Ad-hoc and Opportunistic Routing in Dynamic Scatternet Environment
S K A Khan, M Adeel, M A Azam
AbstractIn reality, mobile ad-hoc networks are highly unpredictable because any node can join or leave the network at any time, thus making reliable and effective communication a problem. This issue is addressed by introducing new breed of ad-hoc networking, known as opportunistic networks. Opportunistic networking is a concept that has evolved from mobile ad-hoc networking. In opportunistic networks nodes have no prior knowledge of routes to intended destinations. Any node in the network can be used as potential forwarder with the exception of taking information one step closer to intended destination. The forwarding decision is based on the information gathered from the source node or encountering node. The opportunistic forwarding can only be achieved if message forwarding is carried out in store and forward fashion. Although, opportunistic networks are more flexible than traditional MANETs, however, due to little insight of network, it poses distinct challenges such as intermittent connectivity, variable delays, short connection duration and dynamic topology. Addressing these challenges in opportunistic network is the basis for developing new and efficient protocols for information sharing. This paper presents a conceptual study for opportunistic networks to improve the overall message delivery at destinations while keeping the communication cost very low. Some assumptions are considered to improved directivity of message flow towards intended destinations. These assumptions exploit human social relationships analogies such as popularity and use of hybrid communication by applying opportunistic concepts on top of traditional ad-hoc routing such as AODV to gain maximum message directivity. The experiment results have shown that by combining traditional ad-hoc routing with opportunistic forwarding has not only improved directivity but as a result have achieved a great improvement in message delivery to intended destinations.
Read More on GDL