Annals of Emerging Technologies in Computing (AETiC)

 
Table of Contents

·         Table of Contents (Volume #2, Issue #3)


 
Cover Page

·         Cover Page (Volume #2, Issue #3)


 
Editorial

·         Editorial (Volume #2, Issue #3)


 
Paper #1                                                                             

Optimising Differentiated Services Strategies under IMS

David K. Osei-Aboagye and Peter S. Excell


Abstract: The evolving standards of mobile communications, the wide variety of services they offer and the rapid growth of the Internet have made a merger of the two network technologies inevitable. One of the most prominent platforms that has been developed to facilitate this is the IP Multimedia Subsystem (IMS) concept. Many mobile communications standards integrate IMS as the main core network architecture and Quality of Service (QoS) is the main concern for customer satisfaction. A major approach to optimisation of QoS is the Differentiated Services scheme, and a simulation study of implementations of this is presented. The study covered an IMS core network architecture modelled with discrete-event network simulator software, with a Differentiated Services QoS scheme run over it with differing bearer traffic scenarios. Implications for core network architectures are discussed.


Keywords: IMS; Mobile communications; Quality of Service; Differentiated Services; Network simulation.


Download Full Text


 
Paper #2                                                                             

A Survey of Distributed Certificate Authorities in MANETs

Junaid Chaudhry, Kashif Saleem, Paul Haskell-Dowland and Mahdi H. Miraz


Abstract: A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security.


Keywords: Component; Certificate Authority; Key management; DCA; Distributed Certificate Management.


Download Full Text


 
Paper #3                                                                             

A Technique to Measure Students’ Mental Approach using Web and Game Based E-Learning Application

Awais K. Jumani, Mashooque A. Memon and Muneer A. Kartio


Abstract: With the advent of E-Learning (Electronic Learning) and M-Learning (Mobile Learning), many educational software or tools have been developed, a major part of which are game-based applications. Even though, most of which are freely available on the web, there are only few intuitions make practical and effective use of these learning applications. Because these applications utilises various elements of multimedia such as audio, video, image and animation, they help visualise the learning materials and hence have higher span of at attention. To investigate the effect of web and game based E-Learning and M-Learning, an experiment was conducted amongst the students of three different schools in Pakistan and the results were analysed. The results of our research reveal that utilisation of such web and game based learning tools are much more effective compared to the traditional teaching methods without applying any ICT (Information and Communication Technology) tools.


Keywords: Game Based Learning; Game Design; E-Learning; M-Learning; Graphical User Interface.


Download Full Text


 
Paper #4                                                                             

Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

Faisal Waheed and Maaruf Ali


Abstract: Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System). Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS), attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step-by-step hardening approach is adopted to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are implemented and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.


Keywords: AAA; ACL; APT; ASA; CEF; Control Plane; Cryptography; DDoS; DES; DMVPN; DMZ; DoS; Data Plane; EIGRP; GRE; Hardening CISCO Devices; HSRP; ICMP; IDS; IKE; IOS; IPS; IPSec; Management Plane; NAT; NHRP; OSFP; OSI; PSM; RADIUS; RIP; RIPv2; RSA; Security Protocols; SNMP; SNMPv3; SSH; SSHv2; SSL; TACACS; TCP/IP; VPN; VLAN.


Download Full Text


 
Paper #5                                                                             

The British Electronics and Computing Industries: Past, Present and Future

Peter S. Excell


Abstract: A brief review of key milestones in the development of the British Electronics and Computing industries is presented, together with some thoughts about future directions.


Keywords: Electronics industry; British industry; thermionic valves; radio; television; radar; satellite communications; optical fibre; computer industry; mobile communications; electronic entertainment; digital media.


Download Full Text

 
 International Association for Educators and Researchers (IAER), registered in England and Wales - Reg #OC418009                        Copyright © IAER 2017