UTS site search

Professor Doan Hoang

Biography

Professor Doan B. Hoang is a Professor in the School of Computing and Communications, Faculty of Engineering and Information Technology, the University of Technology, Sydney (UTS). Before joining UTS, he was an academic staff at University of Sydney’s Basser Department of Computer Science. He held various visiting positions: Visiting Professorships at the University of California, Berkeley; Nortel Networks Technology Centre in Santa Clara, USA; the University of Waterloo, Canada, Carlos III University of Madrid, Spain, and Nanyang Technological University, Singapore.

He is a Director of iNEXT - UTS Centre for Innovation in IT Services and Applications, a research centre at the University of Technology, Sydney for developing and nurturing innovation for the NEXT generation IT services and applications, including Internet-enabled business applications, mobile health services, high-end visualization technologies, novel image processing architectures, and advanced video surveillance systems. He is also the Director of the Advanced Research in Networking (ARN) Laboratory.

He was involved in several DARPA-sponsored projects including Openet, Active Networks, DWD-RAM: A Data-Intensive Service-on-Demand Enabled by Next Generation Dynamic Optical Networks. His research has been sponsored by many competitive research grants including Australian Research Council (ARC) Discovery, Telecom Australia and Industry Linkages Grants.

His industrial experiences include: Senior architect, Nortel Networks; Voice & Data communications manager in Research and Development Department, Telecommunications, Fujitsu Australia Limited; Radio-communications Engineer, Telecom Australia. He is also a telecommunications and IP networks consultant.

Image of Doan Hoang
Professor, School of Computing and Communications
Director, Faculty of Engineering & Information Technology
Associate Member, CHT - Centre for Health Technologies
Director, INEXT - Innovation in IT Services and Applications
Core Member, INEXT - Innovation in IT Services and Applications
Associate Member, CRIN - Centre for Realtime Information Networks
BE (Hons) (UWA), ME (Ncle), PhD (Ncle)
 
Phone
+61 2 9514 7943

Research Interests

His research interests include Next Generation Networks (Security, Quality of Service, Mobility, Service-Oriented Architecture, Peer-to-Peer), Broadband Service Architecture, Collaborative Grid and Cloud Computing, Wireless Sensor Networks and e-Health. He is currently leading research into establishing an innovation culture, reducing the cost of healthcare system through advanced technologies and assistive health Grid/Cloud, and generating wealth through innovative use of the Broadband Internet.

Can supervise: Yes

Chapters

Le, H., Hoang, D.B. & Poliah, R. 2008, 'S-Web: an efficient and self-organizing Wireless Sensor Network Model' in Takizawa, M., Barolli, L. & Enokido, T. (eds), Network-Based Information Systems, Lecture Notes in Computer Science, Springer, Germany, pp. 179-188.
View/Download from: UTS OPUS or Publisher's site
One of the major weaknesses of existing centralized algorithms in Wireless Sensor Network (WSN) routing is that sensor nodes are required to report their status (e.g. remaining energy level) to the central node (i.e. the Base Station BS) and receive configuration information from the BS (e.g. next hop routing). As a result, the WSNs suffer from high communication and/or computation overheads at sensor nodes to accommodate topology changes in the WSN. This paper proposes a novel scheme, called a Sensor Web (or S-Web), that organizes sensors into clusters based on their geographical location without requiring the sensors to have a Global Positioning System or actively locate themselves. The S-Web enables nodes to route data packets while consuming low energy in a decentralized manner. The model is self-organizing and distributed without the need of global network knowledge.
Hoang, D.B. & Simmonds, A.J. 2007, 'Data Communication and Network Infrastructure' in Feng, D. (ed), Biomedical Information Technology, ACADEMIC PRESS, USA, pp. 229-248.
Travostino, F. & Hoang, D.B. 2006, 'Chapter 7: Grid Network Middleware' in Travostino, F., Mambretti, J. & Karmos-Edwards, G. (eds), Grid Networks - Enabling Grids with Advanced Communication Technology, John Wiley & Sons Ltd, West Sussex, England, pp. 114-143.
View/Download from: UTS OPUS
Travostino, F. & Hoang, D. 2006, 'Grid Network Middleware' in Grid Networks: Enabling Grids with Advanced Communication Technology, pp. 113-143.
View/Download from: Publisher's site

Conferences

Nguyen, T., Hoang, D. & Seneviratne, A. 2016, 'Challenge-response trust assessment model for personal space IoT', 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016.
View/Download from: UTS OPUS or Publisher's site
© 2016 IEEE. Internet of Things (IoT) embraces the interconnection of identifiable devices that are capable of providing services through their cooperation. The cooperation among devices in such an IoT environment often requires reliable and trusted participating members in order to provide useful services to the end user. Consequently, an IoT environment or space needs to evaluate the trust levels of all devices in contact before admitting them as members of the space. Existing trust evaluation models are based on resources such as historical observations or recommendations information to evaluate the trust level of a device. However, these methods fail if there is no existing trust resource. This paper introduces a specific IoT environment called personal space IoT and proposes a novel trust evaluation model that performs a challenge-response trust assessment to evaluate the trust level of a device before allowing it to participate in the space. This novel challenge-response trust assessment model does not require the historical observation or previous encounter with the device or any existing trusted recommendation. The proposed challenge-response trust assessment model provides a reliable trust resource that can be used along with other resources such as direct trust, recommendation trust to get a comprehensive trust opinion on a specific device. It can also be considered as a new method for evaluating the trust value on a device.
Pham, M. & Hoang, D.B. 2016, 'SDN applications - The intent-based Northbound Interface realisation for extended applications', IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services, pp. 372-377.
View/Download from: UTS OPUS or Publisher's site
© 2016 IEEE.The Northbound Interface (NBI) plays a crucial role in promoting the adoption of SDN as it allows developers the freedom of developing their revenue-generating applications without being affected and constrained by the complexities of the underlying networks. To do so the NBI has to allow applications to express their requirements and constraints in their own application specific language, and the SDN controller to translate those requirements into SDN network specific language for provisioning network resources and services to satisfy the application requirements. The intent-based NBI is born from this consideration and the Open Networking Foundation (ONF) provides principles and guidelines to build such an intent-based NBI. However, these principles do not lend themselves readily to the design and practical realization of an intent-based NBI for extended classes of business-like network applications. This paper introduces a solution and its initial implementation in the form of a novel architecture for realizing the intent-based NBI. The new solution exploits the modularized and reuse features of the micro services and service oriented architectures.
Dang, T., Hoang, D. & Nanda, P. 2015, 'Data mobility management model for active data cubes', 2015 IEEE Trustcom/BigDataSE/ISPA, E International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), IEEE, Helsinki, Finland, pp. 750-757.
View/Download from: UTS OPUS or Publisher's site
Cloud computing dramatically reduces the expense and complexity of managing IT systems. Business customers do not need to invest in their own costly IT infrastructure, but can delegate and deploy their services effectively to cloud vendors and service providers. A number of security and protection mechanisms have been proposed to prevent the disclosure of sensitive information or tempering with the data by employing various policy, encryption, and monitoring approaches. However, few efforts have been focused on data mobility issues in terms of protection of data when it is moved within a cloud or to and from a new cloud environment. To allay users' concern of data control, data ownership, security and privacy, we propose a novel data mobility management model which ensures continuity protecting data at new cloud hosts at new data locations. The model provides a mobility service to handle data moving operation that relies on a new location database service. The new model allows the establishment of a proxy supervisor in the new environment and the ability of the active data to record its own location. The experimental outcomes demonstrate the feasibility, proactivity, and efficiency by the full mobility management model.
Hoang, D.B. & Dang, T.D. 2015, 'Health Data in Cloud Environments', 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, pp. 96-108.
View/Download from: UTS OPUS
The process of provisioning healthcare involves massive healthcare data which exists in different forms on disparate data sources and in different formats. Consequently, health information systems encounter interoperability problems at many levels. Integrating these disparate systems requires the support at all levels of a very expensive infrastructures. Cloud computing dramatically reduces the expense and complexity of managing IT systems. Business customers do not need to invest in their own costly IT infrastructure, but can delegate and deploy their services effectively to Cloud vendors and service providers. It is inevitable that electronic health records (EHRs) and healthcare-related services will be deployed on cloud platforms to reduce the cost and complexity of handling and integrating medical records while improving efficiency and accuracy. The paper presents a review of EHR including definitions, EHR file formats, structures leading to the discussion of interoperability and security issues. The paper also presents challenges that have to be addressed for realizing Cloud-based healthcare systems: data protection and big health data management. Finally, the paper presents an active data model for housing and protecting EHRs in a Cloud environment.
Hoang, D.B. & Pham, M. 2015, 'On Software-defined networking and the design of SDN Controllers', 6th International Conference on the Network of the Future (NOF), IEEE, Montreal, Canada, pp. 1-3.
View/Download from: UTS OPUS or Publisher's site
Software-Defined Networking (SDN) has emerged as a networking paradigm that can remove the limitations of current network infrastructures by separating the control plane from the data forwarding plane. The implications include: the underlying network state and decision making capability are centralized; programmability is provided on the control plane; the operation at the forwarding plane is simplified; and the underlying network infrastructure is abstracted and presented to the applications. This paper discusses and exposes the details of the design of a common SDN controller based on our study of many controllers. The emphasis is on interfaces as they are essential for evolving the scope of SDN in supporting applications with different network resources requirements. In particular, the paper review and compare the design of the three controllers: Beacon, OpenDaylight, and Open Networking Operation System
Chen, L. & Hoang, D.B. 2013, 'Adaptive data replicas management based on active data-centric framework in cloud environment', The 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), IEEE, Zhangjiajie, China.
View/Download from: UTS OPUS
Cloud data protection is increasingly attracting researchers attention. Cryptographic-based schemes, trust third party technologies, policy-driven frameworks, and data-policy binding mechanisms have been proposed to address data security and privacy issues from many aspects of data protection requirement. However, due to the inevitability of bugs, crashes, operator errors, hardware failure, or server misconfiguration, data availability and reliability might be still compromised. To avoid data loss and access failure when the unpredictable incidents occur, data replication technology is essential to guarantee the availability and reliability. This paper introduces the adaptive data replicas management based on the novel data structure created by the active data-centric framework in the cloud scenario. The simulated result shows the effectiveness and flexibility of the proposed adaptive data replicas scheme.
Hoang, D.B. & Chen, L. 2014, 'Health records protection in cloud environment', Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014, pp. 85-90.
View/Download from: UTS OPUS or Publisher's site
© 2014 IEEE. Cloud computing is a cost-effective solution to the current expensive IT infrastructure for healthcare but it has not been adopted due to the due to the concerns that current Cloud technologies are inadequate to protect sensitive information contents of health records in the outsourced environment. This paper focuses on how electronic health records can be protected in the Cloud environments deploying our proposed trust-oriented data protection framework. In particular, it introduces a technique for transforming raw electronic health records to active data cubes and for encoding data for storage and fast access. Implementation of the framework is also presented.
Furqan, F. & Hoang, D.B. 2013, 'LTE_FICC: A New Mechanism for Provision of QoS and Congestion Control in LTE/LTE-Advanced Networks', Mobile and Ubiquitous Systems: Computing, Networking, and Services, 10th International Conference, MOBIQUITOUS 2013, Springer, Tokyo, Japan, pp. 768-781.
View/Download from: UTS OPUS or Publisher's site
In Long Term Evolution (LTE)/LTE-Advanced architecture, the basic schedulers allocate resources without taking congestion at the Evolved NodeB (eNodeB's) output buffer into account. This leads to buffer overflows and deterioration in overall Quality of Service (QoS). Congestion avoidance and fair bandwidth allocation is hardly considered in existing research for the LTE/LTE-Advanced uplink connections. This paper introduces a mechanism for LTE and LTE-Advanced, LTE Fair Intelligent Congestion Control (LTE_FICC), to control congestion at an eNodeB. LTE_FICC jointly exists with the scheduler at the eNodeB to guarantee efficient traffic scheduling, in order to make the output buffer operate around a target operating point. LTE_FICC also overcomes the problem of unfair bandwidth allocation among the flows that share the same eNodeB interface. LTE_FICC is simple, robust and scalable, as it uses per queue rather than per flow accounting. To evaluate the effectiveness of the proposed algorithm, simulations were performed in Opnet using LTE module. The results demonstrated that LTE_FICC controls the eNodeB buffer effectively; prevents overflows; and ensures the QoS of flows in terms of fair bandwidth allocation, improved throughput and reduced queuing delay.
Hoang, D.B. & Kamyabpour, N. 2013, 'Energy-constrained paths for optimization of energy consumption in wireless sensor networks', 2013 Fourth International Conference on Networking and Distributed Computing (ICNDC), International Conference on Networking and Distributed Computing, IEEE, Los Angeles, CA, pp. 9-13.
View/Download from: UTS OPUS or Publisher's site
A sensor spends a large part of its energy in transmitting its data and relay its neighbours' data. The overall lifetime of a wireless sensor network depends strongly on how a sensor selects its relaying neighbours and the data path to the destination. One critical problem is that if a sensor has to support too many neighbours, its energy is exhausted rapidly and may bring down the whole network. This paper suggests algorithms for assigning weights to links between neighbours taking into account the number of neighbours who rely on them to relay traffic to the destination. In order to do so, the paper also proposes an algorithm for constructing node connectivity based on sensors position within the broadcast range of another sensor, and a shortest energy-constrained path from a sensor to the destination.
Furqan, F., Hoang, D.B. & Collings, I.B. 2014, 'LTE-Advanced fair intelligent admission control LTE-FIAC', 2014 IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, IEEE, Sydney, NSW.
View/Download from: UTS OPUS or Publisher's site
Radio Admission Control (RAC) is a key function of the Radio Resource Management (RRM) at layer 3 of an eNodeB; however, the 3GPP standard does not specify the RAC and is left as an eNodeB vendor specific. Most admission control schemes proposed to date do not ensure differentiation among the users at different priority levels. Also, they do not provide fairness among the users with the same priority. This paper proposes a novel RAC scheme for Long Term Evolution (LTE-Advanced) networks based on the combined idea of complete sharing and virtual partitioning. It introduces a step wise degradation scheme, to prioritize the high priority traffic in state of resource limitations. A detailed and comprehensive simulation is performed in Opnet to show the efficiency of the proposed RAC scheme. The simulation results demonstrate that the proposed RAC scheme minimizes the call blocking probability and adheres extremely well to the bandwidth constraints of different traffic types.
Furqan, F., Hoang, D.B. & Collings, I. 2014, 'Effects of quality of service schemes on the capacity and dimensioning of LTE networks', Proceedings of the 2014 IEEE International Performance Computing and Communications Conference (IPCCC), 2014 IEEE International Performance Computing and Communications Conference (IPCCC), IEEE, Austin, USA, pp. 1-8.
View/Download from: UTS OPUS or Publisher's site
With high data rate and mobility support wireless networks are becoming an integral part of the ubiquitous broadband access. Appropriate dimensioning of the wireless access networks is essential to satisfy users' Quality of Service (QoS) requirements. Once the network is dimensioned, dynamic variations in traffic or population distribution can affect the capability of the network to deliver the agreed QoS of connections. Consequently, re-dimension the network may be necessary. Current researches do not discuss the effects of QoS schemes on the capacity of the network. In this paper, we investigate the impact of QoS schemes on the capacity of the network. The objective is to determine the capability of the network to deal with the variations in the demography of the covered area and the user's traffic profile with the proposed QoS schemes including Congestion Control (CC) and Radio Admission Control (RAC). Different scenarios are presented to evaluate the effects of QoS schemes on the capacity of the network. This investigation will assist network operators to determine the point after which the network needs to be re-dimensioned.
Hoang, D.B., Elliott, D., McKinley, S.M., Nanda, P., Schulte, J. & Duc, N.A. 2012, 'Tele-monitoring techniques to support recovery at home for survivors of a critical illness', Signal Processing and Information Technology 2012, IEEE International Symposium on Signal Processing and Information Technology, IEEE, Ho Chi Minh City, Vietnam, pp. 1-6.
View/Download from: UTS OPUS or Publisher's site
This paper proposes and explores the design of a system that includes sensor-based procedures and techniques for remote physiological sensing and functional assessment for these individuals.
Furqan, F. & Hoang, D.B. 2013, 'WFICC: A new mechanism for provision of QoS and Congestion Control in WiMAX', 2013 IEEE 10th Consumer Communications and Networking Conference, CCNC 2013, IEEE Consumer Communications and Networking Conference, IEEE, Las Vegas, USA, pp. 552-558.
View/Download from: UTS OPUS or Publisher's site
In WiMAX architecture the base station lacks the mechanisms to avoid it from being overloaded, which can lead to degradation in the Quality of service (QoS) experienced by the users in the cell, as the large queue at buffer risk high delays and buffer ov
Chen, L. & Hoang, D.B. 2013, 'Addressing Data and User Mobility Challenges in the Cloud', 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD), IEEE International Conference on Cloud Computing, IEEE, Santa Clara, CA, pp. 549-556.
View/Download from: UTS OPUS or Publisher's site
Recently cloud computing has been increasingly gaining attention and spreading in various industries. This novel paradigm also has received significant research focus on the data security and privacy issues due to its outsourced nature. However, few of the research efforts have been focused on data mobility issues which existed intrinsically in highly complex and dynamic cloud services. To address this challenge, this paper discusses full mobility management of cloud data from two aspects: data mobility management and user mobility management. The work is based on our previously proposed active data-centric framework. Taking advantage of this framework, the active data can establish an active binding relationship with its user. Any data mobility-related behavior could inform to its bundled user instantly and safely. The paper also discusses user mobility management via the self-adaptable heterogeneous network handoff mechanism to ensure the ubiquitous informing service in the mobile cloud environment. The experimental outcomes demonstrate the feasibility, proactivity, and efficiency by the full mobility management scheme.
Furqan, F. & Hoang, D.B. 2013, 'Wireless Fair Intelligent Admission Control -- WFIAC', Advanced Information Networking and Applications, Advanced Information Networking and Applications, IEEE, Barcelona, Spain, pp. 1001-1008.
View/Download from: UTS OPUS or Publisher's site
In next generation wireless networks like WiMAX, a dynamic Call Admission Control (CAC) plays an important role to ensure Quality of Service (QoS) of existing users and to efficiently utilize network resources. We propose a predictive CAC namely Wireless Fair Intelligent Admission Control (WFIAC) that admits or rejects a new incoming connection base on resource availability and load in the network. The proposed CAC works in conjunction to a load control module namely WiMAX Fair Intelligent Congestion Control (WFICC) to determine load in network. The proposed CAC is based on bandwidth borrowing and degradation of over provisioned connections in order to minimize blocking probability and to maximize resource utilization in the network. Once the network load reduces, WFICC upgrades the bandwidth allocated to connections that have data to send. So, WFIAC along with WFICC ensures the network operates around a target operating point to guarantee QoS to end users. A detailed and comprehensive simulation is performed in ns-2 to show the efficiency of the proposed CAC scheme in terms of blocking probability of different service classes and QoS provisioning to existing connections when the network is in congested and non congested state.
Hoang, D.B., Phung, H.M. & Lawrence, E.M. 2013, 'A collaborative task planning and development environment on the Cloud/Grid', 19th IEEE International Conference on Networks (ICON 2013), 2013 19th IEEE International Conference on Networks (ICON 2013), Institute of Electrical and Electronics Engineers (IEEE), Singapore, pp. 1-6.
View/Download from: UTS OPUS or Publisher's site
A Grid system is a promising solution for sharing distributed resources of registered participants to perform tasks whose demands may exceed the capacity of individual participating organization. However, the collaborative aspect of Grids is still underdeveloped as they lack features and mechanisms for human interaction and collaboration. This paper presents a prototype system for collaborative task planning and workflow development over a Grid implemented as a Rich Internet Application. It allows the participants to design their joint workflow interactively and collaboratively in a high level graphical notation. The resulting workflow can be automatically translated into Business Process Execution Language (BPEL) for testing and execution with a few clicks and forms the basis for further refinement and collaboration. This collaborative workflow design application is part of our larger Active Assistive Cloud/Grid infrastructure.
Chen, L. & Hoang, D.B. 2012, 'Active data-centric framework for data protection in cloud environment', Proceedings of the 23rd Australasian Conference on Information Systems 2012, Australasian Conference on Information Systems, ACIS, Geelong, Vic., pp. 1-11.
View/Download from: UTS OPUS
Cloud computing is an emerging revolutionary computing model that provides highly scalable services over high-speed Internet on a pay-as-usage model. However, cloud-based solutions still have not been widely deployed in some sensitive areas, such as banking and healthcare. The lack of widespread development is related to usersâ concern that their confidential data or privacy would leak out in the cloudâs outsourced environment. To address this problem, we propose a novel active data-centric framework to ultimately improve the transparency and accountability of actual usage of the usersâ data in cloud. Our data-centric framework emphasizes âactiveâ feature which packages the raw data with some active properties that enforce data usage with active defending and protection capability. To achieve the active scheme, we innovatively developed Triggerable Data File Structure (TDFS). Moreover, we employed zero-knowledge proof scheme to verify the requestâs identification without revealing any vital information. Our experimental outcome demonstrates the efficiency, dependability, and scalability of our framework.
Zheng, L. & Hoang, D.B. 2012, 'Further Analysis and Tuning of Registered Multi-cycle Polling in Wireless Medium Access Management', The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, ACM, Paphos, Cyprus Island, pp. 53-60.
View/Download from: UTS OPUS or Publisher's site
Multimedia applications are supported by enhancing polling mechanisms to achieve Quality of Service, QoS, in the IEEE 802 MAC layer. We first briefly introduce the problems of reliability and efficiency with the basic polling medium access, particularly in highly loaded environments. A novel mechanism, Registered Polling is then described in details. The proposed mechanism provides a simple and efficient channel for implicit information update on traffic conditions. Based on these updates, it optimizes the actual polling order to meet the needs of multimedia applications. However, performance analysis shows dilemma between network utilization and delay bound guarantee. This motivates us to further investigate a multi-cycle enhancement. It is designed based on the detailed performance analysis on different traffic scenarios. The final scheme not only manages the network resources efficiently with total network utilization improvement but also proves us the parameterized QoS supports particularly for session-based applications.
Schulte, J., Nguyen, V., Hoang, D.B., Elliott, D., McKinley, S.M. & Nanda, P. 2012, 'A remote sensor-based 6-minute functional walking ability test', IEEE Sensors 2012, IEEE Sensors, IEEE, Taipei, Taiwan, pp. 1-4.
View/Download from: UTS OPUS or Publisher's site
This paper proposes and implements an integrated remote sensor-based 6-minute walk test (6MWT) for monitoring a patient's clinical condition and correlate this data to the walking activity that the patient is performing to assess his/her functional ability and physical performance. The 6MWT is known to be one of the most effective rehabilitation tests for a clinician to assess individuals with a variety of clinical conditions including survivors of a critical illness. Our method deploys body sensors for measuring health conditions and an on-body accelerometer for detecting motion. An intelligent algorithm was developed to detect a walk step, count the number of steps, and dynamically derive the step distance based on an individual's real-time walking parameters. The path and the derived walk distance are then related to their vital signs to assess their functional ability under various walk conditions. Our remote 6MWT is being considered for a telehealth rehabilitation procedure in an integrated assistive healthcare system.
Bernardo, D.V. & Hoang, D.B. 2012, 'Compositional Logic for Proof of Correctness of Proposed UDT Security Mechanisms', 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, Fukuoka, pp. 686-694.
View/Download from: UTS OPUS or Publisher's site
We present an approach to analyze the applicability and secrecy properties of the selected security mechanisms when implemented with UDT. This approach extends applicability refinement methodology with symbolic model in UDT implementations. In our approach, we carry out a formal proof of correctness, therefore, determining applicability, using formal composition logic. This approach is modular, comprising a separate proof of each protocol section and providing insight into the network environment in which each section can be reliably employed. Moreover, the proof holds for a variety of failure recovery strategies and other implementation and configuration options. We derive our technique from the protocol composite logic on TLS and Kerberos in the literature. We, maintain, however, the novelty of our work for UDT specifically our newly developed mechanisms such as UDT-AO, UDT-DTLS, UDT-Kerberos(GSS-API) specifically for UDT.
Bernardo, D.V. & Hoang, D.B. 2012, 'Symbolic Analysis of the Proposed UDT Security Architecture', 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), International Conference on Advanced Information Networking and Applications Workshops (WAINA), IEEE, Fukuoka, pp. 171-176.
View/Download from: UTS OPUS or Publisher's site
In this paper, we analyze our UDT security architecture using rewrite based systems and automata. We present and use symbolic analysis approach to effectively verify our proposed architecture. This approach allows dataflow replication in the implementation of selected mechanisms integrated into the proposed architecture. We consider this approach effective by utilizing the properties of the rewrite systems to represent specific flows of the architecture to present a theoretical and reliable method to perform the analysis. We introduce abstract representation of the components that composes the architecture and conduct our analysis, through structural, semantics and query analyses. The result of this work, which is first in the literature, is a more robust theoretical and practical representation of a viable security architecture of UDT that is applicable to other high speed network protocols
Hoang, D.B. & Pham, C. 2012, 'Connectivity abstractions and "service-oriented network" architecture', Computing, Networking and Communications (ICNC), 2012 International Conference on, ICNC 2012, IEEE, Maui, HI, pp. 337-342.
View/Download from: UTS OPUS or Publisher's site
Current generation networks have been designed only for network connectivity; they have been stretched to the limit with many afterthought add-on features including quality of service, mobility, programmability, and security so that they can be deployed for business applications and processes. As such, service deployment on current networks are difficult, time consuming and with limited successes. This paper suggests a service architecture based on network connectivity abstraction, user connectivity abstraction and application/service connectivity abstraction. The paper also proposes a service-oriented network (SON) architecture that facilitates the development of services and applications regardless of the underlying network access technologies. The architecture is conceived through the consideration of the essential requirements of generic Internet applications from the service and network providers' perspective that addresses the Service-Oriented Architecture (SOA) application deployment pattern, user location and device mobility, and the structure of IP-converged networks.
Chen, L. & Hoang, D.B. 2011, 'Novel data protection model in healthcare cloud', 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC),, The Institute of Electrical and Electronics Engineers, Inc., Banff, AB, Canada, pp. 550-555.
View/Download from: UTS OPUS or Publisher's site
Abstract- deploying state-of-the-art technologies is vital and inevitable in healthcare industry to cope with emerging services such as healthcare resource sharing and integration, collaborative consultation, and electronic health record. Cloud computing allows simple and easy user access, coping with users' dynamic and elastic demands, providing metered usage for its resources and hence is increasingly being adopted by individual users as well as enterprise users. The Cloud is being considered as appropriate technology for future healthcare infrastructure. However, in order to use of Cloud services effectively, users' data and/or resource have to be transferred to the cloud side and this inevitably raises several serious issues concerning losing control of users' resource, data privacy protection, data ownership and security. This paper addresses security and privacy challenges in healthcare cloud by deploying a novel framework with CPRBAC (Cloud-based Privacy-aware Role Based Access Control) model for controllability, traceability of data and authorized access to system resources. Furthermore, the work seeks to develop a unique active auditing service that is capable of tracing, tracking, and triggering an alarm on any operation, data or policy violations in the Cloud environment.
Chen, L. & Hoang, D.B. 2011, 'Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud', 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), The Institute of Electrical and Electronics Engineers, Inc., ChangSha, China, pp. 126-133.
View/Download from: UTS OPUS
Despite cloud computing has been widely adopted by most industries, the healthcare industry still reveals a slow development in cloud-based solution due to the raising of user fear that their confidential health data or privacy would leak out in the cloud. To allay users' concern of data control, data ownership, security and privacy, we propose a robust data protection framework which is surrounded by a chain of protection schemes from access control, monitoring, to active auditing. The framework includes three key components which are Cloud-based Privacy-aware Role Based Access Control (CPRBAC) model, Triggerable Data File Structure (TDFS), and Active Auditing Scheme (AAS respectively. Our schemes address controllability, trace ability of data and authorize access to healthcare system resource. Data violation against access control policies can be proactively triggered to perform corresponding defense mechanisms. Our goal is to bring benefits of cloud computing to healthcare industries to assist them improve quality of service and reduce the cost of overall healthcare.
Zhang, J., Huang, M. & Hoang, D.B. 2011, 'Detecting DDoS Attack in Spam Emails using Density-Weight Model', Volume II, Proceedings of 2011 IEEE International Conference on Information Theory and Information Security, IEEE International Conference on Information Theory and Information Security, IEEE Press, Hangzhou, China, pp. 344-352.
View/Download from: UTS OPUS
DDoS attacks whose are embedded in spam emails are increasingly becoming numerous and sophisticated in nature. Hence this has given a growing need for spam email analysis to identify these attacks. The uses of these intrusion detection systems have given rise to two new challenges, 1) how to incrase the accuracy of detection, 2) how to present large spam email networks for better understanding. In this paper we introduce a new analytical model that uses two coefficient vectors: 'density' and 'weight' to measure the network density and system workload for the analysis of DDoS attack of spam emails. We then use a visual clustering method to classify and display the spam emails for better understanding of the spam email network. The experiment shows that the proposed new model can increase the accuracy of the detection of DDoS attacks.
Balasubramanian Appiah, V. & Hoang, D.B. 2011, 'Addressing the Confidentiality and Integrity of Assistive Care Loop Framework using Wireless Sensor Networks', 2011 21st International Conference on Systems Engineering, IEEE Computer Society, Las Vegas Nevada USA, pp. 416-421.
View/Download from: UTS OPUS
In-house healthcare monitoring applications are continuous time-critical applications often built upon Body Area Wireless Sensor Networks (BAWSNs). Our Assistive Care Loop Framework (ACLF) is an in-house healthcare application capable of monitoring the health conditions of aged/patients over a dedicated period of time by deploying the BAWSN as the monitoring component. However, the wireless medium used in the BAWSN for communications is prone to vulnerabilities that could open a door to attackers tampering with or compromising the userâs data privacy. Hence, it is imperative to maintain the privacy and integrity of the data to gain the confidence and hence, the acceptance of the users of the healthcare applications. Furthermore, in time-critical applications, the vital health conditions must be monitored at regular intervals within their specified critical time. Therefore, the security model proposed for the BAWSN must not incur undue overheads when meeting the critical time requirements of the application. In this paper, we propose and implement a secure adaptive triple-key scheme (TKS) for the BAWSN to achieve the privacy and integrity of the monitored data with minimal overheads. We then present the performance results of our scheme for the BAWSN, using real-time test-bed implementations and simulations.
Bernardo, D.V. & Hoang, D.B. 2011, 'Empirical Survey : Experimentation and Implementations of High Speed Protocol Data Transfer for GRID', 2011 Workshop of International Conference on Advanced Information Networking and Applications, 2011 Workshop of International Conference on Advanced Information Networking and Applications, IEEE Computer Society, Biopolis Singapore, pp. 335-340.
View/Download from: UTS OPUS or Publisher's site
Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol). UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, including wide area optical networks. It is considered a state-of-the-art protocol, which promptly addresses various infrastructure requirements for transmitting data in high-speed networks. Its development, however, creates new vulnerabilities because like many other protocols, it is designed to rely solely on existing security mechanisms for existing protocols such as the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of these security mechanisms cannot be used to absolutely protect UDT, just as security mechanisms devised for wired networks cannot be used to protect unwired ones. Both the recently developed UDT and the decades-old TCP/UDP lack a well-thought-out security architecture that addresses problems in today's networks. In this paper, we extend our previous work and implement our developed security methodology that can assist network and security investigators, designers, and users who consider and incorporate security when implementing UDT across wide area networks. These can support security architectural designs of UDP-based protocols as well as assist in the future development of other state-of-the-art fast data transfer protocols.
Bernardo, D.V. & Hoang, D.B. 2011, 'Formalisation and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT', Security Technology, Springer Verlag Berlin, Jeju Island, Korea, pp. 183-194.
View/Download from: UTS OPUS
The development and deployment of User Datagram Protocol (UDP)- based Data Transfer (UDT) is undoubtedly strongly reliant upon existing security mechanisms. However, existing mechanisms are developed for mature protocols such as TCP/UDP. We, therefore, developed proprietary mechanisms to form a security architecture for UDT. The primary objectives of the architecture include the management of messages through Authentication Option (AO) and cryptographic keys, the security of data communications, and the integration of data protection enhancing technologies across all the layers. Our approach is the result of our work which started in 2008. We verified each mechanism through formalisation to achieve informationtheoretic soundness of the architecture. The results achieve the enhancement of existing schemes to introduce a novel approach to integrate mechanisms to secure UDT in its deployment. The architecture does include available and well-discussed schemes, which are used in other protocols, with proven computational intelligence which can be upgraded so as to provide improved security and primary protection in future extensive UDT deployments. In this work, we present UDT Security Architecture with suitable mechanisms to ensure preservation of data integrity in data transmission.
Kamyabpour, N. & Hoang, D.B. 2011, 'A task based sensor-centric model for overall energy consumption', 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), IEEE, Gwangju, China, pp. 237-244.
View/Download from: UTS OPUS or Publisher's site
Sensors have limited resources so it is important to manage the resources efficiently to maximize their use. A sensor's battery is a crucial resource as it singly determines the lifetime of sensor network applications. Since these devices are useful only when they are able to communicate with the world, radio transceiver of a sensor as an I/O and a costly unit plays a key role in its lifetime. This resource often consumes a big portion of the sensor's energy as it must be active most of the time to announce the existence of the sensor in the network. As such the radio component has to deal with its embedded sensor network whose parameters and operations have significant effects on the sensor's lifetime. In existing energy models, hardware is considered, but the environment and the network's parameters did not receive adequate attention. Energy consumption components of traditional network architecture are often considered individually and separately, and their influences on each other have not been considered in these approaches. In this paper we consider all possible tasks of a sensor in its embedded network and propose an energy management model. We categorize these tasks in five energy consuming constituents. The sensor's Energy Consumption (EC) is modeled on its energy consuming constituents and their input parameters and tasks. The sensor's EC can thus be reduced by managing and executing efficiently the tasks of its constituents. The proposed approach can be effective for power management, and it also can be used to guide the design of energy efficient wireless sensor networks through network parameterization and optimization.
Furqan, F. & Hoang, D.B. 2011, 'Analysis of Parameters Contributing Performance and Coverage of Mobile WiMAX with Mix Traffic', 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), IEEE, Gwangju, China, pp. 313-318.
View/Download from: UTS OPUS or Publisher's site
With high data rate and mobility support wireless networks are becoming an essential access component and an integral part of the ubiquitous Internet. As the provision of wireless networks is cost effective, they are being adopted for broadband access in rural areas (e.g., the Australian National Broadband Network). In this paper we present a comprehensive study of the parameters that effect both the capacity and coverage of IEEE 802.16e WiMAX which will serve as a basis for designing an effective access network including network dimensioning and provisioning QoS for dynamic and mixed distribution of services. In particular, the effect of physical and MAC layer overhead is considered for capacity evaluation with a simple scheduler. The paper also discusses the usage of compressed MAPs with SUB-DL-UL-MAP to reduce overheads and increase network capacity. Different scenarios are presented to evaluate the effect of standard and compressed overhead on capacity and coverage
Bernardo, D.V. & Hoang, D.B. 2010, 'A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT', Second IEEE International Conference on Future Networks, IEEE International Conference on Future Networks, IEEE Computer Society, Sanya Hainan, pp. 367-371.
View/Download from: UTS OPUS or Publisher's site
The following topics are dealt with: computing network reliability; network security policy; wireless sensor network; routing protocol; web based intrusion detection system; network topology; BP neural network, WMAN; WDM optical network; WMAN;WDM optical network; TCP/IP networks; OFDMA relay networks; and mobile ad hoc networks.
Bernardo, D.V. & Hoang, D.B. 2010, 'Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol', Lecture Notes in Computer Science vol 6059 - Proceedings of the 4th International Conference on Information Security and Assurance, Information, Security and Assurance, Springer, Miyazaki, Japan, pp. 100-114.
View/Download from: UTS OPUS or Publisher's site
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addressess various infrastructure requirements for transmitting data in high speed networks. However, this development creates new vulnerabilities when these protocols are designed to solely rely on existing security solutions of existing protocols such as TCP and UDP. It is clear that not all security protocols (such as TLS) can be used to protect UDT, just as security solutions devised for wired networks cannot be used to protect the wired ones. The development of UDT, similarly in the development of TCP/UDP many years ago, lacked a well-thought security architecture to address the problems that networks are presently experiencing. This paper proposed and analyses practical security mechanisms for UDT.
Ahmad, N., Phung, M. & Hoang, D.B. 2010, 'Health Alerts: Interaction Protocols in Remote Health Care Monitoring', Proceedings Of The Iadis International Conference E-Health 2010 Part Of The Iadis Multi Conference On Computer Science And Information Systems 2010, International Association for Development of the Information Society International Conference, IADIS Press, Freiburg, Germany, pp. 61-68.
View/Download from: UTS OPUS
Remote health care monitoring is a promising technology to make health care more efficient and cost-effective. A crucial aspect of remote health care monitoring is interaction protocols that govern how alert and information messages are delivered to patients and health care professionals. Proper interaction protocols are essential in ensuring that not only the right messages are delivered to the right receiver in a timely manner but also that the intended actions are understood and carried out and any entailed exceptions are taken care of. In this paper, we discuss various issues in designing interaction protocols for remote health care monitoring. We also present a prototype implementation of an interaction protocol. A simple case study is shown to illustrate how the prototype works in a real-life scenario.
Hoang, D.B. & Chen, L. 2010, 'Mobile Cloud for Assistive Healthcare (MoCAsH)', Proceedings of 2010 IEEE Asia Pacific Services Computing Conference (APSCC 2010), IEEE Asia Pacific Services Computing Conference, IEEE Computer Society, Hangzhou, China, pp. 325-332.
View/Download from: UTS OPUS
Deploying state-of-the-art technologies is vital and inevitable in assistive healthcare to cope with emerging services such as remote monitoring, collaborative consultation, and electronic health record. Grid computing has succeeded somewhat in enabling the sharing of resources across organizations but has not been deployed widely due to its complex implementation and interface. Cloud computing overcomes this aspect by allowing simple and easy user access, coping with users' dynamic and elastic demands, providing metered usage for its resources and hence is increasingly being adopted by individual users as well as enterprise users. The Cloud may just be the right technology for healthcare infrastructure. However, serveral serious issues concerning security, data protection and ownership, quality of services, and mobility need to be resolved before Cloud computing can be widely adopted... This paper proposes Mobile Cloud for Assistive Healthcare (MoCAsH) as an infrastructure for assistive healthcare. Besides inheriting the advantages of Cloud computing, MoCAsH embraces important concepts of mobile sensing, active sensor records, and collaborative planning by deploying intelligent mobile agents, context-aware middleware, and collaborative protocol for efficient resource sharing and planning. MoCAsH addresses security and privacy issues by deploying selective and federated P2P Cloud to protect data, preserve data ownership and strengthen aspects of security. It also addresses various quality-of-service issues concerning critical responses and energy consumption.
Zheng, L. & Hoang, D.B. 2010, 'A QoS Mechanism of Registered Multi-Cycle Polling in Wireless Medium Access Control', 2010 IEEE RIVF International Conference on Computing and Communication Technologies, Research Innovation, and Vision for the Future (RIVF), IEEE-RIVF International Conference on Computing and Communication Technologies, Research Innovation, and Vision for the Future, IEEE Computer Society, Hanoi, pp. 1-6.
View/Download from: UTS OPUS or Publisher's site
Polling schemes in the IEEE 802 MAC layer provide some QoS support for multimedia applications above what can be provided with the contention scheme. However, in highly loaded environment, reliability and efficiency remain the main challenges for current detailed polling schemes. In this paper, we present a detailed analysis of polling medium access , and propose a novel mechanism, the Registered Multi-cycle polling. The new scheme performs particularly well especially under heavy load situations, where QoS guarantee for session-based applications is crucial to the network performance. The scheme provides not only parameterized QoS for session-based applications, but also improves the total network utilization. These performance gains are achieved with Registered Multi-cycle scheme with the use implicit information update and Multi-cycle enhancement.
Kamyabpour, N. & Hoang, D.B. 2010, 'A Hierarchy Energy Driven Architecture for Wireless Sensor Networks', 24th IEEE International Conference on Advanced Information Networking and Application Workshops, IEEE International Conference on Advanced Information Networking and Applications, Conference Publishing Services (CPS) - IEEE Computer Society, Perth Austtralia, pp. 668-673.
View/Download from: UTS OPUS
In Wireless Sensor Networks (WSNs) one of the critical issues is the mazimization of their life time. These networks require a robust architecture that takes into account the energy consumption level of functional contituents and their interdependency. With such an architecture, the overall energy consumption can then be optimized with respects to the contstraints of an application. Unlike most current researches that focus on a single aspect of WSNs, this paper presents a Hierarchy Energy Driven Architecture (HEDA) as new architecture and a novel approach for minimising the total energy consumption of WSNs. The Energy Driven Architecture identifies generic and essential energy-consuming constituents of the network. HEDA as a constituent-based architecture is used to deploy WSNs according to energy dissipation through their contituents. This view of overall energy consumption in WSNs can be applied to optimizing and balancing energy consumption and increasing the network lifetime.
Balasubramanian Appiah, V. & Hoang, D.B. 2010, 'Availability Measure Model for Assistive Care Loop Framework Using Wireless Sensor Networks', Proceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010, International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Casual Productions/IEEE, Brisbane, Australia, pp. 281-286.
View/Download from: UTS OPUS or Publisher's site
Nowadays, body area wireless sensor networks (BAWSNs) applications are increasingly being used in in-house health monitoring systems. These applications have stringent timing requirements and often run continuously without interruptions. Hence, it becomes imperative to determine the operational continuity of the BAWSN applications by measuring their availability. The BAWSN applications rely on the collection of data within a critical time from all of the source sensor nodes rather than the data from an individual source. Subsequently, the measure of availability for a BAWSN application should be based on the time and the data delivery from all the sensor nodes. Taking into account these specific characteristics and the constraints of the BAWSN, we develop a model to measure the availability of a BAWSN application based on the unavailable time. The proposed model is evaluated through a series of experiments conducted in our existing Assistive Care Loop Framework (ACLF). Furthermore, we also develop an analogous theoretical model to evaluate the availability of a BAWSN application.
Bernardo, D.V. & Hoang, D.B. 2010, 'End-to-end security methods for UDT data transmissions', Future Generation Information Technology Second International Conference, FGIT 2010, Future Generation Information Technology Second International Conference, Springer-Verlag, Jeju Island, Korea, pp. 383-393.
View/Download from: UTS OPUS or Publisher's site
UDT (UDP-based data transfer protocol) is one of the most promising network protocols developed for high data speed data transfer. It does not, however, have any inherent security mechanisms, and thus relies on other transport protocols to provide them.
Phung, M., Hoang, D.B. & Lawrence, E.M. 2010, 'A Collaborative Task Planning and Development Environment on the Grid', Proceedings of the 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, The Institute of Electrical and Electronics Engineers, Inc., Larissa, Greece, pp. 266-271.
View/Download from: UTS OPUS or Publisher's site
Grid system is a promising solution for sharing distributed resources of registered participants to perform tasks whose demands may exceed the capacity of individual participating organization. However, the collaborative aspect of Grids is still underdeveloped as they lack features and mechanisms for human interaction and collaboration. This paper presents the design and development of a prototype integrated environment for collaborative task planning and workflow development over a Grid. It allows the participants to design their joint workplan interactively and collaboratively in a high level graphical notation. The resulting workplan can be translated into Business Process Execution Language (BPEL) for testing and execution in the Grid and forms the basis for further refinement and collaboration. This collaborative Grid environment is a part of our larger Active Assistive Grid infrastructure.
Kamyabpour, N. & Hoang, D.B. 2010, 'Modeling overall energy consumption in Wireless Sensor Networks', The 11th International Conference on Parallel and Distributed Computing, Applications and Technologies, International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE Computer Society, Wuhan China, pp. 273-279.
View/Download from: UTS OPUS or Publisher's site
Minimizing the energy consumption of a wireless sensor network application is crucial for effective realization of the intended in terms of cost, lifetime, and functionality. However, the minimizing task is hardly possible as no overall energy cost function is available for optimization. Optimizing a specific component of the toal energy cost does not help in reducing the total energy cost as this reduction may be negated by an increase in the energy consumption of other components of the application. Recently we proposed Hierarchy Energy Driven Architecture as a robust architecture that takes into account all principal energy constituents of wireless sensor network applications. Based on the proposed architecture, this paper presents a single overall model and proposes a feasible formulation to express the overall energy consumption of a generic wireless sensor network application in terms of its energy contituents. In particular, the paper identifies salient components and dominant factors of each energy constituents. The formulation offers a concrete expression for evaluating the performance of a wireless sensor network application, optimizing its constituent's operations, and designing more energy-efficient applications. The paper also presents simulation result to demonstrate the feasibility of our model and energy formulation.
Bernardo, D.V. & Hoang, D.B. 2010, 'Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API', Proceedings - The Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010), International Conference on Emerging Security Information, Systems and Technologies, IEEE Computer Society, Venice/Mestre Italy, pp. 266-272.
View/Download from: UTS OPUS or Publisher's site
Network protocols do not solely rely on the lower layers of the stack for security. Many of these protocols rely on a combination of layers to develop a more secure channel for data transmission. UDT, like other new next generation high speed protocols, relies on Transport, on IP, and on Network layers for data delivery and protection. However, like other existing protocols, UDT has a socket interface to link with API, a feature that makes it flexible in its implementation. This paper contends that UDT's user interface provides a means of protection by using another application service interface to cater for its security requirements. By implementing GSS-API, UDT can achieve authentication, confidentiality, and integrity during data transmission. This work provides another way of securing high speed network protocols such as UDT when implemented in various network environments.
Bernardo, D.V., Chua, B. & Hoang, D.B. 2009, 'Quantitative Security Risk Assessment (SRA) Method: An empirical case study', World Congress on Nature and Biologically Inspired Computing (NaBIC'09), World Congress on Nature and Biologically Inspired Computing, Research Publishing Services, Comibatore, India, pp. 972-977.
View/Download from: UTS OPUS or Publisher's site
This paper introduces a novel approach to a more practical Quantitative SRA. The approach formalized in this paper is based on the methods described in various risk assessment frameworks that were described by existing international standards with adjustments combining qualitative and ranking method based on distance-based approach. The successful implementation of this approach in four organizations provides an alternative conventional means of performing a more practical Quantitative SRA, in a manner consistent with current set of standards and practices.
Phung, M., Hoang, D.B. & Lawrence, E.M. 2009, 'A Front-End for Collaborative Task Planning on the Grid', International Symposium on Collaborative Technologies and Systems, 2009, International Symposium on Collaborative Technologies and Systems, The Institute of Electrical and Electronics Engineers, Inc., Maryland, USA, pp. 292-299.
View/Download from: UTS OPUS or Publisher's site
Grid systems allow the sharing of distributed resources of registered participants to perform tasks whose demand may exceed the capacity of individual participating organization. However, the collaborative aspect of Grids is still underdeveloped as they lack features and mechanisms for interaction and collaboration. This paper presents the design and development of an integrated Front-End as a workplace for collaborative task planning over a Grid. The Front-End allows parties to design their joint workplan interactively and collaboratively in real time in the form of editing activities and Business Process Execution Language (BPEL) workflows. The resulting workplan will be executed by the underlying Grid and forms a basis for further collaboration. The Front-End is in fact the centerpiece of our collaborative Framework within a larger Active Assistive Grid infrastructure.
Phung, M., Hoang, D.B. & Lawrence, E.M. 2009, 'A Novel Collaborative Grid Framework for Distributed Healthcare', 9th IEEE/ACM International Symposium on Cluster Computing and the Grid CCGRID 2009, IEEE International Symposium on Cluster, Cloud and Grid Computing, IEEE computer Society, Shanghai China, pp. 514-519.
View/Download from: UTS OPUS or Publisher's site
The increasing ageing populations around the world presents an unprecedented challenge in developing economically viable healthcare systems for our societies. To overcome this challenge and maintain a decent level of healthcare, further innovation and deployment of information technologies in the field of healthcare are the keys. Our earlier work puts forward "An Active Grid Infrastructure for Elderly Care" solution whereby elderly people are monitored non-intrusively to provide essential health information about them; the information concerning their condition is kept in an "active" health record; and resources involved in the system can be shared by multiple caregivers or organizations allowing them to collaborate in developing relevant care programs for these elderly persons. This paper focuses on the design of collaborative component of the solution. A framework is proposed for an integrated Grid system that supports collaborative task planning and workflow development. The system will enable healthcare professionals to access the necessary resources, collaborate with each other to develop and execute treatment workflows in a user-friendly and intuitive manner. The paper will discuss the requirements and design principle for key components of the system and presents its preliminary implementation.
Ahmad, N. & Hoang, D.B. 2009, 'Assistive Health Care Monitoring Framework using Active Database Approach', IADIS International Conference e-Health 2009, International Association for Development of the Information Society International Conference, International Association for Development of the Information Society, Algarve, Portugal, pp. 19-26.
View/Download from: UTS OPUS
Recent advances in information and communication technologies and wireless sensor networks present opportunities to develop effective assistive health care services that have the potential for reducing the cost of the overall healthcare systems. This paper proposes a health-monitoring architecture that possesses a configurable front end for handling different types of sensors and data conditions, that responds quickly and intelligently to the patient's conditions and that permits reliable notifications and dynamic interactions among carers and patients. The paper focuees on the design of this assistive health care monitoring architecture with wireless sensors and wireless networks. The active database technology approach is deployed to introduce the active mechanism to closely monitor the changes of the health data in the database and detect any important health events of interest. Upon event occurrences, alerts and notifications are communicated to the relevant users through a set of proposed interaction protocols. Part of the framework has been implemented in the Active Maternity Care application.
Koay, W.A. & Hoang, D.B. 2009, 'A New Security Scheme for E-health System', Proceedings of The 2009 International Symposium on Collaborative Technologies and Systems CTS 2009, International Symposium on Collaborative Technologies and Systems, IEEE Computer Society, Baltimore, Maryland USA, pp. 361-366.
View/Download from: UTS OPUS or Publisher's site
Security is a critical requirement for the e-health system because the patient's sensitive information can be acessed remotely ant his makes the entire system vulnerable to malicious attacks. In this paper, we present a novel role-interaction-organization security model and apply it to the e-health system which is modeled as a multi-agent system. The roles in our proposed modeled as a multi-agent system. The roles in our proposed model do not only determine access right passively, but also initiate requests to interact dynamically with the agents who meet the security requirements. The interaction and the organization models help to identify the actions and responsibilities that a role can assume in the system within the organization and any dynamic interactions it can partake. A simple case from the e-health system is given to illustrate the application of the model.
Maimour, M., Pham, C. & Hoang, D.B. 2009, 'A Congestion Control Framework for Handling Video Surveillance Traffics on WSN', 12th IEEE International Conference on Computational Science and Engineering (CSE 2009), International Conference on Computational Science and Engineering, IEEE Computer Society, Vancouver, Canada, pp. 943-948.
View/Download from: UTS OPUS or Publisher's site
This paper focuses on congestion control but while previous works considered scalar sensor nodes which only report events in the size of a few bytes, we are addressing congestion control for information-intensive flows such as video flows for surveillance applications in pervasive wireless multimedia sensor networks. The proposed framework that we describe in order to efficiently handle information-intensive flows in a WSN. This work addresses congestion control with a multi-path routing facility. Next, an efficient congestion detection is proposed as the radio medium is most likely to introduce packet losses due to contention on the radio channel, and not only because of buffer overflow. Then a light-weight load repartition mechanism sits on top in order to take advantages to the path diversity, keeping as long as possible the sending rate constant thus keeping the video quality as high as possible. Simulations are performed in order to get insights into the performances of our proposals.
Li, Z., Hoang, D.B. & Li, M. 2009, 'Applying Fair Intelligent Congestion Control in a Hybrid QoS Architecture for Wireless Environment', 7th International Conference on Information, Communications and Signal Processing ICICS 2009, International Conference on Information, Communications and Signal Processing, IEEE Communications Society, Macau, China, pp. 1-6.
View/Download from: UTS OPUS or Publisher's site
This simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. However, more explicit and stringent admission and reservation based QoS mechanisms are required in the wireless access segment of the network, where available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions. At the edge and over the DiffServ domain, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core.
Lawrence, E.M., Felix Navarro, K.M., Hoang, D.B. & Lim, Y. 2009, 'Data Collection, Correlation and Dissemination of Medical Sensor Information in a WSN', 2009 Fifth International Conference on Networking and Services, International Conference on Networking and Services, IEEE, Valencia, Spain, pp. 402-408.
View/Download from: UTS OPUS or Publisher's site
This paper describes the development of a Wireless Sensor Network personal health monitoring system called Medical MoteCare which uses a combination of medical and environmental sensors. SNMP and CodeBlue agents are incorporated in the system as is the network management software JaguarSX. Network management models and tools provide an alternative, scalable and affordable solution to WSN health monitoring applications that allow for data storage correlation and dissemination as well as timely alerts when parameters are breached. This work forms part of a large grant aimed at providing assistive healthcare for the elderly.
Bernardo, D.V. & Hoang, D.B. 2009, 'Network Security Considerations for a New Generation Protocol UDT', 2nd IEEE International Conference on Computer Science and Information Technology ICCSIT 2009, IEEE International Conference on Computer Science and Information Technology, IEEE Communications Society, Beijing China, pp. 125-130.
View/Download from: UTS OPUS or Publisher's site
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is performed. The objective is to achieve a wide class of security methods used on existing mature protocols such as TCP and UDP, and other developed variants such as DCCP and STCP. This will assist investigators, designers, and users who consider and incorporate security when implementing UDT. Secondly, it aims to provide ways of securing applications and traffic using UDT protocol as well as making recommendations for adequate methods to address its security requirements. This will highlight UDT's security limitations and determine the threshold of feasible security schemes within the constraints under which UDT was designed and developed.
Nguyen Thanh, B. & Hoang, D.B. 2009, 'An Automatic Tool for Deployment of BPEL in ODE Apache', Proceedings of the 2009 International Conference on E-Learning, E-Business, Enterprise Information Systems & E-Government, International Conference on E-Learning, E-Business, Enterprise Information Systems, E-Government and Outsourcing, CSREA Press, Las Vegas Nevada, USA, pp. 248-253.
View/Download from: UTS OPUS
Business Process Execution Language (BPEL) has become an important tool for composing new business processess from Web services and designing Grid workflows. However, running BPEL processes is often error prone procedure that involves a sequence o ftime consuming manual preparation. A deployment stage must be prepared to produce a specific deployment file, then all necessary files must be ensembled to a specific deployment directory, and finally, a BPEL engine has to perform the compilation and error checking to produce runnable BPEL processes. This paper presents a tool for automating the deployment stage of runnable BPEL processes.
Zheng, L. & Hoang, D.B. 2009, 'Overlapping Impacts and Resource Coodination for High-density Wireless Communication', 2009 IEEE-RIVF International Conference on Computing and Communication Technologies, IEEE-RIVF International Conference on Computing and Communication Technologies, Research Innovation, and Vision for the Future, IEEE eXpress Conference Publishing, Da Nang University of Technology, Vietnam, pp. 180-186.
View/Download from: UTS OPUS or Publisher's site
A high-density wireless environment could not avoid ceel/BSS (Basic Service Set) overlapping, which may cause Co-channel interference. Such interference makes it difficult to support QoS. It is desirable that BSSs can share a single frequency channel without interference-free for a business-sound wireless deployment. In this paper, we present a detailed analysis on OBSS co-existence and QoS, based on the context of 802.11 WiFi as an example. The uplink and downlink transmission are separated into two periods. The grouping assigments using coloring theory are carried out based on the topology to divide BSSs into groups and time span to avoid downlink collision.
Ahmad, N., Hoang, D.B. & Phung, M. 2009, 'Robust Preprocessing for Health Care Monitoring Framework', 2009 11th IEEE International Conference on e-Health Networking, Applications and Services, IEEE International Conference on e-Health Networking, Applications and Services, IEEE Communications Society, Sydney Australia, pp. 169-174.
View/Download from: UTS OPUS or Publisher's site
Remote health care monitoring is an emerging application that helps to reduce the cost of health care and at the same time improve its quality. However, by its nature, medical sensor data is often unreliable and massive as the data is collected from numerous sensors operating in noisy environments. Therefore, ensuring the reliability of the sensor data and the scalability of the health care monitoring services are among major challenge and is a determining factor in success of the system. In this paper, we propose a robust and flexible processing module as part of an active health care monitoring framework. It is responsible for preparing the sensor data and performing some initial assessment of the data for input to later modules. The proposed preprocessing architecture contains five stages ; validation, transformation, cleaning, reduction and cross-verification. The module is evaluated using synthetic blood pressure data.
Hoang, D.B., Lawrence, E.M., Ahmad, N., Balasubramanian Appiah, V., Homer, C.S., Foureur, M. & Leap, N. 2008, 'Assistive Care Loop with Electronic Maternity Records', 2008 10th IEEE International Conference on e-Health Networking, Applications and Services, International Conference on e-Health Networking, Applications and Services, IEEE, Biopolis, Singapore, pp. 118-123.
View/Download from: UTS OPUS or Publisher's site
Surprisingly women-held pregnancy health records (paper based) are still predominantly used in most hospitals in Australia. These records are not standardized as each hospital or state has a slightly different version. Early efforts have been made to standardize pregnancy records and make them available electronically. Electronic record systems do not allow dynamic interaction between users and they are not accessible when users are mobile. This paper describes an assistive maternity care (AMC) system that addresses a number of important issues: 1) transforming a women-held paper-based record for pregnancy care into an electronic maternity record (EMR); 2) investigating mechanisms to make the record active; 3) creating a system whereby details of the pregnant women and their carers can be recorded, updated over wired and wireless networks; and 4) creating a pregnancy care loop over which midwives and doctors and pregnant women under their care can communicate effectively anywhere, anytime for the duration of pregnancy.
Hoang, D.B. 2008, 'A global internet infrastructure', 2008 IEEE International Conference on Research, Innovation and Vision for the Future in Computing and Communications Technologies (RIVF'08), RIVF, IEEE, Ho Chi Minh City, Vietnam, pp. 118-123.
View/Download from: UTS OPUS
The Internet plays an essential role in providing us with a global infrastructure for communication and means for accessing instantly a vast amount of worldwide information. The Internet will continue to shape our future especially now that it has been embraced and deployed as an infrastructure for businesses and for social and collaboration activities. The current Internet, however, was-not designed for these purposes when it was first conceived and hence it has experienced many serious difficulties and -limitations over the last few years: security, quality of service, mobility, and service on~demand capability The next generation Internet is more about services and applications that it can enable and offer. For this to be realised, considerations concerning high-level abstraction of the Internet and the scope of its usage are essential in designing next generation networks. This paper suggests a three~layer abstraction architecture that leverages what we learnt from the past and looks forward tol the future through innovations: an underlying network abstraction, an overlay abstraction, and a service/application abstraction. The paper also describes a preliminary implementation of. the architecture to demonstrate its feasibility.
Zheng, L. & Hoang, D.B. 2008, 'Applying Graph Coloring in Resource Coordination for a High-density Wireless Environment', IEEE 8th International Conference on Computer and Information Technology, IEEE International Conference on Computer and Information Technology, IEEE, Sydney, Australia, pp. 664-669.
View/Download from: UTS OPUS or Publisher's site
In a high density wireless environment, channel interference among users of many overlapped Basic Service Sets (OBSSs) is a serious problem. Our solution for the problem relies on a resource coordination scheme that utilizes the spatial distribution of the transceivers for channel reuse and time-slot division multiplexing for downlink transmission sharing among all participating BSSs. In this paper we show that an OBSS environment can be modeled by a planar graph and the OBSS group coordination assignment problem can be considered as a vertex coloring problem whose solution involves at most four colors. The graph coloring solution algorithm for the OBSS group coordination assignment is presented. The actual coloring is demonstrated, using a heuristics of Maximum Degree First. Performance simulation results of the coordination algorithm are also presented.
Nguyen Thanh, B. & Hoang, D.B. 2008, 'Building a Plan-Supported Grid Collaborative Framework', The 2nd IEEE International Conference on Communications and Electronics, HUT-ICCE 2008, IEEE, HoiAn, Vietnam, pp. 150-156.
View/Download from: Publisher's site
Grid infrastructure for resources sharing is somewhat stable with the wide acceptance of the open grid services Architecture (OGSA) and web services resource framework (WSRF), but grid framework for collaboration is far from desired. Current grid collaborative frameworks (GCFs) are domain specific and lack of plan-supported capacity. These limitations make them less useful and narrow in scope of application. This paper describes a grid collaborative framework that is both general purpose and plan supported. With the theoretical foundation based on the activity theory and designed on top of existing OGSA infrastructure, our proposed framework aims at accelerating the development of grid collaborative systems that consider working plans as central role.
Balasubramanian Appiah, V., Hoang, D.B. & Ahmad, N. 2008, 'SOAP based Assistive Care Loop using Wireless Sensor Networks', IEEE International Symposium on IT in Medicine and Education, International Symposium on IT in Medicine and Education, IEEE, Xiamen, China, pp. 409-414.
View/Download from: UTS OPUS or Publisher's site
There is a growing trend towards in-house health monitoring system. It is now feasible to place a personal digital assistant (PDA) or smart phone in the hands of care-delivery staff and the patients regardless of where they are located or what their duties might be. In such instance, the staff would be able to access records and communicate with patients in a flexible and cost effective way. This paper proposes an active care loop framework (ACLF). The strength of our ACLF is to monitor disease over longer period of time and to consult patient who are then able to discuss their conditions with the care staff. Where patients need emergency intervention, an assistive health monitoring system can provide a direct communication channel to summon assistance and to enable with managing the situation until the assistance arrives. With a regular schedule of monitoring and consultation, the assistive ACLF has the capacity to forestall and manage non-critical situations and therefore the system can be deployed to minimize the rate and costs of hospitalizations.
Le, T., Schiff, N., Du, P.J. & Hoang, D.B. 2008, 'A Pervasive Tele-health System for continual and low intrusive monitoring using Peer-to-Peer Networks', 5th International Conference on Information Technology and Applications (ICITA 2008), International Conference on Information Technology and Applications, Macquarie Scientific Publishing, Cairns, Australia, pp. 862-866.
View/Download from: UTS OPUS
There are many people suffering from chronic illnesses, obesity and related diseases such as: high blood pressure, arrhythmia, diabetes, etc. However, with a large number of patients and constant health monitoring requirements, a centralized server will not be able to accommodate such high volumes of data. In this paper, we propose to develop a pervasive electronic healthcare system using Peer-to-Peer (P2P) networks. We developed a heart monitoring application as our first prototype to demonstrate the concept. The main advantage of the model is scalability and cost efficiency.
Zheng, L. & Hoang, D.B. 2008, 'Performance Analysis for Resource Coordination in High-density Wireless Environment', 2008 IEEE Symposium on Computers and Communications (ISCC '08), IEEE Symposium on Computers and Communications, IEEE, Marrakech, Morocco, pp. 685-690.
View/Download from: UTS OPUS or Publisher's site
The cochannel overlapping basic service sets (OBSS) wireless interference is unavoidable in a high-density overlapping BSS environment. In order to provide interference-free environment and, at the same time, Quality of Services, centralized resources coordination functionalities particularly in Medium Access Control (MAC) layer are required. The proposed scheme, based on the context of 802.11 WiFi, separates the uplink and downlink transmission into two periods governed by contention scheme and polling scheme respectively. The possible collisions during the synchronized uplink period are avoided because of the natures of contention scheme used. During the downlink period, the grouping assignments, using coloring theory, are carried out based on the topology to divide BSSs into groups and then time spans to avoid collision. The constraint of grouping is that no two overlapping BSSs could be assigned to the same group/time span, so interferences are minimized using time division technique. A complete performance analysis in a number of simulation scenarios is finally presented.
Zheng, L., Hoang, D.B. & SOC, I.C. 2008, 'Performance Analysis for Resource Coordination in a High-density Wireless Environment', 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, pp. 572-577.
Hoang, D.B. 2007, 'Wireless Technologies and Architectures for Health Monitoring Systems', International Conference on the Digital Society, Telemed 2007, International Conference on Digital Society, IEEE Computer Society, Guadeloupe, pp. 1-6.
View/Download from: UTS OPUS or Publisher's site
Various wireless technologies have been used in health monitoring systems; however, it is not always clear why one technology is chosen over another and how it fits into the overall architecture of an application. This paper explores many limiting characteristics of relevant wireless technologies and attempts to provide a basis for making an appropriate selection. The paper also suggests an architecture that supports collaboration among multiple caregivers over a particular health monitoring application.
Hoang, D.B. & Phan, H. 2007, 'A Scalable End-to-End QoS Architecture', 2007 International Symposium on Communications and Information Technologies, International Symposium on Communications and Information Technologies, IEEE, Sydney, Australia, pp. 677-682.
View/Download from: UTS OPUS
Yousef, B., Hoang, D.B. & Rogers, G. 2004, 'Network Programmability for VPN Overlay Construction and Bandwidth Management', IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers, IFIP International Working Conference, Springer, Kansas, USA, pp. 114-125.
View/Download from: UTS OPUS or Publisher's site
Reliability and security concerns have increased demand for Virtual Private Networks (VPNs). Ideally, a VPN service should offer autonomous overlay networks with guaranteed bandwidth allocations over a shared network. Network providers seek an automated VPN creation and management process, while users of a VPN would greatly benefit from secure control over the handling of their traffic. Currently, network infrastructure does not support such partitioning services and, due to its static nature, it cannot be adapted to meet such new demands. Active and Programmable Network research has developed a number of adaptable architectures. However, its current focus is on theoretical service deployment rather than on applicability to large and shared networking environments. This paper presents the application of a new programmable architecture to enable on-demand VPN construction, bandwidth management, and secure autonomous VPN control onto shared commercial infrastructure.
Phan, H. & Hoang, D.B. 2006, 'Extension of BGP to support multi-domain FICC-diffserv architecture', 20th International Conference On Advanced Information Networking And Applications, Vol 1, Proceedings, International Conference on Advanced Information Networking and Applications (was ICOIN), IEEE, Vienna, Austria, pp. 269-274.
View/Download from: UTS OPUS or Publisher's site
The Internet is composed of many separate administrative domains called Autonomous Systems (ASs). To enable the end-to-end Quality of Service (QoS) for Internet applications, the inter-autonomous system QoS routing plays an important role in advertising
Uppu, S., Hoang, D.B. & Hintz, T.B. 2006, 'A Mobile Hand Held Computing System for Out Patient Workflow in Hospital Environment', 2006 IEEE 63rd Vehicular Technology Conference, IEEE Vehicular Technology Conference, IEEE, Melbourne, Australia, pp. 751-755.
View/Download from: UTS OPUS or Publisher's site
Hospitals around the world are taking advantage of wireless LAN-based computing technologies in view of their mobility, flexibility, and speed to improve the quality and reduce the cost of patient care. The handheld computers have evolved into a viable platform for these organizations to access and manage the patients' information wirelessly from any point of care. However, the deployment of the handheld technology is hindered by the lack of automation of workflows in the present hospital system architecture. In this paper, thin client architecture with workflow decision making is presented by considering the outpatient workflow. The prototype is not intended to replace the workflows in the healthcare but to facilitate the health care professionals to receive useful and relevant information on time with greater flexibility than before. The prototype focuses on exchanging information with existing legacy systems, updating data in real time, and making them available to healthcare professionals by organizing daily routines in the ward
Hoang, D.B. 2006, 'Fair intelligent congestion control', ATNAC 2006 proceedings, Australian Telecommunication Networks and Applications Conference, ATNAC, Melbourne, Australia, pp. 153-157.
View/Download from: UTS OPUS
Le, T., Hoang, D.B. & Simmonds, A.J. 2006, 'PARM: a physically-aware reference model for overlay internetworking', 20th international conference on advanced information networking and applications, International Conference on Advanced Information Networking and Applications (was ICOIN), IEEE, Vienna, Austria, pp. 419-424.
View/Download from: UTS OPUS or Publisher's site
Peer-to-peer (P2P) technologies developed rapidly in different directions with various applications and routing mechanisms. However, the lack of standardization in functional architectures of the P2P systems makes their performances far from optimal. This trend also restricts the interoperability amongst the systems, and limits the exploitation of the edge-Internet resources and tangible benefits for Internet users. Inspired by the TCP/IP model, this paper introduces PARM: a physically-aware reference model for overlay internetworking. PARM is a layered model that enables a more modular communications approach to solve P2P problems and to optimize systems more efficiently. Simulation results indicate that PARM helps to produce better performance overlays with desirable features such as decentralization, self-organization, and minimal delay penalty.
Chan, J.C. & Hoang, D.B. 2005, 'Novel user-centric model for m-business transformation', Proceedings of International Conference on Mobile Business (ICMB'05), International Conference on Mobile Business, IEEE, Sydney, Australia, pp. 3-8.
View/Download from: UTS OPUS
Current mobile business applications are generally device-centric, platform specific and infrastructure dependent. This paper presents a novel user-centric leading to the development of wireless on-demand systems and services independent of devices, netw
Phan, H. & Hoang, D.B. 2005, 'FICC-DiffServ: A new QoS architecture supporting resources discovery, admission and congestion controls', Proceedings of Third International Conference On Information Technology And Applications, Vol 2, International Conference on Information Technology and Applications, IEEE, Sydney, Australia, pp. 710-715.
View/Download from: UTS OPUS or Publisher's site
Differentiated Services (DiffServ) QoS architecture is scalable but inadequate to deal with network congestion and unable to provide fairness among its traffic aggregates. Recently, IETF has recommended additional functions including admission control an
Chan, J.C. & Hoang, D.B. 2005, 'Service architecture for integrating MANETs with heterogeneous IP networks', 2005 IEEE Wireless Communications And Networking Conference, Vols 1-4 - WCNC 2005: Broadband Wireless For The Masses Ready For Take-Off., IEEE Wireless Communications and Networking Conference, IEEE, New Orleans, LA, USA, pp. 2270-2275.
View/Download from: UTS OPUS or Publisher's site
Multi-hop Ad-hoc Network is promising to extend the reach of current Mobile Internet, and support ubiquitous computing. However, it is hindered by the lack of a flexible network structure bridging the gaps between MANETs and heterogeneous IP networks. This paper introduces a novel Mobile Peer-to-Peer Overlay as an enabling structure for uniting connectivity, mobility and services. Our proposed service architecture allows mobile users to build networks on-the-fly, and capitalize relevant resources in their vicinity for universal communications. Practical implementation of system prototype demonstrates that our proposed framework lays a solid foundation for developing an Integrated Mobile Internet and Ubiquitous Computing.
Yousef, B., Hoang, D.B. & Rogers, G. 2005, 'Autonomic resource management for extensible control planes', Proceedings of Sixth IEEE International Symposium On A World Of Wireless Mobile And Multimedia Networks, Proceedings, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, IEEE, Taormina - Giardini Naxos, Italy, pp. 522-526.
View/Download from: UTS OPUS or Publisher's site
A dynamically extensible control plane is a key enabling feature of next generation intelligent self-configuring networks. This extensibility can be achieved by enabling service deployment into the control plane of a network. These services consume unpre
Yousef, B., Hoang, D.B. & Rogers, G. 2005, 'Partitioning and differentiated resource allocation in programmable networks', Proceedings of 10th IEEE Symposium On Computers And Communications (ISCC 2005), IEEE Symposium on Computers and Communications, IFIP, Cartagena, Spain, pp. 840-845.
View/Download from: UTS OPUS or Publisher's site
Programmable network architectures facilitate dynamically updatable functionality to enable selective and trusted third parties on-demand service deployment. Resource and security management of such architectures on shared infrastructure have proven as challenging tasks. This is due to the extent of functionality provided to users and the heterogenous nature of service resource requirements and resource availability. In this paper we present a new programmable network platform that enables safe sharing by providing each trusted user (e.g., an Internet Service Provider) with a secure, separate, and resource assured partition, representing a virtual router, to accommodate their services. To allocate router internal resources among these partitions and among competing services within a partition, this paper uses a new scalable and adaptive mechanism called Control plane-Quality of Service (C-QoS).
Le, T., Hoang, D.B. & Simmonds, A.J. 2005, 'A self-organising model for topology-aware overlay formation', IEEE International Conference on Communications, IEEE International Conference on Communications, IEEE, Seoul, Korea, pp. 1566-1571.
View/Download from: UTS OPUS or Publisher's site
One of the major weaknesses of existing peer-to-peer (P2P) networks is that their overlay structures do not correlate to the physical underlying network topology. As a result, the overlays waste network resources and introduce excessive end-to-end latency for P2P applications. In this paper, we present a new model for topology-aware overlay formation. Firstly, it clusters nodes that are close to each other in terms of network latency and network membership. Secondly, it discovers the underlying topology between clusters to form an efficient overlay. The model is self-organising and distributed without the need of global knowledge.
Le, T., Hoang, D.B., Simmonds, A.J., Yousef, B. & Chan, J.C. 2005, 'An efficient mechanism for mobility support using peer-to-peer overlay and networks', Proceedings of 2005 3rd Intenational Conference on industrial infomatics (INDIN 2005), International Conference on Industrial Informatics, USA, Perth, Australia, pp. 1-6.
View/Download from: UTS OPUS
Le, T., Hoang, D.B. & Simmonds, A.J. 2005, 'An optimised geographically-aware overlay network', Proceedings of 2005 3rd International Conference on Industrial Informatics (INDIN 2005), International Conference in Industrial Informatics, IEEE, Perth, Aust, pp. 372-377.
View/Download from: UTS OPUS
Uppu, S., Hoang, D.B. & Hintz, T.B. 2005, 'A novel exception handling scheme for outpatient workflow in a wireless handheld hospital environment', Proceedings of the 2005 international symposium on web services and applications, international symposium on web services and applications, CSREA Press, Las Vegas, USA, pp. 169-175.
View/Download from: UTS OPUS
Phan, H., Hoang, D.B. & Yousef, B. 2005, 'Performance analysis of the FICC-DiffServ Architecture', Proceedings of IEEE Conference on Local Computer Networks (LCN), IEEE Conference on Local Computer Networks, IEEE, Sydney, Aust, pp. 451-457.
View/Download from: UTS OPUS or Publisher's site
This paper analyses the behaviour and evaluates the performance of a new QoS DiffServ model, called FICC-DiffServ, as implemented in [I]. The implementation proposed a comprehensive framework for DiffServ networks. In the model, the fair intelligent congestion control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion inside the networks. Simulation results show that the FICC-DiffServ is robust and simple to implement. It provides excellent fairness and minimizes the packet delay and jitter under a wide range of variations of both internal and external network conditions. In addition, the paper investigates the dynamicity of the overall system by studying the impact of its target operating point on the overall system performance and suggesting a scheme to adjust the operating point adaptively
Hoang, D.B., Le, T. & Simmonds, A.J. 2005, 'PIPPON: A physical infrastructure peer-to-peer overlay networks', TENCON - 2005 - 2005 IEEE Region 10, IEEE Tencon (IEEE Region 10 Conference), IEEE, Melbourne, Australia, pp. 1-6.
View/Download from: UTS OPUS
Hoang, D.B. & Lavian, T. 2005, 'Information switching networks', Proceedings of 8th International Symposium on DSP and Communication Systems (DSPCS), International Symposium on DSP and Communication Systems, 2005 DSP for Communication Systems, Noosa Heads, Australia, pp. 1-5.
View/Download from: UTS OPUS
Hoang, D.B. 2005, 'A scalable framework for providing end-to-end QoS for internet applications', MAN 2005-IFIP open conference on metropolitan area networks architecture, protocols, control and management, MAN 2005-IFIP open conference on metropolitan area networks architecture, protocols, control and management, IFIP, Ho Chi Minh City, Vietnam, pp. 64-80.
Hoang, D.B. 2005, 'An Efficient Mechanism for Mobility Support using Peer to Peer Overlay Networks', INDIN 2005, IEEE Press, Perth, Australia, pp. 1-6.
Hoang, D.B. 2005, 'A Programmable Network Platform with QoS-Differentiated Resource Allocation', Proceedings of the 9th IFIP/IEEE International Symposium on Integrated Network Management, IEEE, Nice-Acropolis, France.
Hoang, D.B. 2005, 'Edge-aware Resource Discovery and Price-based Admission Control over Differentiated Service Networks', International Workshop on Network Architecture and Service Models (NASM-2005), Fudan University Press, Shanghai, China.
Yousef, B., Hoang, D.B., Thamsakorn, P., Le, T. & Chan, J.C. 2005, 'Network support for distributed web services', Proceedings of 2005 3rd Intenational Conference on industrial infomatics (INDIN 2005), International Conference on industrial infomatics, IEEE, Perth, Australia, pp. 797-801.
View/Download from: UTS OPUS or Publisher's site
Web servers rely on edge network devices to perform a number of operations that directly affect the experience of clients and Web services. Distributing Web services across geographic locations owned and configured by third parties is becoming increasingly popular in dealing with high demands. Under the current distributed model, a uniform configuration across all sites is difficult to maintain, resulting in different clients and service experience, which are dependent on the local set-up. In this paper, we propose a model and architecture that enable the owner of a Web service to maintain uniform configuration across all hosting sites. The model enables the administrator of a Web service to write a single configuration script that is then executed on all edge devices at all hosting sites. This is enabled by deploying a new edge device architecture called Serviter. Serviter enables safe sharing of devices through strict partitioning and hardware abstraction thereby facilitating interoperability among vendors.
Li, M. & Hoang, D.B. 2004, 'Edge-Aware Resource Discovery and Fair Intelligent Admission Control Scheme over Multi-domain Differentiated Services Networks', Proceedings of IEEE International Conference on Communications (IEEE ICC 2004), IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers Inc, Paris, France, pp. 2065-2070.
View/Download from: UTS OPUS
Li, M. & Hoang, D.B. 2004, 'Resource Discovery and Fair Intelligent Admission Control over Differentiated Services Networks for Variable-Length Packets', Proceedings of the IEEE 10th Asia-Pacific Conference on Communications (APCC 2004), Asia Pacific Conference on Communications, Institute of Electrical and Electronics Engineers Inc, Beijing, China, pp. 499-503.
View/Download from: UTS OPUS
Nguyen, D., Hoang, D.B., Zhao, L. & Lavian, T. 2004, 'Implementation of a Quality of Services Feedback Control Loop on Programmable Routers', Proceedings 2004 12th IEEE International Conference on Networks (ICON 2004), IEEE International Conference on Networks, IEEE, Singapore, pp. 578-582.
View/Download from: UTS OPUS or Publisher's site
Current Diffserv architecture lacks mechanisms for network path discovery with specific service performance. Our aim is to introduce an enhanced-Diffserv scheme utilizing a feedback loop to gather path information and allow better flexibility in managing Diffserv flows. We utilize state-of-the-art programmable routers that can host the control loop operation without compromising their normal routing and switching functionalities. Furthermore, the control feedback loop implemented on the control plane of the router can selectively alter the behaviour of a specific data flow in real-time.
Le, T., Hoang, D.B. & Simmonds, A.J. 2004, 'An Efficient Scheme for Locating Nodes in the Internet Geo-LPM: Geographic Longest Prefix Matching', Proceedings of the Australian Telecommunications Networks and Applications Conference 2004, Australian Telecommunication Networks and Applications Conference, ATNAC, Bondi, Australia, pp. 289-296.
View/Download from: UTS OPUS
Zhou, H., Hoang, D.B. & Nhan, P. 2004, 'A Scheme for Improving TCP Fairness and Throughput in Wireless Networks', Proceedings of the Australian Telecommunication Networks and Application Conference 2004, Australian Telecommunication Networks and Applications Conference, ATNAC, Bondi, Australia, pp. 576-581.
View/Download from: UTS OPUS
Zhou, H., Leis, J., Hoang, D.B. & Nhan, P. 2004, 'Throughput and Fairness of Multiple TCP connections in Wireless Networks', Proceedings The 3rd Workshop on Internet, Telecommunications and Signal Processing WITSP'2004, Workshop on internet, telecommunications and signal processing, IEEE, Adelaide, Australia, pp. 273-276.
View/Download from: UTS OPUS
Zhou, H., Hoang, D.B. & Nhan, P. 2004, 'Introducing feedback congestion control to a network with IEEE 802.11 Wireless LAN', Proceedings of IEEE Wireless Telecommunications Symposium 2004, WTS: Wireless Telecommunications Symposium, IEEE, Pomona, USA, pp. 61-66.
View/Download from: UTS OPUS
The interpretation by transmission control protocol (TCP) of loss of linkage as loss due to congestion causes significant inefficiency in a wireless network. Congestion that often occurs in a wireless LAN results in further reduced performance. The paper introduces a method of controlling congestion in a network via a feedback mechanism called fair intelligent congestion control (FICC) which is useful for improving TCP performance in such a network. FICC overcomes the inefficiency of TCP in misinterpreting the link loss as congestion loss. Simulation testing has demonstrated that, by eliminating buffer overflows caused by congestion, FICC provides desirable fairness, reduces delay variation and improves effective throughput
Lavian, T., Hoang, D.B., Mambretti, J., Figueira, S., Naiksatam, S., Kaushik, N., Monga, I., Durairaj, R., Cutrell, D., Merrill, S., Cohen, H., Daspit, P. & Travostino, F. 2004, 'A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Networks', GridNets 2004, IEEE Press, San Jose, pp. 1-10.
Hoang, D.B., Lavian, T., Figueira, S., Mambretti, J., Monga, I., Naiksatam, S., Cohen, H., Cutrell, D. & Travostino, F. 2004, 'DWDM-RAM: An Architecture for Data Intensive Services Enabled by Next Generation Dynamic Optical Networks', IEEE Globecom 2004 High-Performance Global Grid Networks, IEEE Global Telecommunications Conference, IEEE Press, Texas, USA, pp. 400-409.
View/Download from: UTS OPUS
An architecture is proposed for data-intensive services enabled by next generation dynamic optical networks. The architecture supports new data communication services that allow for coordinating extremely large sets of distributed data. The architecture allows for novel features including algorithms for optimizing and scheduling data transfers, methods for allocating and scheduling network resources, and an intelligent middleware platform that is capable of interfacing application level services to the underlying optical technologies. The significance of the architecture is twofold: 1) it encapsulates optical network resources into a service framework to support dynamically provisioned and advance scheduled data-intensive transport services, and 2) it establishes a generalized enabling framework for intelligent services and applications over next generation networks, not necessarily optical end-to-end. DWDM-RAM1 is an implementation version of the architecture, which is conceptual as well as experimental. This architecture has been implemented in prototype on OMNInet, which is an advanced experimental metro area optical testbed that is based on novel architecture, protocols, control plane services (Optical Dynamic Intelligent Network-ODIN2), and advanced photonic components. This paper presents the concepts behind the DWDM-RAM architecture and its design. The paper also describes an application scenario using the architectures data transfer service and network resource services over the agile OMNInet testbed.
Hoang, D.B., Lavian, T., Figueira, S., Mambretti, J., Naiksatam, S., Cohen, H., Cutrell, D. & Travostino, F. 2004, 'DWDM-RAM: A Data Intensive Grid Service Architecture Enabled by Dynamic Optical Networks', CCGrid'04, 4th IEEE/ACM International Symposium on Cluster Computing and the Grid, IEEE International Symposium on Cluster, Cloud and Grid Computing, IEEE Press, Chicago, USA, pp. 762-764.
View/Download from: UTS OPUS or Publisher's site
Next generation applications and architectures (for example, Grids) are driving radical changes in the nature of traffic, service models, technology, and cost, creating opportunities for an advanced communications infrastructure to tackle next generation data services. To take advantage of these trends and opportunities, research communities are creating new architectures, such as the Open Grid Service Architecture (OGSA), which are being implemented in new prototype advanced infrastructures. The DWDM-RAM project, funded by DARPA, is actively addressing the challenges of next generation applications. DWDM-RAM is an architecture for data-intensive services enabled by next generation dynamic optical networks. It develops and demonstrates a novel architecture for new data communication services, within the OGSA context, that allows for managing extremely large sets of distributed data. Novel features move network services beyond notions of the network as a managed resource, for example, by including capabilities for dynamic on-demand provisioning and advance scheduling. DWDM-RAM encapsulates optical network resources (Lambdas, lightpaths) into a Grid service and integrates their management within the Open Grid Service Architecture. Migration to emerging standards such as WS-Resource Framework (WS-RF) should be straightforward. In initial applications, DWDM-RAM targets specific data-intensive services such as rapid, massive data transfers used by large scale eScience applications, including: high-energy physics, geophysics, life science, bioinformatics, genomics, medical morphometry, tomography, microscopy imaging, astronomical and astrophysical imaging, complex modeling, and visualization.
Nguyen, D., Hoang, D.B. & Symvonis, A. 2004, 'Cost-based Optimization for Video-on-Demand using Delayed-Multicast', Proceedings of IASTED International Conference on Communication Systems and Networks CSN2004, CSN2004, ACTA Press, Marbella, Spain.
This paper examines the issue of how to build a cost effective system for delivering video-on-demand. Rather than simply utilizing buffer space to minimize aggregate bandwidth requirement from the server as is the common case in many previous works, we examine how to minimize the overall cost when amortized buffer cost and bandwidth cost are taken into account. An algorithm which minimizes this overall cost is presented along with simulation results comparing it with other schemes.
Hoang, D.B., Yu, Q., Li, M. & Feng, D. 2002, 'Fair Intelligent Congestion Control Resource Discovery Protocol on TCP Based Network', Converged Networking: Data and Real-time Communications over IP, 6TH International Symposium on Communications Internetworking, Kluwer Publishers, Perth, Australia, pp. 145-159.
Nguyen, D., Hoang, D.B. & Symvonis, A. 2003, 'Multi-level Caching with Delayed Multicast for Video-on-Demand', Proceedings of the 7th IASTED International Conference on Internet and Multimedia Systems and Applications, IASTED International Conference on Internet and Multimedia Systems and Applications, ACTA Press, Honolulu, USA, pp. 699-705.
View/Download from: UTS OPUS
Lavian, T., Wang, P.Y., Durairaj, R., Hoang, D.B. & Travostino, F. 2003, 'Edge Device Multi-unicasting for Video Streaming', Proceedings of the 10th International Conference on Telecommunications, IEEE International Conference on Telecommunications, IEEE, Tahiti, French Polynesia, pp. 1441-1447.
View/Download from: UTS OPUS or Publisher's site
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support of the presence of a physical broadcast medium, various application level multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting edge device any-casting technology that lies between the IP-multicasting and the application layer multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Li, M., Hoang, D.B. & Simmonds, A.J. 2003, 'Fair Intelligent Admission Control over Diffserv Network', ICON 2003, IEEE International Conference on Networks, IEEE, Sydney, Australia, pp. 501-506.
View/Download from: UTS OPUS or Publisher's site
NA
Hoang, D.B. & Li, M. 2003, 'Fair Intelligent Congestion Control over DiffServ: A Resource Discovery and Control Scheme for DiffServ', Proceedings of the 2003 International Conference on Information and Communication Technologies (ICT 2003), International Conference on Information and Communication Technologies, Assumption Univeristy,Bangkok, Bangkok, Thailand, pp. 354-359.
View/Download from: UTS OPUS
Hoang, D.B., Yousef, B. & Rogers, G. 2003, 'The Design of a Secure, Extensible, and Deployable-Programmable Network Platform', ICON2003, IEEE International Conference on Networks, IEEE, Sydney, Australia, pp. 63-68.
View/Download from: UTS OPUS or Publisher's site
Active networks present a novel approach to network customization and service deployment. However, they introduce serious security, scalability, and performance compromises at the heart of networks that render their use onto commercial platforms impractical. In this paper, we present a programmable architecture that is capable of deployment onto commercial platforms, while providing service accommodation with secure user separation in an extensible control plane and verified access to a realtime forwarding plane. We envision the architecture as an enabling framework that facilitates the transfer of programmable network technology to the real world.
Li, M. & Hoang, D.B. 2003, 'Achieving Flow Fairness in DiffServ Class: Per-Flow Fair Admission Control over Differentiated Service Network', Proceedings of the ACIS Fourth Intrnational Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Compting (SNPD'03), International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, International Association for Computer and Information Science (ACIS), Lubeck, Germany, pp. 55-61.
View/Download from: UTS OPUS
Hoang, D.B. 2003, 'GMPLS in Optical Networks', The First Australian Undergraduate Students' Computing Conference, 2003, Australian Undergraduate Students' Computing Conference, The University of Melbourne, Australia, pp. 53-58.
Yu, Q., Li, M., Hoang, D.B. & Feng, D. 2002, 'Fair Intelligent Feedback Mechanism on TCP based Network', Proceedings of The International Conference on Internet Computing, International Conference on Internet Computing, CSREA Press, Las Vegas, USA, pp. 1009-1015.
View/Download from: UTS OPUS
Subramanian, S., Wang, P.Y., Durairaj, R., Rasimas, J., Travostino, F., Lavian, T. & Hoang, D.B. 2002, 'Practical Active Network Services within Content-Aware Gateways', Proceedings of DARPA Active Networks Conference and Exposition, DARPA Active Networks Conference and Exposition, IEEE Computer Society, San Francisco, USA, pp. 344-354.
View/Download from: UTS OPUS
Hoang, D.B., Li, M. & Szewcow, U. 2002, 'RTT-Aware Resource Discovery and Fair Share Mechanism for DiffServ', IEEE International Conference on Networking, ICN 2002, World Scientific, Atlanta, Goergia, pp. 319-330.
Hoang, D.B., Lavian, T., Wang, P.Y., Travostino, F., Subramanian, S. & Sethaput, V. 2002, 'Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engines', DARPA Active Networks Conference & Exposition, IEEE, San Francisco, USA, pp. 65-76.
Yu, Q., Hoang, D.B. & Feng, D. 2002, 'A Comparative Study on the Coherent Approaches to Cooperation Between TCP and ATM Congestion Control Algorithms', Proceedings of The 11th International Conference on Computer Communications and Networks, 11th International Conference Computer Communications and Networks, IEEE, Miami, USA, pp. 580-585.
View/Download from: UTS OPUS or Publisher's site
Numerous studies have indicated that ATM available bit rate (ABR) service can provide low-delay, fairness, and high throughput, and can handle congestion effectively inside the ATM network. However, network congestion is not really eliminated but rather it is pushed out to the edge of the ATM network, packets from TCP sources competing for the available ATM bandwidth are buffered in the routers or switches at the network edges, causing severe congestion, degraded throughput, and unfairness. This poor performance is mainly due to the uncoordinated interaction between the congestion control mechanism of TCP and ATM. It is well accepted that some form of cooperation at edge device would help to control TCP traffic flow over ATM more effectively. We have previously proposed the fair intelligent explicit window adaptation (FIEWA) scheme and fair intelligent ACK bucket control (FIABC) scheme. The key idea is to combine the feedback information from the receiver, from the underlying ATM network, and from the local information at the edge device intelligently to explicitly/implicitly control the TCP rate. We present a comparative simulation study on our schemes with other established schemes; to identify the characteristics of each different scheme; and to indicate the requirement for a fairer, simpler and more robust coherent approach at the edge device.
Nguyen, C., Hoang, D.B. & Symvonis, A. 2002, 'Resource allocation for video-on-demand with "delayed-multicast" protocol', Conference Record / IEEE Global Telecommunications Conference, pp. 1789-1793.
"Delayed-Multicast" is a novel transmission technique which uses internal nodes in the transmission paths from the server to the clients to buffer data streams. The buffers are used to service later requests without having to start new streams from the server,thus bringing the benefits of traditional multicast without the constraint that all requests must be serviced at the same time. In this paper, we describe our new scalable "Delayed-Multicast" framework and present an optimal resource allocation algorithm that minimizes the total bandwidth required to service a set of requests.
Hoang, D.B. 2001, 'A Novel QoS feedback control for supporting compressed video', IEEE Globecom 2001, IEEE Globecom, IEEE Press, pp. 2484-2488.
View/Download from: Publisher's site
Hoang, D.B. 2001, 'A QoS control protocol for rate-adaptive video traffic', Ninth IEEE International Conference on Networks, IEEE Press, pp. 334-338.
Hoang, D.B. 2001, 'Supporting compressed video with explicit rate fair intelligent congestion control in ATM network', International Conference on Communications in Computing, Las Vegas.
Hoang, D.B. 2001, 'Fair Intelligent Explicit Window Adaptation', Internationa Conference on Internet Computing, Las Vegas, pp. 486-492.
Lavian, T., Wang, P.Y., Travostino, F., Subramanian, S., Hoang, D.B. & Sethaput, V. 2001, 'Intelligent Network Services through Active Flow Manipulation', Intelligent Network Workshop, 2001 IEEE, IEEE Intelligent Network Workshop, IEEE Press, Boston, USA, pp. 73-82.
View/Download from: Publisher's site
A significant challenge in today's Internet is the ability to efficiently introduce intelligent network services into commercial high-performance network devices. This paper tackles the challenge by introducing the active flow manipulation (AFM) mechanism, a key enabling technology of the programmable networking platform Openet. AFM enhances the control functionality of network devices through programmability. With AFM, customer network services can exercise intelligent network control by identifying specific flows and applying particular actions thereby altering their behavior in real time. These services are dynamically deployed in the CPU-based control plane and are closely coupled with the silicon-based forwarding plane of the network node, without negatively impacting forwarding performance. The effectiveness of our approach is demonstrated by several experimental applications on a commercial network node
Yu, X., Hoang, D.B. & Feng, D. 2001, 'PCR-based fair intelligent bandwidth allocation for rate adaptive video traffic', Intelligent Multimedia, Video and Speech Processing, 2001. Proceedings of 2001 International Symposium on, International Symposium on Intelligent Multimedia, Video and Speech Processing, IEEE Press, Hong Kong, pp. 141-145.
View/Download from: Publisher's site
In this paper, we propose a network bandwidth sharing algorithm, Peak Cell Rate (PCR)-based Fair Intelligent Bandwidth Allocation (PFIBA) for transporting rate-adaptive video traffic using feedback, and report on its performance under a general PCR-based share policies. Through extensive simulations, we obtained following results. The PFIBA algorithm is capable of allocating bandwidth fairly for the minimum cell rate (MCR) plus PCR-proportional fairness criteria among competitive rate-adaptive video sources, is capable to reallocate smoothly when there are renegotiations of the minimum guaranteed cell rate or PCR by some connections, is able to reallocate smoothly when a new connection is admitted, and is able to reallocate smoothly when a connection is throttled somewhere earlier along the connection path. Furthermore, we show the algorithm prevents congestion, especially during the initial periods when buffer queues can build up significantly
Yu, X., Hoang, D.B. & Feng, D. 2001, 'An allocation algorithm for transporting compressed video', Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing, International Symposium on Intelligent Multimedia, Video and Speech Processing, IEEE, Hong Kong, pp. 137-140.
View/Download from: Publisher's site
n this paper, we proposed a novel weight-based bandwidth allocation algorithm (WBA) for transporting compressed video traffic using feedback. Extensive simulation using a modified NIST simulator is conducted to evaluate its performance under a general weight-based share policy. Our results demonstrate that the WBA algorithm is capable of allocating bandwidth fairly for the minimum cell rate (MCR) plus weighted allocation fairness criteria among competitive compressed video sources, and is capable of reallocating smoothly when there are renegotiations of the minimum guaranteed cell rate and weight by some connections. We also show that WBA algorithm is flexible for the reallocation when a new connection is admitted. Furthermore, when unutilized network bandwidth becomes available, our algorithm is capable of exploiting it to dynamically allocate unused bandwidth
Hoang, D.B. 2001, 'Simulation Analysis of Point-to-Multipoint ABR Service with Fair Intelligent Congestion Control in ATM Networks', The Communication Networks and Distributed Systems Modeling and Simulation Conference, Phoenix, Arizona.
Yu, X., Hoang, D.B. & Feng, D. 2001, 'A QoS control protocol for rate-adaptive video traffic', IEEE International Conference on Networks, ICON, pp. 434-438.
View/Download from: Publisher's site
In this paper, we present an application layer quality of service (QoS) control protocol (QCP), which employs an additive-increase bandwidth feedback algorithm. The protocol enhances the communication between end nodes and "the network" by a QoS packet sent from the source for per n video frames. The destination calculates the delay jitter, throughput for per QoS interval, and sends a backward QoS packet to the source. Upon the receipt of a QoS packet, the source use the delay and the bandwidth contained in the QoS packet to adjusts its sending rate. The protocol is well suited for real-time rate-adaptive video streams. The primary goal is to be easy to implement and provide an efficient application layer QoS control. Through extensive simulations, we conclude that the protocol could be able to control the jitter, delay and loss very efficiently. © 2001 IEEE.
Yu, X., Hoang, D.B. & Feng, D.D. 2000, 'Weight-based fair intelligent bandwidth allocation for rate adaptive video traffic', IEEE International Conference on Networks, ICON, p. 486.
View/Download from: Publisher's site
In this paper, we present a weight-based network bandwidth sharing algorithm, fair intelligent bandwidth allocation (FIBA) for transporting rate adaptive video traffic using feedback, and report on its performance. Through simulations the following results are obtained. The algorithm is capable of allocating bandwidth fairly for the MCR plus weighted allocation fairness criteria and MCR plus allocation proportional to PCR fairness criteria, among competitive, rate-adaptive video sources. It is able to reallocate smoothly when there are renegotiations of the minimum guaranteed cell rate, weight, or peak cell rate by some connections, or when a new connection is admitted, or when a connection is throttled somewhere earlier along the connection path. The algorithm prevents congestion, especially during the initial periods when buffer queues can build up significantly. © 2000 IEEE.
Yu, Q. & Hoang, D.B. 1999, 'Multipoint-to-point ABR service with fair intelligent congestion control in ATM networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 393-395.
View/Download from: Publisher's site
© Springer-Verlag Berlin Heidelberg 1999. Current standards of ATM can only support pt-pt (or unicast) connections and unidirectional point-to-multipoint (pt-mpt) connection and do not provide a scalable solution for truly multipoint-to-multipoint (mpt-mpt) communication. The main reason is that AAL5 does not provide multiplexing identification on a per cell basis. Cells from different packets on a single connection cannot be interleaved. To preserve AAL5 structure, additional mechanisms are needed at the merging point to differentiate packets and prevent cell mixing. In our previous study [1], we have proposed a Fair Intelligent Congestion Control (FICC) for ABR point-to-point traffic. It was demonstrated that FICC is simple, robust, efficient, scalable and fair relative to other proposed congestion control algorithms. In this paper we propose to apply FICC together with simple queueing and scheduling mechanism to provide efficient, fair bandwidth allocation and congestion control in a multipoint-topoint (mpt-pt) connection for heterogeneous service with different data rates. The simulation results show that FICC preserves all the desirable point-to-point properties, and performs equally well in multipoint-to-point connections.
Guo, M. & Hoang, D.B. 1998, 'An object-based network simulator', Global Telecommunications Conference, 1998. GLOBECOM 98. The Bridge to Global Integration. IEEE, IEEE, USA, pp. 1562-1567.
The investigation and simulation study of network problems requires substantial amount of effort devoted to implementations of a common network. The paper presents the development of an object-based simulator. In particular, a simulation environment is d
Hoang, D. & Williamson, G. 1998, 'A mixture of global and local gated experts for the prediction of high frequency foreign exchange rates', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 329-340.
View/Download from: Publisher's site
© Springer-Verlag Berlin Heidelberg 1998. This paper presents a new mixture of experts neural network architecture for the prediction of the US Dollar Swiss Franc exchange rate. This architecture achieves improved prediction results on noisy and non-stationary data. In contrast to previous efforts the current system was designed with a particular emphasis on solving the problems of local overfitting & underfitting caused by non-stationarity and noise in the data. The cascade correlation constructive neural network training algorithm was used for the fast training of near optimal complexity global & local experts. The Kohonen Self Organizing Map was used to find regions of the data on which to train local experts. Improved results were obtained by using a combination of the outputs of the global & local experts.
Hoang, D.B. & James, M. 1997, 'Stability and discriminative properties of the AMI model', Neural Networks,1997., International Conference on, IEEE, USA, pp. 270-274.
We consider a basic biologically plausible neural circuit that employs supragranular self-gain, negative feedback via inhibitory infragranular neuron. Such circuitry has been used as fundamental building blocks in the AMI (a model of intelligence) modula
Hoang, D.B. & James, M.R. 1996, 'AMI: A model of intelligence', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 181-192.
View/Download from: Publisher's site
© Springer-Verlag Berlin Heidelberg 1996. It is reasonable to say that so far neural networks have performed very well on many specific tasks of reasonable size, but their performance is far from satisfactory when applied to realistic but complex tasks such speech recognition and language processing. Yet the brain can perform these tasks efficiently and effortlessly (seemingly) using its optimized mechanisms. It is believed crucial to discover these mechanisms. In this paper, a neural network model of the isocortex as basic building block of intelligent systems is consolidated. The model incorporates mechanisms extracted from cortical circuit as suggested from the study of neuroanatomy. The learning rule compatible with what is known about synaptic adaptation in the neocortex is introduced. Simulations results, which verify the mathematical proof of the model stability and robustness, are presented.
Hoang, D.B. & James, M. 1995, 'Stability of a basic biological neural circuit', Neural Networks, 1995. Proceedings., IEEE International Conference on, IEEE, USA, pp. 1981-1985.
Considers a basic biologically plausible neural circuit that employs supragranular self-gain, negative feedback via inhibitory infragranular neuron. Such circuitry has been used as fundamental building blocks in modular neural networks. The authors first
Yusheng, L. & Hoang, D.B. 1995, 'A performance model for the OSI RPC architecture', Networks, 1995. Theme: Electrotechnology 2000: Communications and Networks. [in conjunction with the] International Conference on Information Engineering., Proceedings of IEEE Singapore International Conference on, IEEE, USA, pp. 31-35.
Hoang, D.B. & Jones, T.W. 1994, 'A new approach to neural networks for character recognition', Neural Networks, 1994. IEEE World Congress on Computational Intelligence., 1994 IEEE International Conference on, pp. 1560-1565.
The paper explores a new way of creating neural networks. The central idea is that concepts are created for reasons related to the problem domain, in this case a character recognition problem, not for the reduction of an error function. The resulting sys
Yusheng, L. & Hoang, D.B. 1994, 'Design and implementation of an OSI RPC system', Singapore ICCS 94. Conference Proceedings., IEEE, USA, pp. 1195-1199.

Journal articles

Hoang, D.B. & Nguyen, B.T. 2016, 'Design of a Workflow-Based Grid Framework', International Journal of Computer Theory and Engineering, vol. 8, no. 1.
Khruahong, S., Xiaoying Kong & Doan Hoang 2015, 'Ontology Design for Thailand Travel Industry', International Journal of Knowledge Engineering, vol. 1(3), no. 3, pp. 191-196.
View/Download from: UTS OPUS or Publisher's site
Tourism industry plays a crucial role in the economics growth in countries of South East Asia and hence the demand for rich local tourist information for visitors. In these countries, there are unique deciding impact factors to visitor journey such as constraints in culture, laws, and festivals. Such special information has not been available or implemented in general search engines so far. In this paper, we design an ontology for Thai travel industry to support an intelligent finding of these local events and their constraints using semantic web. The primary contribution of this paper is a new approach to design ontology for Thailand travel industry on both general information and specific dynamic local information using Domain Ontology Graph (DOG) and location based services. As a result, this ontology design will be applied to an intelligent searching for making decision of tourists. This ontology design will be used in semantic tourism applications in the future.
Hoang, D.B. 2015, 'Software Defined Networking – Shaping up for the next disruptive step?', Australian Journal of Telecommunications and the Digital Economy, vol. 3, no. 4, pp. 48-62.
View/Download from: UTS OPUS or Publisher's site
Software-Defined Networking (SDN) has emerged as a networking paradigm that can remove the limitations of current network infrastructures by separating the control plane from the data forwarding plane. As an immediate result, networks can be managed cost-effectively and autonomously through centralising the decision-making capability at the control plane and the programmability of network devices on the data plane. This allows the two planes to evolve independently and to open up separate horizontal markets on simplified network devices and programmable controllers. More importantly, it opens up markets for infrastructure providers to provision and offer network resources on-demand to multiple tenants and for service providers to develop and deploy their services on shared infrastructure resources cost-effectively. This paper provides an essential understanding of the SDN concept and architecture. It discusses the important implications of the control/data plane separation on network devices, management and applications beyond the scope of the original SDN. It also discusses two major issues that may help to bring the disruptive technology forward: the intent northbound interface and the cost-effective SDN approaches for the industry.
Wang, J., Xu, M., He, X., Lu, H. & Hoang, D.B. 2014, 'A hybrid domain enhanced framework for video retargeting with spatialtemporal importance and 3D grid optimization', Signal Processing, vol. 94, pp. 33-47.
View/Download from: UTS OPUS or Publisher's site
Recently, a ubiquitous video access is highly demanded for online video applications. One big challenge is that video service needs to adapt different device capabilities. Pervasive multimedia devices require an accurate and user comfort video retargeting. Letting users see their preferred content accurately directly affects their comforts. User preferences on video contents are different in various video domains. In this paper, we present a hybrid framework of video retargeting with a domain enhanced spatial-temporal grid optimisation. First, we parse videos from low-level features to high-level visual concepts, combining with visual attention for an accurate importance description. Second, a semantic importance map is built up representing the spatial importance and temporal continuity, which is incorporated with a 3D rectilinear grid scaleplate to map frames to a target display, thereby keeping the aspect ratio of semantically salient objects as well as the perceptual coherency. Extensive evaluations are made on five typical video genres, i.e. sports, advertisements, lecture, news and surveillance. The comparison with the state-of-the-art approaches on both images and videos have demonstrated the advantages of the proposed approach.
Zhang, J., Huang, M. & Hoang, D.B. 2013, 'Visual analytics for intrusion detection in spams', International Journal Grid and Utility Computing Vol X No X 20XX, vol. 4, no. 2/3, pp. 178-186.
View/Download from: UTS OPUS or Publisher's site
Spam email attacks are increasing at an alarming rate and have become more and more cunning in nature. This has necessitated the need for visual spam email analysis within an intrusion detection system to identify these attacks. The challenges are how to increase the accuracy of detection and how to visualise large volumes of spam email to better understand the analysis results and identify email attacks. This paper proposes a DensityWeight model that is to strengthen and extend the system capacity for analysis of network attacks in spam emails, including DDoS attacks. An interactive visual clustering method DATU is introduced to classify and display spam emails. The experimental results have shown that the proposed new model has improved the accuracy of intrusion detection and provides a better understanding of the nature of spam email attacks on though the network.
Furqan, F. & Hoang, D.B. 2013, 'Wireless fair intelligent congestion control - A QoS performance evaluation', Journal of Interconnection Networks, vol. 14, no. 3.
View/Download from: UTS OPUS or Publisher's site
In Broadband Wireless Access (BWA) networks, provisioning of Quality of Service (QoS) is absolutely essential for real time and non real time services. Congestion in these networks can lead to deterioration in QoS experienced by the network users. Congestion avoidance is rarely considered to ensure the QoS of wireless connections. Efforts are mainly aimed at reducing the overload once it has occurred. To avoid congestion at the base station in WiMAX networks, the WiMAX Fair Intelligent Congestion Control (WFICC) was proposed to ensure the traffic is scheduled in such a way that the base station output buffer operates around a target operating point without violating the QoS requirements of connections. The aim of this paper is to investigate WFICC thoroughly and evaluate its performance in terms of throughput, delay and jitter for different Classes of Services (CoSs) under various parameter settings of the algorithm. A detailed and comprehensive simulation study on various settings of parameters is performed in ns-2. The results show that WFICC performs excellently in allocating resources fairly among Class of Services (CoSs) and also preserves their QoS requirements. Furthermore, WFICC is robust and easily adapted to various traffic conditions. © World Scientific Publishing Company.
Bernardo, D.V. & Hoang, D.B. 2012, 'Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID', International Journal Grid and Utility Computing Vol X No X 20XX, vol. 3, no. 2/3, pp. 81-88.
View/Download from: UTS OPUS or Publisher's site
GRID computing infrastructures and applications coordinate uncontrolled and decentralised resources; using new fast data transfer protocols deliver and provide high data transmission that can meet high performance computing requirements of users, institutions, and industries. For such environments standard transport protocols such as TCP and UDP are not always sufficient given their fixed set of properties and limited flexibility. Today, TCP protocol variants have demonstrated better performance in either GRID simulations or WAN and in some limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol).UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, GRID, and including wide area optical networks. We surveyed and conducted experiments on existing mechanisms to determine their viability to secure UDT. The results of the experiments provide important dimensions to our aim of developing a comprehensive security architecture for UDT in the future.
Zheng, L., Hoang, D.B. & Li, M. 2012, 'Wireless Hybrid QoS Architecture with an Enhancement of Fair Intelligent Congestion Control', Wireless Engineering and Technology, vol. 3, no. 3, pp. 113-124.
View/Download from: UTS OPUS
More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. At the radio access level, available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions; so streams of those session-based applications are admitted, established according to the traffic profile they require, and guaranteed. As the core in the Admission Control of the hybrid QoS architecture, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core via mechanisms of packet scheduling, buffer management, feedback and adjustments. It manages effectively the overloading scenario by preventing traffic violation from uncontrolled traffic, and providing guarantee to the priority traffic in terms of guaranteed bandwidth allocation and specified delay
Balasubramanian Appiah, V. & Hoang, D.B. 2010, 'Reliability Measure Model for Assistive Care Loop Framework Using Wireless Sensor Networks', International Journal of Healthcare Engineering, vol. 1, no. 2, pp. 239-254.
View/Download from: UTS OPUS or Publisher's site
Body area wireless sensor networks (BAWSNs) are time-critical systems that rely on the collective data of a group of sensor nodes. Reliable data received at the sink is based on the collective data provided by all the source sensor nodes and not on individual data. Unlike conventional reliability, the definition of retransmission is inapplicable in a BAWSN and would only lead to an elapsed data arrival that is not acceptable for time-critical application. Time-driven applications require high data reliability to maintain detection and responses. Hence, the transmission reliability for the BAWSN should be based on the critical time. In this paper, we develop a theoretical model to measure a BAWSN's transmission reliability, based on the critical time. The proposed model is evaluated through simulation and then compared with the experimental results conducted in our existing Active Care Loop Framework (ACLF). We further show the effect of the sink buffer in transmission reliability after a detailed study of various other co-existing parameters.
Bernardo, D.V. & Hoang, D.B. 2010, 'Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option Field:A Characterization', International Journal of Network Security & Its Appli..., vol. 2, no. 4, pp. 13-28.
View/Download from: UTS OPUS
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocols variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g, in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solultions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocols) for cloud/grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the development of a framework for UDT. In this paper we present lower-level security by introducing an Identity Packet (IP) and Authentication Option (AO) for UDT.
Bernardo, D.V. & Hoang, D.B. 2010, 'A Pragmatic Approach: Achieving Acceptable Security Mechanisms for High Speed Data Transfer Protocol-UDT', International Journal of Security and its Application..., vol. 4, no. 4, pp. 1-16.
View/Download from: UTS OPUS
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addresses various infrastructure requirements for transmitting data in high speed networks. However, this development creates new vulnerabilities when these protocols are designed to solely rely on existing security solutions devised for wired networks cannot be used to protect the unwired ones. The development of UDT, similarly in the development of TCP/UDP many years ogo, lacked a well-though security architecture to address the problems that networks are presently experiencing. This paper proposes and analyses practical security mechanisms for UDT.
Homer, C.S., Catling, C., Sinclair, D., Faizah, N., Balasubramanian Appiah, V., Foureur, M., Hoang, D.B. & Lawrence, E.M. 2010, 'Developing an interactive electronic maternity record', Birtish Journal of Midwifery, vol. 18, no. 6, pp. 384-389.
View/Download from: UTS OPUS or Publisher's site
Women have a strong need to be involved in their own maternity care. Pregnancy hand-held records encourage women's participation in their maternity care; gives them an increased sense of control and improves communication among care providers. They have been successfully used in the UK and New Zealand for almost 20 years. Despite evidence that supports the use of hand-held records, widespread introduction has not occurred in Australia. The need for an electronic version of pregnancy hand-held records has become apparent, especially after the introduction of the Electronic Medical Record in Australia. A personal digital assistant (PDA) was developed as an interactive antenatal electronic maternity record that health-care providers could use in any setting and women could access using the internet. This article will describe the testing of the antenatal electronic maternity record.
Bernardo, D.V. & Hoang, D.B. 2009, 'A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT', Journal of Information Assurance and Security, vol. 1, no. 1, pp. 354-360.
View/Download from: UTS OPUS
This paper proposes a security framework for implementing and securing a next generation protocol-UDT. Using proven network security mechanisms, our model enforces the value of implementing widely accepted network security protocols based on existing TCP/UDP architectures. We apply our model to UDT to illustrate the potential of this model for its successful implementations in UDT.
Le, H., Schiff, N., Du Plessis, J. & Hoang, D.B. 2009, 'A pervasive tele-health system for continual and low intrusive monitoring using peer-to-peer networks', International Journal of Computer Applications in Technology, vol. 34, no. 4, pp. 330-334.
View/Download from: Publisher's site
There are many people suffering from chronic illnesses, obesity and related diseases such as: high blood pressure, arrhythmia, diabetes, etc. However, with a large number of patients and constant health monitoring requirements, a centralised server will not be able to accommodate such high volumes of data. In this paper, the authors propose to develop a pervasive electronic healthcare system using peer-to-peer (P2P) networks. The authors developed a heart monitoring application as their first prototype to demonstrate the concept. The main advantage of the model is scalability and cost efficiency. Copyright © 2009 Inderscience Enterprises Ltd.
Hoang, D.B. & Lawrence, E.M. 2008, 'An Active Grid Infrastructure for Elderly Care', Journal of Telemedicine and Telecare, vol. 14, no. 7, pp. 363-367.
View/Download from: UTS OPUS or Publisher's site
We propose a technique in which elderly people can be monitored non-intrusively. The information is kept in an `active health record which becomes alive when attention or action is necessary concerning the condition of the elderly person. The proposed system consists of three main components: a sensor/actor loop, sensor records and associated active services, and a Grid middleware platform. Information is captured in realtime within a collaborative health-care Grid. The Grid connects elderly people, caregivers and medical service providers in ways that reduce unnecessary calls on expensive medical services through an intermediate local service centre (which can be virtual) assisted with Internet communications and monitoring technologies. The proposal should support preventive health-care programmes for reducing the cost of caring for the elderly.
Yousef, B., Hoang, D.B. & Rogers, G. 2006, 'Serviter A service-oriented programmable network platform for shared infrastructure', Computer Communications, vol. 29, no. 5, pp. 642-659.
View/Download from: UTS OPUS or Publisher's site
Active Networks propose a new approach for dynamic service deployment through the introduction of extensible software components and per-packet processing in the forwarding plane. By doing so, this approach causes serious degradation to performance, scal
Le, H., Hoang, D.B. & Simmonds, A.J. 2006, 'PARM: A physically-aware reference model for overlay for peer to peer internetworking', Journal of Interconnection Networks, vol. 7, no. 4, pp. 451-474.
View/Download from: UTS OPUS
Peer-to-Peer (P2P) technologies developed rapidly in different directions with various applications and routing mechanisms. Each of them deals with a particular task, and/or provides a specific service. They were developed separately without a unified architecture taking into account all the performance factors of a P2P system. This makes the P2P systems incomplete and their performances far from optimal. This trend also restricts the interoperability amongst the systems because of the lack of standardization in functional architectures of the P2P systems. As a result, tangible benefits for Internet users are limited because the edge-Internet resources are not sharable amongst the systems. Inspired by TCP/IP model, this paper introduces PARM: a Physically-Aware Reference Model for Overlay Internetworking, which is an open reference structure for designing better performance P2P systems. PARM divides major functional P2P system tasks into layers so that they can be tackled individually and efficiently. A Peer Name Service was developed to evaluate the model. The service interprets peer names into their current locations. Simulation results indicate that PARM helps to produce excellent performance overlays. The overlays can achieve desirable features such as decentralization, self-organization, scalability, low overhead and minimal delay penalty.
Li, M. & Hoang, D.B. 2005, 'FIAC: a resource discovery-based two-level admission control for differentiated service networks', Computer Communications, vol. 28, no. 19, pp. 2094-2104.
View/Download from: UTS OPUS
Differentiated Service (DiffServ) architecture has been proposed as a scalable QoS architecture for Internet. DiffServ, however, could not control its loads under heavy traffic conditions, and it could not provide strong QoS responses for individual traffic flow. This paper introduces at the edges of a DiffServ domain, a novel two-level admission control scheme, the Fair Intelligent Admission Control (FIAC). At per-class level, FIAC admits traffic according their fairshare and usage while preventing possible congestion within the DiffServ core. At per-flow level, FIAC estimates and allocates the fairshare for each flow within a class. Simulation results demonstrate that FIAC adheres extremely well to the bandwidth requirements of DiffServ classes while preventing congestion within the DiffServ core. With FIAC's per-flow level enabled, FIAC is able to prevent uncontrolled UDP flows from depriving TCP-controlled flows of bandwidth share when they are aggregated to the DiffServ domain.
Li, M., Hoang, D.B. & Simmonds, A.J. 2005, 'Fair intelligent admission control over resource-feedback DiffServ network', Computer Communications, vol. 28, no. 15, pp. 1770-1777.
View/Download from: UTS OPUS or Publisher's site
landfeldt, B., Moors, T., Jha, S.K. & Hoang, D.B. 2005, 'Advances and directing in quality of service management', Computer Communications, vol. 28, no. 15, pp. 1701-1702.
Le, T., Hoang, D.B. & Simmonds, A.J. 2005, 'Geo-LPM: An efficient Scheme for Locating Nodes in the Internet', Telecommunication Journal of Australia (JTA), vol. 55, no. 1, pp. 14-37.
View/Download from: UTS OPUS
Glinos, N., Hoang, D.B., Nguyen, D. & Symvonis, A. 2004, 'Video-on-demand based on delayed-multicast: Algorithmic support', Computer Journal, vol. 47, no. 5, pp. 545-559.
View/Download from: UTS OPUS or Publisher's site
Lavian, T., Hoang, D.B., Travostino, F., Wang, P.Y., Subramanian, S. & Monga, I. 2004, 'An extensible programmable, commercial-grade platform for Internet service architecture', IEEE Transactions On Systems Man And Cybernetics Part C-Applications And Reviews, vol. 34, no. 1, pp. 58-68.
View/Download from: UTS OPUS or Publisher's site
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
Hoang, D.B. 2004, 'Networking Issues of Grid Infrastructures', GFD--37, pp. 1-55.
This paper was written by a group of top international networking researchers. It discussed important issues faced by designers of new types of computer networks and infrastructures. This article is selected since it is published as a formal document of Global Grid Forum and is available for whole global research community, not just Grid community.
Li, M., Hoang, D.B. & Simmonds, A.J. 2003, 'Class-Based Fair Intelligent Admission Control over an Enhanced Differentiated Service Network', Lecture Notes in Computer Science, vol. 2662, pp. 543-552.
View/Download from: UTS OPUS
Yu, Q. & Hoang, D.B. 2002, 'An Intelligent Coherent Approach to Cooperation between TCP and ATM Congestion Control Algorithms - Modeling and Simulation Analysis', Journal of the Society for Modelling and Simulation International, vol. 78, no. 4, pp. 258-267.
View/Download from: UTS OPUS or Publisher's site
The combination of transmission control protocol (TCP) and asynchronous transfer mode (ATM) to deliver transport services may incur significant performance penalties due to the interaction of congestion control algorithms of TCP and ATM. In this paper, the authors examine two control categories (explicit window adaptation [EWA] and ACK bucket control [ABC]) and their representative schemes. In particular, they propose the fair intelligent EWA scheme for EWA and the fair intelligent ABC scheme for ABC. The key idea is to combine the feedback information from the receiver, from the ATM network, and from the local information at edge device intelligently to explicitly/implicitly control the TCP rate. The authors present simulation results to show that their schemes can control the buffer occupancy at edge device efficiently and can carry the benefits of ABR end-to-end, resulting in significant improvement in throughput, fairness, packet loss rate, and end-to-end delay for TCP connections. Both schemes are transparent to TCP, requiring no modifications in the ATM networks except at the network edge device. Importantly, they allow TCP to be used with any underlying network, not just ATM, as long as the network is capable of providing explicit feedback information concerning the availability of bandwidth.
Hoang, D.B. 2001, 'Enabling Active Flow Manipulation in Silicon-based Network Forwarding Engines', Journal of Communications and Networks, vol. 3, no. 1, pp. 78-87.
Hoang, D.B., Yu, X. & Feng, D. 2000, 'Fair intelligent bandwidth allocation for rate-adaptive video traffic', Computer Communications, vol. 23, no. 14-15, pp. 1425-1436.
View/Download from: Publisher's site
This paper presents an algorithm for network bandwidth sharing using explicit rate feedback, the Fair Intelligent Bandwidth Allocation (FIBA) for transporting rate-adaptive video traffic. We show that the FIBA algorithm is capable of allocating bandwidth
Hoang, D.B. & Wang, Z.Z. 2000, 'Performance of TCP applications over atm networks with abr and ubr services - a simulation analysis', Computer Communications, vol. 23, no. 9, pp. 802-815.
View/Download from: Publisher's site
This paper aims to present a comparative simulation study of the performance of TCP traffic over ATM networks with UBR and ABR services, to identify weaknesses of currently most promising ATM congestion control schemes; and to indicate the requirements f
Liu, L. & Hoang, D.B. 1997, 'OSI remote procedure call: standardization issues, design and implementation', Computer Communications, vol. 20, no. 6, pp. 462-474.
View/Download from: Publisher's site
OSI Remote Procedure Call (RPC) has been identified as an essential communications and distribution mechanism for open distributed processing environments. This paper presents a design and implementation of an RPC protocol based on the ISO's second Commi
Liu, L. & Hoang, D.B. 1994, 'OSI RPC model and protocol', Computer Communications, vol. 17, no. 1, pp. 53-66.
Remote procedure call (RPC) provides a useful paradigm for developing distributed applications. The growing use of RPC in developing distributed applications has resulted in international efforts to standardize RPC mechanisms to ensure future interoperab
James, M. & Hoang, D. 1992, 'Design of low-cost, real-time simulation systems for large neural networks', Journal of Parallel and Distributed Computing, vol. 14, no. 3, pp. 221-235.
View/Download from: Publisher's site
Systems with large amounts of computing power and storage are required to simulate very large neural networks capable of tackling complex control problems and real-time emulation of the human sensory, language, and reasoning systems. General-purpose parallel computers do not have communications, processor, and memory architectures optimized for neural computation and so cannot perform such simulations at reasonable cost. This paper analyzes several software and hardware strategies to make feasible the simulation of large neural networks in real-time and presents a particular multicomputer design able to implement these strategies. An important design goal is that the system must not sacrifice computational flexibility for speed as new information about the workings of the brain and new artificial neural network architectures and learning algorithms are continually emerging. © 1992.
Ng, M. & Hoang, D.B. 1987, 'Joint optimization of capacity and flow assignment in a packet-switched communications network', IEEE Transactions On Communications, vol. 35, no. 2, pp. 202-209.
View/Download from: Publisher's site
Ng, M. & Hoang, D.B. 1983, 'Optimal capacity assignment in packet-switching networks', Australian Telecommunication Research, vol. 17, no. 2, pp. 53-65.
Goodwin, G.C., Doan, H.B. & Cantoni, A. 1980, 'Application of ARMA models to automatic channel equalization', Information Sciences, vol. 22, no. 2, pp. 107-129.
View/Download from: Publisher's site
This paper describes a novel approach to automatic channel equalization in digital transmission systems. The approach is based on the use of a finite-dimensional rational approximation to the channel characteristics. This class of channel approximation has the following advantages: it allows a finite parametrization of the channel impulse response which may be of infinite duration, it allows for the possibility of the noise being colored, it applies to either single- or multiple-channel systems, and it has the pedigogical advantage that many other algorithms in current use are based on models which are special cases of this model. The rational approximation to the channel characteristics is used in the paper to develop a new receiver structure using fixed-lag smoothing ideas. Simulation studies are presented showing that the receiver offers advantages over other algorithms for mitigating the effects of intersymbol and interchannel interference including those arising from carrier phase errors. © 1980 Elsevier North Holland, Inc. All rights reserved.
Anderson, B.D.O. & Doan, H.B. 1977, 'Design Procedure for Stable Suboptimal Fixed-Lag Smoothers', IEEE Transactions on Automatic Control, vol. 22, no. 6, pp. 949-952.
View/Download from: Publisher's site
A procedure is presented for designing stable suboptimal fixed-lag smoothers for the continuous-time linear Gaussian problem. Apart from incorporating an ideal delay, the smoothers are finite-dimensional. The design procedure involves the approximation by a very straightforward procedure of a matrix impulse response of compact support by a matrix impulse response with a rational and stable Laplace transform. The approximation procedure involves studying the pole-zero pattern of transfer functions derivable from the transfer function matrix being approximated. Copyright © 1977 by The Institute of Electrical and Electronics Engineers, Inc.
Hullett, J.L., Doan, H.B. & Rosman, G. 1975, 'A Modified Receiver for Optical Transmission Systems', IEEE Transactions on Communications, vol. 23, no. 12, pp. 1514-1518.
View/Download from: Publisher's site
A Percival coil connected between the photodetector and amplifier in the receiver of an optical communication system offers the possibility of improved signal-to-noise ratios (SNR's). When the photodetector is ah avalanche diode, the modified receiver requires a lower value of avalanche gain for optimum performance. Copyright © 1975 by The Institute of Electrical and Electronics Engineers, Inc.