-
Reduction of Field Loss by a Video Processing System
Authors:
Dr. Timur Mirzoev
Abstract:
Streaming of 60 de-interlaced fields per second digital uncompressed video with 720x480 resolution without a loss of video fields is one of the desired technologies by scientists in biomechanics. If it is possible to stream digital uncompressed video without dropped video fields, then a sophisticated computer analysis of the transmitted via IEEE 1394a connection video is possible. Such process is…
▽ More
Streaming of 60 de-interlaced fields per second digital uncompressed video with 720x480 resolution without a loss of video fields is one of the desired technologies by scientists in biomechanics. If it is possible to stream digital uncompressed video without dropped video fields, then a sophisticated computer analysis of the transmitted via IEEE 1394a connection video is possible. Such process is used in biomechanics when it is important to analyze athletes performance via streaming digital uncompressed video to a computer and then analyzing it using specific software such as Arial Performance Analysis Systems.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Automation Security
Authors:
Dr. Timur Mirzoev
Abstract:
Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatmen…
▽ More
Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation s critical infrastructure and require protection from a variety of threats that exist in cyber space today.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Teaching Network Storage Technology Assessment Outcomes and Directions
Authors:
Dr. V. Jovanovic,
Dr. Timur Mirzoev
Abstract:
The paper presents academic content, delivery and assessment mechanisms used, available resources including initial lessons from teaching Networked Storage Technology as a special topics course to students enrolled in two specific programs - IT and CS. The course is based on the EMC s vendor-neutral Storage Technology Fundamentals course. Furthermore, this manuscript provides a detailed review of…
▽ More
The paper presents academic content, delivery and assessment mechanisms used, available resources including initial lessons from teaching Networked Storage Technology as a special topics course to students enrolled in two specific programs - IT and CS. The course is based on the EMC s vendor-neutral Storage Technology Fundamentals course. Furthermore, this manuscript provides a detailed review of how the course fits into our curriculum, particularly, how it helps achieving the 2008 ABET assessment requirements.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Low Rate Wireless Personal Area Networks (LR-WPAN 802.15.4 standard)
Authors:
Dr. Timur Mirzoev
Abstract:
This manuscript will provide a brief overview on Low Rate Wireless Personal Area Networks (LR-WPAN) for 802.15.4 protocol standard which was approved by IEEE Computer Society in May 2003. 802.15.4 standard presents some advantages for structuring sensor networks and other types of applications that require low rate communications. Some security considerations will also be presented.
This manuscript will provide a brief overview on Low Rate Wireless Personal Area Networks (LR-WPAN) for 802.15.4 protocol standard which was approved by IEEE Computer Society in May 2003. 802.15.4 standard presents some advantages for structuring sensor networks and other types of applications that require low rate communications. Some security considerations will also be presented.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Analysis of Computer Hardware Affecting Video Transmission via IEEE 1394a connection
Authors:
Dr. Timur Mirzoev
Abstract:
When 60 de-interlaced fields per second digital uncompressed video is streamed to a computer, some video fields are lost and not able to be stored on a computer s hard drive successfully. Additionally, this problem amplifies once multiple video sources are deployed. If it is possible to stream digital uncompressed video without dropped video fields, then a sophisticated computer analysis of the tr…
▽ More
When 60 de-interlaced fields per second digital uncompressed video is streamed to a computer, some video fields are lost and not able to be stored on a computer s hard drive successfully. Additionally, this problem amplifies once multiple video sources are deployed. If it is possible to stream digital uncompressed video without dropped video fields, then a sophisticated computer analysis of the transmitted via IEEE 1394a connection video is possible. Such process is used in biomechanics when it is important to analyze athletes performance via streaming digital uncompressed video to a computer and then analyzing it. If a loss of video fields occurs, then a quality analysis of video is not possible.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Wireless Transmission of Video for Biomechanical Analysis
Authors:
Dr. Timur Mirzoev
Abstract:
When there is a possibility to wirelessly stream video over a network, a sophisticated computer analysis of the transmitted video is possible. Such process is used in biomechanics when it is important to analyze athletes performance via streaming digital uncompressed video to a computer and then analyzing it using specific software such as Arial Performance Analysis Systems or Dartfish. This manus…
▽ More
When there is a possibility to wirelessly stream video over a network, a sophisticated computer analysis of the transmitted video is possible. Such process is used in biomechanics when it is important to analyze athletes performance via streaming digital uncompressed video to a computer and then analyzing it using specific software such as Arial Performance Analysis Systems or Dartfish. This manuscript presents some approaches and challenges in streaming video as well as some applications of Information Technology in biomechanics. An example of how scientists from Indiana State University approached the wireless transmission of video is also introduced.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Disaster Recovery Using Virtual Machines
Authors:
Dr. Timur Mirzoev
Abstract:
Today, the importance of having 100% uptime for businesses and industries is clear: financial reasons and often strict government regulations for certain industries require 100% business continuity. The concept of business continuity (BC), as Microsoft defines it: the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of redundant…
▽ More
Today, the importance of having 100% uptime for businesses and industries is clear: financial reasons and often strict government regulations for certain industries require 100% business continuity. The concept of business continuity (BC), as Microsoft defines it: the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy, directly relates to an organization s ability to quickly restore and deploy IT backups and business operations in a short period of time.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Synchronous replication of remote storage
Authors:
Dr. Timur Mirzoev
Abstract:
Storage replication is one of the essential requirements for network environments. While many forms of Network Attached Storage (NAS), Storage Area Networks (SAN) and other forms of network storage exist, there is a need for a reliable synchronous storage replication technique between distant sites (less than 1 mile). Such technology allows setting new standards for network failover and failback s…
▽ More
Storage replication is one of the essential requirements for network environments. While many forms of Network Attached Storage (NAS), Storage Area Networks (SAN) and other forms of network storage exist, there is a need for a reliable synchronous storage replication technique between distant sites (less than 1 mile). Such technology allows setting new standards for network failover and failback systems for virtual servers; specifically, addressing the growing need for effective disaster recovery (DR) planning. The purpose of this manuscript is to identify newest technologies such as SAN/iQ and Storage VMotion that allow for remote storage synchronous replication for virtual servers. This study provides an analysis and a comparison of various SANs that create solutions for enterprise needs. Additionally, the interoperability of these technologies with the industry s leading product VMware ESX Server will be discussed.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Securing Virtualized Datacenters
Authors:
Dr. Timur Mirzoev,
Dr. Baijian Yang
Abstract:
Virtualization is a very popular solution to many problems in datacenter management. It offers increased utilization of existing system resources through effective consolidation, negating the need for more servers and additional rack space. Furthermore, it offers essential capabilities in terms of disaster recovery and potential savings on energy and maintenance costs. However, these benefits may…
▽ More
Virtualization is a very popular solution to many problems in datacenter management. It offers increased utilization of existing system resources through effective consolidation, negating the need for more servers and additional rack space. Furthermore, it offers essential capabilities in terms of disaster recovery and potential savings on energy and maintenance costs. However, these benefits may be tempered by the increased complexities of securing virtual infrastructure. Do the benefits of virtualization outweigh the risks? In this study, the authors evaluated the functionalities of the basic components of virtual datacenters, identified the major risks to the data infrastructure, and present here several solutions for overcoming potential threats to virtual infrastructure.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks
Authors:
Dr. Timur Mirzoev,
Stacey White
Abstract:
This study investigates the role of the client isolation technology Public Secure Packet Forwarding (PSPF) in defending 802.11 wireless (Wi-Fi) clients, connected to a public wireless access point, from Address Resolution Protocol (ARP)cache poisoning attacks, or ARP spoofing. Exploitation of wireless attack vectors such as these have been on the rise and some have made national and international…
▽ More
This study investigates the role of the client isolation technology Public Secure Packet Forwarding (PSPF) in defending 802.11 wireless (Wi-Fi) clients, connected to a public wireless access point, from Address Resolution Protocol (ARP)cache poisoning attacks, or ARP spoofing. Exploitation of wireless attack vectors such as these have been on the rise and some have made national and international news. Although client isolation technologies are common place in most wireless access points, they are rarely enabled by default. Since an average user generally has a limited understanding of IP networking concepts, it is rarely enabled during access point configurations. Isolating wireless clients from one another on unencrypted wireless networks is a simple and potentially effective way of protection. The purpose of this research is to determine if a commonly available and easily implementable wireless client isolation security technology, such as PSPF, is an effective method for defending wireless clients against attacks.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Employing Virtualization for Information Technology Education
Authors:
Timur Mirzoev
Abstract:
This manuscript presents teaching and curriculum design for Information Technology classes. Today, students demand hands-on activities for the newest technologies. It is feasible to satisfy this appetite for exciting education by employing server virtualization technologies to teach advanced concepts with extensive hands-on assignments. Through utilization of virtualized servers, students are able…
▽ More
This manuscript presents teaching and curriculum design for Information Technology classes. Today, students demand hands-on activities for the newest technologies. It is feasible to satisfy this appetite for exciting education by employing server virtualization technologies to teach advanced concepts with extensive hands-on assignments. Through utilization of virtualized servers, students are able to deploy, secure and manage virtual machines and networks in a contained environment. Various techniques, assessment tools and experiences will be analyzed and presented by this manuscript. Previous teaching cases for Information Systems or Information Technology classes are done using non-commercial products, such as free VMware Server or VMware Player. Such products have very limited functionality in terms of networking, storage and resource management. Several advanced datacenter functions, such as Distributed Power Management (DPM), vMotion and others, are not available in desktop versions of that type of virtualization software. This manuscript introduces the utilization of commercial software, such as vSphere 4.1, with full datacenter functionality and operations for teaching Information Technology classes of various levels.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Webpage Load Speed: ASP.NET vs. PHP
Authors:
Dr. Timur Mirzoev,
Lawton Sack
Abstract:
As data transmission speeds over the Internet continue to increase, it is necessary to research and identify technologies that can take advantage of the increased speeds by enhancing the loading speed of webpages. One area of consideration is found in the type of framework that is utilized for a website. There are numerous frameworks that can be chosen from to be used to support a website, each wi…
▽ More
As data transmission speeds over the Internet continue to increase, it is necessary to research and identify technologies that can take advantage of the increased speeds by enhancing the loading speed of webpages. One area of consideration is found in the type of framework that is utilized for a website. There are numerous frameworks that can be chosen from to be used to support a website, each with their distinctive advantages. There are many different opinions that have been tested on which framework should be used to fully realize the optimization of page load speed. This manuscript examines and implements testing methods for two popular frameworks, Active Server Pages .net and PHP, to make a final determination of which framework is most beneficial for webpage load speeds.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
SAP HANA and its performance benefits
Authors:
Timur Mirzoev,
Craig Brockman
Abstract:
In-memory computing has changed the landscape of database technology. Within the database and technology field, advancements occur over the course of time that has had the capacity to transform some fundamental tenants of the technology and how it is applied. The concept of Database Management Systems (DBMS) was realized in industry during the 1960s, allowing users and developers to use a navigati…
▽ More
In-memory computing has changed the landscape of database technology. Within the database and technology field, advancements occur over the course of time that has had the capacity to transform some fundamental tenants of the technology and how it is applied. The concept of Database Management Systems (DBMS) was realized in industry during the 1960s, allowing users and developers to use a navigational model to access the data stored by the computers of that day as they grew in speed and capability. This manuscript is specifically examines the SAPHigh Performance Analytics Appliance(HANA) approach, which is one of the commonly used technologies today. Additionally, this manuscript provides the analysis of the first two of the four common main usecases to utilize SAP HANA's in-memory computing database technology. The performance benefits are important factors for DB calculations.Some of the benefits are quantified and the demonstrated by the defined sets of data.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Leveraging VMware vCloud Director Virtual Applications (vApps) for Operational Expense (OpEx) Efficiency
Authors:
Dr. Timur Mirzoev,
Ramon Alvarez
Abstract:
Virtualization technology has provided many benefits to organizations, but it cannot provide automation. This causes operational expenditure (OpEx) inefficiencies, which are solved by cloud computing (vCloud Director vApps). Organizations have adopted virtualization technology to reduce IT costs and meet business needs. In addition to improved CapEx efficiency, virtualization has enabled organizat…
▽ More
Virtualization technology has provided many benefits to organizations, but it cannot provide automation. This causes operational expenditure (OpEx) inefficiencies, which are solved by cloud computing (vCloud Director vApps). Organizations have adopted virtualization technology to reduce IT costs and meet business needs. In addition to improved CapEx efficiency, virtualization has enabled organizations to respond to business needs faster. While virtualization has dramatically optimized core IT infrastructures, organizations struggle to reduce OpEx costs. Because virtualization only addresses server consolidation, administrators are faced with the manual and resource-intensive day-to-day tasks of managing the rest of the data center: networking, storage, user management. This manuscript presents details on how leverage vApps based on a virtualized platform to improve CapEx efficiency in today s data center. The combination of virtualization and cloud computing can transform the data center into a dynamic, scalable, and agile resource capable of achieving significant CapEx and OpEx cost savings.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Apple IOS Devices for Network Administrators
Authors:
Timur Mirzoev,
Gerard Gingo,
Mike Stawchansky,
Tracy White
Abstract:
As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform significant amounts of their daily work on tablet devices, some even abandoning the ubiqui…
▽ More
As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform significant amounts of their daily work on tablet devices, some even abandoning the ubiquitous laptop or desktop entirely. Operating exclusively from a tablet device, specifically Apple IOS tablet devices creates unique challenges in a corporate environment traditionally dominated by Microsoft Windows operating systems. Interactions with file shares, presentation media, VPN, and remote access present barriers that users and helpdesk support are unfamiliar with in a relation to an iPad or iPhone. Many solutions are being offered to these challenges some of which are analyzed by this manuscript.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era
Authors:
Timur Mirzoev,
Bruce Benson,
David Hillhouse,
Mickey Lewis
Abstract:
Due to the evolving Cloud Computing paradigm, there is a prevailing concern that in the near future data center managers may be in short supply. Cloud computing, as a whole, is becoming more prevalent into today s computing world. In fact, cloud computing has become so popular that some are now referring to data centers as cloud centers. How does this interest in cloud computing translate into emp…
▽ More
Due to the evolving Cloud Computing paradigm, there is a prevailing concern that in the near future data center managers may be in short supply. Cloud computing, as a whole, is becoming more prevalent into today s computing world. In fact, cloud computing has become so popular that some are now referring to data centers as cloud centers. How does this interest in cloud computing translate into employment rates for data center managers? The popularity of the public and private cloud models are the prevailing force behind answering this question. Therefore, the skill set of the datacenter manager has evolved to harness the on demand self-services, broad network access, resource pooling, rapid elasticity, measured service, and multi tenacity characteristics of cloud computing. Using diverse sources ranging from the Bureau of Labor and Statistics to trade articles, this manuscript takes an in-depth look at these employment rates related to the cloud and the determining factors behind them. Based on the information available, datacenter manager employment rates in the cloud computing era will continue to increase well into 2016.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.