Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Colin Pattinson is active.

Publication


Featured researches published by Colin Pattinson.


distributed systems: operations and management | 2001

A Study of the Behaviour of the Simple Network Management Protocol

Colin Pattinson

The long-standing dominance of the Simple Network Management Protocol (SNMP), in its various flavours (though particularly the original SNMPv1) is being challenged by the development of agent-based (and more specifically mobile-agent based) network management support. One of the criticisms of SNMP is that it suffers from a common failing of such client-server based paradigms, namely the performance problems caused by all traffic being directed to and from a single location (the network management platform). The behaviour of such client-server applications has been explored through the use of the OPNET simulation system, populating the model using data collected from a study of the way a network management platform is used both to monitor a properly-funct ioning network and to collect information in response to fault situations. Initial results are presented for version 1 of SNMP showing the behaviour of the resultant system over a network configuration which includes both local and wide area network links.


trust security and privacy in computing and communications | 2012

The Current State of Understanding of the Energy Efficiency of Cloud Computing

Francis Owusu; Colin Pattinson

Cloud computing has been hailed as the achievement of the long-held dream of computing as a utility and has the potential to transform a large part of the Information and Communication Technology (ICT) industry. Cloud computing is both a business and an economic model which has been gaining popularity since 2006 and it is currently the most talked about technology in the ICT industry. Because it views hardware and software as commodities, the cloud is an example of a disruptive technology. It offers enterprises the opportunity to reduce hardware and software cost and the potential reduction of maintenance and support staff. Data centers and cloud computing services providers hope that the widespread adoption of the cloud will bring them more profit and they are actively promoting the technology. The cloud has had its share of controversy; ranging from the definition of cloud computing to its energy efficiency. This paper discusses one area of controversy; the energy efficiency of cloud computing. We outline previous contributions to the discussion of energy efficiency of cloud computing, provide a working definition of cloud computing and discuss its importance, which will grow as the technology matures and becomes well known.


Campus-wide Information Systems | 2011

Enhancing the Quality of E-Learning through Mobile Technology: A Socio-Cultural and Technology Perspective towards Quality E-Learning Applications.

Galamoyo Male; Colin Pattinson

Purpose – This paper aims to present part of the work of an ongoing research project that is looking at socio‐ cultural and technological developments from a mobile technology convergence view; in order to show how culturally aware convergence developments in mobile technology can be adopted and employed for the betterment of society.Design/methodology/approach – The paper presents a scenario for a mobile technology enabled learning environment in support of the conventional learning approach with a focus on enabling parental involvement and contribution to the daily learning objectives of their children and hence enhancing a quality learning experience. It further critically discusses issues of interface design – at both the device and application levels – that will have an impact on the quality of e‐learning, with a focus on mobile technology.Findings – The paper shows how interface design can positively enhance the quality defining characteristics of learning in an e‐learning environment. Ways of achie...


Journal of Network and Computer Applications | 2000

A simulated network management information base

Colin Pattinson

Initially motivated by the requirement to provide trainee network managers with realistic `hands-on? experience of network management platform, without the problems associated with access to `live? network management data, a simulation-based approach has been adopted, which makes use of a production-standard network management platform, interacting with processes (`model agents?) representing network entities. The development of model agents which provide simulated network management data, whose values are modified according to some pre-determined pattern allows the user to see a (simulated) network whose behaviour, as represented by the variation in the values of data objects within the management information base (MIB), is virtually indistinguishable from a real network with real network entities.This paper describes the processes by which these patterns are controlled, offers an example of how the type of network behaviour reported in published measurements can be simulated, and concludes by proposing the use of such an approach in the study of the behaviour of network managers.


wireless on demand network systems and service | 2008

A Realistic Battlefield Model for the Evaluation of MANET

Adrian J. Pullin; Colin Pattinson

Often quoted MANET applications include battlefield and disaster relief. Most research into MANET routing solutions is done using simulations that contain models of the physical space in which the MANET operates, the number of nodes deployed and the movement patterns and communications requirements of the nodes. This paper presents a specific example model of a battlefield based on a real building and current military tactics, and compares the performance of three protocols (AODV, DSDV and DSR) in this model with a random model similar to those used in most publications.


International Journal of Human Capital and Information Technology Professionals | 2011

Sustainability and Social Responsibility in Raising Awareness of Green Issues through Developing Tertiary Academic Provision: A Case Study

Colin Pattinson; Margaret Ross; Denise Oram

While it is important to promote sustainability throughout ICT-related education, there is a need for individuals who can deliver in the short term. One way to achieve this is the taught Master of Science course, such as Leeds Metropolitan Universitys Green Computing MSc, believed to be the first to commence in the UK. Glyndwr and Southampton Solent Universities have developed awareness of sustainability across the broader curriculum, primarily using professionalism and social responsibility. This paper describes the experiences and thinking behind these developments and offers some suggestions for further development to secure sustainability within the IT education sphere.


Green Information Technology#R##N#A Sustainable Approach | 2015

Critical Issues for Data Center Energy Efficiency

Colin Pattinson; Ah-Lian Kor; Roland Cross

This book chapter is based on a project entitled ‘Measuring Data Centre Efficiency’ (Pattinson and Cross, 2013) funded under the JISC Greening ICT initiative, call for projects 14/10 of October 2010. More specifically, it resides under initiative I of that call, “Rapid Innovation in ICT”. The metering methodology employed for this project fostered metering at varying granularity (e.g. measurement of energy use for individual devices/location of the data center; measurement of energy use for aggregated devices/locations). The project provided real experimental data relating to the accurate measurements of energy consumption in different parts of the data centre. Power Usage Effectiveness (PUE) was calculated based on the collated data and used to provide trends and comparative analysis of the data center efficiency.


european symposium on computer modeling and simulation | 2010

A New Approach for Outlier Detection in Near Real Time

Julius Eiweck; Colin Pattinson; Reinhold Behringer; Alexander K. Seewald

Outlier detection methods have been suggested for a broad range of applications. They are obligatory in different monitoring tasks (e.g. mobile phone monitoring, credit card usage monitoring). Aim is the detection of sudden changes in the usage pattern which may indicate deviations from normal usage. Parametric (statistical) and non parametric methods combined with univariate and multivariate methods form most of the body of research in anomaly detection. In this paper a novel approach for outlier detection is proposed. For the validation of the new approach we have applied the method on voice traffic time-series obtained from a real-life mobile network. Main focus is the incorporation of standard statistical methods, the ability to implement specific heuristics derived from domain expert knowledge and near real-time performance. The reliability achieved with this novel approach for outlier detection is sufficient to be used in operational processes. Enabling the detection of outliers in near real time supports a broad range of monitoring tasks to be performed by the operational staff.


european symposium on computer modeling and simulation | 2008

Using Ship Movement in the Irish Sea for MANET Evaluation

Adrian J. Pullin; Steve Presland; Colin Pattinson

A mobile ad hoc network (MANET) is a self-configuring multi-hop network that does not rely on infrastructure being available. Vehicular ad-hoc networks (VANET) are an application of MANET, with most research focusing on road traffic. The possibility of constructing a VANET for shipping at sea is presented in this paper. Most research into MANET technologies is done using simulations that contain models of the physical space in which the MANET operates, the number of nodes deployed and the movement patterns and communications requirements of the nodes. A method of producing a realistic model for a specific application is presented. Data from the international standard automatic identification system (AIS) used by commercial shipping is gathered and processed to produce a realistic movement model. This model is used in ns-2 simulations to evaluate the application of MANET technologies to shipping. Experiments are performed using different transmission ranges with 802.11 wireless Ethernet as the MAC layer and marine VHF radio as the physical layer. It is demonstrated that the model produces results that are in line with known transmission ranges of marine radio and further concluded that it is possible to construct a MANET for ships in the north Irish Sea using marine VHF as the physical layer.


australasian conference on computer science education | 1998

A network model for network management teaching

Colin Pattinson; Tony Dacre

Experiences in leaching network management at undergraduate and post graduate levels of computer science courses has led to a recognition ‘f ~he need 10 offer some practical experience in xupport of Ike theore~ical material of the trzdilional course. This paper describes the developnwnt of a ‘model agm’, which can be programmed to present mal~agemtwt data 10 a network management platjhm in formats and sequences which simulate a range of network devices and patterns of bduzviour. The paper describes the way in which such a model agenr can be programmed, and shows, by means ofan example simulated network fiwh, how ~he model agents are z{tilised in a p~actical learning environment with a student (in ~.kerole of network manager) Izm’ing to identifi ~id diagnose the ‘fault’ using only data obtained f?om lke model agents forming ‘their’ network

Collaboration


Dive into the Colin Pattinson's collaboration.

Top Co-Authors

Avatar

Ah-Lian Kor

Leeds Beckett University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Asif Iqbal

Leeds Beckett University

View shared research outputs
Top Co-Authors

Avatar

Roland Cross

Leeds Beckett University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Babak Akhgar

Sheffield Hallam University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge