Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
To meet the deadlines of interactive applications, congestion-agnostic transport protocols like UDP are increasingly used side-by-side with congestion-responsive TCP. As bandwidth is not totally virtualized in data centers, service outage may occur (for some applications) when such diverse traffics contend for the small buffers in the switches. In this paper we present SDN-GCC, a simple and practical...
Due to improvements in defensive systems, network threats are becoming increasingly sophisticated and complex as cybercriminals are using various methods to cloak their actions. This, among others, includes the application of network steganography e.g. to hide the communication between an infected host and a malicious control server by embedding commands into innocent-looking traffic. Currently, a...
The rise of Software Defined Networking (SDN) presents an opportunity to overcome the limitations of rigid and static traditional Internet architecture and provide services like network layer multicast for live video streaming. In this paper we propose mCast, an SDN-based architecture for live streaming, to reduce the utilization of network and system resources for both Internet Service Providers...
In this paper, we propose a new geographic holebypassing routing algorithm based on virtual convex model in Wireless Ad hoc Networks (WANETs). Our method is to convert an actual hole into a basic virtual convex first and then use line segments that are parallel to the basic virtual convex to find candidates of anchor points. Later, among these candidates, we choose appropriate anchor points to be...
This paper describes the development of a data exchange protocol for self-organizing computing environments with minimal latency. The protocol is implemented using standard software libraries for mobile device networks. The neighborhood method involves building a route using two broadcast requests, and the method proposed here is implemented using two broadcast requests. One of these requests is issued...
To cope with the varying delay and bandwidth requirements of today’s mobile applications, mobile wireless networks can profit from classifying and predicting mobile application traffic. State-of-the-art traffic classification approaches have various disadvantages: port-based classification methods can be circumvented by choosing non-standard ports, protocol fingerprinting can be confused...
Automation of modern industrial plants require real-time tracking of object locations and sensing of local and ambient parameters for variety of applications such as counting and tracking of objects in assembly line, detection and positioning of failures of machines etc. Mostly, discrete Real Time Location System (RTLS) performs object tracking in existing industrial automation without its integration...
To alleviate the pressure brought by the explosion of mobile video traffic on present cellular networks, small cell base stations (SBS) with caching ability are introduced. In this paper, we consider the caching strategy using network coding for mobile users over heterogeneous wireless network containing SBSs. We formulate an integer programming problem to minimize the average number of packets downloaded...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
Many BitTorrent clients are using these networks as a video-on-demand service, taking advantage of the popularity and the enormity of the collection of media available. However, it is a common sense that transforming the swarms into an on-demand media service causes serious damage to the overall network performance, given that streamer clients modify the method of downloading determined in the protocol...
SDN network’s policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting those conflicts is a laborious and challenging task. This paper presents two-fold contributions. First, we devise an offline method for detecting unmatched OpenFlow...
This paper presents an energy-efficient solution to overcome packet loss in Wireless Sensor Networks (WSNs) by adding seed-based Random Linear Network Coding to MQTT for Sensor Networks (MQTT-SN). Whereas most sensors integrated in common WSN devices consume little energy, using the radio is costly. To increase battery lifetime, devices try to minimize their radio uptime, while still satisfy timeliness...
Low Extra Delay Background Transport (LEDBAT) is defined in RFC6817 as a congestion control algorithm for lower than best effort transport service that reacts to both delay and loss congestion signals. LEDBAT allows bulk transfer applications (such peer-to-peer file transfer and software updates) to utilize available capacity in the background while limiting additional forward queuing delays at network...
EtherCAT is one of the real-time Ethernet protocols widely employed in industrial controls. However, its wireless extension is not straightforward due to the unique on-the-fly bus access method based on summation-frame. This paper explores the possibilities of interconnecting EtherCAT with wireless standards such as IEEE 802.11 and 802.15.4. The gateway design is presented and event-driven interconnection...
The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer...
In this paper, we focus on an application of recurrent neural networks for learning a model that predicts taxi demand based on the requests in the past. A model that can learn time series data is necessary here since taxi requests in the future relate to the requests in the past. For instance, someone who requests a taxi to a movie theater, may also request a taxi to return home after few hours. We...
In this paper, we propose an access control architecture for IoT systems by developing a hybrid model with attributes, capabilities and role-based access control. We apply attributes for role-membership assignment and in permission evaluation, Membership of roles grants capabilities which are used to access specific services provided by things. This approach improves policy management for IoT systems...
During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can be interconnected using wireless ad hoc and disruption-tolerant networking to establish a backup emergency communication system for civilians and emergency services. However, such communication systems entail serious security risks, since adversaries may attempt...
Quality of service and quality of experience are of increasingly interest for successful communication network applications, particularly for decentralized networks, such as peer-to-peer (p2p) networks. They need sophisticated monitoring mechanisms to be able to adapt the system's parameters to maintain a certain level of quality of service. In the literature, several well-studied approaches, classified...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.