The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Far from the traditional Internet in which audio and visual senses can be transferred, the Tactile Internet will introduce a way for transferring touch and actuation in real time form. However, the fifth generation of the mobile cellular system (5G) will be a great support for realizing Tactile Internet, the 1 ms round-trip-delay still a great challenge in the way of the Tactile Internet realization...
Internet of Things (IoT) is a concept of communications between multiple devices equipped with sensors and actuators for the purpose of convenience and economic benefits. In connection with the rapid development of IoT concept it becomes necessary to use those or other instruments for the control and management of IoT. Considered scenario is based on the interaction between the central element (smart...
The paper describes a flying ubiquitous sensor network (FUSN) and the method of interaction UAV network (flying segment) and the terrestrial segment. It is shown that the main problem of the interaction is a significant difference between the motion characteristics of the objects of terrestrial and flying segments of FUSN. It is caused by the fact that the sensor node can be in communications range...
The exponential growth of devices connected to the Internet flogged need to improve methods of network management and recently has become one of the most difficult tasks. As a result of the rapid increase in devices connected to the Internet will increase a huge amount of traffic of today's networks. The ideology of software-defined networking will significantly automate and facilitate network management...
This paper is dedicated to the study of the functioning of wireless sensor networks under electromagnetic interference. As a result of electromagnetic interference, there is a degradation of channel quality down to interruption of nearby nodes, which leads to disruption of route. To maintain the stability of the network operation, a sensory field map is built based on RSSI measurements and an alternative...
The paper presents the results of the traffic investigation on the home networks for BitTorrent, Skype and M2M services. The traffic features are investigated on the test beds. One of them is created for Skype and BitTorrent traffic investigation. Another test bed is created for M2M traffic investigation. The related works on the teletraffic investigation area are analysed. The Poisson and self-similar...
Wireless sensor networks are finding increasing application in various areas of our lives. Typically, the sensor network is important not only to detect or measure the value of an event parameter of interest, but also to correlate it to a specific point in space. As the location of sensors on the ground can be random in nature, there is a question of finding the coordinates of all nodes. Thus, the...
Wireless sensor networks are finding increasing application in various areas of our lives. Typically, the sensor network is important not only to detect or measure the value of an event parameter of interest, but also to correlate it to a specific point in space. As the location of sensors on the ground can be random in nature, there is a question of finding the coordinates of all nodes. Thus, the...
This paper describes the results of a full-scale experiment, in which the data from a Thing of Internet is redirected to a false cloud. This paper also suggests methods of protection which can prevent this type of an attack and secure the connection between a Thing of Internet and Public communication network — Cloud service.
This paper describes the results of a full-scale experiment, in which the data from a Thing of Internet is redirected to a false cloud. This paper also suggests methods of protection which can prevent this type of an attack and secure the connection between a Thing of Internet and Public communication network — Cloud service.
The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network,...
The internet of bio-nanothings has become an important research topic last years, because of the broad opportunities for the new applications that it provides. The key problem which should be solved is a creation of its-bio interface for integration of the living substance into the cyberspace. This paper formulates the general conjugation principle of a living substance with an info-communication...
The internet of bio-nanothings has become an important research topic last years, because of the broad opportunities for the new applications that it provides. The key problem which should be solved is a creation of its-bio interface for integration of the living substance into the cyberspace. This paper formulates the general conjugation principle of a living substance with an info-communication...
The paper presents the results of the traffic investigation on the home networks for BitTorrent, Skype and M2M services. The traffic features are investigated on the test beds. One of them is created for Skype and BitTorrent traffic investigation. Another test bed is created for M2M traffic investigation. The related works on the teletraffic investigation area are analysed. The Poisson and self-similar...
The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network,...
The Flying Ubiquitous Sensor Networks (FUSN) includes two segments: ground and flying. The ground segment is the traditional ubiquitous sensor network (USN) with field or mobile sensor nodes. The flying segment represents the one or more small Unmanned Aerial vehicles (sUAV) which are equipped with sensor nodes as well. The sUAV can collect data from ground sensor fields. Furthermore, the sUAV can...
Technical Security Equipment (TSE) is considered as a protected automated system that is governed by the requirements of relative regulatory documents including those on stability to Intentional Electromagnetic Interference (IEMI). This paper introduces a brief overview of ITU-T SG5 activity in the field of standardization of systems protection from electromagnetic interference. The paper presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.