The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The optical network management system is very important for optical equipment monitoring and managing, the timeliness and accuracy are very critical parameters. Automatic discovery of network nodes is the embodiment of automation of network management system. However, most of the traditional automatic discovery method is based on the ICMP protocol, which is to ping all the IP addresses in local area...
Time synchronization is very important in the IEEE802.15.4e network which aim to industrial automation applications. It enabled high end-to-end reliability and low power wireless networking. If an adversary launches time synchronization attacks to the IEEE802.15.4e networks, the whole network communications will be paralyzed. In this paper, we present two types of attacks: 1) ASN and 2) time synchronization...
The rapid development of Peer-to-Peer (P2P) technology brings challenges to quality of service (QoS), network planning and access control. An accurate classification of P2P traffic is vital for addressing those challenges. Traditional port-based and payload-based methods fail to cope with emerging port disguise and payload encryption techniques. In this paper, we present Peer Sorter, a system for...
Many potential safety problems result from the rapid development of P2P IPTV business, and the foundation for effectively managing the business is to accurately identify unstructured P2P multicast video streaming. In this paper, an identification method is proposed which is based on support vector machines. The network traffic is successively separated by flow features and behavior features, and finally...
Smartphone is the best device to provide the location based service in a query-driven indoor location system, since the query of location based service from the user may appear any time or any where. This paper presents a query-driven indoor location system based on commercial available time of arrival (TOA) devices and Android smartphone. An energy-efficiency dynamic TDMA protocol is designed to...
Due to lacking capability of simultaneously gathering information from the embedded system devices and networks, neither WSN simulators nor testbeds could explain how an abnormal exception in the embedded system would influence the network behaviors, and how the network congestion may possibly damage the health of the system on a single node. In this paper, to observe the WSN behavior from both network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.