The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an advanced routing method in the purpose of increasing IoT routing device’s power-efficiency, which allows to centralize routing tables computing as well as to push loading, related to routing tables computation, towards the Cloud environment at all. We introduced a phased solution for the formulated task. Generally, next steps were performed: stated requirements for the system...
This paper considers the continuous integration (CI) process of user-related services based on free modern software. The CI pipeline consist of source control, quality control, testing, building and deployment of service every time new commit comes to source control server. CI is very important part of service lifecycle due to demands of security and quality assurance at the stage of service deployment...
In this paper we propose a load balancing algorithm to increase the availability of network resources during peak local loads in wireless cellular networks. We simulate a network behavior in normal mode and with using the proposed method.
This paper relates to the problem statement of distribution of heterogeneous information and communication system capacity among multiple service flows. We consider the case study of multi-commodity flow problem in terms of utility functions maximization. This approach differs from previously known by separating the optimization problem into layers based on Bellman's Principle of Optimality. It simplifies...
Cyberprotection topic will remain relevant as the network traffic, it's types and types of Internet-connected elements growth will continue to increase during the future decades. New data protection systems with previously unknown or unused functional anomalies detection systems have some advantage time before intruders figure out a way to bypass the defense which proves the relevance of these systems...
This paper surveys a new and comprehensive concept of services assurance in distributed heterogeneous service-oriented systems. A vertical decomposition of the service delivery is proposed for these systems. The mathematical model of request transmission process is developed.
This paper is devoted to the development of the extended multi-commodity flow model in order to provide optimal routing based on the criteria of quality of service and minimal maximal channel utilization. Since most of the models consider these criteria separately and do not consider different requirements of flows to quality of service, the proposed model allows to close this gap by allowing to achieve...
This paper depicts the modern state and directions of the future development in the area of information and telecommunication systems. We analyze the most interesting and promised technologies of the last decade to define the predictable directions of further ICT shifting.
In this paper the conceptual basics of the migrating firewall are given. Being sophisticated to bypass and robust, it could serve as the multilayer platform of scalable cloud network that demand high level of the defense from different kind of harmful impact and network attacks.
This paper presents a new paradigm of optical data transmission based on resource grid forming. Unlike ordinary data transmission over Gigabit Ethernet network, we suggested optical wavelength-time division multiple access networks. The main difference of this method, is division the data between wavelength-time symbols. Thus, each user allocated on necessary set of wavelengths during fixed time interval...
Improved Channel Quality Indicator (CQI) reporting scheme which aims to reduce the required CQI signaling even when the downlink data activity is high by employing a CQI prediction method. According to this paper, Node B Expectations all the intermediary CQI reports between two subsequent CQI reports by utilizing a FSMC model of the wireless channel. The proposed prediction-based CQI reporting scheme...
This work proposes the analysis of service quality parameters for packet networks. The algorithm of packet processing is designed. It is made a research of delay and jitter for proposed processing method.
The toroidal topology structures and examples of infocommunications networks construction were considered. The tensor presentation of topology structure for toroidal networks is proposed. The compound-tensor is entered and the decomposition of difficult topology structure was conducted.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.