The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditionally, network storage systems have mainly been dominated by two IP-based storage technologies, i.e., Network Attached Storage (NAS) and Storage Area Network (SAN). In recent years, cloud based storage (e.g., Amazon S3) has gained growing popularity for its high flexibility and cross-platform compatibility. Many enterprises are considering to replace traditional storage systems with cloud-based...
Fault localization is a core element in SDN networkmanagement. Many SDN fault reasoning and verificationtechniques assist operators focus on either analyzing the controlplane configuration or checking the data plane network behavior. These solutions are limited in that they cannot correlate networksymptoms between the control and the data planes, and areharder to generalize across protocols since...
Cloud storage has gained increasing popularity in the past few years. In cloud storage, data is stored in the service provider's data centers, and users access data via the network. For such a new storage model, our prior wisdom about conventional storage may not remain valid nor applicable to the emerging cloud storage. In this paper, we present a comprehensive study and attempt to gain insight into...
Cloud storage is receiving high interest in both academia and industry. As a new storage model, it provides many attractive features, such as high availability, resilience, and cost efficiency. Yet, cloud storage also brings many new challenges. In particular, it widens the already-significant semantic gap between applications, which generate data, and storage systems, which manage data. This widening...
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be used for unknown protocols...
Vibration is the main reason for earthen sites to deform and collapse. It is necessary to get vibration data for providing basis to further conserving earthen sites. Traditional monitoring methods are not suitable for the earthen sites because it is destructive and unsustainable. We use the technique of wireless sensor network (WSN) to get the vibration data, and delve into how to transmit large amounts...
It comes out to be the first problem needs to be resolved for wireless sensor networks, that is, to make data acquisition at a lower energy consumption but with high reliability on transmission. So, a reliable transmission protocol with dynamic adjustment for caching position is presented in this paper, which makes a good compromise between transmission reliability and energy consumption. This protocol...
Specifications carrying formal parameters that are bound to concrete data at runtime can effectively and elegantly capture multi-object behaviors or protocols. Unfortunately, parametric specifications are not easy to formulate by nonexperts and, consequently, are rarely available. This paper presents a general approach for mining parametric specifications from program executions, based on a strict...
We discuss the applicability of IEEE 802.15.4 for application in industrial automation. Based on the specific requirements in this field, especially w.r.t. real-time operation, we analyzed the weaknesses of the standard protocol and proposed a novel MAC protocol that keeps the original PHY definition in order to work using available IEEE 802.15.4 chipsets. In earlier work, we analytically derived...
Based on the development of lighting control and management system in the central area of Beijing Olympic park, a large-scale area lighting scheme design language (LALSDL) has been proposed. Through the analysis of the demand of control and manage the lighting devices in the central area of Beijing Olympic park, the characteristics that LALSDL should have are summarized; through the summary of the...
The scene lighting of the Center of Beijing 2008 Olympic Games calls for a lot of lighting devices which are of different types and different communication protocols. The problem that how to standardize these communication messages of devices which use different communication protocols to accomplish unified access of these devices has become one of the most important challenges. To solve these problems,...
Sensor networks have been investigated in many scenarios and a good number of protocols have been developed. With the standardization of the IEEE 802.15.4 protocol, sensor networks became also an interesting topic in industrial automation. Here, the main focus is on real-time capabilities and reliability. We analyzed the IEEE 802.15.4 standard both in a simulation environment and analytically to figure...
We present an approach for integrated network planning with QoS estimation in a simulation tool for use in industrial environments. The architecture is based on a wireless planning tool that uses measurements or accurate models of the environment to predict physical layer signal distribution. This tool allows the precise modeling of industrial environments including machinery, walls, and other obstacles...
A protocol stack can have different internal designs. All the design requires system resources such as CPU execution time and memory. These resources, however, consume scarce resources on an embedded target. This paper introduces different internal design models for TCP/IP protocol stack, and discusses CPU execution and memory consumption for each model, finally indicates optimum design model for...
With the hackers' attacks changing from the desktop to embedded applications, hardware and software security decision leads the whole design of the embedded systems. This paper describes from the characteristics of SSL protocol, concludes two aspects from external hardware cooperation and internal structure optimizations. It presents the strategies of implementing SSL protocol on both software and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.