The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the present world, there are many high tech appliances in our homes that make our lives easier. It is necessary to control these appliances remotely. To automate a machine, a secondary brain (another machine) is required to ‘Think’ and control machines to do tasks as per the convenience of the user from long distances. An automation system is proposed for the users to control home electronic appliances...
The Internet of Things (IoT) is the next wave of innovation that promises to improve and optimize our daily life based on intelligent sensors and smart objects working together. Through Internet Protocol (IP) connectivity, devices can now be connected to the Internet, thus allowing them to be read, controlled, and managed at any time and at any place. Security is an important aspect for IoT deployments...
A prominent function of a mobile host is seamless Vertical Handoff (VHO) that ensures application service continuity and quality. VHO decision algorithms that have been proposed in the literature consider parameters such as wireless channel quality (RSSI), cost, channel load, and available bandwidth. The mobile node runs the VHO algorithm autonomously and makes the decision. We highlight the fact...
Distributed Denials of Service (DDoS) attacks are increasing over the Internet, where the attacker consumes all the resources of the network or the victim computer, thus preventing legitimate users from accessing the services. This paper compares the impact of a DDoS attack, called Land Attack, on popular operating systems such as ??Windows XP??, ??windows Vista?? and ??Apple's Leopard??. We investigate...
The towed array electronics is essentially a multichannel real time data acquisition system. The major challenges involved in it are the simultaneous acquisition of data from multiple channels, telemetry of the data over tow cable (several kilometres in some systems) and synchronization with the onboard receiver for accurate reconstruction. A serial protocol is best suited to transmit the data to...
With the integration of IP and optical technology, fast optical network (of the order of 10 Gbps) has emerged to support international research cooperation such as massive scientific data transfer and next generation Internet related research. Therefore, it is important to analyze the measurement issues to guide the high speed transport protocol research for high speed optical network of the order...
In complex embedded applications, optimization and adaptation at run time of both dynamic and leakage power have become an issue at SoC coarse grain. We propose in this paper a fully integrated Power Supply Unit for fine grain DVFS and adaptive leakage control. The proposed PSU offers five power modes and can be easily integrated in any IP unit. The PSU has been implemented and validated in a STMicroelectronics...
Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete operations. However, at moderate or high loads collisions are quite frequent which not only increases the access time, but also induces non- determinism in the performance. Due to this non-determinism, the performance of these hash...
Data structures representing directed graphs with edges labeled by symbols from a finite alphabet are used to implement packet processing algorithms used in a variety of network applications. In this paper we present a novel approach to represent such data structures, which significantly reduces the amount of memory required. This approach called history-based encoding, execution and addressing (HEXA)...
With the increase in need for wireless appliances to support mobility, many schemes have been proposed to improve the quality of service (QoS) levels during handoffs. Although these schemes have been proven to be very effective in improving the latency and packet loss during handoffs to a significant level, they are mainly limited to micro-mobility scenario. In the context of macro-mobility, mobile...
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been proposed, which delivers very high lookup and update throughput. These architectures often use a pipeline of embedded memories, where each stage stores a single or set of levels of the lookup trie. A stream of lookup requests are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.