The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Far from the traditional Internet in which audio and visual senses can be transferred, the Tactile Internet will introduce a way for transferring touch and actuation in real time form. However, the fifth generation of the mobile cellular system (5G) will be a great support for realizing Tactile Internet, the 1 ms round-trip-delay still a great challenge in the way of the Tactile Internet realization...
Internet of Things (IoT) is a concept of communications between multiple devices equipped with sensors and actuators for the purpose of convenience and economic benefits. In connection with the rapid development of IoT concept it becomes necessary to use those or other instruments for the control and management of IoT. Considered scenario is based on the interaction between the central element (smart...
The paper describes a flying ubiquitous sensor network (FUSN) and the method of interaction UAV network (flying segment) and the terrestrial segment. It is shown that the main problem of the interaction is a significant difference between the motion characteristics of the objects of terrestrial and flying segments of FUSN. It is caused by the fact that the sensor node can be in communications range...
The exponential growth of devices connected to the Internet flogged need to improve methods of network management and recently has become one of the most difficult tasks. As a result of the rapid increase in devices connected to the Internet will increase a huge amount of traffic of today's networks. The ideology of software-defined networking will significantly automate and facilitate network management...
This paper is dedicated to the study of the functioning of wireless sensor networks under electromagnetic interference. As a result of electromagnetic interference, there is a degradation of channel quality down to interruption of nearby nodes, which leads to disruption of route. To maintain the stability of the network operation, a sensory field map is built based on RSSI measurements and an alternative...
The clustering in the Wireless Sensor Networks (WSN) is one of the most important investigation areas. There are many cluster head selection algorithms which were developed before today. These algorithms were developed to 2D and 3D spaces, WSN with fixed and mobile sensor nodes. The main goal of all of developed algorithms is the energy consumption decreasing and WSN life-time increasing. The new...
The paper presents the results of the traffic investigation on the home networks for BitTorrent, Skype and M2M services. The traffic features are investigated on the test beds. One of them is created for Skype and BitTorrent traffic investigation. Another test bed is created for M2M traffic investigation. The related works on the teletraffic investigation area are analysed. The Poisson and self-similar...
Abstract. The clustering in the Wireless Sensor Networks (WSN) is one of the most important investigation areas. There are many cluster head selection algorithms which were developed before today. These algorithms were developed to 2D and 3D spaces, WSN with fixed and mobile sensor nodes. The main goal of all of developed algorithms is the energy consumption decreasing and WSN life-time increasing...
This paper describes the results of a full-scale experiment, in which the data from a Thing of Internet is redirected to a false cloud. This paper also suggests methods of protection which can prevent this type of an attack and secure the connection between a Thing of Internet and Public communication network — Cloud service.
This paper describes the results of a full-scale experiment, in which the data from a Thing of Internet is redirected to a false cloud. This paper also suggests methods of protection which can prevent this type of an attack and secure the connection between a Thing of Internet and Public communication network — Cloud service.
The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network,...
The internet of bio-nanothings has become an important research topic last years, because of the broad opportunities for the new applications that it provides. The key problem which should be solved is a creation of its-bio interface for integration of the living substance into the cyberspace. This paper formulates the general conjugation principle of a living substance with an info-communication...
The internet of bio-nanothings has become an important research topic last years, because of the broad opportunities for the new applications that it provides. The key problem which should be solved is a creation of its-bio interface for integration of the living substance into the cyberspace. This paper formulates the general conjugation principle of a living substance with an info-communication...
The paper presents the results of the traffic investigation on the home networks for BitTorrent, Skype and M2M services. The traffic features are investigated on the test beds. One of them is created for Skype and BitTorrent traffic investigation. Another test bed is created for M2M traffic investigation. The related works on the teletraffic investigation area are analysed. The Poisson and self-similar...
The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network,...
In this study, the authors propose a mobility adaptive clustering algorithm for wireless sensor networks with mobile nodes. In the proposed algorithm, a sensor node selects itself as a cluster head based on a Single Point Predictor for the combined criterion prediction. Here, as a combined criterion predicting proposed comprising parameters as connectivity, coverage, mobility and residual energy consumption...
The introduction of a broad concept of the Internet of Things, together with the development of LTE systems (Long Term Evolution) raises a number of new challenges for the integration of resources of self-organizing networks and traffic management in LTE. The article investigates the possibilities of increasing in the residual energy and the duration of the life cycle of a sensor network by providing...
The Flying Ubiquitous Sensor Networks (FUSN) includes two segments: ground and flying. The ground segment is the traditional ubiquitous sensor network (USN) with field or mobile sensor nodes. The flying segment represents the one or more small Unmanned Aerial vehicles (sUAV) which are equipped with sensor nodes as well. The sUAV can collect data from ground sensor fields. Furthermore, the sUAV can...
Feasible traffic model is one of the most important investigation topic for a network during its planning and performance evaluation. This paper studies traffic characteristics generated by machine-to-machine (M2M) mobile devices. In particular traffic volumes are estimated through practical measurements. It appeared, that within 24 hours, M2M traffic generated by a smartphone is significantly larger...
Ubiquitous Sensor Networks (USN) are the technological basis for the concept of the Internet of Things. Many applications of the Internet of Things provides for the creation of USN with different density of nodes placement. This leads to the necessity of comparing the USN routing protocols and select a particular protocol for the construction of the sensor network, depending on this density. The article...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.