Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Scanning attack threatens the security of network communication severely. Traditional network communication usually uses static IP address configuration, which provides convenience to scanning attackers. In this paper, an IP Hopping (IPH) communication scheme is proposed based on software-defined network to solve this problem, in which IP addresses can be assigned to the hosts in the network dynamically...
To build a simple picture of M2M communication under service-oriented M2M architecture, a key innovation underlines the enablement of M2M device abstraction and semantics support. However, state of the art structures of M2M devices/software lack common M2M Service Layer for interoperability. Devices/software rely heavily on specific API implementation-oriented data services and the data definition...
In this paper, a communication-based fault detection and isolation strategy for multi-agent systems is proposed and all the fault processing operations are achieved by controlling the contents of communication. A fault detection scheme based on the gossip algorithm and status information exchange is introduced first. Then, a new fault isolation and recovery algorithm is designed to moderate its negative...
Along with the popularization of e-Commerce and the development of the business of the corporations, requirements of collaboration among supply systems of inter-corporations and inner-corporations become more and more popular. And traditional integration technologies of enterprise applications cannot adapt to the quick increment of the enterprise information system. The birth and development of Web...
In order to solve the communication conflict of the mine personnel positioning system, clustering protocol is employed, in which the node receiving the strongest signal is selected as the new head of the cluster and the members are selected based on the method of RSSI similarity and neighbor node K. Simulation on clustering protocol was performed using the software MATLAB. It indicated that the speed...
The Network Configuration Protocol (NETCONF) is a new network Management Protocol which becomes more and more widely used in network management area. To make NETCONF much safer, we extend the extensible Access Control Markup Language(XACML) access control mechanism and implement it on our NETCONF network management system-BUPT-NEP. We use subtree filtering expression to represent resource instead...
The project aimed to improve an automatic system for changing feed horn. We developed a precisely positioning unit for the system in the place of manual feed which might cause seriously decreasing of accuracy because of aging equipments, thus to raise accuracy of feedback. The traditional length gauge sensor used for positioning can generally reach a precision of 1mm, but with a serious drift of temperature,...
Since the IEEE 802.11 standard supports multiple data rates at the physical layer, many rate adaptation mechanisms have been proposed to utilize this multi-rate capability by dynamically switching rates in response to different channel conditions. In IEEE 802.11b networks, the guarantee of an equal transmission opportunity for all participating nodes results in performance anomaly. Initial contention...
NETCONF is a new standard network configuration protocol. For further research we have developed an open experimental platform for NETCONF protocol, BUPT-NEP (BUPT NETCONF Experimental Platform). Moreover, based on the experimental platform some significant technologies, such as data filtering, data storage and so on, are considered. This paper gives a detailed introduction of the tree data model...
NETCONF, a new network management protocol, was released in 2006 which has overcome the weaknesses of SNMP. In the NETCONF protocol, it proposed a new mechanism subtree filtering, which allows an application to select particular XML subtrees. With the Subtree Filtering, specifically information of XML can be filtered out as a XML subtree. However, since the Subtree Filtering depends on the parsing...
NETCONF is a new protocol as the network becomes more and more complexity, which has a better capability administering lots of devices. However, the large scale network brings some trouble for implementing access control especially when administers need to deploy or update policies on each devices. In this regard, the architecture of centralized access control proxy server based on NETCONF is focused,...
This paper aims at designing a new effective signaling mechanism for relay coordination in LTE-Advanced. Under the new signaling mechanism, the need of synchronization among multiple relays is eliminated, thus it owns advantages of practicality and high spectral efficiency. Also, considering the characteristic of access and backhaul link in LTE-A, the outage capacity and bit error rate for ODAF and...
NETCONF is a new network management protocol, based on the XML encoding method, which was proposed by IETF in 2006. It aims to overcome the shortcomings of SNMP predominantly used for configuration tasks at present. In the NETCONF protocol, subtree filtering mechanism and XPath capability is defined, both used to allow a client to select particular XML subtrees of the data model of the server. In...
In BGP, autonomous systems (ASes) advertise routes. Unfortunately, malicious ASes can advertise false routes that do not exist in the Internet. Many extensions of BGP have been proposed to allow each AS to check whether the received routes are false. It turns out that none of these extensions can defend against collusions among malicious ASes. In this paper, we present an extension of BGP that can...
In 2006, the IETF released its latest effort, NETCONF, a brand new network management protocol, which is based on the XML encoding method. The NETCONF protocol is thought to be able to meet the requirement of configuration management which SNMP fails to do well. The NETCONF protocol also performs better in other fields such as the efficiency, more flexible operations, etc. But, as a new protocol,...
As SNMP management system has some weaknesses due to its built-in functional limitation, NETCONF, with XML as its data encoding scheme, is viewed as a promising solution for future network configuration management. To make NETCONF interoperable and capable of manipulating data in a standardized fashion, an extensible data modeling language, YANG, was proposed to model data including configuration...
As network grows in complexity, types of management data become so diverse that the SNMP protocol exceeds the demands of network management. Therefore, the NETCONF protocol appears, which is a network configuration protocol, making use of XML in encoding. Under these circumstances, we have developed an open experimental platform environment for NETCONF protocol, BUPT-NEP (BUPT NETCONF Experimental...
Based on the analysis and comparison of normal network management protocols, which mean SNMP, CORBA and Web services, a novel scheme of Northbound Interface according to JMS specification is proposed in WiMAX network management systems. Detailed procedures and functional entities are designed in this paper. It is proved that the design is markedly superior to other choices, as it can enhance the performance...
With the emergence of Information Communication Technology (ICT), enabling end users to take part in telecom service creation is critical for telecom operators. To stimulate the production of end user-generated services, the service platform should provide adaptation and personalization mechanisms to end users. We present a user profile repository approach that takes account of the personalization...
Privacy protection is particularly challenging in location based services (LBS). On one hand, service providers want to authenticate legitimate users. On the other hand, mobile users would prefer not to expose any information which enables anyone, including service providers, to get some clue regarding their whereabouts. To resolve this dilemma, we propose an anonymous authentication protocol to protect...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.