The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Overlay solutions of SDN-based networks became very popular. Controller as a centralized management devices gather information about network topology and current network state. Overlay network have a lot benefits however the using of classical traffic engineering principles for traffic management in Software-Defined Network is becoming problem. The physical network does not automatically adapt to...
This paper represents the characteristic of current state of information technologies. In addition, it provides with the comparative analysis of wireless technologies and proves the relevance of the issues of the Internet of Things. Moreover, it describes the built working prototype of a device for remote power management, which will find its practical application at businesses, offices, data centers...
This paper represents the implemented model of electronic control system based on the concept of Internet of Things. The current state of information and communication networks, its perspectives and concepts of development were characterized. Components for deploying Internet of Things networks such as communication technology, controllers, reader equipment and identification devices, have been identified...
The conception of the pseudonondeterministic cryptography is considered. Multiplied data-driven pseudonondeterministic hash constructions, which provide infeasibility increasing against generic attacks based on the multicollision designing, were proposed. The estimations of the infeasibility increasing were presented. The instances of the data-driven pseudonondeterministic hashing methods, which could...
The mathematical model of the process of communicating real time traffic in telecommunication network channel with commutation of packets, which is based on exponential distribution of the moments of starting communicating and duration of communicating real time streams, is set forth in the article. Using the pro-posed model allows researching, by virtue of imitation, the process of dynamic change...
in this article are listed the most popular IoT platforms and their performances. This platforms are used to create modern IoT projects in startups, scientific projects and other useful devices for smart house etc. The article formulates basic review of hardware platforms based on user needs.
Method of data segmentation and transferring via disjoint ways for providing secure connections between nodes in computer network. This method purposed as tool for reduce the chance of information interception.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.